nping
TLDR
TCP ping to port
SYNOPSIS
nping [--tcp] [--udp] [--icmp] [-p port] [-c count] [options] targets
DESCRIPTION
nping is a flexible packet generation and response analysis tool. It extends ping functionality to arbitrary protocol combinations.
TCP mode probes ports without completing connections. SYN packets test firewall rules and service availability. Custom flag combinations test TCP stack behavior.
UDP probing tests UDP services. ICMP includes various message types beyond echo requests. ARP queries resolve MAC addresses on local networks.
Echo mode bounces packets through a server, useful for testing firewalls and NAT traversal. The client sends packets to the server, which returns them.
Traceroute mode discovers network paths by incrementing TTL values. It works with TCP, UDP, or ICMP probes.
Packet customization includes payload data, timing, and protocol options. This enables protocol research and network testing.
PARAMETERS
--tcp
TCP mode.--udp
UDP mode.--icmp
ICMP mode.--arp
ARP mode.-p PORT
Target port(s).-c COUNT
Packet count.--rate RATE
Packets per second.--flags FLAGS
TCP flags (syn, ack, rst, etc.).--ttl TTL
IP time to live.--data-length LEN
Append random data.--data-string STR
Append string data.--traceroute
Traceroute mode.-e IFACE
Network interface.-S ADDR
Source address.--echo-client PASS
Echo mode client.--echo-server PASS
Echo mode server.
CAVEATS
Raw sockets require root privileges. Some modes may trigger IDS alerts. Use only on authorized networks. Results depend on firewall configuration.
HISTORY
nping was developed as part of the Nmap project by Gordon Lyon (Fyodor) and contributors. It complements Nmap's port scanning with active probing capabilities.
SEE ALSO
nmap(1), hping3(8), ping(1), traceroute(1)


