
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
flocore-p2p
Advanced tools
bitcore-p2p adds Bitcoin protocol support for Bitcore.
See the main bitcore repo for more information.
npm install bitcore-p2p
In order to connect to the Bitcoin network, you'll need to know the IP address of at least one node of the network, or use Pool to discover peers using a DNS seed.
var Peer = require('bitcore-p2p').Peer;
var peer = new Peer({host: '127.0.0.1'});
peer.on('ready', function() {
// peer info
console.log(peer.version, peer.subversion, peer.bestHeight);
});
peer.on('disconnect', function() {
console.log('connection closed');
});
peer.connect();
Then, you can get information from other peers by using:
// handle events
peer.on('inv', function(message) {
// message.inventory[]
});
peer.on('tx', function(message) {
// message.transaction
});
Take a look at the bitcore guide on the usage of the Peer class.
See CONTRIBUTING.md on the main bitcore repo for information about how to contribute.
Code released under the MIT license.
Copyright 2013-2015 BitPay, Inc. Bitcore is a trademark maintained by BitPay, Inc.
FAQs
Interface to the Flo P2P network for flocore
The npm package flocore-p2p receives a total of 7 weekly downloads. As such, flocore-p2p popularity was classified as not popular.
We found that flocore-p2p demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.