Asset Management Suite

 View Only

Targeted Ping to Check Existence of Computers 

Dec 23, 2009 02:06 PM

WHAT IT DOES:
"Targeted Ping" works by taking a text file with a list of hostnames or IP addresses and pinging them to check they are alive hosts. It then provides an output file marking alive/dead hosts. Thats all it does. Its only been tested on Windows XP, we are unlikely to make any requested changes or fixes but you can try :)

HOW TO USE IT:

Create a text file. Copy an item to be pinged on each new line. Launch "Targeted Ping" Point it to your text file. "Targeted Ping" will start checking hosts. When done press the prompt to open the results file which defaults to the root of your C:\ drive. The results file (c:\working.txt) will list each result next to the relevant hostname (Hostname, OK/bad).You may need Administrator priviledges on your local PC for that.

WHY IT COULD BE USEFUL :
Many commercial scanning tools are non targeted and deal with IP address ranges rather than imported lists of hostnames. In addition it is simple and has no cost attached. We use it to begin troubleshooting clients that do not report or have some other issues. Where NS has a large collection of computers from a report or similar, you can copy the computers into a text file to scan. With the results file you can sort using Microsoft XL - after this and do whatever it is you want, knowing these are live clients...eg fire back into the client install, put in a collection for jobs etc.  Because the application is standalone and because the lists are static, you can run the scans very fast. It also gives some peace of mind using a second system to test the first.

LICENSE:
Its supplied as is, as freeware. It is compiled with AutoIt , a free scripting tool. You may do what you like with the tool.

WAIVER:

The owner, supplier, host or distributor of the file will not accept any blame for anything that anyone does with this file that results in anything bad happening. Please test it in your own environment and begin by using small lists of hostnames first. It will run many shortened pings to the list of supplied hostnames/IP addresses and thus does use appropriate computer resources which are within normal usage on a computer. Be mindful that the intended action of this script in many ways can be similar to some of the actions of virus or malware and you should consider network implications as a result (intusion detection systems, other network security monitors).

Happy pinging.

Statistics
0 Favorited
0 Views
2 Files
0 Shares
0 Downloads
Attachment(s)
zip file
pingy_v2.zip   295 KB   1 version
Uploaded - Feb 25, 2020
zip file
targeted_ping.zip   296 KB   1 version
Uploaded - Feb 25, 2020

Tags and Keywords

Comments

Mar 03, 2010 07:33 AM

But im considering looking at some deeper pingage like a DNS lookup.

I'm using it on a lot of computers (thousands) infequently so i think DNS checking could be overkill but i can see where you are coming from.

Will ask the author and see. 

Jan 15, 2010 11:02 AM

this is great but I am wondering does it just do a simple ping? will it tell me if a computer is simply just not responding or if a name cannot be resolved?

Related Entries and Links

No Related Resource entered.