11-06-2008
hi
I thing so this command use full
netstat -an | grep LISTEN gives me a list of open ports this command work fine please check u r port or open/ closed
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hello,
I'm new to the forum and would like to know how to check
inbound traffic on various port numbers.
I would also like to know how to open and close various ports
on a unix box running solaris 8.
Thanks in advance.
sunoracle (1 Reply)
Discussion started by: sunoracle
1 Replies
2. IP Networking
Hello,
I'm new to the forum and would like to know how to check
inbound traffic on various port numbers.
I would also like to know how to open and close various ports
on a unix box running solaris 8.
Thanks in advance.
sunoracle (2 Replies)
Discussion started by: sunoracle
2 Replies
3. Shell Programming and Scripting
Hello, i need a script (bash type maybe?..), which would check open ports on 127.0.0.1 and then compare open ports with "registered/allowed" port list and try to kill the program who uses unregistered ports. It would be great that script would be started lets say every 5 or 10 minutes.
You see i... (2 Replies)
Discussion started by: MorchiuS
2 Replies
4. Shell Programming and Scripting
Good day,
I'm new to linux environment...Is there any scripts available for me to check ports (lets say port 80 and 21) through shell with just a single commandline?
Any response is very much appreciated..
thanks (4 Replies)
Discussion started by: arsonist
4 Replies
5. IP Networking
Hi all - i currently run a domain strifex.net. This domain has a dedicated IP address and in having that, should be able to run a ventrilo VoIP server from it. I uploaded all the needed files etc... and am able to connect to it, if and only if i enable DMZ to my local machine - then i am able to... (1 Reply)
Discussion started by: ccfc1986
1 Replies
6. Shell Programming and Scripting
Hi
I'd like to check that a bunch of firewall rules have been applied and, therefore, want to write a script that basically does the following:
telnet serverA port1
telnet serverA port2
telnet serverB port1
telnet serverB port2
I would just compile the list in excel and run it as a... (2 Replies)
Discussion started by: jibberish
2 Replies
7. Red Hat
Hi Gents,
I know we can use nmap & telnet to find remove server ports, any other way for the same ?
thanks (1 Reply)
Discussion started by: heman96
1 Replies
8. AIX
Hi,
I am trying to implement a service on AIX based on ONCRPC protocal and I want to use a RPC library called oncrpc4j because it is a non-blocked i/o library. I found it works fine on my work machine (WIndows 7) but failed on my AIX work station. The author of oncrpc4j told me that check that... (1 Reply)
Discussion started by: derekhsu
1 Replies
9. Shell Programming and Scripting
Hi. I need to add code to my KSH script to automatically assign an open port number from a pre-defined range to an Oracle listener.
Should I use:
lsof -i
or
netstat -vatn
or something else?
Thanks. (9 Replies)
Discussion started by: user052009
9 Replies
10. Shell Programming and Scripting
Hi,
I do a telnet to a single server using command :telnet tibserver001 9640
The output i get is :
Trying 10.19....
Connected to tibserver001
However i need to put all the servers in a single file and get the output to see if the server is connected or not.
#! /bin/bash
telnet... (3 Replies)
Discussion started by: samrat dutta
3 Replies
LEARN ABOUT HPUX
aa-unconfined
AA-UNCONFINED(8) AppArmor AA-UNCONFINED(8)
NAME
aa-unconfined - output a list of processes with tcp or udp ports that do not have AppArmor profiles loaded
SYNOPSIS
aa-unconfined
DESCRIPTION
aa-unconfined will use netstat(8) to determine which processes have open network sockets and do not have AppArmor profiles loaded into the
kernel.
BUGS
aa-unconfined must be run as root to retrieve the process executable link from the /proc filesystem. This program is susceptible to race
conditions of several flavours: an unlinked executable will be mishandled; an executable started before a AppArmor profile is loaded will
not appear in the output, despite running without confinement; a process that dies between the netstat(8) and further checks will be
mishandled. This program only lists processes using TCP and UDP. In short, this program is unsuitable for forensics use and is provided
only as an aid to profiling all network-accessible processes in the lab.
If you find any bugs, please report them at <http://https://bugs.launchpad.net/apparmor/+filebug>.
SEE ALSO
netstat(8), apparmor(7), apparmor.d(5), aa_change_hat(2), and <http://wiki.apparmor.net>.
AppArmor 2.7.103 2012-06-28 AA-UNCONFINED(8)