How can I ping multiple IP addresses at the same time?Loop over multiple addresses: ping and drop data into fileHow to disable IPv6 ping response in Linux without firewallCannot Ping, nor Curl, but Nslookup worksFile /etc/resolv.conf deleted on every reboot, why or what?Ping works only with IP addresses (not with domain names)Ping with negative timeping statistics time meaningWhy can I ping IP addresses from 127.0.0.1 to 127.255.255.254?How to Disable Ping Response (ICMP echo) in Linux all the time?How to Disable Ping ( TCP ) in Linux all the time?
At what temperature should the earth be cooked to prevent human infection?
Why is Skinner so awkward in Hot Fuzz?
Fill the maze with a wall-following Snake until it gets stuck
Leaving job close to major deadlines
Huge Heap Table and table compression on SQL Server 2016
How would Japanese people react to someone refusing to say “itadakimasu” for religious reasons?
Schedule Batch Apex too many rows
Why do you need to heat the pan before heating the olive oil?
What is the precise meaning of "подсел на мак"?
New Site Design!
How to ask if I can mow my neighbor's lawn
Is the infant mortality rate among African-American babies in Youngstown, Ohio greater than that of babies in Iran?
Does knowing the surface area of all faces uniquely determine a tetrahedron?
How to sort human readable size
Is there any effect in D&D 5e that cannot be undone?
How to make a villain when your PCs are villains?
...and then she held the gun
Testing thermite for chemical properties
Why should the equality of mixed partials be "intuitively obvious"?
How do I run a script as sudo at boot time on Ubuntu 18.04 Server?
Is it possible for underground bunkers on different continents to be connected?
Basic power tool set for Home repair and simple projects
The instant an accelerating object has zero speed, is it speeding up, slowing down, or neither?
How to avoid offending original culture when making conculture inspired from original
How can I ping multiple IP addresses at the same time?
Loop over multiple addresses: ping and drop data into fileHow to disable IPv6 ping response in Linux without firewallCannot Ping, nor Curl, but Nslookup worksFile /etc/resolv.conf deleted on every reboot, why or what?Ping works only with IP addresses (not with domain names)Ping with negative timeping statistics time meaningWhy can I ping IP addresses from 127.0.0.1 to 127.255.255.254?How to Disable Ping Response (ICMP echo) in Linux all the time?How to Disable Ping ( TCP ) in Linux all the time?
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;
I'm aware of the methods where you can run a Bash for
loop and ping
multiple servers, is there a Linux CLI tool that I can use which will allow for me to do this without having to resort to writing a Bash script to ping
a list of servers one at a time?
Something like this:
$ ping host1 host2 host3
NOTE: I'm looking specifically for CentOS/Fedora, but if it works on other distros that's fine too.
networking ping icmp
add a comment |
I'm aware of the methods where you can run a Bash for
loop and ping
multiple servers, is there a Linux CLI tool that I can use which will allow for me to do this without having to resort to writing a Bash script to ping
a list of servers one at a time?
Something like this:
$ ping host1 host2 host3
NOTE: I'm looking specifically for CentOS/Fedora, but if it works on other distros that's fine too.
networking ping icmp
add a comment |
I'm aware of the methods where you can run a Bash for
loop and ping
multiple servers, is there a Linux CLI tool that I can use which will allow for me to do this without having to resort to writing a Bash script to ping
a list of servers one at a time?
Something like this:
$ ping host1 host2 host3
NOTE: I'm looking specifically for CentOS/Fedora, but if it works on other distros that's fine too.
networking ping icmp
I'm aware of the methods where you can run a Bash for
loop and ping
multiple servers, is there a Linux CLI tool that I can use which will allow for me to do this without having to resort to writing a Bash script to ping
a list of servers one at a time?
Something like this:
$ ping host1 host2 host3
NOTE: I'm looking specifically for CentOS/Fedora, but if it works on other distros that's fine too.
networking ping icmp
networking ping icmp
asked 8 hours ago
slm♦slm
261k72561707
261k72561707
add a comment |
add a comment |
6 Answers
6
active
oldest
votes
If you look into the NMAP project you'll find that it includes additional tools on top of just nmap
. One of these tools is nping
, which includes the following ability:
Nping has a very flexible and powerful command-line interface that
grants users full control over generated packets. Nping's features
include:
- Custom TCP, UDP, ICMP and ARP packet generation.
