Date: Sun, 22 Feb 2004 09:01:32 -0500 From: Marty Landman <MLandman@face2interface.com> To: Chuck Swiger <cswiger@mac.com> Cc: freebsd-questions@freebsd.org Subject: Re: DHCP access Message-ID: <6.0.0.22.0.20040222085418.01b94e68@pop.face2interface.com> In-Reply-To: <4037D5D7.8030700@mac.com> References: <E1AuKeY-0003wT-Bn@dick.ccstores.com> <20040221052137.GL24309@hardesty.saintaardvarkthecarpeted.com> <6.0.0.22.0.20040221092538.05e6dc48@pop.face2interface.com> <4037D5D7.8030700@mac.com>
next in thread | previous in thread | raw e-mail | index | archive | help
At 05:04 PM 2/21/2004, Chuck Swiger wrote:
>Marty Landman wrote:
>
>>looks like arp is unreliable for a canonical list of plugged in ip's.
>>Curious about what would work.
>
>"nmap -sP 22 192.168.0.0/24" should do it
%nmap -sP 22 192.168.0.0/24
Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
Target host specification is illegal.
QUITTING!
%
I don't understand the man page though so assume it's me, not nmap.
>ping 192.168.0.255
%ping 192.168.0.255
PING 192.168.0.255 (192.168.0.255): 56 data bytes
64 bytes from 192.168.0.3: icmp_seq=0 ttl=255 time=0.964 ms
64 bytes from 192.168.0.160: icmp_seq=0 ttl=64 time=1.359 ms (DUP!)
^C
Hmm, since there are five nodes on my class c network this didn't do the
trick either.
I wrote a quick perl script that I think works but so slowly that it's
impractical:
%perl -e 'for(0..255) {$ip = "192.168.0.$_";$ping = `ping -c1 $ip`;print
"$ip\n" if $ping =~ /64 bytes from/}'
192.168.0.0
192.168.0.1
192.168.0.3
.
.
.
Marty Landman Face 2 Interface Inc 845-679-9387
This Month's New Quiz --- Past Superbowl Winners
Make a Website: http://face2interface.com/Home/Demo.shtml
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.0.0.22.0.20040222085418.01b94e68>
