Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

public IP identification - free or in use

Posted on 2014-10-29
6
Medium Priority
?
106 Views
Last Modified: 2014-10-30
how can i check which public IP is  in use or available for use if have public range to use
0
Comment
Question by:DPKNPSH
  • 3
  • 2
6 Comments
 
LVL 7

Expert Comment

by:Stampel
ID: 40410368
why dont you just use ping ? or nmap -O if host are firewalled ?
0
 
LVL 7

Accepted Solution

by:
Stampel earned 2000 total points
ID: 40410373
You could also try :
nmap -sP 98.121.13.*
Will try to give you all hostnames and IP adresses responding (run it as root)
Try to use a single address first as it could take LONG
0
 

Author Comment

by:DPKNPSH
ID: 40410701
where to run this
0
Veeam Task Manager for Hyper-V

Task Manager for Hyper-V provides critical information that allows you to monitor Hyper-V performance by displaying real-time views of CPU and memory at the individual VM-level, so you can quickly identify which VMs are using host resources.

 
LVL 7

Assisted Solution

by:Stampel
Stampel earned 2000 total points
ID: 40410717
You can run it from any Linux station / VM ?

If you dont have Linux, download windows version here :
http://nmap.org/download.html#windows
it should work the same.
0
 
LVL 6

Expert Comment

by:Wylie Bayes
ID: 40411009
First of all you can't just say... "Oh this IP address doesn't ping, or doesn't get any results from nmap therefore I should be able to use it."

IP's are controlled and assigned to specific service providers.  Those service providers assign you IP's based on your needs and contract.  So I have a /29 network assigned to me on my VPS(Virtual Private Server).  If I am only using 3 addresses currently, it doesn't mean the other 2 are "up for grabs," they are still MY addresses.

The gov/military owns Millions of IP's that are not currently being used.  It's just how the world of public addressing works.  

Find a service provider.  Sign up for services through that provider.  Get assigned IP's to use.
0
 

Author Closing Comment

by:DPKNPSH
ID: 40415113
thanks got solution following you thanks a lot
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question