.P
.nf
.I $ hath <<< \(dq10.0.0.0/29 10.0.0.8/29\(dq
-((10)\.(0)\.(0)\.(0|1|2|3|4|5|6|7|8|9|10|11|12|13|14|15))
+((10)\.(0)\.(0)\.(15|14|13|12|11|10|9|8|7|6|5|4|3|2|1|0))
.fi
.IP \(bu 2
\fBReduced\fR
List the IP addresses contained within the given CIDRs.
.P
.nf
-.I $ hath listed <<< \(dq192.168.0.240/29\(dq
+.I $ hath listed <<< 192.168.0.240/29
192.168.0.240
192.168.0.241
192.168.0.242
the given CIDRs.
.P
.nf
-.I $ hath reversed <<< \(dq198.41.0.4/30\(dq
+.I $ hath reversed <<< 198.41.0.4/30
198.41.0.4: a.root-servers.net.
198.41.0.5:
198.41.0.6: rs.internic.net.
25 lookups in parallel:
.P
.nf
-.I $ hath reversed +RTS -N25 <<< \(dq198.41.0.4/24\(dq
+.I $ hath reversed +RTS -N25 <<< 198.41.0.4/24
198.41.0.4: a.root-servers.net.
198.41.0.5:
198.41.0.6: rs.internic.net.
Without \fB\-\-barriers\fR, you can match things you shouldn't:
.nf
-.I $ echo \(dq127.0.0.100\(dq | grep -P $(hath <<< \(dq127.0.0.1/32\(dq)
+.I $ echo 127.0.0.100 | grep -P $(hath <<< 127.0.0.1/32)
127.0.0.100
.fi
Using \fB\-\-barriers\fR can prevent this:
.nf
-.I $ echo \(dq127.0.0.100\(dq | grep -P $(hath -b <<< \(dq127.0.0.1/32\(dq)
+.I $ echo 127.0.0.100 | grep -P $(hath -b <<< 127.0.0.1/32)
.I $ echo $?
1
.fi
address:
.nf
-.I $ echo \(dqx127.0.0.1x\(dq | grep -Po $(hath -b <<< \(dq127.0.0.1/32\(dq)
+.I $ echo x127.0.0.1x | grep -Po $(hath -b <<< 127.0.0.1/32)
x127.0.0.1x
.fi