Date: Sun, 22 Feb 2004 09:01:32 -0500 From: Marty Landman <MLandman@face2interface.com> To: Chuck Swiger <cswiger@mac.com> Cc: freebsd-questions@freebsd.org Subject: Re: DHCP access Message-ID: <6.0.0.22.0.20040222085418.01b94e68@pop.face2interface.com> In-Reply-To: <4037D5D7.8030700@mac.com> References: <E1AuKeY-0003wT-Bn@dick.ccstores.com> <20040221052137.GL24309@hardesty.saintaardvarkthecarpeted.com> <6.0.0.22.0.20040221092538.05e6dc48@pop.face2interface.com> <4037D5D7.8030700@mac.com>
next in thread | previous in thread | raw e-mail | index | archive | help
At 05:04 PM 2/21/2004, Chuck Swiger wrote: >Marty Landman wrote: > >>looks like arp is unreliable for a canonical list of plugged in ip's. >>Curious about what would work. > >"nmap -sP 22 192.168.0.0/24" should do it %nmap -sP 22 192.168.0.0/24 Starting nmap V. 3.00 ( www.insecure.org/nmap/ ) Target host specification is illegal. QUITTING! % I don't understand the man page though so assume it's me, not nmap. >ping 192.168.0.255 %ping 192.168.0.255 PING 192.168.0.255 (192.168.0.255): 56 data bytes 64 bytes from 192.168.0.3: icmp_seq=0 ttl=255 time=0.964 ms 64 bytes from 192.168.0.160: icmp_seq=0 ttl=64 time=1.359 ms (DUP!) ^C Hmm, since there are five nodes on my class c network this didn't do the trick either. I wrote a quick perl script that I think works but so slowly that it's impractical: %perl -e 'for(0..255) {$ip = "192.168.0.$_";$ping = `ping -c1 $ip`;print "$ip\n" if $ping =~ /64 bytes from/}' 192.168.0.0 192.168.0.1 192.168.0.3 . . . Marty Landman Face 2 Interface Inc 845-679-9387 This Month's New Quiz --- Past Superbowl Winners Make a Website: http://face2interface.com/Home/Demo.shtml
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.0.0.22.0.20040222085418.01b94e68>