Scroll to navigation

SC_PINGER(1) General Commands Manual SC_PINGER(1)

NAME

sc_pingerscamper driver to run ping with different probe methods on a list of addresses.

SYNOPSIS

sc_pinger [-?D] [-a infile] [-o outfile] [-p port] [-U unix-socket] [-c probe-count] [-m method] [-t logfile]

DESCRIPTION

The sc_pinger utility provides the ability to connect to a running scamper(1) instance and run ping on a set of IPv4 and IPv6 addresses. For each address in the file, sc_pinger will try ICMP, UDP, and TCP-ack probe methods to solicit responses from the address. sc_pinger will not try all methods if one method obtains responses. The output of sc_pinger is written to a warts(5) file, which can then be processed to extract details of responses. The options are as follows:

-?
prints a list of command line options and a synopsis of each.
causes sc_pinger to detach and become a daemon.
infile
specifies the name of the input file which consists of a sequence of IPv4 and IPv6 addresses, one per line.
outfile
specifies the name of the output file to be written. The output file will use the warts(5) format.
port
specifies the port on the local host where scamper(1) is accepting control socket connections.
unix-socket
specifies the name of a unix domain socket where scamper(1) is accepting control socket connections.
probe-count
specifies the number of probes to send for each method. sc_pinger accepts two formats: a single integer that specifies the number of probes (and responses) desired; or, two integers, separated by /, that specify the number of responses desired and maximum number of probes to send. By default, sc_pinger seeks three responses from up to five probes.
method
specifies a single probe method to try. The available probe methods are the same as scamper's ping implementation, listed in scamper(1) manual page. By default, sc_pinger uses ICMP-echo, UDP-dport, and TCP-ack-sport to destination port 80.
logfile
specifies the name of a file to log output from sc_pinger generated at run time.

EXAMPLES

Given a set of IPv4 and IPv6 address sets in a file named infile.txt:

192.0.2.1
192.0.32.10
192.0.31.60
2001:db8::1

and a scamper(1) daemon listening on port 31337, then these addresses can be probed using

sc_pinger -a infile.txt -o outfile.warts -p 31337

To send 4 probes, and stop after receiving two responses:

sc_pinger -a infile.txt -o outfile.warts -p 31337 -c 2/4

To use ICMP-echo and TCP-syn probes to destination port 443

sc_pinger -a infile.txt -o outfile.warts -p 31337 -m icmp-echo -m 'tcp-syn -d 443'

SEE ALSO

scamper(1), sc_wartsdump(1), sc_warts2json(1), sc_warts2text(1)

AUTHORS

sc_pinger was written by Matthew Luckie <mjl@luckie.org.nz>.

June 24, 2020 Debian