Provided by: scamper_20211212-1.1_amd64 bug

NAME

     sc_pinger — scamper driver to run ping with different probe methods on a list of addresses.

SYNOPSIS

     sc_pinger [-?D] [-a infile] [-o outfile] [-p port] [-U unix-socket] [-c probe-count]
               [-m method] [-t logfile]

DESCRIPTION

     The sc_pinger utility provides the ability to connect to a running scamper(1) instance and
     run ping on a set of IPv4 and IPv6 addresses.  For each address in the file, sc_pinger will
     try ICMP, UDP, and TCP-ack probe methods to solicit responses from the address.  sc_pinger
     will not try all methods if one method obtains responses.  The output of sc_pinger is
     written to a warts(5) file, which can then be processed to extract details of responses.
     The options are as follows:

     -?      prints a list of command line options and a synopsis of each.

     -D      causes sc_pinger to detach and become a daemon.

     -a infile
             specifies the name of the input file which consists of a sequence of IPv4 and IPv6
             addresses, one per line.

     -o outfile
             specifies the name of the output file to be written.  The output file will use the
             warts(5) format.

     -p port
             specifies the port on the local host where scamper(1) is accepting control socket
             connections.

     -U unix-socket
             specifies the name of a unix domain socket where scamper(1) is accepting control
             socket connections.

     -c probe-count
             specifies the number of probes to send for each method.  sc_pinger accepts two
             formats: a single integer that specifies the number of probes (and responses)
             desired; or, two integers, separated by /, that specify the number of responses
             desired and maximum number of probes to send.  By default, sc_pinger seeks three
             responses from up to five probes.

     -m method
             specifies a single probe method to try.  The available probe methods are the same as
             scamper's ping implementation, listed in scamper(1) manual page.  By default,
             sc_pinger uses ICMP-echo, UDP-dport, and TCP-ack-sport to destination port 80.

     -t logfile
             specifies the name of a file to log output from sc_pinger generated at run time.

EXAMPLES

     Given a set of IPv4 and IPv6 address sets in a file named infile.txt:

        192.0.2.1
        192.0.32.10
        192.0.31.60
        2001:db8::1

     and a scamper(1) daemon listening on port 31337, then these addresses can be probed using

           sc_pinger -a infile.txt -o outfile.warts -p 31337

     To send 4 probes, and stop after receiving two responses:

           sc_pinger -a infile.txt -o outfile.warts -p 31337 -c 2/4

     To use ICMP-echo and TCP-syn probes to destination port 443

           sc_pinger -a infile.txt -o outfile.warts -p 31337 -m icmp-echo -m 'tcp-syn -d 443'

SEE ALSO

     scamper(1), sc_wartsdump(1), sc_warts2json(1), sc_warts2text(1)

AUTHORS

     sc_pinger was written by Matthew Luckie <mjl@luckie.org.nz>.