$ fstat | grep internet
phessler ssh         7237    4* internet stream tcp 0x1077a330 
192.168.1.132:13171 --> 209.204.157.98:22
phessler gaim       30459   12* internet stream tcp 0x1077ab00 
192.168.1.132:32441 --> 205.188.9.46:5190
phessler gaim       30459   13* internet stream tcp 0x1077a010 
192.168.1.132:9925 --> 72.14.253.125:5222
phessler gaim       30459   14* internet stream tcp 0x1077ae20 
192.168.1.132:4844 --> 207.46.111.88:1863
phessler gaim       30459   15* internet stream tcp 0x1077a650 
192.168.1.132:27485 --> 64.12.26.81:5190
phessler Xorg        9663    5* internet6 stream tcp 0x63af008 *:6000
phessler Xorg        9663    7* internet stream tcp 0x63af198 *:6000
root     sendmail   29679    3* internet stream tcp 0x479d960 
127.0.0.1:25
root     sendmail   29679    5* internet6 stream tcp 0x479daf0 [::1]:25
root     sendmail   29679    6* internet stream tcp 0x479dc80 
127.0.0.1:587
root     sendmail   29679    7* internet6 stream tcp 0x479de10 [::1]:587
root     sshd       14561    4* internet6 stream tcp 0x479d640 *:22
root     sshd       14561    5* internet stream tcp 0x479d7d0 *:22
_ntp     ntpd       10823    4* internet dgram udp 192.168.1.132:14984 
<-> 138.23.180.126:123
_ntp     ntpd       10823    6* internet dgram udp 127.0.0.1:123
_ntp     ntpd       10823    7* internet6 dgram udp [::1]:123
_ntp     ntpd       10823    8* internet6 dgram udp [fe80::1%lo0]:123
_ntp     ntpd       10823    9* internet6 dgram udp 
[fe80::230:65ff:fe26:8d10%wi0]:123
_ntp     ntpd       10823   10* internet dgram udp 192.168.1.132:123
_ntp     ntpd       10823   11* internet6 dgram udp 
[fe80::203:93ff:fe90:3ca8%gem0]:123
_ntp     ntpd       10823   19* internet dgram udp 192.168.1.132:16965 
<-> 209.204.157.98:123
root     nfsd       24383    3* internet stream tcp 0x479d4b0 *:2049
root     mountd       152    3* internet dgram udp *:622
root     mountd       152    4* internet stream tcp 0x479d320 *:951
_portmap portmap     3783    4* internet dgram udp *:111
_portmap portmap     3783    5* internet dgram udp 127.0.0.1:111
_portmap portmap     3783    6* internet stream tcp 0x479d000 *:111
_portmap portmap     3783    7* internet stream tcp 0x479d190 
127.0.0.1:111
_syslogd syslogd    29186    4* internet dgram udp *:514
_dhcp    dhclient   25722    8* internet raw ip 0x39a5000
$

This is on OpenBSD.  If fstat(1) doesn't exist, then try lsof(1)



On 2007 Apr 09 (Mon) at 20:28:57 +0530 (+0530), Siju George wrote:
:Hi,
:
:How Do you actually Identify what process is listening on a TCP/IP port?
:"nmap" does not usually give the right answer.
:There should be some command that can be run on the local host for
:identification right?
:
:Thankyou so much
:
:kind Regards
:
:Siju


--
"Never underestimate the power of a small tactical nuclear weapon."
_______________________________________________
Openbsd-newbies mailing list
[email protected]
http://mailman.theapt.org/listinfo/openbsd-newbies

Reply via email to