- Support for multiple target host specification.
- Support for multiple target port specification.
- ...
nping
is in the standard EPEL repos to boot.
$ repoquery -qlf nmap.x86_64 | grep nping
/usr/bin/nping
/usr/share/man/man1/nping.1.gz
Usage
To ping multiple servers you merely have to tell nping
the names/IPs and which protocol you want to use. Here since we want to mimic what the traditional ping
CLI does we'll use ICMP.
$ sudo nping -c 2 --icmp scanme.nmap.org google.com
Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-06-14 13:43 EDT
SENT (0.0088s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=1] IP [ttl=64 id=57921 iplen=28 ]
RCVD (0.0950s) ICMP [45.33.32.156 > 10.3.144.95 Echo reply (type=0/code=0) id=42074 seq=1] IP [ttl=46 id=24195 iplen=28 ]
SENT (1.0091s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=2] IP [ttl=64 id=57921 iplen=28 ]
SENT (2.0105s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=2] IP [ttl=64 id=57921 iplen=28 ]
RCVD (2.0107s) ICMP [45.33.32.156 > 10.3.144.95 Echo reply (type=0/code=0) id=42074 seq=2] IP [ttl=46 id=24465 iplen=28 ]
SENT (3.0138s) ICMP [10.3.144.95 > 64.233.177.100 Echo request (type=8/code=0) id=49169 seq=2] IP [ttl=64 id=57921 iplen=28 ]
Statistics for host scanme.nmap.org (45.33.32.156):
| Probes Sent: 2 | Rcvd: 2 | Lost: 0 (0.00%)
|_ Max rtt: 86.053ms | Min rtt: 0.188ms | Avg rtt: 43.120ms
Statistics for host google.com (64.233.177.100):
| Probes Sent: 2 | Rcvd: 0 | Lost: 2 (100.00%)
|_ Max rtt: N/A | Min rtt: N/A | Avg rtt: N/A
Raw packets sent: 4 (112B) | Rcvd: 2 (108B) | Lost: 2 (50.00%)
Nping done: 2 IP addresses pinged in 3.01 seconds
The only drawback I've found with this tool is the use of ICMP mode requiring root privileges.
$ nping -c 2 --icmp scanme.nmap.org google.com
Mode ICMP requires root privileges.
add a comment |
fping is in a Fedora package of the same name, and allows for many hosts, or a set of ip addressses.
$ fping -a -A -c 1 hosta hostb
192.168.0.20 : xmt/rcv/%loss = 1/1/0%, min/avg/max = 0.64/0.64/0.64
192.168.1.3 : xmt/rcv/%loss = 1/1/0%, min/avg/max = 0.50/0.50/0.50
fping will send out a ping packet and move on to the next target in a
round-robin fashion... if a target replies, it is noted and removed from
the list
add a comment |
I know it's specifically not what you are asking for, but a bash script to accomplish this:
#!/bin/bash
endpoints=("$@")
for i in "$endpoints[@]"; do
ping -c5 "$i" 2>&1 | tail -3 &
pids+=($!)
done
for pid in "$pids[@]"; do
wait "$pid"
done
This will take your endpoints as command line arguments and send a 5 count ping to each one as a background process and then wait for all to finish before exiting. It will print the last three lines of the ping output which contains useful stats about the success rate and latency.
add a comment |
oping host1 host2 host3
Description:
oping uses ICMP packages (better known as "ping packets") to test the reachability of network hosts. It supports pinging multiple hosts in parallel using IPv4 and/or IPv6 transparently.
This package contains two command line applications: "oping" is a replacement for tools like ping(1), ping6(1) and fping(1). "noping" is an ncurses-based tool which displays statistics while pinging and highlights aberrant round-trip times.
add a comment |
Just for fun and profit...
