At 05:04 PM 2/21/2004, Chuck Swiger wrote:
Marty Landman wrote:

looks like arp is unreliable for a canonical list of plugged in ip's. Curious about what would work.

"nmap -sP 22 192.168.0.0/24" should do it

%nmap -sP 22 192.168.0.0/24


Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
Target host specification is illegal.
QUITTING!
%

I don't understand the man page though so assume it's me, not nmap.

ping 192.168.0.255

%ping 192.168.0.255 PING 192.168.0.255 (192.168.0.255): 56 data bytes 64 bytes from 192.168.0.3: icmp_seq=0 ttl=255 time=0.964 ms 64 bytes from 192.168.0.160: icmp_seq=0 ttl=64 time=1.359 ms (DUP!) ^C

Hmm, since there are five nodes on my class c network this didn't do the trick either.

I wrote a quick perl script that I think works but so slowly that it's impractical:

%perl -e 'for(0..255) {$ip = "192.168.0.$_";$ping = `ping -c1 $ip`;print "$ip\n" if $ping =~ /64 bytes from/}'
192.168.0.0
192.168.0.1
192.168.0.3


.
.
.




Marty Landman Face 2 Interface Inc 845-679-9387 This Month's New Quiz --- Past Superbowl Winners Make a Website: http://face2interface.com/Home/Demo.shtml

_______________________________________________
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to