ip

显示/操纵路由,设备,策略路由和隧道。

语法

ip link set 详解
ip address add | del 详解
ip address show | flush 详解
ip addrlabel详解
ip route 详解
ip lneighbour 详解
ip tunnel 详解
ip maddress 详解
ip mroute 详解
ip monitor 详解
ip xfrm 详解

  ip [ OPTIONS ] OBJECT { COMMAND | help }

     OBJECT := { link | addr | addrlabel | route | rule | neigh | tunnel | maddr | mroute | monitor }

     OPTIONS := { -V[ersion] | -s[tatistics] | -r[esolve] | -f[amily] { inet | inet6 | ipx | dnet | link } | -o[neline] }

  ip link set DEVICE { up | down | arp { on | off } |
     promisc { on | off } | allmulticast { on | off } |
        dynamic { on | off } | multicast { on | off } |
           txqueuelen PACKETS | name NEWNAME |
              address LLADDR | broadcast LLADDR | mtu MTU | netns PID | 
                 alias NAME | vf NUM [ mac LLADDR ] [ vlan VLANID [ qos VLAN-QOS ] ] [ rate TXRATE ] }

  ip link show [ DEVICE ]
        dev NAME (default)  -  NAME 指定要显示的网络设备.
                               如果省略此参数,则列出所有设备
        up                  -  仅显示正在运行的设备,例如 $ ip link ls up 

  ip address { add | del } IFADDR dev STRING

  ip address { show | flush } [ dev STRING ] [ scope SCOPE-ID ] [ to PREFIX ] [ FLAG-LIST ] [ label PATTERN ]

     IFADDR := PREFIX | ADDR peer PREFIX [ broadcast ADDR ] [ anycast ADDR ] [ label STRING ] [ scope SCOPE-ID ]

     SCOPE-ID := [ host | link | global | NUMBER ]

     FLAG-LIST := [ FLAG-LIST ] FLAG

     FLAG := [ permanent | dynamic | secondary | primary | tentative | deprecated ]

  ip addrlabel { add | del } prefix PREFIX [ dev DEV ] [ label NUMBER ]

  ip addrlabel { list | flush }

  ip route { list | flush } SELECTOR

  ip route get ADDRESS [ from ADDRESS iif STRING ] [ oif STRING ] [ tos TOS ]

  ip route { add | del | change | append | replace | monitor } ROUTE

     SELECTOR := [ root PREFIX ] [ match PREFIX ] [ exact PREFIX ] [ table TABLE_ID ]
                    [ proto RTPROTO ] [ type TYPE ] [ scope SCOPE ]

     ROUTE := NODE_SPEC [ INFO_SPEC ]

     NODE_SPEC := [ TYPE ] PREFIX [ tos TOS ] [ table TABLE_ID ] [ proto RTPROTO ] [ scope SCOPE ] [ metric METRIC ]

     INFO_SPEC := NH OPTIONS FLAGS [ nexthop NH ] ...

     NH := [ via ADDRESS ] [ dev STRING ] [ weight NUMBER ] NHFLAGS

     OPTIONS := FLAGS [ mtu NUMBER ] [ advmss NUMBER ] [ rtt TIME ] [ rttvar TIME ]
                   [ window NUMBER ] [ cwnd NUMBER ] [ initcwnd NUMBER ] [ ssthresh REALM ]
                      [ realms REALM ] [ rto_min TIME ] [ initrwnd NUMBER ]

     TYPE := [ unicast | local | broadcast | multicast | throw | unreachable | prohibit | blackhole | nat ]

     TABLE_ID := [ local| main | default | all | NUMBER ]

     SCOPE := [ host | link | global | NUMBER ]

     FLAGS := [ equalize ]

     NHFLAGS := [ onlink | pervasive ]

     RTPROTO := [ kernel | boot | static | NUMBER ]

  ip rule [ list | add | del | flush ] SELECTOR ACTION

     SELECTOR := [ from PREFIX ] [ to PREFIX ] [ tos TOS ] [ fwmark FWMARK[/MASK] ] [ dev STRING ] [ pref NUMBER ]

     ACTION := [ table TABLE_ID ] [ nat ADDRESS ] [ prohibit | reject | unreachable ] [ realms [SRCREALM/]DSTREALM ]

     TABLE_ID := [ local | main | default | NUMBER ]

  ip neighbour { add | del | change | replace } { ADDR [ lladdr LLADDR ]
              [ nud { permanent | noarp | stale | reachable } ] | proxy ADDR } [ dev DEV ]

  ip neighbour { show | flush } [ to PREFIX ] [ dev DEV ] [ nud STATE ]

  ip tunnel { add | change | del | show | prl } [ NAME ] [ mode MODE ] [ remote ADDR ]
     [ local ADDR ] [ [i|o]seq ] [ [i|o]key KEY ] [ [i|o]csum ] ] [ encaplimit ELIM ] [ ttl TTL ]
        [ tos TOS ] [ flowlabel FLOWLABEL ] [ prl-default ADDR ] [ prl-nodefault ADDR ] [ prl-delete ADDR ]
           [ [no]pmtudisc ] [ dev PHYS_DEV ] [ dscp inherit ]

