{"tool":"path-to-pig.py","tool_display":"Path To Pig.py","intent":"print-lease-info-neighbor-scan-release","intent_display":"print lease info neighbor scan release","title":"Path To Pig.py Command: print lease info neighbor scan release","command_string":"sudo <path/to>/pig.py -n -r -o <eth1>","raw_command_string":"sudo {{path/to}}/pig.py {{[-n|--neighbors-scan-arp]}} {{[-r|--neighbors-attack-release]}} {{[-o|--show-options]}} {{eth1}}","description":"Exact CLI syntax to print lease info neighbor scan release using Path To Pig.py.","usage_scenario":"When troubleshooting network issues related to IP allocations or inspecting DHCP lease records.","scenario_context":"Use this tool to quickly identify and release problematic DHCP leases.","simulated_output":"$ sudo path/to/pig.py --neighbors-scan-arp --neighbors-attack-release eth1\nScanning neighbors on eth1...\n\nNeighbor Table:\n+----------------+----------------+----------------+\n| IP Address     | MAC Address     | Lease Status    |\n+----------------+----------------+----------------+\n| 192.168.1.10   | 00:1A:2B:3C:4D:5E| Active          |\n| 192.168.1.20   | 00:1A:2B:3C:4D:5F| Inactive        |\n+----------------+----------------+----------------+\nReleasing lease for 192.168.1.10...\nLease released successfully.","how_to_steps":["Run the command with sudo privileges.","Specify the interface (e.g., eth1) for scanning.","Review the output for lease information."],"inferred_category":"Filesystem","canonical_url":"https://www.syntaxstandard.com/path-to-pig.py/print-lease-info-neighbor-scan-release"}