09-20-2012
You're not sure? What does it do right now?
What does your netstat -i output look like?
10 More Discussions You Might Find Interesting
1. IP Networking
Giving netstat command on the prompt gives commands such as
localhost.43592 localhost.35237 32768 0 32768 0 TIME_WAIT
localhost.43594 localhost.43595 32768 0 32768 0 TIME_WAIT
localhost.43598 localhost.35237 32768 0 32768 0 TIME_WAIT... (6 Replies)
Discussion started by: DPAI
6 Replies
2. IP Networking
Hi
what is the command to see the process name/application name
along with the port number, connection status ...
netstat is not giving process/application name
Is there any way to know which application is holding which port?
Thanks in advance (3 Replies)
Discussion started by: axes
3 Replies
3. UNIX for Dummies Questions & Answers
Hello,
One of the solaris machine in our network is giving an error when the netstat command is executed.
soloman:/home/db2admin->netstat
ip open: Permission denied
can't open mib stream: Bad file number
But it works with root. I couldnt' get any useful info during my search in google.
... (2 Replies)
Discussion started by: k_pranava
2 Replies
4. AIX
Hi
Which options can I use to show program with its open ports on AIX?. Just like netstat on linux does:
netstat -anp|grep 25
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 2112/sendmail: acce
Thanks
Time to start using code tags. Check your... (2 Replies)
Discussion started by: iga3725
2 Replies
5. Solaris
Greetings to all,
Here is a line of output from my netstat command
cbp031.904 wdcprodhome.nfsd 98304 0 49640 0 ESTABLISHED
The only thing i recognize is the unix machine "cbp031" but what is .904 and all the other data telling me?
Thanks in advance. (3 Replies)
Discussion started by: Harleyrci
3 Replies
6. UNIX for Advanced & Expert Users
Hi,
I want to list the time for how long a secure connections last to my server/blade. i am using netstat command to get the same, but not sure how to get the time for how long connections is being ESTABLISHED.
netstat -na | grep 'ESTABLISHED' | grep :443 |awk '{print $4}' | cut -d: -f1 |... (1 Reply)
Discussion started by: Siddheshk
1 Replies
7. UNIX for Dummies Questions & Answers
Do I have this command correct to show all current connections/sessions my Solaris box has? It does not seem to do anything.
netstat -an | grep EST (6 Replies)
Discussion started by: SIFT3R
6 Replies
8. Red Hat
Hi
Can any body tell me about TIME_WAIT status meaning in the following command output.
# netstat -anp|grep 5000
tcp 0 0 127.0.0.1:50006 0.0.0.0:* LISTEN 5058/ccsd
tcp 0 0 0.0.0.0:50008 0.0.0.0:* ... (3 Replies)
Discussion started by: mastansaheb
3 Replies
9. OS X (Apple)
When running netstat -i from the Command Terminal,
It returns with 21 different connections..
The addresses all look like this:
::1
fe80:1::1
10:dd:b1:a5:c4:ba
with Network names like
Linke#2
fe80::8e2d
How can I delve deeper into this to clarify what is going on with my network?... (0 Replies)
Discussion started by: dwfiedler
0 Replies
10. Shell Programming and Scripting
Hi Team,
Below is the output of netstat -an | grep 1533
tcp 0 0 17.18.18.12:583 10.3.2.0:1533 ESTABLISHED
tcp 0 0 17.18.18.12:370 10.3.2.0:1533 ESTABLISHED
Below is the o/p of netstat -a | grep server_name
tcp 0 ... (4 Replies)
Discussion started by: Girish19
4 Replies
LEARN ABOUT HPUX
aa-unconfined
AA-UNCONFINED(8) AppArmor AA-UNCONFINED(8)
NAME
aa-unconfined - output a list of processes with tcp or udp ports that do not have AppArmor profiles loaded
SYNOPSIS
aa-unconfined
DESCRIPTION
aa-unconfined will use netstat(8) to determine which processes have open network sockets and do not have AppArmor profiles loaded into the
kernel.
BUGS
aa-unconfined must be run as root to retrieve the process executable link from the /proc filesystem. This program is susceptible to race
conditions of several flavours: an unlinked executable will be mishandled; an executable started before a AppArmor profile is loaded will
not appear in the output, despite running without confinement; a process that dies between the netstat(8) and further checks will be
mishandled. This program only lists processes using TCP and UDP. In short, this program is unsuitable for forensics use and is provided
only as an aid to profiling all network-accessible processes in the lab.
If you find any bugs, please report them at <http://https://bugs.launchpad.net/apparmor/+filebug>.
SEE ALSO
netstat(8), apparmor(7), apparmor.d(5), aa_change_hat(2), and <http://wiki.apparmor.net>.
AppArmor 2.7.103 2012-06-28 AA-UNCONFINED(8)