Sponsored Content
Special Forums IP Networking Tcp ip port open but no such process (merged: Release A Port) Post 302774267 by RudiC on Friday 1st of March 2013 01:25:14 PM
Old 03-01-2013
Use the less (or more) command :
Code:
netstat -tlp | less
# netstat -tlpn
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 127.0.1.1:53            0.0.0.0:*               LISTEN      1113/dnsmasq
                              ^--- port                                         ^--- PID

 

10 More Discussions You Might Find Interesting

1. IP Networking

tcp problem with port

I am trying to connect via DBACCESS and Informix server to a server on a different computer. When I execute the connect command from dbaccess I get the following message, Exec format error cannot bind a name to the port. As far as I know the port is not being used by another client. How... (1 Reply)
Discussion started by: lopez
1 Replies

2. UNIX for Dummies Questions & Answers

Redirecting output to TCP port

Hi All, I suspect this is simple but I cannot find any info on it. I have a logfile on a solaris box (EMS) that I want to tail -f but I want the output of this to be redirected to a TCP port. I have a second solaris box (PEM) running patrol enterprise manager that I am using as an alarm... (1 Reply)
Discussion started by: mscomms
1 Replies

3. UNIX for Dummies Questions & Answers

restrict tcp-port access

Hi Is there any way to restrict the TCP-IP port usage. I want to restrict TCP-IP port 1500/1550 to the oracle osuser. Tanks in advance. Remi (2 Replies)
Discussion started by: remivisser
2 Replies

4. Solaris

Locked TCP port in Solaris 10

Hi all I haven't had much experience with Solaris 10 but we've started running into a problem where a process hangs, it is killed and leaves a zombie process. The sysadmins are saying this zombie process is locking a tcp port and not allowing the process to start up. The process is a usually... (5 Replies)
Discussion started by: casphar
5 Replies

5. UNIX for Dummies Questions & Answers

close tcp port

Hello, I have a service running (ODBC) and every now and then it will hang and I will have to stop and restart the service. The problem is when I stop the service, it indeed stops the service, but netstat reports a tcp port still open with the fin_wait_2 status. Then I must close the client... (1 Reply)
Discussion started by: raidzero
1 Replies

6. IP Networking

Unknown open port: "6881/tcp open bittorrent-tracker" found with nmap

Hi. I ran nmap on my server, and I get the following: Starting Nmap 4.76 ( http://nmap.org ) at 2009-03-19 16:33 EDT Interesting ports on -------- (-----): Not shown: 997 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 6881/tcp open bittorrent-tracker The... (0 Replies)
Discussion started by: Rledley
0 Replies

7. Shell Programming and Scripting

TCP port assignment

I have multiple processes running the same program on my linux machine. For each process I want to be able to use a unique (available) TCP port. I have thought of using netstat to check which ports are available for use however, the time-window between checking and selecting might expose some race... (1 Reply)
Discussion started by: timmylita
1 Replies

8. UNIX for Advanced & Expert Users

How to list process connected to tcp port?

Hey guys, I need to kill the process that is currently connected to port 10540. I'm on HP-UX machine. Below is the result of my netstat. $ netstat -an |grep 10540 tcp 0 0 129.0.0.1.10540 *.* LISTEN We don't have lsof command, but we have fuser. ... (3 Replies)
Discussion started by: brichigo
3 Replies

9. Programming

Using socket to test a TCP port

Hello, I'm trying to write a small c application to test a tcp port. This works fine for the most part but the default timeout on the connect is very long. I have been reading many posts but and it looks like I need to set the socket to be non-blocking and poll for a result. I have been totally... (2 Replies)
Discussion started by: tjones1105
2 Replies

10. Solaris

How to find port number wwn of particular port on dual port HBA,?

please find the below o/p for your reference bash-3.00# fcinfo hba-port HBA Port WWN: 21000024ff295a34 OS Device Name: /dev/cfg/c2 Manufacturer: QLogic Corp. Model: 375-3356-02 Firmware Version: 05.03.02 FCode/BIOS Version: BIOS: 2.02; fcode: 2.01;... (3 Replies)
Discussion started by: sb200
3 Replies
netstat(1)						      General Commands Manual							netstat(1)