     MODE := { ipip | gre | sit | isatap | ip6ip6 | ipip6 | any }

     ADDR := { IP_ADDRESS | any }

     TOS := { NUMBER | inherit }

     ELIM := { none | 0..255 }

     TTL := { 1..255 | inherit }

     KEY := { DOTTED_QUAD | NUMBER }

     TIME := NUMBER[s|ms|us|ns|j]

  ip maddr [ add | del ] MULTIADDR dev STRING

  ip maddr show [ dev STRING ]

  ip mroute show [ PREFIX ] [ from PREFIX ] [ iif DEVICE ]

  ip monitor [ all | LISTofOBJECTS ]

  ip xfrm XFRM_OBJECT { COMMAND }

     XFRM_OBJECT := { state | policy | monitor }

  ip xfrm state { add | update } ID [ XFRM_OPT ] [ mode MODE ] [ reqid REQID ] [ seq SEQ ] [ replay-window SIZE ]
     [ flag FLAG-LIST ] [ encap ENCAP ] [ sel SELECTOR ] [ LIMIT-LIST ]

  ip xfrm state allocspi ID [ mode MODE ] [ reqid REQID ] [ seq SEQ ] [ min SPI max SPI ]

  ip xfrm state { delete | get } ID

  ip xfrm state { deleteall | list } [ ID ] [ mode MODE ] [ reqid REQID ] [ flag FLAG_LIST ]

  ip xfrm state flush [ proto XFRM_PROTO ]

  ip xfrm state count

     ID := [ src ADDR ] [ dst ADDR ] [ proto XFRM_PROTO ] [ spi SPI ]

     XFRM_PROTO := [ esp | ah | comp | route2 | hao ]

     MODE := [ transport | tunnel | ro | beet ] (default=transport)

     FLAG-LIST := [ FLAG-LIST ] FLAG

     FLAG := [ noecn | decap-dscp | wildrecv ]

     ENCAP := ENCAP-TYPE SPORT DPORT OADDR

     ENCAP-TYPE := espinudp | espinudp-nonike

     ALGO-LIST := [ ALGO-LIST ] | [ ALGO ]

     ALGO := ALGO_TYPE ALGO_NAME ALGO_KEY

     ALGO_TYPE := [ enc | auth | comp ]

     SELECTOR := src ADDR[/PLEN] dst ADDR[/PLEN] [ UPSPEC ] [ dev DEV ]

     UPSPEC := proto PROTO [[ sport PORT ] [ dport PORT ] | [ type NUMBER ] [ code NUMBER ]]

     LIMIT-LIST := [ LIMIT-LIST ] | [ limit LIMIT ]

     LIMIT := [ [time-soft|time-hard|time-use-soft|time-use-hard] SECONDS ] |
                 [ [byte-soft|byte-hard] SIZE ] | [ [packet-soft|packet-hard] COUNT ]

  ip xfrm policy { add | update } dir DIR SELECTOR [ index INDEX ]
                    [ ptype PTYPE ] [ action ACTION ] [ priority PRIORITY ]
                       [ LIMIT-LIST ] [ TMPL-LIST ]

  ip xfrm policy { delete | get } dir DIR [ SELECTOR | index INDEX ] [ ptype PTYPE ]

  ip xfrm policy { deleteall | list } [ dir DIR ] [ SELECTOR ] [ index INDEX ]
                    [ action ACTION ] [ priority PRIORITY ]

  ip xfrm policy flush [ ptype PTYPE ]

  ip xfrm count

     PTYPE := [ main | sub ] (default=main)

     DIR := [ in | out | fwd ]

     SELECTOR := src ADDR[/PLEN] dst ADDR[/PLEN] [ UPSPEC ] [ dev DEV ]

     UPSPEC := proto PROTO [ [ sport PORT ] [ dport PORT ] |
                  [ type NUMBER ] [ code NUMBER ] ]

     ACTION := [ allow | block ] (default=allow)

     LIMIT-LIST := [ LIMIT-LIST ] | [ limit LIMIT ]

     LIMIT := [ [time-soft|time-hard|time-use-soft|time-use-hard] SECONDS ] |
                 [ [byte-soft|byte-hard] SIZE ] | [packet-soft|packet-hard] NUMBER ]

     TMPL-LIST := [ TMPL-LIST ] | [ tmpl TMPL ]

     TMPL := ID [ mode MODE ] [ reqid REQID ] [ level LEVEL ]

     ID := [ src ADDR ] [ dst ADDR ] [ proto XFRM_PROTO ] [ spi SPI ]

     XFRM_PROTO := [ esp | ah | comp | route2 | hao ]

     MODE := [ transport | tunnel | beet ] (default=transport)

     LEVEL := [ required | use ] (default=required)

  ip xfrm monitor [ all | LISTofOBJECTS ] 

选项




   -f, -family
       强制使用指定的协议族,协议族:inet,inet6或link

   -4  指定使用的网络层协议是IPv4协议,-family inet的快捷方式 . (IPv4)

   -6  指定使用的网络层协议是IPv6协议,-family inet6的快捷方式 . (IPv6)

   -0  -family link的快捷方式 .
   -o, -oneline
       将每条记录输出到一行,用'\'字符替换换行符

   -r, -resolve
    使用系统的名称解析程序来打印DNS名称而不是主机地址

   -s, -stats, -statistics
       输出更多信息。如果选项出现两次或更多次,则信息量会增加。
       通常,信息是统计信息或某些时间值。.

