LinuxCommandLibrary

nping

TLDR

TCP ping to port

$ nping --tcp -p [80] [target]
copy
UDP ping
$ nping --udp -p [53] [target]
copy
ICMP echo ping
$ nping --icmp [target]
copy
Send multiple packets
$ nping -c [5] [target]
copy
Set packet rate
$ nping --rate [10] [target]
copy
TCP SYN packets
$ nping --tcp --flags syn -p [22] [target]
copy
ARP ping (local network)
$ nping --arp [192.168.1.0/24]
copy
Traceroute mode
$ nping --traceroute [target]
copy

SYNOPSIS

nping [--tcp] [--udp] [--icmp] [-p port] [-c count] [options] targets

DESCRIPTION

nping is a flexible packet generation and response analysis tool. It extends ping functionality to arbitrary protocol combinations.
TCP mode probes ports without completing connections. SYN packets test firewall rules and service availability. Custom flag combinations test TCP stack behavior.
UDP probing tests UDP services. ICMP includes various message types beyond echo requests. ARP queries resolve MAC addresses on local networks.
Echo mode bounces packets through a server, useful for testing firewalls and NAT traversal. The client sends packets to the server, which returns them.
Traceroute mode discovers network paths by incrementing TTL values. It works with TCP, UDP, or ICMP probes.
Packet customization includes payload data, timing, and protocol options. This enables protocol research and network testing.

PARAMETERS

--tcp

TCP mode.
--udp
UDP mode.
--icmp
ICMP mode.
--arp
ARP mode.
-p PORT
Target port(s).
-c COUNT
Packet count.
--rate RATE
Packets per second.
--flags FLAGS
TCP flags (syn, ack, rst, etc.).
--ttl TTL
IP time to live.
--data-length LEN
Append random data.
--data-string STR
Append string data.
--traceroute
Traceroute mode.
-e IFACE
Network interface.
-S ADDR
Source address.
--echo-client PASS
Echo mode client.
--echo-server PASS
Echo mode server.

CAVEATS

Raw sockets require root privileges. Some modes may trigger IDS alerts. Use only on authorized networks. Results depend on firewall configuration.

HISTORY

nping was developed as part of the Nmap project by Gordon Lyon (Fyodor) and contributors. It complements Nmap's port scanning with active probing capabilities.

SEE ALSO

nmap(1), hping3(8), ping(1), traceroute(1)

Copied to clipboard