#!/bin/sh -
hosts="
host.a
host.b
host.c
host.d
host.e
"
for p in $hosts
do
# ONLY CHOOSE ONE OF THE FOLLOWING, NOT BOTH
# dump results to file
ping $p >>./PINGED
# dump output to console
ping $p
done
exit
This could be easily enhanced. Which makes it pretty useful. :)
HTH
New contributor
add a comment |
I do not know what you want exactly but you could change the last 8 bit-set into the decimal 255, so your hosts will receive a broadcast, actually,it will transmit ping packets to all devices that exist in a network.
ping -c 1 xx.xx.xx.255
New contributor
That's not what I'm looking for.
– slm♦
5 hours ago
add a comment |
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "106"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f524963%2fhow-can-i-ping-multiple-ip-addresses-at-the-same-time%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
6 Answers
6
active
oldest
votes
6 Answers
6
active
oldest
votes
active
oldest
votes
active
oldest
votes
If you look into the NMAP project you'll find that it includes additional tools on top of just nmap
. One of these tools is nping
, which includes the following ability:
Nping has a very flexible and powerful command-line interface that
grants users full control over generated packets. Nping's features
include:
- Custom TCP, UDP, ICMP and ARP packet generation.
- Support for multiple target host specification.
- Support for multiple target port specification.
- ...
nping
is in the standard EPEL repos to boot.
$ repoquery -qlf nmap.x86_64 | grep nping
/usr/bin/nping
/usr/share/man/man1/nping.1.gz
Usage
To ping multiple servers you merely have to tell nping
the names/IPs and which protocol you want to use. Here since we want to mimic what the traditional ping
CLI does we'll use ICMP.
$ sudo nping -c 2 --icmp scanme.nmap.org google.com
Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-06-14 13:43 EDT
SENT (0.0088s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=1] IP [ttl=64 id=57921 iplen=28 ]
RCVD (0.0950s) ICMP [45.33.32.156 > 10.3.144.95 Echo reply (type=0/code=0) id=42074 seq=1] IP [ttl=46 id=24195 iplen=28 ]
SENT (1.0091s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=2] IP [ttl=64 id=57921 iplen=28 ]
SENT (2.0105s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=2] IP [ttl=64 id=57921 iplen=28 ]
RCVD (2.0107s) ICMP [45.33.32.156 > 10.3.144.95 Echo reply (type=0/code=0) id=42074 seq=2] IP [ttl=46 id=24465 iplen=28 ]
SENT (3.0138s) ICMP [10.3.144.95 > 64.233.177.100 Echo request (type=8/code=0) id=49169 seq=2] IP [ttl=64 id=57921 iplen=28 ]
Statistics for host scanme.nmap.org (45.33.32.156):
| Probes Sent: 2 | Rcvd: 2 | Lost: 0 (0.00%)
|_ Max rtt: 86.053ms | Min rtt: 0.188ms | Avg rtt: 43.120ms
Statistics for host google.com (64.233.177.100):
| Probes Sent: 2 | Rcvd: 0 | Lost: 2 (100.00%)
|_ Max rtt: N/A | Min rtt: N/A | Avg rtt: N/A
Raw packets sent: 4 (112B) | Rcvd: 2 (108B) | Lost: 2 (50.00%)
Nping done: 2 IP addresses pinged in 3.01 seconds
The only drawback I've found with this tool is the use of ICMP mode requiring root privileges.
$ nping -c 2 --icmp scanme.nmap.org google.com
Mode ICMP requires root privileges.
add a comment |
If you look into the NMAP project you'll find that it includes additional tools on top of just nmap
. One of these tools is nping
, which includes the following ability:
Nping has a very flexible and powerful command-line interface that
grants users full control over generated packets. Nping's features
include:
- Custom TCP, UDP, ICMP and ARP packet generation.
- Support for multiple target host specification.
- Support for multiple target port specification.
- ...
nping
is in the standard EPEL repos to boot.
$ repoquery -qlf nmap.x86_64 | grep nping
/usr/bin/nping
/usr/share/man/man1/nping.1.gz
Usage
To ping multiple servers you merely have to tell nping
the names/IPs and which protocol you want to use. Here since we want to mimic what the traditional ping
CLI does we'll use ICMP.
