2010-01-19 14:51:10 +01:00
|
|
|
// Copyright (c) The Tor Project, Inc.
|
|
|
|
// See LICENSE for licensing information
|
|
|
|
// This is an asciidoc file used to generate the manpage/html reference.
|
|
|
|
// Learn asciidoc on http://www.methods.co.nz/asciidoc/userguide.html
|
2012-08-23 19:19:54 +02:00
|
|
|
:man source: Tor
|
|
|
|
:man manual: Tor Manual
|
2010-01-19 14:51:10 +01:00
|
|
|
tor-resolve(1)
|
|
|
|
==============
|
|
|
|
Peter Palfrader
|
|
|
|
|
|
|
|
NAME
|
|
|
|
----
|
|
|
|
tor-resolve - resolve a hostname to an IP address via tor
|
|
|
|
|
|
|
|
SYNOPSIS
|
|
|
|
--------
|
|
|
|
**tor-resolve** [-4|-5] [-v] [-x] __hostname__ [__sockshost__[:__socksport__]]
|
|
|
|
|
|
|
|
DESCRIPTION
|
|
|
|
-----------
|
|
|
|
**tor-resolve** is a simple script to connect to a SOCKS proxy that knows about
|
|
|
|
the SOCKS RESOLVE command, hand it a hostname, and return an IP address.
|
|
|
|
|
2011-01-09 21:40:40 +01:00
|
|
|
By default, **tor-resolve** uses the Tor server running on 127.0.0.1 on SOCKS
|
|
|
|
port 9050. If this isn't what you want, you should specify an explicit
|
|
|
|
__sockshost__ and/or __socksport__ on the command line.
|
|
|
|
|
2010-01-19 14:51:10 +01:00
|
|
|
OPTIONS
|
|
|
|
-------
|
|
|
|
**-v**::
|
|
|
|
Display verbose output.
|
|
|
|
|
|
|
|
**-x**::
|
|
|
|
Perform a reverse lookup: get the PTR record for an IPv4 address.
|
|
|
|
|
|
|
|
**-5**::
|
|
|
|
Use the SOCKS5 protocol. (Default)
|
|
|
|
|
|
|
|
**-4**::
|
|
|
|
Use the SOCKS4a protocol rather than the default SOCKS5 protocol. Doesn't
|
|
|
|
support reverse DNS.
|
|
|
|
|
|
|
|
SEE ALSO
|
|
|
|
--------
|
|
|
|
**tor**(1), **torify**(1). +
|
|
|
|
|
|
|
|
See doc/socks-extensions.txt in the Tor package for protocol details.
|
|
|
|
|
|
|
|
AUTHORS
|
|
|
|
-------
|
2011-01-09 21:40:40 +01:00
|
|
|
Roger Dingledine <arma@mit.edu>, Nick Mathewson <nickm@alum.mit.edu>.
|