Generate summary with AI

Network commands are popular for a good reason. They’re impactful and help you get complex IT work done quickly. But even when you know them well and have used them over and over, there are so many to keep track of that one may slip your mind. When that happens, you sometimes need a quick reminder.

To provide that extra support, here are 30 of the most useful network commands. Keep this list as part of the secret sauce for making you an IT superhero.

1) Ping

Ping helps you understand the level of network connectivity. It does so by sending data to another network, or between two devices on the same network, and testing how quickly you get a response. If the response is slow—or there’s no response—it can help you troubleshoot the connectivity issue. This can be done across a variety of operating systems, including Windows, Mac, and Linux.

2) Netstat

Netstat shows network connectivity status as well as data and statistics. This helps with system administration efforts: I.e., knowing which networks or devices a computer is connected to. It also sheds light on the cause of certain problems. For example, if there are performance challenges, it can assess the amount of traffic on the network, then help you figure out if that’s related and how to troubleshoot it.

3) Hostname

Hostname shows the full name, or unique identifier, of the device that serves as the current system host. This command is basically a shortcut for those who don’t want to perform a search on the system settings. If a change in the hostname is required, you’ll need to approach those with root user authority.

4) ARP

ARP stands for Address Resolution Protocol. It connects constantly changing IP addresses to fixed physical device addresses. It’s also used to change a device’s ARP cache—the mapping of corresponding IP and MAC addresses—or delete entries from there.

5) Nslookup

Nslookup helps you find a domain name’s IP address or DNS records. Similarly, if you know the IP address and need to find its attached domain, you can conduct a reverse DNS search. Online Nslookup tools also provide information on ports and timeout, but they’re less secure than the computer-based option.

6) IPConfig

IPConfig helps troubleshoot network connection issues—like refreshing DHCP settings and flushing DNS cache—by showing detailed information regarding a user’s network settings, configurations, and adapters. This can include insight into a user’s  DHCP server, DNS servers, IP address, default gateway, and subnet mask.

7) Nbstat

Nbstat displays TCP/IP connections with NBT (NetBIOS over TCP/IP) protocol stats, NetBIOS name cache, and NetBIOS name tables to help users overcome NetBIOS name resolution challenges. Nbstat is useful for refreshing names registered with Windows Internet Name Service, as well as renewing NetBIOS name cache.

8) Traceroute

Traceroute grants users a map of the path their data travels from its source location to its destination in Mac and Linux operating systems. That map includes devices, reuters, and networks (for the Windows version, use Tracert). This network command is useful if you need to troubleshoot poor internet performance. Understanding your data’s route can clarify the problem’s cause (for example, a router processing traffic slower than expected) and simplify resolution.

9) Tracert

Tracert is Windows’ version of the Traceroute networking command. Tracert also gives users a map of the path their data travels across the internet. It traces it from its source location to its destination, including all the stops along the way and how long it takes for that data to make the journey.

10) Tracepath

Like Traceroute, Tracepath shows a packet’s path from its source location to its destination and reports the time it takes. Unlike Traceroute, it discovers MTU (maximum transmission units) on this path. It’s a simpler option than Traceroute and doesn’t offer a data format option like Traceroute. However, it’s available to any user that has access to your command line prompt—not just superusers.

11) MTR

MTR, also known as My Traceroute, combines the diagnostic power of Traceroute and Ping. It shows the path a packet takes from its source location to its destination—including all stops along the way. MTR’s uniqueness is that it clarifies what the response times are, where there’s latency, the percentage of network hops between the source and destination servers, and if there are any packet losses. Another aspect that positively differentiates MTR is that it’s constantly updated automatically so you can get more accurate information.

12) Dig

Dig helps you search for DNS name systems—one by one or in batches—through operating system files. When name servers aren’t specified, you can use Dig to query the DNS root zone in the operating system’s default resolver.

13) Systeminfo

As its name implies, Systeminfo displays computer and operating system information. That includes the version of the operating system, original installation date, its manufacturer, hostname, configurations, product ID, hardware properties (disk space, network cards and the likes), installed memory availability, virtual memory availability, BIOS version, processors, installed network cards, system boot time, and security measures.

14) Pathping

Pathping helps identify and troubleshoot network performance, latency and loss challenges at key areas where data passes between its source location and destination. Those areas include routers and links, among others. This insight allows you to identify which parts of the data’s route (i.e., which router) are having issues, leading to more efficient resolution. Pathping can be used as an alternative for the combination of Tracert and Ping.

15) TCPDump

TCPDump is all about capturing and analyzing data in real time. It helps you see when packets get created or received. This makes it easier to monitor network activity, analyze what’s going on, and troubleshoot issues. TCPDump works on Linux and Mac operating systems.

16) cURL

Pronounced “curl,” this command lets you transfer data between servers, or between devices and servers. The command name stands for Client URL because it allows you to specify where you want to send data and presents that location as a URL. You can use it to download files and test device communication. It works on almost any platform and supports a variety of protocols.

17) Wget

Wget stands for “World Wide Web Get.” Like cURL, it can be used to download files from the internet. You can use it even when you’re on an unstable network, working on other tasks, or are offline. It works with a variety of protocols including HTTP, HTTPS, FTP, and SFTP.

18) Host

The host command searches for a hostname upon receiving an IP address. Conversely, if you insert a hostname, it will give you an IP address. It also provides plenty of helpful information including domains, mail exchange records, and aliases.

19) Whois

You can use Whois to search up databases of registered and assigned internet users. A wealth of information exists within those parameters, including autonomous systems, IP address blocks, and domain names. The main incentive behind using Whois is to carry out what its name implies—finding out who is behind a domain and how to contact them.

20) Telnet

Telnet helps you connect to a remote computer in a way that simulates physical presence. Let’s say you want to connect to Computer A, access the command line interface, and have command lines run as if you’re physically logged into that computer. When you log in remotely with your user name and password to Computer B and leverage Telnet, you’re able to do just that.

21) Getmac

This Windows command shows the Media Access Control (MAC) addresses—including all their network protocols—for every network card or adapter in every computer across your network.

22) Iwconfig

Iwconfig comand helps you view and configure wireless network interfaces. You can change the network’s settings—like its power management or name—or other items that directly impact the wireless operation. You can also combine it with Iwlist to compile available wireless network lists.

23) IP

The Internet Protocol (IP) helps you see device addresses, as well as configure network tunnels and interfaces (such as routers).

24) SSH

SSH is called Secure Shell because that’s what it provides when managing machines, sending commands, or moving files between two remote systems across an unsecure network. It uses cryptography to encrypt and authenticate device connections so you can operate safely.

25) SCP

Secure Copy Protocol (SCP) provides an efficient, secure way to copy directories and files between two remote systems, or between remote and local systems. After logging in to your local system, or using the SSH command to log into a remote system, you can authenticate and encrypt systems and data.

26) FTP

Most websites have FTP built in. This command helps you transfer, upload, or download files between remote hosts—or between a remote and a local host—across a TCP-based network like the internet. You can do it as long as the hosts use different file systems. Doing activities in batches is possible here. However, it’s best to avoid using FTP remotely.

27) Netcat

Netcat helps reading and writing data over network connections. In doing so, you can create and manage network connections, scan ports, discover networks, and transfer files. It performs all this using TCP or UDP protocols.

28) Nmap

Nmap is a free, open-source, and widely used utility that lets you scan and explore your network. You can use IP packets to identify the devices on your network, get information on operating systems and other services they run, monitor host uptime, manage service upgrade schedules, and perform network inventory and security auditing. Nmap helps you map networks and detect security vulnerabilities. Make sure you use it well, because misuses can lead to ISP bans and legal issues.

29) Ifplugstatus

Use Ifplugstatus to find out if a cable is plugged into your Ethernet network interface. This might be especially needed if there are connectivity issues or if there have been changes to the network interface.

30) Flush DNS

Flush DNS clears IP addresses and additional DNS records from your stored cache. While your DNS cache will automatically “flush” itself on occasion, internet connectivity, privacy or security challenges might lead you to consider proactively removing this data yourself. Some even do it as a regular maintenance activity to ensure ongoing, high quality system performance.

Ways you can use this list

How many times have you found an invaluable resource, but then closed all your tabs and lost them forever?

Change that pattern by using (and preserving) this list in the following ways.

Start a resource folder

As much as search keeps getting better and easier to use, there’s no reason to waste time tracking the same information over and over again. Start a resource folder that’s accessible from anywhere, and add resources like this one for quick future reference.

Print it and hang it on the wall

If you need even faster access to this cheat sheet—or if you want a more professional background for Zoom calls than your blank wall or space poster— hang this list on your work station’s wall.

Include it in the training kit for new technicians

Get your new technicians excited about working with your team by showing them you go the extra mile to help them succeed. Besides headphones, plants, or restaurant gift cards, give them simple or fun tools that will make them better at their jobs—like a gamified training app or a network command cheat sheet.

Go beyond cheat sheets with advanced IT management technology

We hope this cheat sheet is helpful for you and your team. Here at Atera, we’re dedicated to helping IT departments and MSPs like yours thrive—so much so, that we update our AI-powered IT management software every month based on customer feedback.

Indeed, as Artificial Intelligence for IT Operations (AIOps) becomes indispensable, we want to verify you’re set to lead your industry. According to the International Market Analysis Research and Consulting (IMARC) Group, “the global AIOps market size reached US$23.3 billion in 2023…[It’s expected] to reach US$112.1 billion by 2023, exhibiting a growth rate (CAGR) of 18.5% during 2024-2032.” This growth isn’t surprising when considering how AIOps is a better approach to IT. It helps you to:

  • Unify RMM, helpdesk, billing and reporting.
  • Automate countless mundane tasks to resolve tickets 10X faster without increasing technician headcount.
  • Make more data-driven decisions for more accurate troubleshooting.
  • Skill up your technicians and focus on more strategic actions.
  • Increase customer satisfaction—whether you’re an MSP or resolving internal IT issues to serve your customers better.

Atera helps companies around the world accomplish all this and more. Ready to supercharge your company’s growth? Try Atera for free with our 30-day trial.

Was this helpful?

Related Articles

How to choose the right network switch for your IT team

Read now

10 network alerting solutions IT pros swear by in 2024

Read now

Why network management is essential for businesses

Read now

IT Asset Discovery vs. IT Asset Management

Read now

Endless IT possibilities

Boost your productivity with Atera’s intuitive, centralized all-in-one platform