This is my BitTorrent Distributed Hash Tables research project.
This tool has several main purposes:
- To be a custom Python BTDHT realization, which you can easily use in your application. You can play with DHT protocol, fuzz it, change DHT internal timing limits etc.
- Act as my Proof-Of-Concept of DHT amplification DDoS attack
No. This is just DHT.
Lookup for BitTorrent peers for 746385fe32b268d513d068f22c53c46d2eb34a5c hash in BitTorrent DHT:
import time
from btdht import DHT
current_magnet = "746385fe32b268d513d068f22c53c46d2eb34a5c".decode("hex")
if __name__ == "__main__":
# Start DHT Node on port 60000
dht = DHT(host='0.0.0.0', port=60000)
dht.start()
# Boostrap it
dht.bootstrap('router.bittorrent.com', 6881)
# Find me peers for that torrent hashes
dht.ht.add_hash(current_magnet)
res = []
for count in xrange(5):
print("DHT Nodes found: %d" % (dht.rt.count()))
print("Bad DHT nodes found: %d" % (dht.rt.bad_count()))
print("Total peers found: %d" % (dht.ht.count_all_peers()))
# How many peers at this moment?
peers = dht.ht.get_hash_peers(current_magnet)
for peer in peers:
res.append((peer))
print("Found peer: %s:%d" % (peer))
time.sleep(3)
print("Total peers found: %d" % (len(res)))
dht.stop()