Detabification massive.
darcs-hash:20051018083823-d1718-09c2df38cfb707d3c3679188b9b9a812009f4f7c.gz
This commit is contained in:
parent
3c54fb2904
commit
37b21339a6
40 changed files with 1473 additions and 1473 deletions
|
@ -84,12 +84,12 @@ infections = curseur.fetchall()
|
|||
liste_virus=""
|
||||
for i in range(1,len(infections)):
|
||||
IP=infections[i][0]
|
||||
print IP
|
||||
try:
|
||||
hostname = socket.gethostbyaddr("%s"%IP)[0]
|
||||
except socket.herror:
|
||||
continue
|
||||
liste_virus+="%s\n"%(str(hostname))
|
||||
print IP
|
||||
try:
|
||||
hostname = socket.gethostbyaddr("%s"%IP)[0]
|
||||
except socket.herror:
|
||||
continue
|
||||
liste_virus+="%s\n"%(str(hostname))
|
||||
|
||||
|
||||
# Machines utilisant des protocoles P2P :
|
||||
|
@ -102,10 +102,10 @@ for i in range(0,len(p2p)):
|
|||
IP=p2p[i][0]
|
||||
protocole = p2p[i][1]
|
||||
hostname = socket.gethostbyaddr("%s"%IP)[0]
|
||||
requete = "SELECT COUNT(ip_src) from p2p where date > timestamp 'now' - interval '1 day' and ip_src='%s'"%IP
|
||||
requete = "SELECT COUNT(ip_src) from p2p where date > timestamp 'now' - interval '1 day' and ip_src='%s'"%IP
|
||||
curseur.execute(requete)
|
||||
paquets=curseur.fetchall()
|
||||
liste_p2p+="%10s\t%20s\t%s\n"%(str(protocole),str(hostname),str(paquets[0][0]))
|
||||
paquets=curseur.fetchall()
|
||||
liste_p2p+="%10s\t%20s\t%s\n"%(str(protocole),str(hostname),str(paquets[0][0]))
|
||||
|
||||
|
||||
#############
|
||||
|
@ -157,7 +157,7 @@ corps = message %{'From':expediteur,
|
|||
'liste_virus':liste_virus,
|
||||
'liste_exemptes':liste_exemptes,
|
||||
'liste_serveurs':liste_serveurs,
|
||||
'seuil':5}
|
||||
'seuil':5}
|
||||
|
||||
#corps = corps.encode('iso 8859-15')
|
||||
mail.sendmail('disconnect@crans.org','disconnect@crans.org',corps)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue