170 lines
7.3 KiB
Bash
Executable File
170 lines
7.3 KiB
Bash
Executable File
#!/bin/bash
|
||
# ==========================================================
|
||
# IP-Sentinel: 深海声呐 (IP 质量全维异步检测模块 v4.0.0)
|
||
# ==========================================================
|
||
|
||
source /opt/ip_sentinel/config.conf
|
||
|
||
IP_PROTO="${IP_PREF:-4}"
|
||
|
||
# [核心修复] 动态装配参数阵列:默认注入 -y(跳过确认), -j(输出JSON), -f(输出完整明文IP)
|
||
PROBE_ARGS=("-y" "-j" "-f" "-${IP_PROTO}")
|
||
|
||
# 仅当 BIND_IP 真实存在时(即非 NAT 的纯物理直连机),才向官方探针下发强制绑卡指令
|
||
if [ -n "$BIND_IP" ]; then
|
||
PROBE_ARGS+=("-i" "$(echo "$BIND_IP" | tr -d '[]')")
|
||
fi
|
||
|
||
# 1. 静默拉取原始数据 (消除短链接 RCE 劫持风险,收编为本地固化执行)
|
||
PROBE_SCRIPT="/opt/ip_sentinel/core/ip_probe.sh"
|
||
if [ ! -x "$PROBE_SCRIPT" ]; then
|
||
# 若本地探针尚未就绪,直接从 GitHub 官方主干拉取底层源码,绕过未知域名
|
||
curl -sL "https://raw.githubusercontent.com/xykt/IPQuality/main/ip.sh" -o "$PROBE_SCRIPT" 2>/dev/null
|
||
chmod +x "$PROBE_SCRIPT" 2>/dev/null
|
||
fi
|
||
|
||
# 采用本地执行,将动态参数阵列展开,彻底封死外部投毒与 NAT 死锁陷阱
|
||
RAW_OUTPUT=$(timeout 180 bash "$PROBE_SCRIPT" "${PROBE_ARGS[@]}" 2>/dev/null)
|
||
|
||
# 2. 极致截取 JSON (无视开头的赞助商广告与不可见字符,精准提取)
|
||
JSON_DATA="{${RAW_OUTPUT#*\{}"
|
||
|
||
# 2. 提取基础物理定位与身份特征 (兼作合法性校验)
|
||
IP_ADDR=$(echo "$JSON_DATA" | jq -r '.Head.IP // empty' 2>/dev/null)
|
||
|
||
if [ -z "$IP_ADDR" ]; then
|
||
curl -s -X POST "${TG_API_URL}" \
|
||
-d "chat_id=${CHAT_ID}" \
|
||
-d "parse_mode=Markdown" \
|
||
-d "text=❌ *深海声呐探测失败*
|
||
📍 节点:\`${NODE_ALIAS}\`
|
||
🌐 锁定IP:\`${PUBLIC_IP}\`
|
||
⚠️ *未收到有效回波。检测源超时或数据解析受阻。*" >/dev/null
|
||
exit 1
|
||
fi
|
||
|
||
[ -z "$IP_ADDR" ] && IP_ADDR="$PUBLIC_IP"
|
||
ASN=$(echo "$JSON_DATA" | jq -r '.Info.ASN // "Unknown"' 2>/dev/null)
|
||
ORG=$(echo "$JSON_DATA" | jq -r '.Info.Organization // "Unknown"' 2>/dev/null)
|
||
CITY=$(echo "$JSON_DATA" | jq -r '.Info.City.Name // "Unknown"' 2>/dev/null)
|
||
COUNTRY=$(echo "$JSON_DATA" | jq -r '.Info.Region.Name // "Unknown"' 2>/dev/null)
|
||
IP_TYPE=$(echo "$JSON_DATA" | jq -r '.Info.Type // "未知属性"' 2>/dev/null)
|
||
USAGE_TYPE=$(echo "$JSON_DATA" | jq -r '.Type.Usage.IPinfo // "未知场景"' 2>/dev/null)
|
||
|
||
# 3. 深度欺诈与信用评估 (各大权威库联查)
|
||
SCAM_SCORE=$(echo "$JSON_DATA" | jq -r '.Score.SCAMALYTICS // "0"' 2>/dev/null)
|
||
ABUSE_SCORE=$(echo "$JSON_DATA" | jq -r '.Score.AbuseIPDB // "0"' 2>/dev/null)