$ sudo nping -c 2 --icmp scanme.nmap.org google.com
Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-06-14 13:43 EDT
SENT (0.0088s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=1] IP [ttl=64 id=57921 iplen=28 ]
RCVD (0.0950s) ICMP [45.33.32.156 > 10.3.144.95 Echo reply (type=0/code=0) id=42074 seq=1] IP [ttl=46 id=24195 iplen=28 ]
SENT (1.0091s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=2] IP [ttl=64 id=57921 iplen=28 ]
SENT (2.0105s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=2] IP [ttl=64 id=57921 iplen=28 ]
RCVD (2.0107s) ICMP [45.33.32.156 > 10.3.144.95 Echo reply (type=0/code=0) id=42074 seq=2] IP [ttl=46 id=24465 iplen=28 ]
SENT (3.0138s) ICMP [10.3.144.95 > 64.233.177.100 Echo request (type=8/code=0) id=49169 seq=2] IP [ttl=64 id=57921 iplen=28 ]
Statistics for host scanme.nmap.org (45.33.32.156):
| Probes Sent: 2 | Rcvd: 2 | Lost: 0 (0.00%)
|_ Max rtt: 86.053ms | Min rtt: 0.188ms | Avg rtt: 43.120ms
Statistics for host google.com (64.233.177.100):
| Probes Sent: 2 | Rcvd: 0 | Lost: 2 (100.00%)
|_ Max rtt: N/A | Min rtt: N/A | Avg rtt: N/A
Raw packets sent: 4 (112B) | Rcvd: 2 (108B) | Lost: 2 (50.00%)
Nping done: 2 IP addresses pinged in 3.01 seconds
The only drawback I've found with this tool is the use of ICMP mode requiring root privileges.
$ nping -c 2 --icmp scanme.nmap.org google.com
Mode ICMP requires root privileges.
add a comment |
If you look into the NMAP project you'll find that it includes additional tools on top of just nmap
. One of these tools is nping
, which includes the following ability:
Nping has a very flexible and powerful command-line interface that
grants users full control over generated packets. Nping's features
include:
- Custom TCP, UDP, ICMP and ARP packet generation.
- Support for multiple target host specification.
- Support for multiple target port specification.
- ...
nping
is in the standard EPEL repos to boot.
$ repoquery -qlf nmap.x86_64 | grep nping
/usr/bin/nping
/usr/share/man/man1/nping.1.gz
Usage
To ping multiple servers you merely have to tell nping
the names/IPs and which protocol you want to use. Here since we want to mimic what the traditional ping
CLI does we'll use ICMP.
$ sudo nping -c 2 --icmp scanme.nmap.org google.com
Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-06-14 13:43 EDT
SENT (0.0088s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=1] IP [ttl=64 id=57921 iplen=28 ]
RCVD (0.0950s) ICMP [45.33.32.156 > 10.3.144.95 Echo reply (type=0/code=0) id=42074 seq=1] IP [ttl=46 id=24195 iplen=28 ]
SENT (1.0091s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=2] IP [ttl=64 id=57921 iplen=28 ]
SENT (2.0105s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=2] IP [ttl=64 id=57921 iplen=28 ]
RCVD (2.0107s) ICMP [45.33.32.156 > 10.3.144.95 Echo reply (type=0/code=0) id=42074 seq=2] IP [ttl=46 id=24465 iplen=28 ]
SENT (3.0138s) ICMP [10.3.144.95 > 64.233.177.100 Echo request (type=8/code=0) id=49169 seq=2] IP [ttl=64 id=57921 iplen=28 ]
Statistics for host scanme.nmap.org (45.33.32.156):
| Probes Sent: 2 | Rcvd: 2 | Lost: 0 (0.00%)
|_ Max rtt: 86.053ms | Min rtt: 0.188ms | Avg rtt: 43.120ms
Statistics for host google.com (64.233.177.100):
| Probes Sent: 2 | Rcvd: 0 | Lost: 2 (100.00%)
|_ Max rtt: N/A | Min rtt: N/A | Avg rtt: N/A
Raw packets sent: 4 (112B) | Rcvd: 2 (108B) | Lost: 2 (50.00%)
Nping done: 2 IP addresses pinged in 3.01 seconds
The only drawback I've found with this tool is the use of ICMP mode requiring root privileges.
