Hide

What's this?

commandlinefu.com is the place to record those command-line gems that you return to again and again.

Delete that bloated snippets file you've been using and share your personal repository with the world. That way others can gain from your CLI wisdom and you from theirs too. All commands can be commented on, discussed and voted up or down.


If you have a new feature suggestion or find a bug, please get in touch via http://commandlinefu.uservoice.com/

Get involved!

You can sign-in using OpenID credentials, or register a traditional username and password.

First-time OpenID users will be automatically assigned a username which can be changed after signing in.

Hide

Stay in the loop…

Follow the Tweets.

Every new command is wrapped in a tweet and posted to Twitter. Following the stream is a great way of staying abreast of the latest commands. For the more discerning, there are Twitter accounts for commands that get a minimum of 3 and 10 votes - that way only the great commands get tweeted.

» http://twitter.com/commandlinefu
» http://twitter.com/commandlinefu3
» http://twitter.com/commandlinefu10

Subscribe to the feeds.

Use your favourite RSS aggregator to stay in touch with the latest commands. There are feeds mirroring the 3 Twitter streams as well as for virtually every other subset (users, tags, functions,…):

Subscribe to the feed for:

Hide

News

2011-03-12 - Confoo 2011 presentation
Slides are available from the commandlinefu presentation at Confoo 2011: http://presentations.codeinthehole.com/confoo2011/
2011-01-04 - Moderation now required for new commands
To try and put and end to the spamming, new commands require moderation before they will appear on the site.
2010-12-27 - Apologies for not banning the trolls sooner
Have been away from the interwebs over Christmas. Will be more vigilant henceforth.
2010-09-24 - OAuth and pagination problems fixed
Apologies for the delay in getting Twitter's OAuth supported. Annoying pagination gremlin also fixed.
Hide

Tags

Hide

Functions

Commands tagged port from sorted by
Terminal - Commands tagged port - 15 results
nc -zv localhost 25
2013-11-21 22:04:00
User: toaster
0

Using netcat (nc)

25 can be replaced with the friendly value (smtp). Check error code for result or use -v option to echo output

nc -z localhost smtp && echo open || echo closed

nc -zv host protocol

netstat -lntp
sudo lsof -iTCP:25
sudo lsof -iTCP:25 -sTCP:LISTEN
netstat -tln | grep :25
2013-11-12 16:47:06
User: Peteches
Functions: grep netstat
0

netstat will list all open ports on the system, unix sockets, tcp sockets and udp sockets. the t flag limits to tcp ports the l flag limits to listening ports and the n flag disables the translation of port to service ( ie :25 displayed instead of :smtp ). then grep for the port you are interested in preceeded by a colon.

(echo >/dev/tcp/localhost/25) &>/dev/null && echo "TCP port 25 open" || echo "TCP port 25 close"
2013-11-12 02:11:01
User: YouM
Functions: echo
0

Check trough unix sockets if tcp port is open or close

sudo port selfupdate && sudo port upgrade outdated && sudo port clean --all installed && sudo port -f uninstall inactive
nc -l <port-number>
2013-03-20 15:25:57
User: cybertoast
0

Simple way to test if a port is available to the public. Run this command on the "server" and run a `telnet host-ip port-number` on the client. Test by sending strings to the server, which will be displayed in the server terminal.

lsof -nPi tcp:80
fuser -v 80/tcp
checkport() { sudo nmap -sS -p $1 $2 }
2011-12-13 11:46:15
Functions: sudo
Tags: nmap scan port
0

Check to see if a port is open or closed on a given host.

netstat -tulpnc
2011-04-20 07:30:31
User: altern
Functions: netstat
0

shows opened ports on machine in continuous mode (refreshing every 10 sec)

nc -z <IP> <TCP port> OR nc -zu <IP> <UDP port>
2011-04-01 04:08:53
User: frank514
Tags: telnet port
0

-z: Specifies that nc should just scan for listening daemons, without sending any data to them

-u: Use UDP instead of the default option of TCP.

rsync --progress --partial --rsh="ssh -p 8322" --bwlimit=100 --ipv4 user@domain.com:~/file.tgz .
2011-02-10 14:25:22
User: ruslan
Functions: rsync
16

The command copies a file from remote SSH host on port 8322 with bandwidth limit 100KB/sec;

--progress shows a progress bar

--partial turns partial download on; thus, you can resume the process if something goes wrong

--bwlimit limits bandwidth by specified KB/sec

--ipv4 selects IPv4 as preferred

I find it useful to create the following alias:

alias myscp='rsync --progress --partial --rsh="ssh -p 8322" --bwlimit=100 --ipv4'

in ~/.bash_aliases, ~/.bash_profile, ~/.bash_login or ~/.bashrc where appropriate.

for i in {21..29}; do nc -v -n -z -w 1 192.168.0.$i 443; done
2009-09-25 03:31:29
User: rez0r
9

Simple one-liner for scanning a range of hosts, you can also scan a range of ports with Netcat by ex.: nc -v -n -z -w 1 192.168.0.1 21-443

Useful when Nmap is not available:)

Range declaration like X..X "for i in {21..29}" is only works with bash 3.0+