|
||
IPQS_SCORE=$(echo "$JSON_DATA" | jq -r '.Score.IPQS // "0"' 2>/dev/null)
|
||
IP2L_SCORE=$(echo "$JSON_DATA" | jq -r '.Score.IP2LOCATION // "0"' 2>/dev/null)
|
||
FRAUD_RISK=$(echo "$JSON_DATA" | jq -r '.Score.ipapi // "0%"' 2>/dev/null)
|
||
|
||
# [修复] 清洗 API 阻断返回的 null 值,保障面板整洁
|
||
[ "$SCAM_SCORE" == "null" ] || [ -z "$SCAM_SCORE" ] && SCAM_SCORE="N/A"
|
||
[ "$ABUSE_SCORE" == "null" ] || [ -z "$ABUSE_SCORE" ] && ABUSE_SCORE="N/A"
|
||
[ "$IPQS_SCORE" == "null" ] || [ -z "$IPQS_SCORE" ] && IPQS_SCORE="N/A"
|
||
[ "$IP2L_SCORE" == "null" ] || [ -z "$IP2L_SCORE" ] && IP2L_SCORE="N/A"
|
||
[ "$FRAUD_RISK" == "null" ] || [ -z "$FRAUD_RISK" ] && FRAUD_RISK="N/A"
|
||
|
||
# 代理/VPN 特征探针 (只要有一家认为是代理,就亮黄灯)
|
||
IS_PROXY="🟢 干净"
|
||
if echo "$JSON_DATA" | jq -e '.Factor.Proxy | to_entries | any(.value == true)' >/dev/null 2>&1 || \
|
||
echo "$JSON_DATA" | jq -e '.Factor.VPN | to_entries | any(.value == true)' >/dev/null 2>&1; then
|
||
IS_PROXY="🟡 疑似代理/VPN"
|
||
fi
|
||
|
||
# 4. 提取流媒体与 AI 解锁指标 (带解锁类型)
|
||
parse_media() {
|
||
local status=$(echo "$JSON_DATA" | jq -r ".Media.$1.Status // \"未知\"" 2>/dev/null)
|
||
local reg=$(echo "$JSON_DATA" | jq -r ".Media.$1.Region // \"\"" 2>/dev/null)
|
||
local type=$(echo "$JSON_DATA" | jq -r ".Media.$1.Type // \"\"" 2>/dev/null)
|
||
|
||
if [[ "$status" == *"解锁"* ]]; then
|
||
echo "🟢 ${reg} (${type})"
|
||
elif [[ "$status" == *"仅"* ]] || [[ "$status" == *"机房"* ]] || [[ "$status" == *"待支持"* ]]; then
|
||
# 捕捉 Netflix "仅自制"、ChatGPT "仅网页"、TikTok "机房" 等半残状态
|
||
echo "🟡 ${status} ${reg}"
|
||
elif [[ "$status" == *"屏蔽"* ]] || [[ "$status" == *"失败"* ]] || [[ "$status" == *"中国"* ]] || [[ "$status" == *"禁"* ]]; then
|
||
# 捕捉 "屏蔽"、"失败"、"禁会员"、"中国"(送中)
|
||
echo "🔴 ${status}"
|
||
else
|
||
echo "⚪ ${status}"
|
||
fi
|
||
}
|
||
|
||
NF_STAT=$(parse_media "Netflix")
|
||
YT_STAT=$(parse_media "Youtube")
|
||
DP_STAT=$(parse_media "DisneyPlus")
|
||
TK_STAT=$(parse_media "TikTok")
|
||
GPT_STAT=$(parse_media "ChatGPT")
|
||
APV_STAT=$(parse_media "AmazonPrimeVideo")
|
||
|
||
# 提取原生 JSON 里的原始状态用于底层隐写回传
|
||
RAW_NF_STAT=$(echo "$JSON_DATA" | jq -r '.Media.Netflix.Status // "Unknown"' 2>/dev/null)
|
||
RAW_YT_REG=$(echo "$JSON_DATA" | jq -r '.Media.Youtube.Region // ""' 2>/dev/null)
|
||
RAW_YT_STAT=$(echo "$JSON_DATA" | jq -r '.Media.Youtube.Status // "Unknown"' 2>/dev/null)
|
||
|
||
# 5. 邮局连通性与黑名单
|
||
PORT25=$(echo "$JSON_DATA" | jq -r '.Mail.Port25 // "false"' 2>/dev/null)
|
||
[ "$PORT25" == "true" ] && P25_TEXT="✅ 畅通" || P25_TEXT="❌ 封堵"
|
||
DNS_BLACK=$(echo "$JSON_DATA" | jq -r '.Mail.DNSBlacklist.Blacklisted // "0"' 2>/dev/null)
|
||
DNS_MARK=$(echo "$JSON_DATA" | jq -r '.Mail.DNSBlacklist.Marked // "0"' 2>/dev/null)
|
||
|
||
# 6. “送中” 逻辑判定
|
||
WARNING_MSG=""
|
||
# [修复] 官方 JSON 已经去除了方括号,直接匹配 CN 或者状态包含中国
|
||
if [[ "$RAW_YT_REG" == "CN" ]] || [[ "$RAW_YT_STAT" == *"中国"* ]]; then
|
||
WARNING_MSG="%0A🚨 **[高危] 该节点已被 Google 判定为中国大陆 (送中)!**%0A"
|
||
fi
|
||
|
||
# 7. 组装情报级 Markdown 战报
|
||
# 提取本地运行态版本与生成时间戳
|
||
LOCAL_VER="${AGENT_VERSION:-未知}"
|
||
CURRENT_TIME=$(date "+%Y-%m-%d %H:%M:%S")
|
||
|
||
REPORT="🎯 *IP-Sentinel 深海声呐报告*
|
||
📍 节点:\`${NODE_ALIAS}\`
|
||
🌐 地址:\`${IP_ADDR}\`${WARNING_MSG}
|
||
|
||
*🏢 物理身份与网络属性*
|
||
\`AS${ASN}\` | \`${ORG}\`
|
||
**定位:** \`${COUNTRY} - ${CITY}\`
|
||
**属性:** \`${IP_TYPE}\` | \`${USAGE_TYPE}\`
|
||
**探针:** ${IS_PROXY}
|
||
|
||
*🛡️ 欺诈雷达 (0为最优)*
|
||
• **Scamalytics:** \`${SCAM_SCORE}/100\`
|
||
• **AbuseIPDB:** \`${ABUSE_SCORE}/100\`
|
||
• **IPQS:** \`${IPQS_SCORE}/100\`
|
||
• **IP2Location:** \`${IP2L_SCORE}/100\`
|
||
• **IPAPI 风险率:** \`${FRAUD_RISK}\`
|
||
|
||
*🎬 核心业务解锁*
|
||
• **YouTube:** ${YT_STAT}
|
||
• **Netflix:** ${NF_STAT}
|
||
• **Disney+:** ${DP_STAT}
|
||
• **PrimeVideo:** ${APV_STAT}
|
||
• **TikTok:** ${TK_STAT}
|
||
• **ChatGPT:** ${GPT_STAT}
|
||
|
||
*✉️ 邮局与污染度*
|
||
• **25 端口出站:** ${P25_TEXT}
|
||
• **DNS 污染库:** 严重 \`${DNS_BLACK}\` | 轻微 \`${DNS_MARK}\`
|
||
|
||
_👉 [🔍 详细信用图谱直达 (Scamalytics)](https://scamalytics.com/ip/${TARGET_IP})_
|
||
|
||
⏱️ \`${CURRENT_TIME}\` | ⚙️ \`v${LOCAL_VER}\`"
|
||
|
||
# [修复] 剥离显示层的 N/A,确保传给 Master 趋势数据库的是纯数字 (无效则记为0)
|
||
SAFE_SCAM_SCORE=$(echo "$SCAM_SCORE" | tr -cd '0-9')
|
||
[ -z "$SAFE_SCAM_SCORE" ] && SAFE_SCAM_SCORE="0"
|
||
|
||
REPORT="$REPORT
|
||
|
||
\`[SYSTEM_REPORT]|QUALITY|${NODE_NAME}|${SAFE_SCAM_SCORE}|${RAW_NF_STAT}\`"
|
||
|
||
# 8. 直送指挥部
|
||
curl -s -X POST "${TG_API_URL}" \
|
||
-d "chat_id=${CHAT_ID}" \
|
||
-d "parse_mode=Markdown" \
|
||
-d "disable_web_page_preview=true" \
|
||
-d "text=${REPORT}" >/dev/null |