以太幣交易所 以太幣交易所
Ctrl+D 以太幣交易所
ads

Docker高級篇之網絡詳解-云原生核心_AST

Author:

Time:1900/1/1 0:00:00

前面給大家項目的介紹了Docker的基礎內容Docker基礎篇接下來給大家系統的介紹下Docker高級篇的內容:網絡核心、Docker實戰、DockerCompose、Harbor以及Swarm。歡迎關注收藏哦

Docker網絡介紹

Docker是基于LinuxKernel的namespace,CGroups,UnionFileSystem等技術封裝成的一種自定義容器格式,從而提供了一套虛擬運行環境。

namespace:用來做隔離的,比如pid、net、mnt

CGroups:ControllerGroups用來做資源限制,比如內存和CPU等

UnionFileSystems:用來做Image和Container分層

1.計算機網絡模型

Docker網絡官網:https://docs.docker.com/network/。

OSI:開放系統互聯參考模型(OpenSystemInterconnect)

TCP/IP:傳輸控制協議/網際協議(TransmissionControl/InternetProtocol),是指能夠在多個不同網絡間實現信息傳輸的協議簇。TCP/IP協議不僅僅指的是TCP和IP兩個協議,而是指一個由FTP、SMTP、TCP、UDP、IP等協議構成的協議簇,只是因為在TCP/IP協議中TCP協議和IP協議最具代表性,所以被稱為TCP/IP協議。

分層思想:分層的基本想法是每一層都在它的下層提供的服務基礎上提供更高級的增值服務,而最高層提供能運行分布式應用程序的服務

在這里插入圖片描述客戶端發送請求:在這里插入圖片描述

服務端接受請求:

在這里插入圖片描述

2Liunx中網卡

2.1查看網卡信息

查看網卡的命令:ipa

$ipa1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverinet6::1/128scopehostvalid_lftforeverpreferred_lftforever2:eth0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether52:54:00:4d:77:d3brdff:ff:ff:ff:ff:ffinet10.0.2.15/24brd10.0.2.255scopeglobalnoprefixroutedynamiceth0valid_lft85987secpreferred_lft85987secinet6fe80::5054:ff:fe4d:77d3/64scopelinkvalid_lftforeverpreferred_lftforever3:eth1:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether08:00:27:6e:31:45brdff:ff:ff:ff:ff:ffinet192.168.56.10/24brd192.168.56.255scopeglobalnoprefixrouteeth1valid_lftforeverpreferred_lftforeverinet6fe80::a00:27ff:fe6e:3145/64scopelinkvalid_lftforeverpreferred_lftforever4:docker0:<NO-CARRIER,BROADCAST,MULTICAST,UP>mtu1500qdiscnoqueuestateDOWNgroupdefaultlink/ether02:42:bf:79:9f:debrdff:ff:ff:ff:ff:ffinet172.17.0.1/16brd172.17.255.255scopeglobaldocker0valid_lftforeverpreferred_lftforever

PeckShield:此前網絡釣魚獲得2423萬美元的攻擊者將1ETH轉移到TornadoCash:金色財經報道,據PeckShield監測,此前攻擊某巨鯨地址獲得2423萬美元加密貨幣的網絡釣魚攻擊者將1ETH轉移到TornadoCash。

金色財經此前報道,某地址遭受網絡釣魚攻擊損失了價值2423萬美元的stETH和rETH。[2023/9/8 13:26:49]

通過ipa可以看到當前的centos中有的4個網卡信息作用分別是

名稱作用lo本地網卡eth0連接網絡的網卡eth1和宿主機通信的網卡docker0docker的網卡

iplinkshow:

$iplinkshow1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNmodeDEFAULTgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:002:eth0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPmodeDEFAULTgroupdefaultqlen1000link/ether52:54:00:4d:77:d3brdff:ff:ff:ff:ff:ff3:eth1:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPmodeDEFAULTgroupdefaultqlen1000link/ether08:00:27:6e:31:45brdff:ff:ff:ff:ff:ff4:docker0:<NO-CARRIER,BROADCAST,MULTICAST,UP>mtu1500qdiscnoqueuestateDOWNmodeDEFAULTgroupdefaultlink/ether02:42:bf:79:9f:debrdff:ff:ff:ff:ff:ff