   -V, -Version
       打印ip实用程序的版本并退出

带缩写的对象

   link      l           网络设备.
   address   a or addr   添加协议(IP或IPv6)地址. 
   addrlabel addrl       协议地址选择的标签配置
   neighbour n or neigh  ARP或NDISC缓存条目
   route     r           路由表条目
   rule      ru          路由策略数据库中的规则。
   maddress  m or maddr  组播地址 
   mroute    mr          多播路由缓存条目
   tunnel    t           隧道.
   xfrm      x           用于IPsec协议的框架

   所有对象的名称可以全部或缩写形式书写

实例:

列出并显示所有网络接口上关联的所有IP地址:

$ ip addr

通过使rm交互来防止意外删除:

$ alias rm='rm -i'

ip 命令实例:

linux命令:ip r show default | awk '{print $5}' $5}' '{print awk | default show r ip ip r show default | awk '{print $5}'rootopen.com
linux命令:ip r show default | awk '{print $5}' $5}' '{print awk | default show r ip ip r show default | awk '{print $5}'rootopen.com
2019-07-09 21:21:24

linux命令:ip a | grep -oP '(?<=inet |addr:)(?:\d+\.){3}\d+' |addr:)(?:\d+\.){3}\d+' '(?<=inet -oP grep | a ip ip a | grep -oP '(?<=inet |addr:)(?:\d+\.){3}\d+'rootopen.com
linux命令:ip a | grep -oP '(?<=inet |addr:)(?:\d+\.){3}\d+' |addr:)(?:\d+\.){3}\d+' '(?<=inet -oP grep | a ip ip a | grep -oP '(?<=inet |addr:)(?:\d+\.){3}\d+'rootopen.com
2019-06-05 22:24:04

linux命令:ip a | grep -oP '(?<=inet |addr:)(?:\d+\.){3}\d+' |addr:)(?:\d+\.){3}\d+' '(?<=inet -oP grep | a ip ip a | grep -oP '(?<=inet |addr:)(?:\d+\.){3}\d+'rootopen.com
linux命令:ip a | grep -oP '(?<=inet |addr:)(?:\d+\.){3}\d+' |addr:)(?:\d+\.){3}\d+' '(?<=inet -oP grep | a ip ip a | grep -oP '(?<=inet |addr:)(?:\d+\.){3}\d+'rootopen.com
2019-03-23 18:48:04

linux命令:ip route add default via 192.168.2.1 dev ens33 ens33 dev 192.168.2.1 via default add route ip ip route add default via 192.168.2.1 dev ens33rootopen.com
linux命令:ip route add default via 192.168.2.1 dev ens33 ens33 dev 192.168.2.1 via default add route ip ip route add default via 192.168.2.1 dev ens33rootopen.com
2018-07-14 10:51:58

linux命令:iptables -A INPUT -s 222.35.138.25/32 -j DROP DROP -j 222.35.138.25/32 -s INPUT -A iptables iptables -A INPUT -s 222.35.138.25/32 -j DROProotopen.com
linux命令:iptables -A INPUT -s 222.35.138.25/32 -j DROP DROP -j 222.35.138.25/32 -s INPUT -A iptables iptables -A INPUT -s 222.35.138.25/32 -j DROProotopen.com
2018-05-06 14:30:48

linux命令:iptables -t nat -A OUTPUT -d ! 10.0.0.0/8 -p tcp --dport 80 -j DNAT --to-destination 10.1.1.123:3128 10.1.1.123:3128 --to-destination DNAT -j 80 --dport tcp -p 10.0.0.0/8 ! -d OUTPUT -A nat -t iptables iptables -t nat -A OUTPUT -d ! 10.0.0.0/8 -p tcp --dport 80 -j DNAT --to-destination 10.1.1.123:3128rootopen.com
linux命令:iptables -t nat -A OUTPUT -d ! 10.0.0.0/8 -p tcp --dport 80 -j DNAT --to-destination 10.1.1.123:3128 10.1.1.123:3128 --to-destination DNAT -j 80 --dport tcp -p 10.0.0.0/8 ! -d OUTPUT -A nat -t iptables iptables -t nat -A OUTPUT -d ! 10.0.0.0/8 -p tcp --dport 80 -j DNAT --to-destination 10.1.1.123:3128rootopen.com
2018-04-05 11:56:48

linux命令:iptables -L -n -v -v -n -L iptables iptables -L -n -vrootopen.com
linux命令:iptables -L -n -v -v -n -L iptables iptables -L -n -vrootopen.com
2018-05-17 13:08:48

linux命令:iptables -F -F iptables iptables -Frootopen.com
linux命令:iptables -F -F iptables iptables -Frootopen.com
2018-03-04 02:16:48

linux命令:iptables -L -n --line-numbers | grep xx.xx.xx.xx xx.xx.xx.xx grep | --line-numbers -n -L iptables iptables -L -n --line-numbers | grep xx.xx.xx.xxrootopen.com
linux命令:iptables -L -n --line-numbers | grep xx.xx.xx.xx xx.xx.xx.xx grep | --line-numbers -n -L iptables iptables -L -n --line-numbers | grep xx.xx.xx.xxrootopen.com
2017-12-29 20:20:48

linux命令:ip route | grep default | awk '{print $3}' $3}' '{print awk | default grep | route ip ip route | grep default | awk '{print $3}'rootopen.com
linux命令:ip route | grep default | awk '{print $3}' $3}' '{print awk | default grep | route ip ip route | grep default | awk '{print $3}'rootopen.com
2018-01-22 10:24:48

