10-22-2009
Yes, the port is up and waiting for connections, ie. the app/demon behind it. Connections usually are seen with client IP addresses where the *.* is and also with something like "ESTABLISHED" as status.
If you see a name at the positon where the 8090 is, this is translated from the /etc/services, where port numbers can be mapped to a service name.
Next time please checkout a more appropriate subforum since this is "Shell Programming and Scripting"
---------- Post updated at 12:45 PM ---------- Previous update was at 12:40 PM ----------
Thread moved with a redirect, no offense.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Are there any references I can look up for to interprete "netstat -s", especially those on TCP statistics. (6 Replies)
Discussion started by: deaniyoer
6 Replies
2. UNIX for Dummies Questions & Answers
# netstat -in
Name Mtu Network Address Ipkts Ierrs Opkts Oerrs Coll
net1 1500 192.168 192.168.0.11 24508 0 12212 112931 2795
lo0 8232 127 127.0.0.1 42 0 42 0 0
atl0* 8232 none none No Statistics... (1 Reply)
Discussion started by: samprax
1 Replies
3. UNIX for Dummies Questions & Answers
Hi there again,
Running Solaris 10 with built-in Java. Seems to compile and run fine.
Problem is: Say I want to see contents of current directory. In a shell, I'd just write "ls" and it outputs the content.
When I write a Java file, I have the following line:
System.out.println("ls");
... (1 Reply)
Discussion started by: EugeneG
1 Replies
4. Solaris
Dear Experts,
I put below command-
could you please describe the outputs column-
let me describe some them-
col_1: (10.131.60.48.55880) The IP address of the local computer and the port number being used for this particular connection appear in the Local Address column.
col_2:... (3 Replies)
Discussion started by: thepurple
3 Replies
5. HP-UX
Hi,
Does anyone know why I get a different output when using "netstat -a" or "netstat -an" ??
# netstat -a | grep ts15r135
tcp 0 0 nbsol152.62736 ts15r135.23211 ESTABLISHED
# netstat -an | grep 172.23.160.78
tcp 0 0 135.246.39.152.51954 ... (4 Replies)
Discussion started by: ejdv
4 Replies
6. UNIX for Dummies Questions & Answers
I am having trouble figuring this one out.....Is this a 2CPU or a 4CPU v490 with 16GB? I think it is a 2CPU system, looking for confirmation.
$ prtdiag
System Configuration: Sun Microsystems sun4u Sun Fire V490
System clock frequency: 150 MHz
Memory size: 16384 Megabytes
... (1 Reply)
Discussion started by: config_boy
1 Replies
7. IP Networking
I can't tell what the output of the netstat command means. Is there anywhere that has this information? I tried the man pages, but they weren't helpful. (3 Replies)
Discussion started by: Ultrix
3 Replies
8. Solaris
Hi. I wonder what the equal sign in front of the answer means.
I have read man pages and googled but found no answer.
xntpdc -p
=15.5.64.3 15.5.2.51 3 512 377 0.02060 0.057426 0.04965Thanks.
Jan (1 Reply)
Discussion started by: vettec3
1 Replies
9. Shell Programming and Scripting
Hi Team,
Below is the output of netstat -an | grep 1533
tcp 0 0 17.18.18.12:583 10.3.2.0:1533 ESTABLISHED
tcp 0 0 17.18.18.12:370 10.3.2.0:1533 ESTABLISHED
Below is the o/p of netstat -a | grep server_name
tcp 0 ... (4 Replies)
Discussion started by: Girish19
4 Replies
10. UNIX for Beginners Questions & Answers
I have two questions on Linux's free command. Below, I have provided output from my home laptop (fedora 26 ) which has 16GB Physical RAM and a production server (RHEL 7.4) which has 24GB RAM.
Question1. What exactly does the buffer/cache column say in free command's output ? buffer/cache is... (9 Replies)
Discussion started by: omega3
9 Replies
LEARN ABOUT DEBIAN
aa-unconfined
AA-UNCONFINED(8) AppArmor AA-UNCONFINED(8)
NAME
aa-unconfined - output a list of processes with tcp or udp ports that do not have AppArmor profiles loaded
SYNOPSIS
aa-unconfined
DESCRIPTION
aa-unconfined will use netstat(8) to determine which processes have open network sockets and do not have AppArmor profiles loaded into the
kernel.
BUGS
aa-unconfined must be run as root to retrieve the process executable link from the /proc filesystem. This program is susceptible to race
conditions of several flavours: an unlinked executable will be mishandled; an executable started before a AppArmor profile is loaded will
not appear in the output, despite running without confinement; a process that dies between the netstat(8) and further checks will be
mishandled. This program only lists processes using TCP and UDP. In short, this program is unsuitable for forensics use and is provided
only as an aid to profiling all network-accessible processes in the lab.
If you find any bugs, please report them at <http://https://bugs.launchpad.net/apparmor/+filebug>.
SEE ALSO
netstat(8), apparmor(7), apparmor.d(5), aa_change_hat(2), and <http://wiki.apparmor.net>.
AppArmor 2.7.103 2012-06-28 AA-UNCONFINED(8)