以文件的形式查看網卡:ls/sys/class/net

$ls/sys/class/netdocker0eth0eth1lo

2.2配置文件

在Linux中網卡對應的其實就是文件,所以找到對應的網卡文件即可,存放的路徑

$cd/etc/sysconfig/network-scripts/$lsifcfg-eth0ifdown-ethifdown-pppifdown-tunnelifup-ipppifup-postifup-TeamPortnetwork-functions-ipv6ifcfg-eth1ifdown-ipppifdown-routesifupifup-ipv6ifup-pppifup-tunnelifcfg-loifdown-ipv6ifdown-sitifup-aliasesifup-isdnifup-routesifup-wirelessifdownifdown-isdnifdown-Teamifup-bnepifup-plipifup-sitinit.ipv6-globalifdown-bnepifdown-postifdown-TeamPortifup-ethifup-plusbifup-Teamnetwork-functions

2.3網卡操作

網卡中增加ip地址

Billions項目組ipa1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverinet6::1/128scopehostvalid_lftforeverpreferred_lftforever2:eth0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether52:54:00:4d:77:d3brdff:ff:ff:ff:ff:ffinet10.0.2.15/24brd10.0.2.255scopeglobalnoprefixroutedynamiceth0valid_lft84918secpreferred_lft84918secinet192.168.100.120/24scopeglobaleth0Billions項目組Billions項目組增加了一個IP地址valid_lftforeverpreferred_lftforeverinet6fe80::5054:ff:fe4d:77d3/64scopelinkvalid_lftforeverpreferred_lftforever3:eth1:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether08:00:27:6e:31:45brdff:ff:ff:ff:ff:ffinet192.168.56.10/24brd192.168.56.255scopeglobalnoprefixrouteeth1valid_lftforeverpreferred_lftforeverinet6fe80::a00:27ff:fe6e:3145/64scopelinkvalid_lftforeverpreferred_lftforever4:docker0:<NO-CARRIER,BROADCAST,MULTICAST,UP>mtu1500qdiscnoqueuestateDOWNgroupdefaultlink/ether02:42:bf:79:9f:debrdff:ff:ff:ff:ff:ffinet172.17.0.1/16brd172.17.255.255scopeglobaldocker0valid_lftforeverpreferred_lftforever

派盾:Harmony攻擊者已將4.2萬枚ETH轉入TornadoCash:金色財經消息,據PeckShield發推表示,盜取Harmony跨鏈橋Horizon1億美元資金的黑客已將被盜金額的46%(約4.2萬枚ETH)轉移至TornadoCash。當前主要的攻擊者錢包地址還持有31785枚ETH。[2022/6/30 1:41:41]

刪除IP地址:ipaddrdelete192.168.100.120/24deveth0

Billions項目組ipa1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverinet6::1/128scopehostvalid_lftforeverpreferred_lftforever2:eth0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether52:54:00:4d:77:d3brdff:ff:ff:ff:ff:ffinet10.0.2.15/24brd10.0.2.255scopeglobalnoprefixroutedynamiceth0valid_lft84847secpreferred_lft84847secinet6fe80::5054:ff:fe4d:77d3/64scopelinkvalid_lftforeverpreferred_lftforever3:eth1:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether08:00:27:6e:31:45brdff:ff:ff:ff:ff:ffinet192.168.56.10/24brd192.168.56.255scopeglobalnoprefixrouteeth1valid_lftforeverpreferred_lftforeverinet6fe80::a00:27ff:fe6e:3145/64scopelinkvalid_lftforeverpreferred_lftforever4:docker0:<NO-CARRIER,BROADCAST,MULTICAST,UP>mtu1500qdiscnoqueuestateDOWNgroupdefaultlik/ether02:42:bf:79:9f:debrdff:ff:ff:ff:ff:ffinet172.17.0.1/16brd172.17.255.255scopeglobaldocker0valid_lftforeverpreferred_lftforever