linux命令:ipconfig /flushdns /flushdns ipconfig ipconfig /flushdnsrootopen.com
linux命令:ipconfig /flushdns /flushdns ipconfig ipconfig /flushdnsrootopen.com
2018-02-27 15:26:48

linux命令:iptables -nL -v --line-numbers --line-numbers -v -nL iptables iptables -nL -v --line-numbersrootopen.com
linux命令:iptables -nL -v --line-numbers --line-numbers -v -nL iptables iptables -nL -v --line-numbersrootopen.com
2018-01-09 08:33:48

linux命令:ipconfig /all /all ipconfig ipconfig /allrootopen.com
linux命令:ipconfig /all /all ipconfig ipconfig /allrootopen.com
2018-03-15 18:37:48

linux命令:iptables -F && iptables -X && iptables -P INPUT ACCEPT && iptables -OUTPUT ACCEPT ACCEPT -OUTPUT iptables && ACCEPT INPUT -P iptables && -X iptables && -F iptables iptables -F && iptables -X && iptables -P INPUT ACCEPT && iptables -OUTPUT ACCEPTrootopen.com
linux命令:iptables -F && iptables -X && iptables -P INPUT ACCEPT && iptables -OUTPUT ACCEPT ACCEPT -OUTPUT iptables && ACCEPT INPUT -P iptables && -X iptables && -F iptables iptables -F && iptables -X && iptables -P INPUT ACCEPT && iptables -OUTPUT ACCEPTrootopen.com
2018-01-04 09:00:48

linux命令:ip route show dev ppp0 | awk '{ print $7 }' }' $7 print '{ awk | ppp0 dev show route ip ip route show dev ppp0 | awk '{ print $7 }'rootopen.com
linux命令:ip route show dev ppp0 | awk '{ print $7 }' }' $7 print '{ awk | ppp0 dev show route ip ip route show dev ppp0 | awk '{ print $7 }'rootopen.com
2017-12-29 13:49:48

linux命令:iptables -D fail2ban-SSH -s <ip_address_to_be_set_free> -j DROP DROP -j <ip_address_to_be_set_free> -s fail2ban-SSH -D iptables iptables -D fail2ban-SSH -s <ip_address_to_be_set_free> -j DROProotopen.com
linux命令:iptables -D fail2ban-SSH -s <ip_address_to_be_set_free> -j DROP DROP -j <ip_address_to_be_set_free> -s fail2ban-SSH -D iptables iptables -D fail2ban-SSH -s <ip_address_to_be_set_free> -j DROProotopen.com
2018-06-09 20:42:48

linux命令:ip route show dev eth0 | awk '{print $7}' $7}' '{print awk | eth0 dev show route ip ip route show dev eth0 | awk '{print $7}'rootopen.com
linux命令:ip route show dev eth0 | awk '{print $7}' $7}' '{print awk | eth0 dev show route ip ip route show dev eth0 | awk '{print $7}'rootopen.com
2018-04-26 06:13:48

linux命令:iptables -t nat -A PREROUTING -p tcp --dport [port of your choosing] -j REDIRECT --to-ports 22 22 --to-ports REDIRECT -j choosing] your of [port --dport tcp -p PREROUTING -A nat -t iptables iptables -t nat -A PREROUTING -p tcp --dport [port of your choosing] -j REDIRECT --to-ports 22rootopen.com
linux命令:iptables -t nat -A PREROUTING -p tcp --dport [port of your choosing] -j REDIRECT --to-ports 22 22 --to-ports REDIRECT -j choosing] your of [port --dport tcp -p PREROUTING -A nat -t iptables iptables -t nat -A PREROUTING -p tcp --dport [port of your choosing] -j REDIRECT --to-ports 22rootopen.com
2018-04-23 18:20:48

linux命令:ip addr|grep "inet " " "inet addr|grep ip ip addr|grep "inet "rootopen.com
linux命令:ip addr|grep "inet " " "inet addr|grep ip ip addr|grep "inet "rootopen.com
2018-05-29 01:59:48

linux命令:ipconfig getpacket en0 | grep yi| sed s."yiaddr = "."en0: ". ipconfig getpacket en1 | grep yi| sed s."yiaddr = "."en1: ". ". "."en1: = s."yiaddr sed yi| grep | en1 getpacket ipconfig ". "."en0: = s."yiaddr sed yi| grep | en0 getpacket ipconfig ipconfig getpacket en0 | grep yi| sed s."yiaddr = "."en0: ". ipconfig getpacket en1 | grep yi| sed s."yiaddr = "."en1: ".rootopen.com
linux命令:ipconfig getpacket en0 | grep yi| sed s."yiaddr = "."en0: ". ipconfig getpacket en1 | grep yi| sed s."yiaddr = "."en1: ". ". "."en1: = s."yiaddr sed yi| grep | en1 getpacket ipconfig ". "."en0: = s."yiaddr sed yi| grep | en0 getpacket ipconfig ipconfig getpacket en0 | grep yi| sed s."yiaddr = "."en0: ". ipconfig getpacket en1 | grep yi| sed s."yiaddr = "."en1: ".rootopen.com
2017-12-30 20:57:48

