fping  5.1
About: fping quickly ping N number of hosts to determine their reachability without flooding the network.
  Fossies Dox: fping-5.1.tar.gz  ("unofficial" and yet experimental doxygen-generated source code documentation)  

fping Documentation

Some Fossies usage hints in advance:

  1. To see the Doxygen generated documentation please click on one of the items in the steelblue colored "quick index" bar above or use the side panel at the left which displays a hierarchical tree-like index structure and is adjustable in width.
  2. If you want to search for something by keyword rather than browse for it you can use the client side search facility (using Javascript and DHTML) that provides live searching, i.e. the search results are presented and adapted as you type in the Search input field at the top right.
  3. Doxygen doesn't incorporate all member files but just a definable subset (basically the main project source code files that are written in a supported language). So to search and browse all member files you may visit the Fossies fping-5.1.tar.gz contents page and use the Fossies standard member browsing features (also with source code highlighting and additionally with optional code folding).

Build Status Coverage Status Coverity Scan Build Status


fping is a program to send ICMP echo probes to network hosts, similar to ping, but much better performing when pinging multiple hosts. fping has a long long story: Roland Schemers did publish a first version of it in 1992 and it has established itself since then as a standard tool.

Current maintainer:
David Schweikert <david@schweikert.ch>




If you want to install fping from source, proceed as follows:

  1. Run ./autogen.sh (only if you got the source from Github).
  2. Run ./configure with the correct arguments. (see: ./configure --help)
  3. Run make; make install.
  4. Make fping either setuid, or, if under Linux: sudo setcap cap_net_raw+ep fping

If you can't run fping as root or can't use the cap_net_raw capability, you can also run fping in unprivileged mode. This works on MacOS and also on Linux, provided that your GID is included in the range defined in /proc/sys/net/ipv4/ping_group_range. This is particularly useful for running fping in rootless / unprivileged containers.


Have a look at the fping(8) manual page for usage help. (fping -h will also give a minimal help output.)