|
NAMEsc_pinger —
scamper driver to run ping with different probe methods on a
list of addresses.
SYNOPSIS
DESCRIPTIONThesc_pinger utility provides the ability to connect to
a running
scamper(1)
instance and run ping on a set of IPv4 and IPv6 addresses. For each address in
the file, sc_pinger will try ICMP, UDP, and TCP-ack
probe methods to solicit responses from the address.
sc_pinger will not try all methods if one method
obtains responses. The output of sc_pinger is written
to a
warts(5)
file, which can then be processed to extract details of responses. The options
are as follows:
EXAMPLESGiven a set of IPv4 and IPv6 address sets in a file named infile.txt:192.0.2.1 192.0.32.10 192.0.31.60 2001:db8::1 and a scamper(1) daemon listening on port 31337, then these addresses can be probed using sc_pinger -a infile.txt -o
outfile.warts -p 31337 To send 4 probes, and stop after receiving two responses: sc_pinger -a infile.txt -o
outfile.warts -p 31337 -c 2/4 To use ICMP-echo and TCP-syn probes to destination port 443 sc_pinger -a infile.txt -o
outfile.warts -p 31337 -m icmp-echo -m 'tcp-syn -d 443' SEE ALSOscamper(1), sc_wartsdump(1), sc_warts2json(1), sc_warts2text(1)AUTHORSsc_pinger was written by Matthew Luckie
<mjl@luckie.org.nz>.
Visit the GSP FreeBSD Man Page Interface. |