linux命令:ips(){ for if in ${1:-$(ip link list|grep '^.: '|cut -d\ -f2|cut -d: -f1)};do cur=$(ifconfig $if|grep "inet addr"|sed 's/.*inet addr:\([0-9\.]*\).*/\1/g');printf '%-5s%-15s%-15s\n' $if $cur $(nc -s $cur sine.cluenet.org 128 2>/dev/null||echo $cur);done;} $cur);done;} 2>/dev/null||echo 128 sine.cluenet.org $cur -s $(nc $cur $if '%-5s%-15s%-15s\n' addr:\([0-9\.]*\).*/\1/g');printf 's/.*inet addr"|sed "inet $if|grep cur=$(ifconfig -f1)};do -d: -f2|cut -d\ '|cut '^.: list|grep link ${1:-$(ip in if for ips(){ ips(){ for if in ${1:-$(ip link list|grep '^.: '|cut -d\ -f2|cut -d: -f1)};do cur=$(ifconfig $if|grep "inet addr"|sed 's/.*inet addr:\([0-9\.]*\).*/\1/g');printf '%-5s%-15s%-15s\n' $if $cur $(nc -s $cur sine.cluenet.org 128 2>/dev/null||echo $cur);done;}rootopen.com
linux命令:ips(){ for if in ${1:-$(ip link list|grep '^.: '|cut -d\ -f2|cut -d: -f1)};do cur=$(ifconfig $if|grep "inet addr"|sed 's/.*inet addr:\([0-9\.]*\).*/\1/g');printf '%-5s%-15s%-15s\n' $if $cur $(nc -s $cur sine.cluenet.org 128 2>/dev/null||echo $cur);done;} $cur);done;} 2>/dev/null||echo 128 sine.cluenet.org $cur -s $(nc $cur $if '%-5s%-15s%-15s\n' addr:\([0-9\.]*\).*/\1/g');printf 's/.*inet addr"|sed "inet $if|grep cur=$(ifconfig -f1)};do -d: -f2|cut -d\ '|cut '^.: list|grep link ${1:-$(ip in if for ips(){ ips(){ for if in ${1:-$(ip link list|grep '^.: '|cut -d\ -f2|cut -d: -f1)};do cur=$(ifconfig $if|grep "inet addr"|sed 's/.*inet addr:\([0-9\.]*\).*/\1/g');printf '%-5s%-15s%-15s\n' $if $cur $(nc -s $cur sine.cluenet.org 128 2>/dev/null||echo $cur);done;}rootopen.com
2018-05-23 18:13:48

linux命令:ipconfig getifaddr <Interface> <Interface> getifaddr ipconfig ipconfig getifaddr <Interface>rootopen.com
linux命令:ipconfig getifaddr <Interface> <Interface> getifaddr ipconfig ipconfig getifaddr <Interface>rootopen.com
2018-04-29 04:12:48

linux命令:ip addr show show addr ip ip addr showrootopen.com
linux命令:ip addr show show addr ip ip addr showrootopen.com
2018-04-09 17:55:48

linux命令:iptables -t nat -A POSTROUTING -p tcp --dport 25 -j SNAT --to-source IP_TO_ROUTE_THROUGH IP_TO_ROUTE_THROUGH --to-source SNAT -j 25 --dport tcp -p POSTROUTING -A nat -t iptables iptables -t nat -A POSTROUTING -p tcp --dport 25 -j SNAT --to-source IP_TO_ROUTE_THROUGHrootopen.com
linux命令:iptables -t nat -A POSTROUTING -p tcp --dport 25 -j SNAT --to-source IP_TO_ROUTE_THROUGH IP_TO_ROUTE_THROUGH --to-source SNAT -j 25 --dport tcp -p POSTROUTING -A nat -t iptables iptables -t nat -A POSTROUTING -p tcp --dport 25 -j SNAT --to-source IP_TO_ROUTE_THROUGHrootopen.com
2018-03-30 04:38:48

linux命令:iptables -L -n -v -v -n -L iptables iptables -L -n -vrootopen.com
linux命令:iptables -L -n -v -v -n -L iptables iptables -L -n -vrootopen.com
2018-03-30 15:50:48

linux命令:ipcalc $(ifconfig eth0 | grep "inet addr:" | cut -d':' -f2,4 | sed 's/.+Bcast:/\//g') | awk '/Network/ { print $2 } ' ' } $2 print { '/Network/ awk | 's/.+Bcast:/\//g') sed | -f2,4 -d':' cut | addr:" "inet grep | eth0 $(ifconfig ipcalc ipcalc $(ifconfig eth0 | grep "inet addr:" | cut -d':' -f2,4 | sed 's/.+Bcast:/\//g') | awk '/Network/ { print $2 } 'rootopen.com
linux命令:ipcalc $(ifconfig eth0 | grep "inet addr:" | cut -d':' -f2,4 | sed 's/.+Bcast:/\//g') | awk '/Network/ { print $2 } ' ' } $2 print { '/Network/ awk | 's/.+Bcast:/\//g') sed | -f2,4 -d':' cut | addr:" "inet grep | eth0 $(ifconfig ipcalc ipcalc $(ifconfig eth0 | grep "inet addr:" | cut -d':' -f2,4 | sed 's/.+Bcast:/\//g') | awk '/Network/ { print $2 } 'rootopen.com
2018-04-01 19:18:48

linux命令:ipcs ipcs ipcsrootopen.com
linux命令:ipcs ipcs ipcsrootopen.com
2018-03-31 20:41:48

linux命令:iptraf iptraf iptrafrootopen.com
linux命令:iptraf iptraf iptrafrootopen.com
2018-02-01 08:55:48

