User Tools

Site Tools


cheatsheet:networking

networking command cheatsheet

list all ip addresses

$ ip a
OR
$ ifconfig
OR
$ ipconfig (windows)
 
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: enp1s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether c4:54:44:fd:e8:45 brd ff:ff:ff:ff:ff:ff
    inet 10.0.1.33/26 metric 100 brd 10.0.1.63 scope global dynamic enp1s0
       valid_lft 5151sec preferred_lft 5151sec
    inet6 fe80::c654:44ff:fefd:e845/64 scope link
       valid_lft forever preferred_lft forever
3: wlp2s0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000
    link/ether 18:cf:5e:f3:37:ce brd ff:ff:ff:ff:ff:ff
4: wg0: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
    link/none
    inet 10.1.248.0/21 scope global wg0
       valid_lft forever preferred_lft forever

list ip address of specific interface

$ ip a show wg0
 
4: wg0: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
    link/none
    inet 10.1.248.0/21 scope global wg0
       valid_lft forever preferred_lft forever

show network routes

$ ip route s (the new standard, yay)
 
default via 192.168.64.1 dev enp0s1 proto dhcp src 192.168.64.4 metric 100
10.0.1.0/26 via 192.168.64.1 dev enp0s1 proto static onlink
192.168.64.0/24 dev enp0s1 proto kernel scope link src 192.168.64.4 metric 100
192.168.64.1 dev enp0s1 proto dhcp scope link src 192.168.64.4 metric 100
 
 
$ route -n
 
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.64.1    0.0.0.0         UG    100    0        0 enp0s1
10.0.1.0        192.168.64.1    255.255.255.192 UG    0      0        0 enp0s1
192.168.64.0    0.0.0.0         255.255.255.0   U     100    0        0 enp0s1
192.168.64.1    0.0.0.0         255.255.255.255 UH    100    0        0 enp0s1
 
 
$ netstat -rn (works on macOS)
 
Kernel IP routing table
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
0.0.0.0         192.168.64.1    0.0.0.0         UG        0 0          0 enp0s1
10.0.1.0        192.168.64.1    255.255.255.192 UG        0 0          0 enp0s1
192.168.64.0    0.0.0.0         255.255.255.0   U         0 0          0 enp0s1
192.168.64.1    0.0.0.0         255.255.255.255 UH        0 0          0 enp0s1

nslookup (forward DNS lookup)

get IP addresses for a domain

$ nslookup kamaradski.com
Server:		127.0.0.53
Address:	127.0.0.53#53
 
Non-authoritative answer:
Name:	kamaradski.com
Address: 172.67.191.29
Name:	kamaradski.com
Address: 104.21.60.32
Name:	kamaradski.com
Address: 2606:4700:3037::6815:3c20
Name:	kamaradski.com
Address: 2606:4700:3037::ac43:bf1d

get all dns entries of a domain (disabled by most providers)

$ nslookup -type=all microsoft.com
 
Server:     8.8.8.8
Address:    8.8.8.8#53
Non-authoritative answer:
Name:    microsoft.com
Address: 134.170.185.46
Name:    microsoft.com
Address: 134.170.188.221
microsoft.com    nameserver = ns3.msft.net.
microsoft.com    nameserver = ns4.msft.net.
microsoft.com    nameserver = ns1.msft.net.
microsoft.com    nameserver = ns2.msft.net.
microsoft.com
    origin = ns1.msft.net
    mail addr = msnhst.microsoft.com
    serial = 2014110802
    refresh = 7200
    retry = 600
    expire = 2419200
    minimum = 3600
microsoft.com    mail exchanger = 10 microsoft-com.mail.protection.outlook.com.
microsoft.com    text = "v=spf1 include:_spf-a.microsoft.com include:_spf-b.microsoft.com 
include:_spf-c.microsoft.com include:_spf-ssg-a.microsoft.com include:spf-a.hotmail.com 
ip4:147.243.128.24 ip4:147.243.128.26 ip4:147.243.128.25 ip4:147.243.1.47 ip4:147.243.1.48 
-all" microsoft.com    text = "FbUF6DbkE+Aw1/wi9xgDi8KVrIIZus5v8L6tbIQZkGrQ/rVQKJi8CjQbBtW
tE64ey4NJJwj5J65PIggVYNabdQ=="
Authoritative answers can be found from:
cheatsheet/networking.txt · Last modified: 2023/02/14 08:14 by kamaradski