10-22-2013
What looks strange to you? This does not appear to be sufficient. We also don't know what you are doing in your script Are you concerned about the null characters?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
# netstat -in
Name Mtu Network Address Ipkts Ierrs Opkts Oerrs Coll
net1 1500 192.168 192.168.0.11 24508 0 12212 112931 2795
lo0 8232 127 127.0.0.1 42 0 42 0 0
atl0* 8232 none none No Statistics... (1 Reply)
Discussion started by: samprax
1 Replies
2. Solaris
Dear Experts,
I put below command-
could you please describe the outputs column-
let me describe some them-
col_1: (10.131.60.48.55880) The IP address of the local computer and the port number being used for this particular connection appear in the Local Address column.
col_2:... (3 Replies)
Discussion started by: thepurple
3 Replies
3. Shell Programming and Scripting
echo "23.54" | awk '
function round(A) {
return int( A + 0.5 )
}
{
printf("%d\n",round($1));
}'> > > > > >
awk: syntax error near line 2
awk: bailing out near line 2 (2 Replies)
Discussion started by: santosh1234
2 Replies
4. HP-UX
Hi,
Does anyone know why I get a different output when using "netstat -a" or "netstat -an" ??
# netstat -a | grep ts15r135
tcp 0 0 nbsol152.62736 ts15r135.23211 ESTABLISHED
# netstat -an | grep 172.23.160.78
tcp 0 0 135.246.39.152.51954 ... (4 Replies)
Discussion started by: ejdv
4 Replies
5. UNIX for Dummies Questions & Answers
hi all,
when I run-
wcars1j5#netstat -an | grep 8090
127.0.0.1.8090 *.* 0 0 49152 0 LISTEN
wcars1j5#
1. does this mean that no one is connected to this port?
Regards,
akash (1 Reply)
Discussion started by: akash_mahakode
1 Replies
6. IP Networking
I can't tell what the output of the netstat command means. Is there anywhere that has this information? I tried the man pages, but they weren't helpful. (3 Replies)
Discussion started by: Ultrix
3 Replies
7. IP Networking
I have a TCPIP server application (a Vendor package) which by default allows 10 connections. It provides a parameter to allow us to increase the maximum allowable connections in case it is needed. Intermittently this application is failing with maximum number of connections reached even when there... (1 Reply)
Discussion started by: AIX_user
1 Replies
8. UNIX for Dummies Questions & Answers
I have a directory, user name sam 755
drwxr-xr-x 3 sam oper 6 Apr 23 15:57 sam
I log in as root, I can't write to sam folder. if the file already there, I can change that permission but it doesn't allow me to create any files in the above folder. Why, I thought root has... (2 Replies)
Discussion started by: samnyc
2 Replies
9. Shell Programming and Scripting
Hi Team,
Below is the output of netstat -an | grep 1533
tcp 0 0 17.18.18.12:583 10.3.2.0:1533 ESTABLISHED
tcp 0 0 17.18.18.12:370 10.3.2.0:1533 ESTABLISHED
Below is the o/p of netstat -a | grep server_name
tcp 0 ... (4 Replies)
Discussion started by: Girish19
4 Replies
10. UNIX for Beginners Questions & Answers
Hi All,
I am trying to collect the listen ports info from netstat command in centos 7
From that info i am trying to collect all the foreign address IP for those ports.
I am using below script to do the same.
netstat -an |grep -w "LISTEN" |grep -v "127.0.0.1" |awk '{print $4}' >... (3 Replies)
Discussion started by: sravani25
3 Replies
LEARN ABOUT MOJAVE
aa-unconfined
AA-UNCONFINED(8) AppArmor AA-UNCONFINED(8)
NAME
aa-unconfined - output a list of processes with tcp or udp ports that do not have AppArmor profiles loaded
SYNOPSIS
aa-unconfined
DESCRIPTION
aa-unconfined will use netstat(8) to determine which processes have open network sockets and do not have AppArmor profiles loaded into the
kernel.
BUGS
aa-unconfined must be run as root to retrieve the process executable link from the /proc filesystem. This program is susceptible to race
conditions of several flavours: an unlinked executable will be mishandled; an executable started before a AppArmor profile is loaded will
not appear in the output, despite running without confinement; a process that dies between the netstat(8) and further checks will be
mishandled. This program only lists processes using TCP and UDP. In short, this program is unsuitable for forensics use and is provided
only as an aid to profiling all network-accessible processes in the lab.
If you find any bugs, please report them at <http://https://bugs.launchpad.net/apparmor/+filebug>.
SEE ALSO
netstat(8), apparmor(7), apparmor.d(5), aa_change_hat(2), and <http://wiki.apparmor.net>.
AppArmor 2.7.103 2012-06-28 AA-UNCONFINED(8)