version 1.46, 2022/06/03 04:00:15 |
version 1.47, 2022/10/28 02:29:34 |
|
|
login access to the machines that are being scanned, nor does the |
login access to the machines that are being scanned, nor does the |
scanning process involve any encryption. |
scanning process involve any encryption. |
.Pp |
.Pp |
|
Hosts to be scanned may be specified by hostname, address or by CIDR |
|
network range (e.g. 192.168.16/28). |
|
If a network range is specified, then all addresses in that range will |
|
be scanned. |
|
.Pp |
The options are as follows: |
The options are as follows: |
.Bl -tag -width Ds |
.Bl -tag -width Ds |
.It Fl 4 |
.It Fl 4 |
|
|
is supplied instead of a filename, |
is supplied instead of a filename, |
.Nm |
.Nm |
will read from the standard input. |
will read from the standard input. |
Input is expected in the format: |
Names read from a file must start with an address, hostname or CIDR network |
|
range to be scanned. |
|
Addresses and hostnames may optionally be followed by comma-separated name |
|
or address aliases that will be copied to the output. |
|
For example: |
.Bd -literal |
.Bd -literal |
1.2.3.4,1.2.4.4 name.my.domain,name,n.my.domain,n,1.2.3.4,1.2.4.4 |
192.168.11.0/24 |
|
10.20.1.1 |
|
happy.example.org |
|
10.0.0.1,sad.example.org |
.Ed |
.Ed |
.It Fl H |
.It Fl H |
Hash all hostnames and addresses in the output. |
Hash all hostnames and addresses in the output. |
|
|
.Ar hostname : |
.Ar hostname : |
.Pp |
.Pp |
.Dl $ ssh-keyscan -t rsa hostname |
.Dl $ ssh-keyscan -t rsa hostname |
|
.Pp |
|
Search a network range, printing all supported key types: |
|
.Pp |
|
.Dl $ ssh-keyscan 192.168.0.64/25 |
.Pp |
.Pp |
Find all hosts from the file |
Find all hosts from the file |
.Pa ssh_hosts |
.Pa ssh_hosts |