linux命令:ip addr add 192.168.10.1/24 dev eth0 eth0 dev 192.168.10.1/24 add addr ip ip addr add 192.168.10.1/24 dev eth0rootopen.com
linux命令:ip addr add 192.168.10.1/24 dev eth0 eth0 dev 192.168.10.1/24 add addr ip ip addr add 192.168.10.1/24 dev eth0rootopen.com
2018-05-25 20:50:48

linux命令:ipcs -a | grep 0x | awk '{printf( "-Q %s ", $1 )}' | xargs ipcrm ipcrm xargs | )}' $1 ", %s "-Q '{printf( awk | 0x grep | -a ipcs ipcs -a | grep 0x | awk '{printf( "-Q %s ", $1 )}' | xargs ipcrmrootopen.com
linux命令:ipcs -a | grep 0x | awk '{printf( "-Q %s ", $1 )}' | xargs ipcrm ipcrm xargs | )}' $1 ", %s "-Q '{printf( awk | 0x grep | -a ipcs ipcs -a | grep 0x | awk '{printf( "-Q %s ", $1 )}' | xargs ipcrmrootopen.com
2018-06-12 04:44:48

linux命令:ip addr | awk '/inet / {sub(/\/.*/, "", $2); print $2}' $2}' print $2); "", {sub(/\/.*/, / '/inet awk | addr ip ip addr | awk '/inet / {sub(/\/.*/, "", $2); print $2}'rootopen.com
linux命令:ip addr | awk '/inet / {sub(/\/.*/, "", $2); print $2}' $2}' print $2); "", {sub(/\/.*/, / '/inet awk | addr ip ip addr | awk '/inet / {sub(/\/.*/, "", $2); print $2}'rootopen.com
2018-04-29 12:29:48

linux命令:ip route list match 0.0.0.0/0 | cut -d " " -f 3 3 -f " " -d cut | 0.0.0.0/0 match list route ip ip route list match 0.0.0.0/0 | cut -d " " -f 3rootopen.com
linux命令:ip route list match 0.0.0.0/0 | cut -d " " -f 3 3 -f " " -d cut | 0.0.0.0/0 match list route ip ip route list match 0.0.0.0/0 | cut -d " " -f 3rootopen.com
2018-01-28 02:23:48

linux命令:ip addr show eth0 |grep 'inet\b' |awk '{print $2}' |sed -r -e 's/\/.*?//g' 's/\/.*?//g' -e -r |sed $2}' '{print |awk 'inet\b' |grep eth0 show addr ip ip addr show eth0 |grep 'inet\b' |awk '{print $2}' |sed -r -e 's/\/.*?//g'rootopen.com
linux命令:ip addr show eth0 |grep 'inet\b' |awk '{print $2}' |sed -r -e 's/\/.*?//g' 's/\/.*?//g' -e -r |sed $2}' '{print |awk 'inet\b' |grep eth0 show addr ip ip addr show eth0 |grep 'inet\b' |awk '{print $2}' |sed -r -e 's/\/.*?//g'rootopen.com
2018-04-13 00:52:48

linux命令:ip addr show eth0 | awk '/inet / {FS = "/"; $0 = $2; print $1}' $1}' print $2; = $0 "/"; = {FS / '/inet awk | eth0 show addr ip ip addr show eth0 | awk '/inet / {FS = "/"; $0 = $2; print $1}'rootopen.com
linux命令:ip addr show eth0 | awk '/inet / {FS = "/"; $0 = $2; print $1}' $1}' print $2; = $0 "/"; = {FS / '/inet awk | eth0 show addr ip ip addr show eth0 | awk '/inet / {FS = "/"; $0 = $2; print $1}'rootopen.com
2018-02-12 02:51:48

linux命令:ip route show | awk '$3 ~ /^[1-9]+/ {print $3;}' $3;}' {print /^[1-9]+/ ~ '$3 awk | show route ip ip route show | awk '$3 ~ /^[1-9]+/ {print $3;}'rootopen.com
linux命令:ip route show | awk '$3 ~ /^[1-9]+/ {print $3;}' $3;}' {print /^[1-9]+/ ~ '$3 awk | show route ip ip route show | awk '$3 ~ /^[1-9]+/ {print $3;}'rootopen.com
2018-04-11 01:31:48

linux命令:ip route | awk '/default/{print $3}' $3}' '/default/{print awk | route ip ip route | awk '/default/{print $3}'rootopen.com
linux命令:ip route | awk '/default/{print $3}' $3}' '/default/{print awk | route ip ip route | awk '/default/{print $3}'rootopen.com
2018-02-28 14:47:48