$ nping -c 2 --icmp scanme.nmap.org google.com
Mode ICMP requires root privileges.
If you look into the NMAP project you'll find that it includes additional tools on top of just nmap
. One of these tools is nping
, which includes the following ability:
Nping has a very flexible and powerful command-line interface that
grants users full control over generated packets. Nping's features
include:
- Custom TCP, UDP, ICMP and ARP packet generation.
- Support for multiple target host specification.
- Support for multiple target port specification.
- ...
nping
is in the standard EPEL repos to boot.
$ repoquery -qlf nmap.x86_64 | grep nping
/usr/bin/nping
/usr/share/man/man1/nping.1.gz
Usage
To ping multiple servers you merely have to tell nping
the names/IPs and which protocol you want to use. Here since we want to mimic what the traditional ping
CLI does we'll use ICMP.
$ sudo nping -c 2 --icmp scanme.nmap.org google.com
Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-06-14 13:43 EDT
SENT (0.0088s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=1] IP [ttl=64 id=57921 iplen=28 ]
RCVD (0.0950s) ICMP [45.33.32.156 > 10.3.144.95 Echo reply (type=0/code=0) id=42074 seq=1] IP [ttl=46 id=24195 iplen=28 ]
SENT (1.0091s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=2] IP [ttl=64 id=57921 iplen=28 ]
SENT (2.0105s) ICMP [10.3.144.95 > 45.33.32.156 Echo request (type=8/code=0) id=42074 seq=2] IP [ttl=64 id=57921 iplen=28 ]
RCVD (2.0107s) ICMP [45.33.32.156 > 10.3.144.95 Echo reply (type=0/code=0) id=42074 seq=2] IP [ttl=46 id=24465 iplen=28 ]
SENT (3.0138s) ICMP [10.3.144.95 > 64.233.177.100 Echo request (type=8/code=0) id=49169 seq=2] IP [ttl=64 id=57921 iplen=28 ]
Statistics for host scanme.nmap.org (45.33.32.156):
| Probes Sent: 2 | Rcvd: 2 | Lost: 0 (0.00%)
|_ Max rtt: 86.053ms | Min rtt: 0.188ms | Avg rtt: 43.120ms
Statistics for host google.com (64.233.177.100):
| Probes Sent: 2 | Rcvd: 0 | Lost: 2 (100.00%)
|_ Max rtt: N/A | Min rtt: N/A | Avg rtt: N/A
Raw packets sent: 4 (112B) | Rcvd: 2 (108B) | Lost: 2 (50.00%)
Nping done: 2 IP addresses pinged in 3.01 seconds
The only drawback I've found with this tool is the use of ICMP mode requiring root privileges.
$ nping -c 2 --icmp scanme.nmap.org google.com
Mode ICMP requires root privileges.
answered 8 hours ago
slm♦slm
261k72561707
261k72561707
add a comment |
add a comment |
fping is in a Fedora package of the same name, and allows for many hosts, or a set of ip addressses.
$ fping -a -A -c 1 hosta hostb
192.168.0.20 : xmt/rcv/%loss = 1/1/0%, min/avg/max = 0.64/0.64/0.64
192.168.1.3 : xmt/rcv/%loss = 1/1/0%, min/avg/max = 0.50/0.50/0.50
fping will send out a ping packet and move on to the next target in a
round-robin fashion... if a target replies, it is noted and removed from
the list
add a comment |
fping is in a Fedora package of the same name, and allows for many hosts, or a set of ip addressses.
$ fping -a -A -c 1 hosta hostb
192.168.0.20 : xmt/rcv/%loss = 1/1/0%, min/avg/max = 0.64/0.64/0.64
192.168.1.3 : xmt/rcv/%loss = 1/1/0%, min/avg/max = 0.50/0.50/0.50
fping will send out a ping packet and move on to the next target in a
round-robin fashion... if a target replies, it is noted and removed from
the list
add a comment |
fping is in a Fedora package of the same name, and allows for many hosts, or a set of ip addressses.