NAME
netstat - Displays network statistics. SYNOPSIS
/usr/sbin/netstat [-ARgrn | [-Aan] [-f address_family] [-p protocol]] [interval] /usr/sbin/netstat [-adgHimMnRrstuv] [-f address_family] [-p protocol] [interval] /usr/sbin/netstat [-dntz] [-I interface [-c | -s]] [interval] The netstat command displays network-related data in various formats. OPTIONS
Displays the state of sockets related to the Internet protocol. Includes sockets for processes such as servers that are currently listening at a socket but are otherwise inactive. Displays either the address of any protocol control blocks associated with sockets or the addresses of routing table entries with bitmasks. Typically, this option is used for debugging. Displays the number of dropped packets; for use with the -I interface or -i options. You can also specify an interval argument (in seconds). Limits reports to the specified address family. The address families that can be specified might include the following: Specifies reports of the AF_INET family, if present in the kernel. Specifies reports of the AF_INET6 family, if present in the kernel. Specifies reports of the AF_UNIX family, if present in the kernel. Lists information about all address families in the system. Lists information about any address families in the system. Dis- plays statistics since the system was last booted. By default, the command displays statistics since they were last zeroed. Use this option with the -p and -s options only. Displays the current ARP table (behaves like arp -a). Displays the state of configured interfaces. (Interfaces that are statically configured into the system, but not located at system startup, are not shown.) When used with the -a option, it displays IP (IPv4 and IPv6) and link-level addresses associated with the interfaces. You can use the -i option to retrieve your system's hardware address. Displays information about the specified interface. Displays the current access filter for the specified network interface. See ifaccess.conf(4) for more information. Displays the DNA Data Link Layer counters for the specified network interface and the adapter's status and characteristics. See Network Administration for a description of the display fields. Displays information about memory allocated to data structures associated with network operations. Displays Internet protocol multicast routing information. When used with the -s option, it displays IP (IPv4 and IPv6) multicast statistics. Displays network address in numerical format with network masks in CIDR format. When this option is not spec- ified, the address is displayed as hostname and port number. This option can be used with any of the display formats. Displays statistics for protocol, which you can specify as a well known name or an alias. Supported protocol names and their aliases are listed in /etc/protocols. A null listing (0) means that there is no data to report. If routines to report statistics for a speci- fied protocol are not implemented on this system, netstat reports that the protocol is unknown. Displays the host's routing tables. When used with the -s option, shows the host's routing statistics instead of routing tables. Display's the host's routing tables on each Resource Affinity Domain (RAD), if your system has NUMA-capable hardware. Displays statistics for each protocol. Displays timer information; for use with the -I interface or -i options. Displays information about domain sockets (UNIX domain). Displays more verbose output when specified with the -r option. In this case, route metric values are displayed. Sets the network interface counters or protocol statistics counters to zero. This option must be specified with either the -I interface option or the -s or -p options. In addition, you must be superuser to use this option. DESCRIPTION
The interval argument specifies in seconds the interval for updating and displaying information. The first line of the display shows cumu- lative statistics; subsequent lines show statistics recorded during interval. Default Display When used without options, the netstat command displays a list of active sockets for each protocol. The default display shows the following items: Local and remote addresses Send and receive queue sizes (in bytes) Protocol State Address formats are of the form host.port or network.port if a socket's address specifies a network but no specific host address. The host and network address are displayed symbolically unless -n is specified. Interface Display The network interface display format provides a table of cumulative statistics for the following: Interface name Maximum Transmission Unit (MTU) Network Address Packets received (Ipkts) Packets received in error (Ierrs) Packets transferred (Opkts) Outgoing packets in error (Oerrs) Collisions Note that the collisions item has different meanings for different network interfaces. Drops (optional with -d) Timers (optional with -t) Routing Table Display A route consists of a destination host or network and a gateway to use when forwarding packets. Direct routes are created automatically for each interface attached to the local host when you issue the ifconfig command. In addition, loopback routes are created automatically for each interface address that is configured with the ifconfig command. Routes can be modified automatically in response to the prevailing condition of the network. The routing-table display format indicates available routes and the status of each in the following fields: Displays the state of the route as one or more of the following: This is a cloned route. This route is a cloning route that was created by the route command. This route was dynamically created by a redirect. Fragment to path MTU size is disabled on this route. This route is to a gateway. This route is to a host. This route contains valid link-layer information. This route is a loopback route that was created by the kernel. This route was modified by a redirect. Path MTU discovery is disabled on this route. This route was created by the Path MTU discovery process. This is a reject route that was created by the route command. This is a static route that was created by the route command. Up, or available. Gives the current number of active uses for the route. Connection-oriented protocols hold on to a single route for the duration of a con- nection; connectionless protocols obtain routes in the process of sending to a destination. Provides a count of the number of packets sent using the route. Indicates the network interface used for the route. When the -v option is specified, the routing table display includes the route metrics. An asterisk (*) indicates the metric is locked. See route(8) for additional information on routing. DIAGNOSTICS
Verify that the kloadsrv daemon is running. If it is not, start it. See kloadsrv(8) for more information. Make sure that you have not replaced the running kernel with a new kernel. You might need to reboot the system to correct this problem. EXAMPLES
To show the state of the configured interfaces, enter: $ netstat -i To show the routing tables, enter: $ netstat -r The resulting display looks like the following: Routing Tables Destination Gateway Flags Refs Use Interface Netmasks: Inet 255.255.255.0 Route Tree for Protocol Family 2: default 16.55.5.5 UG 13 38618 ln0 localhost 16.55.5.4 UH 2 29 lo0 ethernet 16.55.5.3 U 98 66760 ln0 (Output may be formatted differently on your system.) To show the routing tables with network addresses, enter: $ netstat -rn The resulting display looks like the following: Routing tables Destination Gateway Flags Refs Use Interface Netmasks: Inet 0.0.0.0 Inet 255.0.0.0 Inet 255.255.0.0 Inet 255.255.252.0 Inet 255.255.255.0 Inet 255.255.255.224 Route Tree for Protocol Family 2: default 16.140.28.1 UG 0 6004465 tu0 16.140.128/24 16.140.128.198 U 4 181451 tu0 127.0.0.1 127.0.0.1 UH 0 0 lo0 194.224/16 127.0.0.1 UG 0 3 lo0 194.226/16 127.0.0.1 UGR 0 0 lo0 198.119.1/24 198.119.19.76 U 1 867 le0 198.119.19.64/27 198.119.19.76 U 0 1 le0 198.119.64.80 198.119.19.24 UGH 0 0 le0 130.200/16 16.140.128.1 UG 0 0 tu0 To produce the default display for network connections, enter: netstat The resulting display might include the following headings: Active Internet connections Proto Recv-Q Send-Q Local Address Foreign Address (state) To set the ln0 interface counters to zero, enter: netstat -Iln0 -z To display IPv6 routing entries, enter: # net- stat -rnf inet6 Routing tables Destination Gateway Flags Refs Use Interface Route Tree for Protocol Family 26 default Link#8 UCL 0 0 ipt0 default Link#1 UCL 0 0 ln0 default fe80::a00:2bff:fe2d:2b2 UG 0 0 ln0 3ffe:1200:4110:1::/64 Link#1 UCL 0 0 ln0 3ffe:1200:4110:1:a00:2bff:fe2c:f632 Link#1 UH 1 0 ln0 fe80::/10 Link#8 UCL 0 0 ipt0 fe80::/10 Link#1 UCL 0 0 ln0 fe80::108c:1056 Link#8 UHLc 1 4 ipt0 fe80::108c:80e3 Link#8 UHLc 0 0 ipt0 fe80::a00:2bff:fe2d:2b2 Link#1 UHLc 1 0 ln0 ff02::/16 Link#1 UCL 0 0 ln0 ff02::/16 Link#8 UCL 0 0 ipt0 ff02::1 16.140.128.227 UHLVc 0 8 ipt0 ff02::1 33:33:0:0:0:1 UHLVc 0 3 ln0 ff02::2 33:33:0:0:0:2 UHLVc 0 1 ln0 ff02::2 16.140.128.227 UHLVc 1 2 ipt0 ff02::9 16.140.128.227 UHLVc 0 4 ipt0 To display active IPv6 connections, enter: # netstat -af inet6 Active Internet connections (including servers) Proto Recv-Q Send-Q Local Address Foreign Address (state) tcp 0 0 3ffe:1200:4110:1:a00:2bff:fe2c:f632.1054 host1.corp.com.telnet ESTABLISHED tcp 0 0 *.finger *.* LISTEN tcp 0 0 *.telnet *.* LISTEN tcp 0 0 *.ftp *.* LISTEN SEE ALSO
Commands: vmstat(1), route(8) Network Administration netstat(1)
All times are GMT -4. The time now is 03:25 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy