Provided by: scamper_20191102-1_amd64 bug

NAME

     sc_ipiddump — utility to dump IP-ID values embedded in ping, traceroute, and dealias objects
     in warts files.

SYNOPSIS

     sc_ipiddump [-i ips] [-O options] [-U userid] [file ...]

DESCRIPTION

     The sc_ipiddump utility dumps the IP-ID values embedded in IPv4 and IPv6 responses to ping,
     traceroute, and dealias objects.  The output contains the transit and receive timestamps,
     the source address used by scamper when probing, the interface address which replied, and
     the IPID value (in hexadecimal).  The objects are sorted by transmit time.  The supported
     options to sc_ipiddump are as follows:

     -i ip   restricts the selection of source addresses to those with the given IP address(es).

     -O options
             allows the behavior of sc_ipiddump to be further tailored.  The current choice for
             this option is:
               -  notrace: do not parse traceroutes for IPID values.

     -U userid
             restricts the selection of warts objects to those with the given userid(s).

EXAMPLES

     Given an input file foo.warts, the following command dumps IP-ID values found in objects
     with userid values 3 and 4:

           sc_ipiddump -U 3,4 foo.warts

     Given an input file foo.warts.gz, the following command dumps IP-ID values found in
     responses from IP address 192.0.2.1

           zcat foo.warts.gz | sc_ipiddump -i 192.0.2.1 -

SEE ALSO

     scamper(1), sc_wartsdump(1), sc_warts2text(1), sc_warts2json(1)

AUTHORS

     sc_ipiddump was written by Matthew Luckie <mjl@luckie.org.nz>.