Tag:ip
-
Time:2021-1-13
Copy codeThe code is as follows: @echo off : check whether the IP format is standard:: code by jm 2006-10-23 :begin cls set input= Set / P input = please input IP:echo %input%|findstr “^[0-9]*\.[0-9]*\.[0-9]*\.[0-9]*$”>nul||goto fail set _input=%input:.= % call :check %_input% :check if “%4″==”” goto fail for %%i in (%1 %2 %3 %4) do ( […]
-
Time:2020-12-25
Many people will encounter the need to Ping a network segment to see which IP addresses are in use. Some group Ping software downloaded from the Internet either reports virus by antivirus software or displays different results each time. Therefore, after integrating various batch Ping commands on the Internet, I organized a batch processing by […]
-
Time:2020-12-23
Copy codeThe code is as follows: @echo off for /f “tokens=15” %%i in (‘ipconfig ^| find /i “ip address”‘) do set ip=%%i echo %ip% pause
-
Time:2020-12-8
Mac users must know the difference between IP address and MAC address, but for their own computer IP address and MAC address is what, many users may not be able to know, then, how to check their own computer IP address and MAC address? Now the editor will teach you a solution. View method: 1. […]
-
Time:2020-11-11
install and configure The fail2ban tool can automatically access the IP address of an intruder by analyzing the log. The download address is at:http://fail2ban.sourceforge.net/rpms/Find the latest version of the RPM package to install. After installation, you can use it by changing the configuration slightly according to your own situation. Copy code The code is as […]
-
Time:2020-11-8
PHP comes with a very simple global variable to obtain IP address. Many beginners use it to obtain IP address. However, we can meet the general usage for these functions, but we can’t do it for the function that requires high precision. This is the simplest method. There is no way to open a transparent […]
-
Time:2020-10-31
Sometimes, the IP address of some countries has been trying to login or attack the server. It is necessary to analyze the suspicious IP first and then seal it with iptables. Delay is time-consuming and laborious. Now you can use xtables addons to block the source IP.1. Preconditionsiptables >= 1.4.5kernel-devel >= 3.72. Install the dependency […]
-
Time:2020-10-26
In our daily use of computers, we often need to check the IP address of our computer. Of course, this is the simplest for many people, but for many people who are not very familiar with computers, especially girls, are confused and don’t know where to start. The following small series for you to introduce […]
-
Time:2020-9-30
This tutorial describes how to verify IP address of domain name or computer name on Linux terminal. This tutorial will allow you to check multiple domains at once. You may have used these commands to verify information. However, we will teach you how to use these commands effectively to identify IP address information of multiple […]
-
Time:2020-9-15
This article mainly introduces how Python implements the IP proxy pool based on redis. The example code is introduced in detail, which has a certain reference learning value for everyone’s study or work. Friends in need can refer to it The apscheduler library is used to crawl IP regularly, detect IP regularly, delete IP, and […]
-
Time:2020-7-20
In JSP, the method to obtain the client’s IP address is as follows: request.getRemoteAddr This method is effective in most cases. But through Apache, squid, nginx and other reverse proxy software, we can’t get the real IP address of the client. If reverse proxy software is used, the http://192.168.1.110 The URL reverse proxy for: 2046 […]
-
Time:2020-7-15
Configure a series of IP In Linux, if you configure multiple IP addresses, it is usually eth0.0.. eth0.1.. eth0. X, and so on. If you want to configure a large number of IP addresses, this configuration is OK, but tedious, although this situation is rare.For adding a large number of IP, there are certain regulations. […]