Terminal command:

Netstat nalp | 8011 | grep wc – l # to check 8011 port on the number of client connection

Ulimit -n 102400 # Change the maximum number of files in the current process

 

Introduction to the

The Netstat command is used to display various network-related information, such as network connections, routing tables, interface states, Masquerade connections, and Multicast Memberships.

Description of the output

After the netstat command is executed, the output is

Active Internetconnections (w/o servers) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 2 210.34.6.89: Telnet 210.34.6.96:2873 ESTABLISHED TCP 296 0 210.34.6.89:1165 210.34.6.84:netbios-ssn ESTABLISHED TCP 0 0 localhost.localdom:9001localhost.localdom:1162 ESTABLISHED tcp 0 0 localhost.localdom:1162localhost.localdom:9001 ESTABLISHED TCP 0 80 210.34.6.89:1161 210.34.6.10: Netbios-SSN CLOSE Active UNIX Domain Sockets (W/O Servers) Proto RefCnt Flags Type State I-Node Path unix 1 [ ] STREAM CONNECTED 16178@000000dd unix 1 [ ] STREAM CONNECTED 16176@000000dc unix 9 [ ] DGRAM 5292 /dev/log unix 1 [ ] STREAM CONNECTED 16182@000000df

Taken as a whole, the netstat output can be divided into two parts:

One is Active Internet Connections, called Active TCP connections, where “recv-q” and “send-q” refer to %0A for receiving and sending queues. These numbers should always be 0. If not, it indicates that the software package is piled up in the queue. This can only be seen in very rare cases.

The other is Active UNIX Domain Sockets, called Active UNIX Domain Sockets (the same as network sockets, but only for native communication, with twice the performance). Types indicates the type of the socket. State indicates the current status of the socket. Path indicates the pathname used by other processes connected to the socket.

Common parameters

-T (TCP) Displays only TCP-related options. -u (udp) Displays only UDP-related options. -n Rejects aliases and converts all numbers that can be displayed to numbers. -l Lists only the status of the services that are listening

-r Displays routing information. -e displays extended information, such as uid. -s Collects statistics by protocol.

Note: The LISTEN and LISTENING states can only be seen with -a or -l

 

Utility command example


1. List all ports (listening and unlistening)

Example List all ports netstat -a

# netstat -a |more Active Internet connections (servers andestablished) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 localhost:30037 *:* LISTEN udp 0 0 *:bootpc *:* Active UNIX domain sockets (servers and established) Proto RefCnt Flags Type State I-Node Path unix 2 [ACC ] STREAM LISTENING 6135 /tmp/.X11-unix/X0 unix 2 [ACC ] STREAM LISTENING 5140 /var/run/acpid.socket

List all TCP ports netstat -at

# netstat -at

Active Internet connections (servers andestablished)

Proto Recv-Q Send-Q Local Address           Foreign Address         State

tcp        0      0 localhost:30037         *:*                     LISTEN

tcp        0      0 localhost:ipp           *:*                     LISTEN

tcp        0      0 *:smtp                  *:*                     LISTEN

tcp6       0      0 localhost:ipp           [::]:*                  LISTEN

Example List all UDP ports netstat-au

# netstat -au

Active Internet connections (servers andestablished)

Proto Recv-Q Send-Q Local Address           Foreign Address         State

udp        0      0 *:bootpc                *:*

udp        0      0 *:49119                *:*

udp        0      0 *:mdns                  *:*


2. List all listening Sockets

Only the listening port netstat -l is displayed

# netstat -l

Active Internet connections (onlyservers)

Proto Recv-Q Send-Q Local Address           Foreign Address         State

tcp        0      0 localhost:ipp           *:*                     LISTEN

tcp6       0      0 localhost:ipp           [::]:*                  LISTEN

udp        0      0 *:49119                 *:*

Only all listening TCP ports netstat -lt are listed

# netstat -lt

Active Internet connections (onlyservers)

Proto Recv-Q Send-Q Local Address           Foreign Address         State

tcp        0      0 localhost:30037         *:*                     LISTEN

tcp        0      0 *:smtp                  *:*                     LISTEN

tcp6       0      0 localhost:ipp           [::]:*                  LISTEN

Only all udp port netstat-Lu listening is listed

# netstat -lu

Active Internet connections (onlyservers)

Proto Recv-Q Send-Q Local Address           Foreign Address         State

udp        0      0 *:49119                *:*

udp        0      0 *:mdns                  *:*

Only all listening UNIX ports, netstat -lx, are listed

# netstat -lx

Active UNIX domain sockets (onlyservers)

Proto RefCnt Flags       Type       State         I-Node   Path

unix 2      [ACC ]     STREAM     LISTENING     6294     private/maildrop

unix 2      [ACC ]     STREAM     LISTENING     6203     public/cleanup

unix 2      [ACC ]     STREAM     LISTENING     6302     private/ifmail

unix 2      [ACC ]     STREAM     LISTENING     6306     private/bsmtp

 

3. Display the statistics of each protocol

Netstat -s Displays the statistics of all ports

# netstat -s

Ip:

11150 totalpackets received

1 withinvalid addresses

0forwarded

0incoming packets discarded

11149incoming packets delivered

11635requests sent out

Icmp:

0 ICMPmessages received

0 inputICMP message failed.

Tcp:

582active connections openings

2failed connection attempts

25connection resets received

Udp:

1183packets received

4packets to unknown port received.

…..

Display TCP or UDP port statistics netstat -st or -su

# netstat -st

# netstat -su


4. In the netstat output, PID and the process name netstat -p are displayed

Netstat -p can be used together with other switches to add PID/ process name to the netstat output. In this way, you can easily find the programs running on a specific port during debugging.

# netstat -pt

Active Internet connections (w/oservers)

Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name

tcp        1      0 ramesh-laptop.loc:47212 192.168.185.75:www        CLOSE_WAIT  2109/firefox

tcp        0      0 ramesh-laptop.loc:52750 lax:www ESTABLISHED 2109/firefox

5. Do not display the host, port, or user name in netstat output.

Use netstat -n when you do not want the host, port, and username to be displayed. Numbers will be used instead of those names.

The output can also be accelerated because no comparison queries are required.

# netstat -an

If you just don’t want one of these three names to be displayed, use the following command

# netsat -a–numeric-ports

# netsat -a –numeric-hosts

# netsat -a –numeric-users


6. Continuously output Netstat information

Netstat will output network information every second.

# netstat -c Active Internet connections (w/oservers) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 Ama: WWW ESTABLISHED TCP 11 Ramesh-laptop. Loc :52564 101.11.169.230: WWW CLOSING TCP 0 0 ramesh-laptop. Loc :43758 server-101-101-43-2: WWW ESTABLISHED TCP 1 1 Ramesh-laptop. Loc :42367 101.101.34.101: WWW CLOSING ^C


7. Display unsupported Address Families

netstat –verbose

At the end of the output, there is the following information

netstat: nosupport for `AF IPX’ on this system.

netstat: no support for `AF AX25′ on this system.

netstat: no support for `AF X25′ on this system.

netstat: no support for `AF NETROM’ on this system.


8. Display the core route information netstat -r

# netstat -r

Kernel IP routing table

Destination     Gateway         Genmask         Flags  MSS Window  irtt Iface

192.168.1.0     *               255.255.255.0   U         0 0          0 eth2

link-local      *               255.255.0.0     U         0 0          0 eth2

default         192.168.1.1     0.0.0.0         UG        0 0          0 eth2

Note: Use netstat -rn to display the number format and do not query the host name.


9. Find the port on which the program is running

Not all processes can be found. If you do not have permission, you will not be displayed. Use root to view all information.

1 0 # netstat – ap | grep SSH TCP dev – db: SSH 101.174.100.22: CLOSE_WAIT – TCP 1 0 dev – 39213 db: SSH 101.174.100.22:57643 CLOSE_WAIT –

Finds the process running on the specified port

# netstat -an |grep ‘:80’


10. The network interface list is displayed

# netstat -i Kernel Interface table Iface MTU Met RX-OK RX-ERR RX-DRPRX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg eth0 1500 0 0 0 0 0 0 0 0 0 BMU eth2 1500 0 26196 0 0 0 26883 6 0 0 BMRU lo 16436 0 4 0 0 0 4 0 0 0 LRU

Display details such as ifconfig using netstat -ie:

# netstat -ie Kernel Interface table eth0 Link encap:Ethernet HWaddr 00:10:40:11:11:11 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0errors:0 dropped:0overruns:0 frame:0 TX packets:0errors:0 dropped:0overruns:0 carrier:0 Collisions: 0 txqueuelen: RX 1000 bytes: 0 (0.0 B) TX bytes: 0 (0.0 B) Memory: f6ae0000 – f6b00000


11. IP and TCP analysis

View the IP addresses that connect to a service port most frequently

Wss8848 @ ubuntu: ~ $netstat – NAT | grep “192.168.1.15:22” | awk ‘{print $5}’ | awk – F: ‘{print $1}’ | sort | uniq -c | sort – nr | head 18-20 221.136.168.36 3 154.74.45.242 78.173.31.236 62.183.207.98 2 2 2 192.168.1.14 2 182.48.111.215 2 124.193.219.34 2 119.145.41.2 2 114.255.41.30 1 75.102.11.99

TCP status list

wss8848@ubuntu:~$netstat -nat |awk ‘{print $6}’

established)

Foreign

LISTEN

TIME_WAIT

ESTABLISHED

TIME_WAIT

SYN_SENT

First pull out all the states, then use uniQ-C statistics, and then sort.

wss8848@ubuntu:~$netstat -nat |awk ‘{print $6}’|sort|uniq -c

143 ESTABLISHED

1 FIN_WAIT1

1 Foreign

1 LAST_ACK

36 LISTEN

6 SYN_SENT

113 TIME_WAIT

1 established)

The final command is as follows:

netstat -nat |awk ‘{print $6}’|sort|uniq -c|sort -rn

Access. Log is analyzed to obtain the top 10 IP addresses

awk ‘{print $1}’ access.log |sort|uniq -c|sort -nr|head -10

 

Reference :blog.maxiang.net/10-netstat-…

www.ipcpu.com/2011/07/net…