From owner-freebsd-questions@FreeBSD.ORG Sun Feb 22 06:01:40 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id B843116A4CE for ; Sun, 22 Feb 2004 06:01:40 -0800 (PST) Received: from www6.web2010.com (www6.web2010.com [216.157.5.254]) by mx1.FreeBSD.org (Postfix) with ESMTP id 801FE43D1D for ; Sun, 22 Feb 2004 06:01:40 -0800 (PST) (envelope-from MLandman@face2interface.com) Received: from delliver.face2interface.com (dialup-wash-129-203.thebiz.net [64.30.129.203] (may be forged)) by www6.web2010.com (8.12.10/8.9.0) with ESMTP id i1ME1C89002492; Sun, 22 Feb 2004 09:01:17 -0500 (EST) Message-Id: <6.0.0.22.0.20040222085418.01b94e68@pop.face2interface.com> X-Sender: face@pop.face2interface.com X-Mailer: QUALCOMM Windows Eudora Version 6.0.0.22 Date: Sun, 22 Feb 2004 09:01:32 -0500 To: Chuck Swiger From: Marty Landman In-Reply-To: <4037D5D7.8030700@mac.com> References: <20040221052137.GL24309@hardesty.saintaardvarkthecarpeted.com> <6.0.0.22.0.20040221092538.05e6dc48@pop.face2interface.com> <4037D5D7.8030700@mac.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed cc: freebsd-questions@freebsd.org Subject: Re: DHCP access X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 22 Feb 2004 14:01:40 -0000 At 05:04 PM 2/21/2004, Chuck Swiger wrote: >Marty Landman wrote: > >>looks like arp is unreliable for a canonical list of plugged in ip's. >>Curious about what would work. > >"nmap -sP 22 192.168.0.0/24" should do it %nmap -sP 22 192.168.0.0/24 Starting nmap V. 3.00 ( www.insecure.org/nmap/ ) Target host specification is illegal. QUITTING! % I don't understand the man page though so assume it's me, not nmap. >ping 192.168.0.255 %ping 192.168.0.255 PING 192.168.0.255 (192.168.0.255): 56 data bytes 64 bytes from 192.168.0.3: icmp_seq=0 ttl=255 time=0.964 ms 64 bytes from 192.168.0.160: icmp_seq=0 ttl=64 time=1.359 ms (DUP!) ^C Hmm, since there are five nodes on my class c network this didn't do the trick either. I wrote a quick perl script that I think works but so slowly that it's impractical: %perl -e 'for(0..255) {$ip = "192.168.0.$_";$ping = `ping -c1 $ip`;print "$ip\n" if $ping =~ /64 bytes from/}' 192.168.0.0 192.168.0.1 192.168.0.3 . . . Marty Landman Face 2 Interface Inc 845-679-9387 This Month's New Quiz --- Past Superbowl Winners Make a Website: http://face2interface.com/Home/Demo.shtml