$ fstat | grep internet phessler ssh 7237 4* internet stream tcp 0x1077a330 192.168.1.132:13171 --> 209.204.157.98:22 phessler gaim 30459 12* internet stream tcp 0x1077ab00 192.168.1.132:32441 --> 205.188.9.46:5190 phessler gaim 30459 13* internet stream tcp 0x1077a010 192.168.1.132:9925 --> 72.14.253.125:5222 phessler gaim 30459 14* internet stream tcp 0x1077ae20 192.168.1.132:4844 --> 207.46.111.88:1863 phessler gaim 30459 15* internet stream tcp 0x1077a650 192.168.1.132:27485 --> 64.12.26.81:5190 phessler Xorg 9663 5* internet6 stream tcp 0x63af008 *:6000 phessler Xorg 9663 7* internet stream tcp 0x63af198 *:6000 root sendmail 29679 3* internet stream tcp 0x479d960 127.0.0.1:25 root sendmail 29679 5* internet6 stream tcp 0x479daf0 [::1]:25 root sendmail 29679 6* internet stream tcp 0x479dc80 127.0.0.1:587 root sendmail 29679 7* internet6 stream tcp 0x479de10 [::1]:587 root sshd 14561 4* internet6 stream tcp 0x479d640 *:22 root sshd 14561 5* internet stream tcp 0x479d7d0 *:22 _ntp ntpd 10823 4* internet dgram udp 192.168.1.132:14984 <-> 138.23.180.126:123 _ntp ntpd 10823 6* internet dgram udp 127.0.0.1:123 _ntp ntpd 10823 7* internet6 dgram udp [::1]:123 _ntp ntpd 10823 8* internet6 dgram udp [fe80::1%lo0]:123 _ntp ntpd 10823 9* internet6 dgram udp [fe80::230:65ff:fe26:8d10%wi0]:123 _ntp ntpd 10823 10* internet dgram udp 192.168.1.132:123 _ntp ntpd 10823 11* internet6 dgram udp [fe80::203:93ff:fe90:3ca8%gem0]:123 _ntp ntpd 10823 19* internet dgram udp 192.168.1.132:16965 <-> 209.204.157.98:123 root nfsd 24383 3* internet stream tcp 0x479d4b0 *:2049 root mountd 152 3* internet dgram udp *:622 root mountd 152 4* internet stream tcp 0x479d320 *:951 _portmap portmap 3783 4* internet dgram udp *:111 _portmap portmap 3783 5* internet dgram udp 127.0.0.1:111 _portmap portmap 3783 6* internet stream tcp 0x479d000 *:111 _portmap portmap 3783 7* internet stream tcp 0x479d190 127.0.0.1:111 _syslogd syslogd 29186 4* internet dgram udp *:514 _dhcp dhclient 25722 8* internet raw ip 0x39a5000 $
This is on OpenBSD. If fstat(1) doesn't exist, then try lsof(1) On 2007 Apr 09 (Mon) at 20:28:57 +0530 (+0530), Siju George wrote: :Hi, : :How Do you actually Identify what process is listening on a TCP/IP port? :"nmap" does not usually give the right answer. :There should be some command that can be run on the local host for :identification right? : :Thankyou so much : :kind Regards : :Siju -- "Never underestimate the power of a small tactical nuclear weapon." _______________________________________________ Openbsd-newbies mailing list [email protected] http://mailman.theapt.org/listinfo/openbsd-newbies
