networking command cheatsheet
list all ip addresses
$ ip a
OR
$ ifconfig
OR
$ ipconfig (windows)
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: enp1s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
link/ether c4:54:44:fd:e8:45 brd ff:ff:ff:ff:ff:ff
inet 10.0.1.33/26 metric 100 brd 10.0.1.63 scope global dynamic enp1s0
valid_lft 5151sec preferred_lft 5151sec
inet6 fe80::c654:44ff:fefd:e845/64 scope link
valid_lft forever preferred_lft forever
3: wlp2s0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000
link/ether 18:cf:5e:f3:37:ce brd ff:ff:ff:ff:ff:ff
4: wg0: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
link/none
inet 10.1.248.0/21 scope global wg0
valid_lft forever preferred_lft forever
list ip address of specific interface
$ ip a show wg0
4: wg0: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
link/none
inet 10.1.248.0/21 scope global wg0
valid_lft forever preferred_lft forever
show network routes
$ ip route s (the new standard, yay)
default via 192.168.64.1 dev enp0s1 proto dhcp src 192.168.64.4 metric 100
10.0.1.0/26 via 192.168.64.1 dev enp0s1 proto static onlink
192.168.64.0/24 dev enp0s1 proto kernel scope link src 192.168.64.4 metric 100
192.168.64.1 dev enp0s1 proto dhcp scope link src 192.168.64.4 metric 100
$ route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.64.1 0.0.0.0 UG 100 0 0 enp0s1
10.0.1.0 192.168.64.1 255.255.255.192 UG 0 0 0 enp0s1
192.168.64.0 0.0.0.0 255.255.255.0 U 100 0 0 enp0s1
192.168.64.1 0.0.0.0 255.255.255.255 UH 100 0 0 enp0s1
$ netstat -rn (works on macOS)
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 192.168.64.1 0.0.0.0 UG 0 0 0 enp0s1
10.0.1.0 192.168.64.1 255.255.255.192 UG 0 0 0 enp0s1
192.168.64.0 0.0.0.0 255.255.255.0 U 0 0 0 enp0s1
192.168.64.1 0.0.0.0 255.255.255.255 UH 0 0 0 enp0s1
nslookup (forward DNS lookup)
get IP addresses for a domain
$ nslookup kamaradski.com
Server: 127.0.0.53
Address: 127.0.0.53#53
Non-authoritative answer:
Name: kamaradski.com
Address: 172.67.191.29
Name: kamaradski.com
Address: 104.21.60.32
Name: kamaradski.com
Address: 2606:4700:3037::6815:3c20
Name: kamaradski.com
Address: 2606:4700:3037::ac43:bf1d
get all dns entries of a domain (disabled by most providers)
$ nslookup -type=all microsoft.com
Server: 8.8.8.8
Address: 8.8.8.8#53
Non-authoritative answer:
Name: microsoft.com
Address: 134.170.185.46
Name: microsoft.com
Address: 134.170.188.221
microsoft.com nameserver = ns3.msft.net.
microsoft.com nameserver = ns4.msft.net.
microsoft.com nameserver = ns1.msft.net.
microsoft.com nameserver = ns2.msft.net.
microsoft.com
origin = ns1.msft.net
mail addr = msnhst.microsoft.com
serial = 2014110802
refresh = 7200
retry = 600
expire = 2419200
minimum = 3600
microsoft.com mail exchanger = 10 microsoft-com.mail.protection.outlook.com.
microsoft.com text = "v=spf1 include:_spf-a.microsoft.com include:_spf-b.microsoft.com
include:_spf-c.microsoft.com include:_spf-ssg-a.microsoft.com include:spf-a.hotmail.com
ip4:147.243.128.24 ip4:147.243.128.26 ip4:147.243.128.25 ip4:147.243.1.47 ip4:147.243.1.48
-all" microsoft.com text = "FbUF6DbkE+Aw1/wi9xgDi8KVrIIZus5v8L6tbIQZkGrQ/rVQKJi8CjQbBtW
tE64ey4NJJwj5J65PIggVYNabdQ=="
Authoritative answers can be found from: