-h, --help (Display help)
           Displays help information and exits.
       -V, --version (Display version)
           Displays the program's version number and quits.
       -c rounds, --count rounds (Stop after a given number of rounds)
           This option lets you specify the number of times that Nping
           should loop over target hosts (and in some cases target
           ports). Nping calls these 'rounds'. In a basic execution with
           only one target (and only one target port in TCP/UDP modes),
           the number of rounds matches the number of probes sent to the
           target host. However, in more complex executions where Nping
           is run against multiple targets and multiple ports, the
           number of rounds is the number of times that Nping sends a
           complete set of probes that covers all target IPs and all
           target ports. For example, if Nping is asked to send TCP SYN
           packets to hosts 192.168.1.0-255 and ports 80 and 433, then
           256 × 2 = 512 packets are sent in one round. So if you
           specify -c 100, Nping will loop over the different target
           hosts and ports 100 times, sending a total of 256 × 2 ×
           100 = 51200 packets. By default Nping runs for 5 rounds. If a
           value of 0 is specified, Nping will run continuously.
       -e name, --interface name (Set the network interface to be used)
           This option tells Nping what interface should be used to send
           and receive packets. Nping should be able to detect this
           automatically, but it will tell you if it cannot.  name must
           be the name of an existing network interface with an assigned
           IP address.
       --privileged (Assume that the user is fully privileged)
           Tells Nping to simply assume that it is privileged enough to
           perform raw socket sends, packet sniffing, and similar
           operations that usually require special privileges. By
           default Nping quits if such operations are requested by a
           user that has no root or administrator privileges. This
           option may be useful on Linux, BSD or similar systems that
           can be configured to allow unprivileged users to perform
           raw-packet transmissions. The NPING_PRIVILEGED environment
           variable may be set as an alternative to using --privileged.
       --unprivileged (Assume that the user lacks raw socket privileges)
           This option is the opposite of --privileged. It tells Nping
           to treat the user as lacking network raw socket and sniffing
           privileges. This is useful for testing, debugging, or when
           the raw network functionality of your operating system is
           somehow broken. The NPING_UNPRIVILEGED environment variable
           may be set as an alternative to using --unprivileged.
       --send-eth (Use raw ethernet sending)
           Asks Nping to send packets at the raw ethernet (data link)
           layer rather than the higher IP (network) layer. By default,
           Nping chooses the one which is generally best for the
           platform it is running on. Raw sockets (IP layer) are
           generally most efficient for Unix machines, while ethernet
           frames are required for Windows operation since Microsoft
           disabled raw socket support. Nping still uses raw IP packets
           despite this option when there is no other choice (such as
           non-ethernet connections).
       --send-ip (Send at raw IP level)
           Asks Nping to send packets via raw IP sockets rather than
           sending lower level ethernet frames. It is the complement to
           the --send-eth option.
       --bpf-filter filter spec --filter filter spec (Set custom BPF
       filter)
           This option lets you use a custom BPF filter. By default
           Nping chooses a filter that is intended to capture most
           common responses to the particular probes that are sent. For
           example, when sending TCP packets, the filter is set to
           capture packets whose destination port matches the probe's
           source port or ICMP error messages that may be generated by
           the target or any intermediate device as a result of the
           probe. If for some reason you expect strange packets in
           response to sent probes or you just want to sniff a
           particular kind of traffic, you can specify a custom filter
           using the BPF syntax used by tools like tcpdump.  See the
           documentation at http://www.tcpdump.org/ 
       -H, --hide-sent (Do not display sent packets)
           This option tells Nping not to print information about sent
           packets. This can be useful when using very short inter-probe
           delays (i.e., when flooding), because printing information to
           the standard output has a computational cost and disabling it
           can probably speed things up a bit. Also, it may be useful
           when using Nping to detect active hosts or open ports (e.g.
           sending probes to all TCP ports in a /24 subnet). In that
           case, users may not want to see thousands of sent probes but
           just the replies generated by active hosts.
       -N, --no-capture (Do not attempt to capture replies)
           This option tells Nping to skip packet capture. This means
           that packets in response to sent probes will not be processed
           or displayed. This can be useful when doing flooding and
           network stack stress tests. Note that when this option is
           specified, most of the statistics shown at the end of the
           execution will be useless. This option does not work with TCP
           Connect mode.