2.4網卡信息解析

狀態:UP/DOWN/UNKOWN等

link/ether:MAC地址

inet:綁定的IP地址

3NetworkNamespace

NetworkNamespace是實現網絡虛擬化的重要功能,它能創建多個隔離的網絡空間,它們有獨自的網絡棧信息。不管是虛擬機還是容器,運行的時候仿佛自己就在獨立的網絡中。

3.1NetworkNamespce實戰

添加一個namespace

ipnetnsaddns1

查看當前具有的namespace

ipnetnslistBillions項目組ipnetnslistns1

刪除namespace

ipnetnsdeletens1Billions項目組ipnetnslistns1Billions項目組ipnetnslistBillions項目組ipnetnsexecns1ipa1:lo:<LOOPBACK>mtu65536qdiscnoopstateDOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00在這里插入圖片描述啟動網絡狀態

Rugdoc:Vee.Finance或被攻擊導致 2500 萬美元被盜,Vee.Finance官方回復稱非其合約:9月21日消息,據Rugdoc分析表示,Avalanche生態跨鏈借貸協議Vee.Finance被盜資產已超過2500萬美元,并且還在增加,建議參與Staking的用戶盡快撤出資金。Vee.Finance官方轉發并回復表示,這并不是Vee.Finance的合約,團隊將盡快公布調查報告。Rugdoc已將該推文刪除。

此前消息,Vee.Finance在推特表示平臺可能受到了攻擊,所有的服務已經停止。[2021/9/21 23:40:13]

ipnetnsexecns1ifuploBillions項目組ipnetnsexecns1ifuploBillions項目組

關掉網絡狀態

Billions項目組ipnetnsexecns1ipa1:lo:<LOOPBACK>mtu65536qdiscnoqueuestateDOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00

還可以通過link來設置狀態

Billions項目組ipnetnsexecns1ipa1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverinet6::1/128scopehostvalid_lftforeverpreferred_lftforeverBillions項目組ipnetnsexecns1ipa1:lo:<LOOPBACK>mtu65536qdiscnoqueuestateDOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverBillions項目組ipnetnsaddns2Billions項目組ipnetnsexecns1iplink1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNmodeDEFAULTgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:006:veth-ns1@if5:<BROADCAST,MULTICAST>mtu1500qdiscnoopstateDOWNmodeDEFAULTgroupdefaultqlen1000link/ether7e:bb:ee:13:a2:9abrdff:ff:ff:ff:ff:fflink-netnsid1Billions項目組ipnetnsexecns1iplinksetveth-ns1upBillions項目組ipa1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverinet6::1/128scopehostvalid_lftforeverpreferred_lftforever2:eth0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether52:54:00:4d:77:d3brdff:ff:ff:ff:ff:ffinet10.0.2.15/24brd10.0.2.255scopeglobalnoprefixroutedynamiceth0valid_lft66199secpreferred_lft66199secinet6fe80::5054:ff:fe4d:77d3/64scopelinkvalid_lftforeverpreferred_lftforever3:eth1:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether08:00:27:6e:31:45brdff:ff:ff:ff:ff:ffinet192.168.56.10/24brd192.168.56.255scopeglobalnoprefixrouteeth1valid_lftforeverpreferred_lftforeverinet6fe80::a00:27ff:fe6e:3145/64scopelinkvalid_lftforeverpreferred_lftforever4:docker0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscnoqueuestateUPgroupdefaultlink/ether02:42:52:d4:0a:9fbrdff:ff:ff:ff:ff:ffinet172.17.0.1/16brd172.17.255.255scopeglobaldocker0valid_lftforeverpreferred_lftforeverinet6fe80::42:52ff:fed4:a9f/64scopelinkvalid_lftforeverpreferred_lftforever24:veth78a90d0@if23:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscnoqueuemasterdocker0stateUPgroupdefaultlink/ether7e:6b:8c:bf:7e:30brdff:ff:ff:ff:ff:fflink-netnsid2inet6fe80::7c6b:8cff:febf:7e30/64scopelinkvalid_lftforeverpreferred_lftforever26:vetha2bfbf4@if25:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscnoqueuemasterdocker0stateUPgroupdefaultlink/etherce:2f:ed:e5:61:32brdff:ff:ff:ff:ff:fflink-netnsid3inet6fe80::cc2f:edff:fee5:6132/64scopelinkvalid_lftforeverpreferred_lftforever

安全公司:黑客利用惡意Docker鏡像挖掘Monero:網絡安全公司Palo Alto Networks威脅研究部門Unit 42表示,最近發現的一個加密劫持挖礦方案使用惡意的Docker鏡像來隱藏加密貨幣挖礦代碼。

研究人員發現這個Docker鏡像六個變體,其中包含XMRig加密挖礦木馬,這使得黑客能夠從受損的Docker容器中挖掘門羅幣(Monero)。這些鏡像保存在官方Docker Hub存儲庫的一個賬戶中,下載次數超過200萬次。報告指出,其中一個與黑客有關的加密錢包里有大約525枚門羅幣,價值約3.6萬美元。(Data Breach Today)[2020/6/27]

然后查看tomcat01中的網絡:dockerexec-ittomcat01ipa可以發現

Billions項目組ping172.17.0.2PING172.17.0.2(172.17.0.2)56(84)bytesofdata.64bytesfrom172.17.0.2:icmp_seq=1ttl=64time=0.038ms64bytesfrom172.17.0.2:icmp_seq=2ttl=64time=0.038ms^C---172.17.0.2pingstatistics---2packetstransmitted,2received,0%packetloss,time999msrttmin/avg/max/mdev=0.038/0.038/0.038/0.000ms

既然可以ping通,而且centos和tomcat01又屬于兩個不同的NetWorkNameSpace,他們是怎么連接的?看圖

在這里插入圖片描述其實在tomcat01中有一個eth0和centos的docker0中有一個veth是成對的,類似于之前實戰中的veth-ns1和veth-ns2,要確認也很簡單

yuminstallbridge-utilsbrctlshow

執行

Billions項目組dockernetworklsNETWORKIDNAMEDRIVERSCOPE92242fc0f805bridgebridgelocal96b999d7fcc2hosthostlocal17b86f9caa33nonenulllocal

不妨檢查一下bridge:dockernetworkinspectbridge

"Containers":{"4b3500fed6b99c00b3ed1ae46bd6bc33040c77efdab343175363f32fbcf42e63":{"Name":"tomcat01","EndpointID":"40fc0925fcb59c9bb002779580107ab9601640188bf157fa57b1c2de9478053a","MacAddress":"02:42:ac:11:00:02","IPv4Address":"172.17.0.2/16","IPv6Address":""},"92d2ff3e9be523099ac4b45058c5bf4652a77a27b7053a9115ea565ab43f9ab0":{"Name":"tomcat02","EndpointID":"1d6c3bd73e3727dd368edf3cc74d2f01b5c458223f844d6188486cb26ea255bc","MacAddress":"02:42:ac:11:00:03","IPv4Address":"172.17.0.3/16","IPv6Address":""}}

在tomcat01容器中是可以訪問互聯網的,順便把這張圖畫一下咯,NAT是通過iptables實現的

在這里插入圖片描述

4.2自定義NetWork

創建一個network,類型為Bridge

dockernetworkcreatetomcat-net或者dockernetworkcreatetomcat-net--subnet=172.18.0.0/24tomcat-net

