03-01-2010
Anything to do with hardware or communications is machine-specific. Please post what Operating System you are running and what hardware you have.
9 More Discussions You Might Find Interesting
1. AIX
Hi. I would like to be able to deny IP address for too many failed login attemps (either from ssh, sftp, ftp, etc). The system I wish this to work on is an AIX 5.1 system. I'm new to AIX but I'm a linux user. There is a program for linux called fail2ban which reads from the log files and see if... (1 Reply)
Discussion started by: metzgerh
1 Replies
2. AIX
Hi,
I have created the below ftp script to put files over to our capacity server, the check at the end works if ftp fails to run however if the script cannot login or the transfer itself failed there is no warnings.
Does anyone know the syntax to trap the erorr codes or to put a check within... (3 Replies)
Discussion started by: chlawren
3 Replies
3. UNIX for Advanced & Expert Users
Hi Experts,
need help about release or refresh TCP Connection:
i have the sample like below :
application log connection:
0500 ( 192.168.0.1:36053) 00919 2007/05/10 23:30:25 112 13 2007/05/10 23:30:25 1969/12/31 17:00:00
0500 ( 192.168.0.1:36054) 00920 2007/05/10 23:30:26 000 00... (3 Replies)
Discussion started by: bucci
3 Replies
4. UNIX for Dummies Questions & Answers
# netstat -a > /test/a
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
command is working fine (as i get output in file /test/a)
# dig -x 10.xxx.xxx.xxx
; <<>> DiG 9.3.3rc2 <<>> -x 10.203.xxx.xxx
;; global... (4 Replies)
Discussion started by: crackthehit007
4 Replies
5. UNIX for Dummies Questions & Answers
I wrote a very simple script to calculate the DB connection from an appserver and check the total netstat connection to a particular DB exceed 25 then it will send mail
netstat -a 2> /dev/null | awk '/.*ESTAB/{print $5}' | cut -d. -f1 | uniq -c | awk '{if ($1 > 25)print $2," exceed ",$1;}'
... (1 Reply)
Discussion started by: senthil.ak
1 Replies
6. Solaris
Hello,
Actually there are some bugs in application which does not close the TCP connection to other server though CORBA.
We need to kill that ESTABLISHED connections as new connection are not happeneing as the allocated ports were used and showing as ESTABLISHED
Is there any... (4 Replies)
Discussion started by: GIC1986
4 Replies
7. Solaris
Hey all I'm having a big problem here. Someone is attempting an SSH to a destination host on which an account resides and locking the account. I'm trying to determine who is performing the SSH attempts from my host. For instance they're logged in as their standard account but then (I'm assuming)... (13 Replies)
Discussion started by: MaindotC
13 Replies
8. IP Networking
Hello
netstat -p give below 6634176 connections as closed.How do we trace that which all connections are being closed on the server?
1366888371 data packet headers correctly predicted
1195906 connection requests
5227320 connection accepts
5992919... (6 Replies)
Discussion started by: Vishal_dba
6 Replies
9. Cybersecurity
The purpose of this thread is for everyone to follow the same methodology so we can create a future table, for the benefit of all, that shows how many failed login attempts (hacking) per day per server (and per minute) are happening.
This is not a thread on writing scripts or creating... (10 Replies)
Discussion started by: Neo
10 Replies
TRPT(8C) TRPT(8C)
NAME
trpt - transliterate protocol trace
SYNOPSIS
trpt [ -a ] [ -s ] [ -t ] [ -f ] [ -j ] [ -p hex-address ] [ system [ core ] ]
DESCRIPTION
Trpt interrogates the buffer of TCP trace records created when a socket is marked for "debugging" (see setsockopt(2)), and prints a read-
able description of these records. When no options are supplied, trpt prints all the trace records found in the system grouped according
to TCP connection protocol control block (PCB). The following options may be used to alter this behavior.
-a in addition to the normal output, print the values of the source and destination addresses for each packet recorded.
-s in addition to the normal output, print a detailed description of the packet sequencing information.
-t in addition to the normal output, print the values for all timers at each point in the trace.
-f follow the trace as it occurs, waiting a short time for additional records each time the end of the log is reached.
-j just give a list of the protocol control block addresses for which there are trace records.
-p show only trace records associated with the protocol control block, the address of which follows.
The recommended use of trpt is as follows. Isolate the problem and enable debugging on the socket(s) involved in the connection. Find the
address of the protocol control blocks associated with the sockets using the -A option to netstat(1). Then run trpt with the -p option,
supplying the associated protocol control block addresses. The -f option can be used to follow the trace log once the trace is located.
If there are many sockets using the debugging option, the -j option may be useful in checking to see if any trace records are present for
the socket in question. The
If debugging is being performed on a system or core file other than the default, the last two arguments may be used to supplant the
defaults.
FILES
/vmunix
/dev/kmem
SEE ALSO
setsockopt(2), netstat(1), trsp(8C)
DIAGNOSTICS
``no namelist'' when the system image doesn't contain the proper symbols to find the trace buffer; others which should be self explanatory.
BUGS
Should also print the data for each input or output, but this is not saved in the race record.
The output format is inscrutable and should be described here.
4.2 Berkeley Distribution May 26, 1986 TRPT(8C)