SC_PINGER(1) | General Commands Manual | SC_PINGER(1) |
sc_pinger
—
scamper driver to run ping with different probe methods on
a list of addresses.
sc_pinger |
[-?D ]
[-a infile]
[-o outfile]
[-p port]
[-U unix-socket]
[-c probe-count]
[-m method]
[-t logfile] |
The sc_pinger
utility provides the ability
to connect to a running scamper(1) instance and run ping
on a set of IPv4 and IPv6 addresses. For each address in the file,
sc_pinger
will try ICMP, UDP, and TCP-ack probe
methods to solicit responses from the address.
sc_pinger
will not try all methods if one method
obtains responses. The output of sc_pinger
is
written to a warts(5) file, which can then be processed to
extract details of responses. The options are as follows:
-
?-D
sc_pinger
to detach and become a
daemon.-a
infile-o
outfile-p
port-U
unix-socket-c
probe-countsc_pinger
accepts two formats: a single integer
that specifies the number of probes (and responses) desired; or, two
integers, separated by /, that specify the number of responses desired and
maximum number of probes to send. By default,
sc_pinger
seeks three responses from up to five
probes.-m
methodsc_pinger
uses ICMP-echo, UDP-dport, and
TCP-ack-sport to destination port 80.-t
logfilesc_pinger
generated at run time.Given a set of IPv4 and IPv6 address sets in a file named infile.txt:
192.0.2.1 192.0.32.10 192.0.31.60 2001:db8::1
and a scamper(1) daemon listening on port 31337, then these addresses can be probed using
sc_pinger -a infile.txt -o
outfile.warts -p 31337
To send 4 probes, and stop after receiving two responses:
sc_pinger -a infile.txt -o
outfile.warts -p 31337 -c 2/4
To use ICMP-echo and TCP-syn probes to destination port 443
sc_pinger -a infile.txt -o
outfile.warts -p 31337 -m icmp-echo -m 'tcp-syn -d 443'
scamper(1), sc_wartsdump(1), sc_warts2json(1), sc_warts2text(1)
sc_pinger
was written by Matthew Luckie
<mjl@luckie.org.nz>.
June 24, 2020 | Debian |