AIDOC價格上漲,今日漲幅達17.73%:根據火幣交易平臺數據顯示,AIDOC最新成交價格為人民幣1.00元,24小時最高價達人民幣1.01元,最低價格為人民幣0.70元,24小時成交量27686230AIDOC,漲幅達17.73%。AIDOC從醫療數據切入,研發的AI超能醫生形成天醫分布式“大腦”結合智慧硬體、物聯網等設備,構建智慧醫療全產業鏈生態,把生命體征數據寫入區塊鏈克隆出比特數字人,讓每個人都擁有一個全天候守護的私人AI超能醫生。[2018/1/25]

查看已有的NetWork:dockernetworkls

Billions項目組dockernetworklsNETWORKIDNAMEDRIVERSCOPEb5c9cfbc0410bridgebridgelocal96b999d7fcc2hosthostlocal17b86f9caa33nonenulllocal43915cba1f92tomcat-netbridgelocal

查看tomcat-net詳情信息:dockernetworkinspecttomcat-net

Billions項目組dockerrun-d--namecustom-net-tomcat--networktomcat-nettomcat-ip:1.0264b3901f8f12fd7f4cc69810be6a24de48f82402b1e5b0df364bd1ee72d8f0e

查看custom-net-tomcat的網絡信息:截取了關鍵信息

12:br-43915cba1f92:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscnoqueuestateUPgroupdefaultlink/ether02:42:71:a6:67:c7brdff:ff:ff:ff:ff:ffinet172.18.0.1/16brd172.18.255.255scopeglobalbr-43915cba1f92valid_lftforeverpreferred_lftforeverinet6fe80::42:71ff:fea6:67c7/64scopelinkvalid_lftforeverpreferred_lftforever14:veth282a555@if13:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscnoqueuemasterbr-43915cba1f92stateUPgroupdefaultlink/ether3a:3d:83:15:3f:edbrdff:ff:ff:ff:ff:fflink-netnsid3inet6fe80::383d:83ff:fe15:3fed/64scopelinkvalid_lftforeverpreferred_lftforever

查看網卡接口信息

Billions項目組dockerexec-itcustom-net-tomcatping172.17.0.2PING172.17.0.2(172.17.0.2)56(84)bytesofdata.^C---172.17.0.2pingstatistics---3packetstransmitted,0received,100%packetloss,time2000ms

此時如果tomcat01容器能夠連接上tomcat-net上應該就可以了

dockernetworkconnecttomcat-nettomcat01Billions項目組dockerexec-itcustom-net-tomcatpingtomcat01PINGtomcat01(172.18.0.3)56(84)bytesofdata.64bytesfromtomcat01.tomcat-net(172.18.0.3):icmp_seq=1ttl=64time=0.031ms

5深入分析Container網絡-Host&None

5.1Host

Host模式下,容器將共享主機的網絡堆棧,并且主機的所有接口都可供容器使用.容器的主機名將與主機系統上的主機名匹配

創建一個容器,并指定網絡為host

dockerrun-d--namemy-tomcat-host--networkhosttomcat-ip:1.0

查看ip地址

dockerexec-itmy-tomcat-hostipa

檢查host網絡

dockernetworkinspecthost"Containers":{"f495a6892d422e61daab01e3fcfa4abb515753e5f9390af44c93cae376ca7464":{"Name":"my-tomcat-host","EndpointID":"77012b1ac5d15bde3105d2eb2fe0e58a5ef78fb44a88dc8b655d373d36cde5da","MacAddress":"","IPv4Address":"","IPv6Address":""}}

5.2None

None模式不會為容器配置任何IP,也不能訪問外部網絡以及其他容器.它具有環回地址,可用于運行批處理作業.

創建一個tomcat容器,并指定網絡為none

dockerrun-d--namemy-tomcat-none--networknonetomcat-ip:1.0

查看ip地址

dockerexec-itmy-tomcat-none

檢查none網絡

dockernetworkinspectnone"Containers":{"c957b61dae93fbb9275acf73c370e5df1aaf44a986579ee43ab751f790220807":{"Name":"my-tomcat-none","EndpointID":"16bf30fb7328ceb433b55574dc071bf346efa58e2eb92b6f40d7a902ddc94293","MacAddress":"","IPv4Address":"","IPv6Address":""}}

6端口映射

創建一個tomcat容器,名稱為port-tomcat

dockerrun-d--nameport-tomcattomcat-ip:1.0

思考如何訪問tomcat的服務

dockerexec-itport-tomcatbashcurllocalhost:8080

如果要載centos7上訪問呢

dockerexec-itport-tomcatipacurl172.17.0.4:8080

如果我們需要在centos中通過localhost來訪問呢?這時我們就需要將port-tomcat中的8080端口映射到centos上了

dockerrm-fport-tomcatdockerrun-d--nameport-tomcat-p8090:8080tomcat-ip:1.0curllocalhost:8090

centos7是運行在win10上的虛擬機,如果想要在win10上通過ip:port方式訪問呢?

Billions項目組這種方式等同于橋接網絡。也可以給該網絡指定使用物理機哪一塊網卡,比如#config.vm.network"public_network",:bridge=>'en1:Wi-Fi(AirPort)'config.vm.network"public_network"centos7:ipa--->192.168.8.118win10:瀏覽器訪問192.168.8.118:9080在這里插入圖片描述

7多機之間通信

具體深入介紹會在DockerSwarm中詳聊,本節簡單介紹。

在同一臺centos7機器上,發現無論怎么折騰,我們一定有辦法讓兩個container通信。那如果是在兩臺centos7機器上呢?畫個圖

在這里插入圖片描述VXLAN技術實現:VirtualExtensibleLAN(虛擬可擴展局域網)。在這里插入圖片描述

ps:掌握了Docker的網絡,其實也就掌握整個技術的核心了,如果文章有幫助歡迎關注點贊收藏哦

https://www.ixiera.com

Tags:ASTCASTCASAST幣AST價格CAST價格CAST幣CAS幣CAS價格

狗狗幣最新價格
這是一條價值740萬元人民幣的健身建議……_Cred

而經常熬夜的人往往不會吃早餐或者沒時間一大早起來準備早餐 結果就是在快餐店 隨手買點高油高糖的面包 蛋糕油條燒賣 往往含大量脂肪和碳水化合物M Credit CEO 歐嘉成:機構投資者關注長期收.

1900/1/1 0:00:00
Shiba Inu:由于Binance-Voyager交易失敗,3.1萬億代幣面臨風險_Voyage

Binance.US最近宣布取消與破產的加密貨幣公司VoyagerDigital的交易。Binance的美國分公司本應從倒閉的公司手中購買價值10億美元的資產.

1900/1/1 0:00:00
紙幣發行千年紀念——世界歷史上紙幣的理論與實踐_哈耶克

作者何平系中國人民大學財政金融學院教授,本文轉自4月8日“IMI財經觀察”微信公眾號。 導讀 第19屆世界經濟史大會于2022年7月25-29日在法國巴黎召開.

1900/1/1 0:00:00
今晚上線的Hook有機會嗎?開盤能沖到多少?_GAL

小市值nft亂拉盤 dego因為nft概念幣安小市值受opensea支持幣安鏈消息和uni要推出nft市場雙重刺激,率先拉盤.

1900/1/1 0:00:00
你絕對沒見過的世界級精美硬幣(續四)_加密貨幣

1.三色紫羅蘭景泰藍庫克群島此枚庫克群島的硬幣,刻著景泰藍的三色紫羅蘭,這在鑄幣中很罕見,因為景泰藍工藝復雜,費時費力,盡管看起來有點像涂抹的油漆,不過這顯然是藝術,習慣就好.

1900/1/1 0:00:00
比特幣在中國遭遇滑鐵盧:曾占全球98%交易量的3大平臺全軍覆沒_比特幣

9月15日晚,中國比特幣交易網站火幣網、OKCoin幾乎在同一時間對外發布公告,今天下午,接到中國監管層的通知和指導,將會在9月30日前通知所有用戶即將停止交易;并將于10月31日前.

1900/1/1 0:00:00
ads