$ fping -a -A -c 1 hosta hostb
192.168.0.20 : xmt/rcv/%loss = 1/1/0%, min/avg/max = 0.64/0.64/0.64
192.168.1.3 : xmt/rcv/%loss = 1/1/0%, min/avg/max = 0.50/0.50/0.50
fping will send out a ping packet and move on to the next target in a
round-robin fashion... if a target replies, it is noted and removed from
the list
fping is in a Fedora package of the same name, and allows for many hosts, or a set of ip addressses.
$ fping -a -A -c 1 hosta hostb
192.168.0.20 : xmt/rcv/%loss = 1/1/0%, min/avg/max = 0.64/0.64/0.64
192.168.1.3 : xmt/rcv/%loss = 1/1/0%, min/avg/max = 0.50/0.50/0.50
fping will send out a ping packet and move on to the next target in a
round-robin fashion... if a target replies, it is noted and removed from
the list
answered 6 hours ago
meuhmeuh
33k12558
33k12558
add a comment |
add a comment |
I know it's specifically not what you are asking for, but a bash script to accomplish this:
#!/bin/bash
endpoints=("$@")
for i in "$endpoints[@]"; do
ping -c5 "$i" 2>&1 | tail -3 &
pids+=($!)
done
for pid in "$pids[@]"; do
wait "$pid"
done
This will take your endpoints as command line arguments and send a 5 count ping to each one as a background process and then wait for all to finish before exiting. It will print the last three lines of the ping output which contains useful stats about the success rate and latency.
add a comment |
I know it's specifically not what you are asking for, but a bash script to accomplish this:
#!/bin/bash
endpoints=("$@")
for i in "$endpoints[@]"; do
ping -c5 "$i" 2>&1 | tail -3 &
pids+=($!)
done
for pid in "$pids[@]"; do
wait "$pid"
done
This will take your endpoints as command line arguments and send a 5 count ping to each one as a background process and then wait for all to finish before exiting. It will print the last three lines of the ping output which contains useful stats about the success rate and latency.
add a comment |
I know it's specifically not what you are asking for, but a bash script to accomplish this:
#!/bin/bash
endpoints=("$@")
for i in "$endpoints[@]"; do
ping -c5 "$i" 2>&1 | tail -3 &
pids+=($!)
done
for pid in "$pids[@]"; do
wait "$pid"
done
This will take your endpoints as command line arguments and send a 5 count ping to each one as a background process and then wait for all to finish before exiting. It will print the last three lines of the ping output which contains useful stats about the success rate and latency.
I know it's specifically not what you are asking for, but a bash script to accomplish this:
#!/bin/bash
endpoints=("$@")
for i in "$endpoints[@]"; do
ping -c5 "$i" 2>&1 | tail -3 &
pids+=($!)
done
for pid in "$pids[@]"; do
wait "$pid"
done
This will take your endpoints as command line arguments and send a 5 count ping to each one as a background process and then wait for all to finish before exiting. It will print the last three lines of the ping output which contains useful stats about the success rate and latency.
answered 7 hours ago
Jesse_bJesse_b
16.7k34183
16.7k34183
add a comment |
add a comment |
oping host1 host2 host3
Description:
oping uses ICMP packages (better known as "ping packets") to test the reachability of network hosts. It supports pinging multiple hosts in parallel using IPv4 and/or IPv6 transparently.
This package contains two command line applications: "oping" is a replacement for tools like ping(1), ping6(1) and fping(1). "noping" is an ncurses-based tool which displays statistics while pinging and highlights aberrant round-trip times.
add a comment |
oping host1 host2 host3
Description:
oping uses ICMP packages (better known as "ping packets") to test the reachability of network hosts. It supports pinging multiple hosts in parallel using IPv4 and/or IPv6 transparently.
This package contains two command line applications: "oping" is a replacement for tools like ping(1), ping6(1) and fping(1). "noping" is an ncurses-based tool which displays statistics while pinging and highlights aberrant round-trip times.
add a comment |
oping host1 host2 host3
Description:
oping uses ICMP packages (better known as "ping packets") to test the reachability of network hosts. It supports pinging multiple hosts in parallel using IPv4 and/or IPv6 transparently.