linux命令:ip2loc() { wget -qO - www.ip2location.com/$1 | grep "<span id=\"dgLookup__ctl2_lblICountry\">" | sed 's/<[^>]*>//g; s/^[\t]*//; s/&quot;/"/g; s/</</g; s/>/>/g; s/&amp;/\&/g'; } } s/&amp;/\&/g'; s/>/>/g; s/</</g; s/&quot;/"/g; s/^[\t]*//; 's/<[^>]*>//g; sed | id=\"dgLookup__ctl2_lblICountry\">" "<span grep | www.ip2location.com/$1 - -qO wget { ip2loc() ip2loc() { wget -qO - www.ip2location.com/$1 | grep "<span id=\"dgLookup__ctl2_lblICountry\">" | sed 's/<[^>]*>//g; s/^[\t]*//; s/&quot;/"/g; s/</</g; s/>/>/g; s/&amp;/\&/g'; }rootopen.com
linux命令:ip2loc() { wget -qO - www.ip2location.com/$1 | grep "<span id=\"dgLookup__ctl2_lblICountry\">" | sed 's/<[^>]*>//g; s/^[\t]*//; s/&quot;/"/g; s/</</g; s/>/>/g; s/&amp;/\&/g'; } } s/&amp;/\&/g'; s/>/>/g; s/</</g; s/&quot;/"/g; s/^[\t]*//; 's/<[^>]*>//g; sed | id=\"dgLookup__ctl2_lblICountry\">" "<span grep | www.ip2location.com/$1 - -qO wget { ip2loc() ip2loc() { wget -qO - www.ip2location.com/$1 | grep "<span id=\"dgLookup__ctl2_lblICountry\">" | sed 's/<[^>]*>//g; s/^[\t]*//; s/&quot;/"/g; s/</</g; s/>/>/g; s/&amp;/\&/g'; }rootopen.com
2018-03-26 19:45:48

linux命令:iptables -A FORWARD -i br0 -m iprange --src-range 192.168.0.x-192.168.0.y -m iprange --dst-range 192.168.0.w-192.168.0.z -j DROP DROP -j 192.168.0.w-192.168.0.z --dst-range iprange -m 192.168.0.x-192.168.0.y --src-range iprange -m br0 -i FORWARD -A iptables iptables -A FORWARD -i br0 -m iprange --src-range 192.168.0.x-192.168.0.y -m iprange --dst-range 192.168.0.w-192.168.0.z -j DROProotopen.com
linux命令:iptables -A FORWARD -i br0 -m iprange --src-range 192.168.0.x-192.168.0.y -m iprange --dst-range 192.168.0.w-192.168.0.z -j DROP DROP -j 192.168.0.w-192.168.0.z --dst-range iprange -m 192.168.0.x-192.168.0.y --src-range iprange -m br0 -i FORWARD -A iptables iptables -A FORWARD -i br0 -m iprange --src-range 192.168.0.x-192.168.0.y -m iprange --dst-range 192.168.0.w-192.168.0.z -j DROProotopen.com
2018-05-12 15:56:48

linux命令:iptables-save > firewall.conf; rm -f /etc/network/if-up.d/iptables; echo '#!/bin/sh' > /etc/network/if-up.d/iptables; echo "iptables-restore < firewall.conf" >> /etc/network/if-up.d/iptables; chmod +x /etc/network/if-up.d/iptables /etc/network/if-up.d/iptables +x chmod /etc/network/if-up.d/iptables; >> firewall.conf" < "iptables-restore echo /etc/network/if-up.d/iptables; > '#!/bin/sh' echo /etc/network/if-up.d/iptables; -f rm firewall.conf; > iptables-save iptables-save > firewall.conf; rm -f /etc/network/if-up.d/iptables; echo '#!/bin/sh' > /etc/network/if-up.d/iptables; echo "iptables-restore < firewall.conf" >> /etc/network/if-up.d/iptables; chmod +x /etc/network/if-up.d/iptablesrootopen.com
linux命令:iptables-save > firewall.conf; rm -f /etc/network/if-up.d/iptables; echo '#!/bin/sh' > /etc/network/if-up.d/iptables; echo "iptables-restore < firewall.conf" >> /etc/network/if-up.d/iptables; chmod +x /etc/network/if-up.d/iptables /etc/network/if-up.d/iptables +x chmod /etc/network/if-up.d/iptables; >> firewall.conf" < "iptables-restore echo /etc/network/if-up.d/iptables; > '#!/bin/sh' echo /etc/network/if-up.d/iptables; -f rm firewall.conf; > iptables-save iptables-save > firewall.conf; rm -f /etc/network/if-up.d/iptables; echo '#!/bin/sh' > /etc/network/if-up.d/iptables; echo "iptables-restore < firewall.conf" >> /etc/network/if-up.d/iptables; chmod +x /etc/network/if-up.d/iptablesrootopen.com
2017-12-26 18:18:48

linux命令:ip addr change 2001:db8:1:2::ab dev eth0 preferred_lft 0 0 preferred_lft eth0 dev 2001:db8:1:2::ab change addr ip ip addr change 2001:db8:1:2::ab dev eth0 preferred_lft 0rootopen.com
linux命令:ip addr change 2001:db8:1:2::ab dev eth0 preferred_lft 0 0 preferred_lft eth0 dev 2001:db8:1:2::ab change addr ip ip addr change 2001:db8:1:2::ab dev eth0 preferred_lft 0rootopen.com
2018-05-02 17:36:48

linux命令:iperf -s -s iperf iperf -srootopen.com
linux命令:iperf -s -s iperf iperf -srootopen.com
2018-05-19 11:23:48

linux命令:ip link | awk '/link/ {print $2}' $2}' {print '/link/ awk | link ip ip link | awk '/link/ {print $2}'rootopen.com
linux命令:ip link | awk '/link/ {print $2}' $2}' {print '/link/ awk | link ip ip link | awk '/link/ {print $2}'rootopen.com
2018-02-28 15:36:48

