1
0
mirror of https://github.com/byReqz/conn.git synced 2024-12-25 13:01:48 +00:00
Go to file
2021-11-27 23:46:08 +01:00
.github/workflows fix hash action 2021-04-15 09:24:21 +02:00
.gitignore add note files to gitignore 2021-11-27 23:37:57 +01:00
conn.sh.old prepare branch 2021-11-27 23:46:08 +01:00
LICENSE Initial commit 2021-01-15 14:40:34 +00:00
README.md prepare branch 2021-11-27 23:46:08 +01:00

conn

the script is actively being rewritten on this branch and might not be on a usable state right now

quick and dirty server availability check

basically just a way too complex wrapper for nmap and fping

features:

  • multi-input detection
  • ipv4 input detection
  • ipv6 input detection
  • waiting for availability
  • send notification on availability
  • updater built in

usage

Usage: conn (options) [ip]
Options:
-m/--multi -- test multiple ips / disable portscan
-h/--help -- show help
-6/--force-ipv6 -- force ipv6 portscanning (also forces portscanning)
-4/--force-ipv4 -- force ipv4 portscanning (also forces portscanning)
-y/--yes -- portscan without asking
-n/--no -- dont portscan
-p/--portscan -- same as -y
-w/--wait -- wait for active connection
-u/--update -- update the script
-f/ --fast -- disable os check
-s/ --simple -- same as -f

installation

  1. download the script:
wget https://git.byreqz.de/byreqz/conn/raw/branch/main/conn.sh
  1. run it with
    bash conn.sh or
    chmod +x conn.sh && ./conn.sh
  2. optionally alias it
    alias conn="~/conn.sh"

sample output

checking connection status for localhost
-------------------Availability----------------------
localhost is alive (545 ms)
note: this seems to be a linux machine
-----------------------------------------------------
-------------------Portscan---------------------
Starting Nmap 7.91 ( https://nmap.org ) at 2021-02-15 15:07 CET
Nmap scan report for localhost (127.0.0.1)
Host is up, received user-set (0.047s latency).
Other addresses for localhost (not scanned): ::1
Not shown: 998 closed ports
Reason: 998 conn-refused
PORT    STATE SERVICE REASON
22/tcp  open  ssh     syn-ack
631/tcp open  ipp     syn-ack
Nmap done: 1 IP address (1 host up) scanned in 3.23 seconds

localhost : [0], 64 bytes, 0.185 ms (0.185 avg, 0% loss)
localhost : [1], 64 bytes, 0.058 ms (0.122 avg, 0% loss)
localhost : [2], 64 bytes, 0.060 ms (0.101 avg, 0% loss)
localhost : [3], 64 bytes, 0.081 ms (0.096 avg, 0% loss)

localhost : xmt/rcv/%loss = 4/4/0%, min/avg/max = 0.058/0.096/0.185
------------------------------------------------