This package contains two command line applications: "oping" is a replacement for tools like ping(1), ping6(1) and fping(1). "noping" is an ncurses-based tool which displays statistics while pinging and highlights aberrant round-trip times.
oping host1 host2 host3
Description:
oping uses ICMP packages (better known as "ping packets") to test the reachability of network hosts. It supports pinging multiple hosts in parallel using IPv4 and/or IPv6 transparently.
This package contains two command line applications: "oping" is a replacement for tools like ping(1), ping6(1) and fping(1). "noping" is an ncurses-based tool which displays statistics while pinging and highlights aberrant round-trip times.
answered 5 hours ago
GAD3RGAD3R
29.1k1960118
29.1k1960118
add a comment |
add a comment |
Just for fun and profit...
#!/bin/sh -
hosts="
host.a
host.b
host.c
host.d
host.e
"
for p in $hosts
do
# ONLY CHOOSE ONE OF THE FOLLOWING, NOT BOTH
# dump results to file
ping $p >>./PINGED
# dump output to console
ping $p
done
exit
This could be easily enhanced. Which makes it pretty useful. :)
HTH
New contributor
add a comment |
Just for fun and profit...
#!/bin/sh -
hosts="
host.a
host.b
host.c
host.d
host.e
"
for p in $hosts
do
# ONLY CHOOSE ONE OF THE FOLLOWING, NOT BOTH
# dump results to file
ping $p >>./PINGED
# dump output to console
ping $p
done
exit
This could be easily enhanced. Which makes it pretty useful. :)
HTH
New contributor
add a comment |
Just for fun and profit...
#!/bin/sh -
hosts="
host.a
host.b
host.c
host.d
host.e
"
for p in $hosts
do
# ONLY CHOOSE ONE OF THE FOLLOWING, NOT BOTH
# dump results to file
ping $p >>./PINGED
# dump output to console
ping $p
done
exit
This could be easily enhanced. Which makes it pretty useful. :)
HTH
New contributor
Just for fun and profit...
#!/bin/sh -
hosts="
host.a
host.b
host.c
host.d
host.e
"
for p in $hosts
do
# ONLY CHOOSE ONE OF THE FOLLOWING, NOT BOTH
# dump results to file
ping $p >>./PINGED
# dump output to console
ping $p
done
exit
This could be easily enhanced. Which makes it pretty useful. :)
HTH
New contributor
New contributor
answered 5 hours ago
somebodysomebody
1103
1103
New contributor
New contributor
add a comment |
add a comment |
I do not know what you want exactly but you could change the last 8 bit-set into the decimal 255, so your hosts will receive a broadcast, actually,it will transmit ping packets to all devices that exist in a network.
ping -c 1 xx.xx.xx.255
New contributor
That's not what I'm looking for.
– slm♦
5 hours ago
add a comment |
I do not know what you want exactly but you could change the last 8 bit-set into the decimal 255, so your hosts will receive a broadcast, actually,it will transmit ping packets to all devices that exist in a network.
ping -c 1 xx.xx.xx.255
New contributor
That's not what I'm looking for.
– slm♦
5 hours ago
add a comment |
I do not know what you want exactly but you could change the last 8 bit-set into the decimal 255, so your hosts will receive a broadcast, actually,it will transmit ping packets to all devices that exist in a network.
ping -c 1 xx.xx.xx.255
New contributor
I do not know what you want exactly but you could change the last 8 bit-set into the decimal 255, so your hosts will receive a broadcast, actually,it will transmit ping packets to all devices that exist in a network.
ping -c 1 xx.xx.xx.255
New contributor
New contributor
answered 5 hours ago
D.ThomasD.Thomas
1
1
New contributor
New contributor
That's not what I'm looking for.
– slm♦
5 hours ago
add a comment |
That's not what I'm looking for.
– slm♦
5 hours ago
That's not what I'm looking for.
– slm♦
5 hours ago
That's not what I'm looking for.
– slm♦
5 hours ago
add a comment |
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f524963%2fhow-can-i-ping-multiple-ip-addresses-at-the-same-time%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown