|specifies the name of a file with IP-address, description mappings, one mapping per line. See the examples section for further information.|
While the output of sc_warts2text is structured and suitable for initial analyses of results, the format of the output is not suitable for automated parsing and analysis as the output of sc_warts2text will change overtime with no regard to backwards compatibility. Analyses of the contents of a warts file should be made using specialised programs which link against the scamper file API.
sc_warts2text file1.warts file2.warts
will decode and print the contents of file1.warts, followed by the contents of file2.warts.
gzcat file1.warts.gz | sc_warts2text
will print the contents of the uncompressed file supplied on stdin.
Given a set of IP-address, description pairs in a file name mappings.txt:
192.0.2.1 "foo" 192.0.2.2 "bar"
then the command gzcat file1.warts.gz | sc_warts2text -d mappings.txt will print the description associated with a given destination address before each result is presented.
scamper(1), sc_wartsdump(1), sc_warts2json(1)
sc_warts2text is written by Matthew Luckie <firstname.lastname@example.org>.