linux命令:ip addr show eth0 | grep ether | awk '{print $2}' $2}' '{print awk | ether grep | eth0 show addr ip ip addr show eth0 | grep ether | awk '{print $2}'rootopen.com
linux命令:ip addr show eth0 | grep ether | awk '{print $2}' $2}' '{print awk | ether grep | eth0 show addr ip ip addr show eth0 | grep ether | awk '{print $2}'rootopen.com
2018-01-14 21:49:48

linux命令:iptables -A INPUT -s 65.55.44.100 -j DROP DROP -j 65.55.44.100 -s INPUT -A iptables iptables -A INPUT -s 65.55.44.100 -j DROProotopen.com
linux命令:iptables -A INPUT -s 65.55.44.100 -j DROP DROP -j 65.55.44.100 -s INPUT -A iptables iptables -A INPUT -s 65.55.44.100 -j DROProotopen.com
2018-04-02 13:28:48

linux命令:ip -f inet addr |grep "global eth0$"|awk '{print $2}'|cut -d '/' -f 1 1 -f '/' -d $2}'|cut '{print eth0$"|awk "global |grep addr inet -f ip ip -f inet addr |grep "global eth0$"|awk '{print $2}'|cut -d '/' -f 1rootopen.com
linux命令:ip -f inet addr |grep "global eth0$"|awk '{print $2}'|cut -d '/' -f 1 1 -f '/' -d $2}'|cut '{print eth0$"|awk "global |grep addr inet -f ip ip -f inet addr |grep "global eth0$"|awk '{print $2}'|cut -d '/' -f 1rootopen.com
2018-02-08 16:36:48

linux命令:iptables -A OUTPUT www.baidu.com -p tcp -j REJECT --reject-with tcp-reset tcp-reset --reject-with REJECT -j tcp -p www.baidu.com OUTPUT -A iptables iptables -A OUTPUT www.baidu.com -p tcp -j REJECT --reject-with tcp-resetrootopen.com
linux命令:iptables -A OUTPUT www.baidu.com -p tcp -j REJECT --reject-with tcp-reset tcp-reset --reject-with REJECT -j tcp -p www.baidu.com OUTPUT -A iptables iptables -A OUTPUT www.baidu.com -p tcp -j REJECT --reject-with tcp-resetrootopen.com
2018-02-28 14:42:48

linux命令:ipcs -ma | awk '/^m / { if ($9 == 0) { print $2 }}' | xargs -n 1 ipcrm -m -m ipcrm 1 -n xargs | }}' $2 print { 0) == ($9 if { / '/^m awk | -ma ipcs ipcs -ma | awk '/^m / { if ($9 == 0) { print $2 }}' | xargs -n 1 ipcrm -mrootopen.com
linux命令:ipcs -ma | awk '/^m / { if ($9 == 0) { print $2 }}' | xargs -n 1 ipcrm -m -m ipcrm 1 -n xargs | }}' $2 print { 0) == ($9 if { / '/^m awk | -ma ipcs ipcs -ma | awk '/^m / { if ($9 == 0) { print $2 }}' | xargs -n 1 ipcrm -mrootopen.com
2018-05-12 06:26:48

linux命令:ip -4 addr show eth0 | awk ' /inet/ {print $2}' $2}' {print /inet/ ' awk | eth0 show addr -4 ip ip -4 addr show eth0 | awk ' /inet/ {print $2}'rootopen.com
linux命令:ip -4 addr show eth0 | awk ' /inet/ {print $2}' $2}' {print /inet/ ' awk | eth0 show addr -4 ip ip -4 addr show eth0 | awk ' /inet/ {print $2}'rootopen.com
2018-02-24 04:28:48

linux命令:iptables -P INPUT ACCEPT; iptables -P FORWARD ACCEPT; iptables -P OUTPUT ACCEPT; for table in `cat /proc/net/ip_tables_names`; do iptables -t $table -F; iptables -t $table -Z; iptables -t $table -X; done done -X; $table -t iptables -Z; $table -t iptables -F; $table -t iptables do /proc/net/ip_tables_names`; `cat in table for ACCEPT; OUTPUT -P iptables ACCEPT; FORWARD -P iptables ACCEPT; INPUT -P iptables iptables -P INPUT ACCEPT; iptables -P FORWARD ACCEPT; iptables -P OUTPUT ACCEPT; for table in `cat /proc/net/ip_tables_names`; do iptables -t $table -F; iptables -t $table -Z; iptables -t $table -X; donerootopen.com
linux命令:iptables -P INPUT ACCEPT; iptables -P FORWARD ACCEPT; iptables -P OUTPUT ACCEPT; for table in `cat /proc/net/ip_tables_names`; do iptables -t $table -F; iptables -t $table -Z; iptables -t $table -X; done done -X; $table -t iptables -Z; $table -t iptables -F; $table -t iptables do /proc/net/ip_tables_names`; `cat in table for ACCEPT; OUTPUT -P iptables ACCEPT; FORWARD -P iptables ACCEPT; INPUT -P iptables iptables -P INPUT ACCEPT; iptables -P FORWARD ACCEPT; iptables -P OUTPUT ACCEPT; for table in `cat /proc/net/ip_tables_names`; do iptables -t $table -F; iptables -t $table -Z; iptables -t $table -X; donerootopen.com
2018-04-07 23:01:48

linux命令:ip li | grep ff ff grep | li ip ip li | grep ffrootopen.com
linux命令:ip li | grep ff ff grep | li ip ip li | grep ffrootopen.com
2018-01-05 03:15:48

Linux的Bash命令行(A-Z排序)