Linux network commands
Server Administration

Linux Network Commands Used In Network Troubleshooting

In the previous post, we talked about Linux process management. In this post, we will talk about Linux network commands and how to troubleshoot your network.

Once you have confirmed that the physical network is working, the next step is to troubleshoot your network and here we come to our topic which is Linux network commands and how to use them to troubleshoot your network.

We are going to cover the most used Linux network commands.


ping command

The ping command is one of the most used Linux network commands in network troubleshooting. It is used to check whether or not a specific IP address can be reached, it checks whether there is an available connection.

The ping command works by sending an ICMP echo request to the specified destination in order to verify and check network connectivity.

$ ping

ping linux network commands

These results are showing a successful ping, and it can be described as the trip of an echo request issued by our system to

This command measures the average response. If there is no response, then maybe there is one of the following:

  • There is a physical problem on the network itself.
  • The location might be incorrect or non-functional.
  • The ping request is blocked by the target.
  • The host routing table is incorrect.

If you want to limit the number of echo requests made to 3, you can do it like this:

$ ping -c 3

ping -c Linux network commands

Here ping command stops sending echo requests after 3 cycles.

There are some issues that you should consider about ping command. These issues may not necessarily mean that there is a problem, but they will influence the results of a ping test.

Distance to the target: so if you live in the U.S. and you ping a server on Asia, you should expect that this ping will take much time than pinging a server in the U.S.

The connection speed: if your connection is slow, ping will take longer time than if you have a fast connection.

The hop count: this refers to routers and servers that the echo travels across till reaching its destination.

The important rule about ping is that the low ping is always desirable.

dig and host commands

You can use the dig command to verify DNS mappings, host addresses, MX records, and to discover more about any potential reverse DNS issues that can lead to spam and blacklisting.

The dig command was developed to replace nslookup command.

$ dig

dig linux network commands

The dig command by default searches for A records, you can obtain information for specific record types like MX records or NS records.

$ dig MX

dig mx linux network commands

You can get all types of records by using ANY query.

$ dig ANY

dig ANY linux network commands

The dig command makes a reverse lookup to get DNS information based on a specific IP address like this:

$ dig x

dig -x linux network commands

dig command does its query using the servers listed on /etc/resolv.conf.

The host command is similar to dig command.

$ host a

host linux network commands

Also, you can perform reverse lookups using host command.

$ host

So both commands work in a similar way, but dig command provides more advanced options.

traceroute command

The traceroute command is one of the most useful Linux network commands. It is used to show the pathway to a remote destination and the delays that occur at every hop. This command helps basically in:

  • Providing the names and the identity of every device on the path.
  • Reporting network latency and identify at which device the latency come from.

$ traceroute

traceroute linux network commands

The output will provide the specified host, the size of the packet that will be used, the IP address, and the maximum number of hops required. You can see the hostname, IP address, the hop number, and packet travel times.

To avoid reverse DNS lookup, use the -n option.

$ traceroute -n

traceroute -n linux network commands

By using traceroute command, you can identify network bottlenecks, and if you begin to see asterisks * then that means there is a potential problem in routing to that host, as the asterisks indicate packet loss or dropped packets.

The traceroute command sends a UDP packet, traceroute can send UDP, TCP, and ICMP.

If you need to send ICMP packet, you can send it like this:

$ sudo traceroute -I

traceroute -I linux network commands

To use a TCP variation, it can be used like this:

$ sudo traceroute -T

traceroute -T linux network commands

This is because some servers block UDP requests, so you can use this method.

In this case, you can send UDP, ICMP, or TCP to bypass these issues.

mtr command

On some Linux systems, you will need to run this command as a root user. This command is an alternative to traceroute command.

$ mtr

mtr linux network command

The best thing about mtr command is that it displays real-time data unlike traceroute.

Furthermore, the mtr command will also provide a reporting option that will issue the results of 10 packets to each hop encountered like this:

$ mtr --report

mtr report linux network command

This command gives a huge amount of details better than traceroute.

Checking Connection Performance Using ss Command

The socket statistics command ss is a replacement for netstat; it is not only faster, but it is also able to display more information.

The ss command gets its information directly from the kernel instead of relying on /proc directory like netstat command.

$ ss | less

ss linux network command

This command outputs all TCP, UDP, and UNIX socket connections and pipes the result to the less command in order to ensure that the results can be seen on screen.

You can combine this command with either the -t to show TCP sockets or -u to show UDP or -x to show UNIX sockets. And you should use -a option combined with any of these options to show the connected and listening sockets.

$ ss -ta

ss -ta linux network command

To list all established TCP sockets for IPV4, use the following command:

$ ss -t4 state established

ss established connections

To list all closed TCP states:

$ ss -t4 state closed

You can use the ss command to show all ports connected from a remote IP address:

$ ss dst XXX.XXX.XXX.XXX

And you can filter by a specific port like this:

$ ss dst XXX.XXX.XXX.XXX:22

iftop command

iftop utility or iftop command is used to monitor the traffic on a named interface and display real-time results.

You can download the tool like this:

$ wget

Then extract it:

$  tar zxvf iftop-0.17.tar.gz

Then compile it:

If you got any errors about libpcap, you can install it like this:

$ yum install libpcap-dev

And you can run the tool as a root user like this:

$ sudo iftop -I <interface>

iftop command

And you will see this table with a real-time data about your traffic.

add P option with iftop to show ports.

$ sudo iftop -P

iftop -P linux network commands

By default, iftop will display rates in bits/sec. To display it in bytes/sec with -B option.

$ iftop -B

iftop -B linux ntwork command

There a lot of options, you can check them man iftop.

arp command

Systems keep a table about what IP addresses are associated with what MAC addresses, this table is called ARP lookup table. If you try to connect to an IP address, the system will check this table first to see if it already knows the MAC address. If there is a cached value, ARP table is not used.

To view the arp table, use the arp command:

$ arp

arp linux network command

By default, arp command shows the hostnames, you can show IP addresses instead like this:

$ arp -n

arp -n linux network command

You can delete entries from the arp table like this:

$ arp -d HWADDR

Packet analysis with tcpdump

One of the most important Linux network commands is The tcpdump command. tcpdump command is a packet analyzer that is able to capture and provide a description of the traffic being transmitted across a network interface.

This kind of access to the packets which is the deepest level of the network can be vital when troubleshooting the network.

$ tcpdump -i <device_name>

tcpdump linux network command

You can also specify a protocol (TCP, UDP, ICMP and others) like this:

$ tcpdump -i <device_name> tcp

Also, you can specify the port:

$ tcpdump -i <device_name> port 22

tcpdump will keep running until the request is canceled; it is better to use the -c option in order to capture a pre-determined number of events like this:

$ tcpdump -c 10 -i <device_name>

You can also specify the IP to capture from using src option or going to using dst option.

$ tcpdump -c 10 -i <device_name> src XXX.XXX.XXX.XXX

You can obtain the device names like this:

$ ifconfig

ifconfig linux network command

You can save the traffic captured from tcpdump to a file and read it later with -w option.

$ tcpdump -w /path/ -i <device_name>

And to read that file:

$ tcpdump -r /path

I hope that Linux network commands we’ve discussed in this post could help you troubleshooting some of your network problems and take the right decision.

Thank you.