{"id":4222,"date":"2016-07-29T23:03:02","date_gmt":"2016-07-29T15:03:02","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4222"},"modified":"2016-07-29T02:03:15","modified_gmt":"2016-07-28T18:03:15","slug":"fping-3-multi-target-icmp-ping-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/07\/fping-3-multi-target-icmp-ping-tool\/","title":{"rendered":"fping 3 – Multi Target ICMP Ping Tool"},"content":{"rendered":"

fping is a program like ping which uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding.<\/p>\n

\"fping<\/p>\n

fping differs from ping in that you can specify any number of targets on the command line, or specify a file containing the lists of targets to ping. Instead of sending to one target until it times out or replies, fping will send out a ping packet and move on to the next target in a round-robin fashion. In the default mode, if a target replies, it is noted and removed from the list of targets to check; if a target does not respond within a certain time limit and\/or retry limit it is designated as unreachable.<\/p>\n

fping also supports sending a specified number of pings to a target, or looping indefinitely (as in ping). Unlike ping, fping is meant to be used in scripts, so its output is designed to be easy to parse.<\/p>\n

The binary named fping6 is the same as fping, except that it uses IPv6 addresses instead of IPv4.<\/p>\n

Usage<\/h3>\n
\u2212a Show systems that are alive.\r\n\u2212A Display targets by address rather than DNS name.\r\n\u2212b n Number of bytes of ping data to send. The minimum size (normally 12) allows room for the data that fping needs to do its work (sequence number, timestamp). The reported received data size includes the IP header (normally 20 bytes) and ICMP header (8 bytes), so the minimum total size is 40 bytes. Default is 56, as in ping. Maximum is the theoretical maximum IP datagram size (64K), though most systems limit this to a smaller, system-dependent number.\r\n\u2212B n In the default mode, fping sends several requests to a target before giving up, waiting longer for a reply on each successive request. This parameter is the value by which the wait time is multiplied on each successive request; it must be entered as a floating-point number (x.y). The default is 1.5.\r\n\u2212c n Number of request packets to send to each target. In this mode, a line is displayed for each received response (this can suppressed with \u2212q or \u2212Q). Also, statistics about responses for each target are displayed when all requests have been sent (or when interrupted).\r\n\u2212C n Similar to \u2212c, but the per-target statistics are displayed in a format designed for automated response-time statistics gathering.\r\nshows the response time in milliseconds for each of the five requests, with the \"\u2212\" indicating that no response was received to the fourth request.\r\n\u2212d Use DNS to lookup address of return ping packet. This allows you to give fping a list of IP addresses as input and print hostnames in the output.\r\n\u2212D Add Unix timestamps in front of output lines generated with in looping or counting modes (\u2212l, \u2212c, or \u2212C).\r\n\u2212e Show elapsed (round-trip) time of packets.\r\n\u2212f Read list of targets from a file. This option can only be used by the root user.\r\n-g Generate a target list from a supplied IP netmask, or a starting and ending IP. Specify the netmask or start\/end in the targets portion of the command line.\r\n\u2212h Print usage message.\r\n\u2212i n The minimum amount of time (in milliseconds) between sending a ping packet to any target (default is 25).\r\n\u2212l Loop sending packets to each target indefinitely. Can be interrupted with Ctrl-C; statistics about responses for each target are then displayed.\r\n\u2212m Send pings to each of a target host\u2019s multiple interfaces.\r\n\u2212n Same as \u2212d.\r\n\u2212p  In looping or counting modes (\u2212l, \u2212c, or \u2212C), this parameter sets the time in milliseconds that fping waits between successive packets to an individual target. Default is 1000.\r\n\u2212q Quiet. Don\u2019t show per-probe results, but only the final summary. Also don\u2019t show ICMP error messages.\r\n\u2212Q n Like \u2212q, but show summary results every n seconds.\r\n\u2212r n Retry limit (default 3). This is the number of times an attempt at pinging a target will be made, not including the first try.\r\n\u2212s Print cumulative statistics upon exit.\r\n\u2212S addr Set source address.\r\n\u2212I if Set the interface (requires SO_BINDTODEVICE support)\r\n\u2212t n Initial target timeout in milliseconds (default 500). In the default mode, this is the amount of time that fping waits for a response to its first request. Successive timeouts are multiplied by the backoff factor.\r\n\u2212T n Ignored (for compatibility with fping 2.4).\r\n\u2212u Show targets that are unreachable.\r\n\u2212O n Set the typ of service flag ( TOS ). n can be either decimal or hexadecimal (0xh) format.\r\n\u2212v Print fping version information.\r\n\u2212H n Set the IP TTL field (time to live hops).<\/pre>\n

You can download fping 3 here:<\/p>\n

fping-3.13.tar.gz<\/a><\/p>\n

Or read more here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

fping is a program like ping which uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding. fping differs from ping in that you can specify any number of targets on the command line, or specify a file containing the lists of targets to ping. Instead of sending […]<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"fping is a program like ping which uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding.","_seopress_robots_index":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[9,5],"tags":[],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Darknet","author_link":"https:\/\/www.darknet.org.uk\/author\/darknet\/"},"_links":{"self":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/4222"}],"collection":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/comments?post=4222"}],"version-history":[{"count":0,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/4222\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/media?parent=4222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/categories?post=4222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/tags?post=4222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}