All,
this is what I see (quite regular actually):
tcpdump:
17:12:39.282431 > piquet.barrett.com.au.40612 > acc8.mel.connect.com.au.33435: udp 10
[ttl 1]
17:12:39.412449 < acc8.mel.connect.com.au > piquet.barrett.com.au: icmp:
acc8.mel.connect.com.au udp port 33435 unreachable [tos 0xc0]
ngrep:
#
U 203.63.73.52:40614 -> 203.63.80.135:33435
....';....
#
I 203.63.80.135 -> 203.63.73.52 3:3
....E..&`.....(..?I4.?P.........
How can I figure out which processes generate this packages?
jhs
--
Take into account that great love and great achievements involve great risk.
| __, Jobst Schmalenbach, [EMAIL PROTECTED], Technical Director|
| _ _.--'-n_/ Barrett Consulting Group P/L & The Meditation Room P/L |
|-(_)------(_)= +61 3 9532 7677, POBox 277, Caulfield South, 3162, Australia|
--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug