Re: netstat output

2009-09-22 Thread Tom H
Israel Garcia > wrote: >> server:~# netstat -tulp >> Active Internet connections (only servers) >> Proto Recv-Q Send-Q Local Address Foreign Address State >> PID/Program name >> tcp 0 0 *:mysql *:* LISTEN >> 14399/mysqld >> tcp 0 0 s

Re: netstat output

2009-09-20 Thread Javier Barroso
On Sat, Sep 19, 2009 at 3:50 AM, Israel Garcia wrote: > netstat output: > > server:~# netstat  -tulp > Active Internet connections (only servers) > Proto Recv-Q Send-Q Local Address           Foreign Address > State       PID/Program name > tcp        0      0 *:mysql        

netstat output

2009-09-18 Thread Israel Garcia
netstat output: server:~# netstat -tulp Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp0 0 *:mysql *:* LISTEN 14399/mysqld tcp0 0 server.domain.:www

Re: netstat output evidence of a cracker?

2007-11-12 Thread Osamu Aoki
Hi, On Sun, Nov 11, 2007 at 06:34:12AM -0600, Hugo Vanwoerkom wrote: > John Hasler wrote: >> Robert Hodgins writes: >>> Gibosn's site scans the first 1056 ports. >> >> By default. It will scan them all if you tell it to. > > That's a good hint! > I get: > You are from Oaxaca De Juárez, 20, in th

Re: netstat output evidence of a cracker?

2007-11-11 Thread Christian Jaeger
Adam Hardy wrote: One routine check that I do on my webserver to check it's OK is netstat, and this time it looks like I was under attack from some muppet out there via what seems to be a brute force attempt to crack my ssh login. (We're all seeing this all the time.) Trying to understand th

Re: netstat output evidence of a cracker?

2007-11-11 Thread John Hasler
Hugo writes: > You are from Oaxaca De Juárez, 20, in the MX, with an ip of > xxx.xx.xxx.xxx Do I care that that is public info? If you do you better get off the Net. He's guessing the location from the IP, which is in every packet you send. -- John Hasler

Re: netstat output evidence of a cracker?

2007-11-11 Thread Hugo Vanwoerkom
John Hasler wrote: Robert Hodgins writes: Gibosn's site scans the first 1056 ports. By default. It will scan them all if you tell it to. That's a good hint! I get: You are from Oaxaca De Juárez, 20, in the MX, with an ip of xxx.xx.xxx.xxx Do I care that that is public info? Hugo -- To UN

Re: netstat output evidence of a cracker?

2007-11-10 Thread John Hasler
Robert Hodgins writes: > Gibosn's site scans the first 1056 ports. By default. It will scan them all if you tell it to. -- John Hasler -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: netstat output evidence of a cracker?

2007-11-10 Thread Robert Hodgins
> That would be Steve Gibsons's site, that I've often used. > http://www.grc.com Gibosn's site scans the first 1056 ports. This site (http://www.auditmypc.com/firewall-test.asp) scans up to 65535. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact

Re: netstat output evidence of a cracker?

2007-11-10 Thread John Hasler
Nigel writes: > That would be Steve Gibsons's site, that I've often used. > http://www.grc.com That's a convenient way to run nmap remotely but don't pay attention to his advice about security. -- John Hasler -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Troub

Re: netstat output evidence of a cracker?

2007-11-10 Thread Nigel Henry
On Saturday 10 November 2007 22:40, Gabriel Parrondo wrote: > El sáb, 10-11-2007 a las 12:46 +, Adam Hardy escribió: > [...] > > > I can't see anything running on the server now that might be using those > > ports, but then if it's rootkitted, I wouldn't would I? Is there a > > website out ther

Re: netstat output evidence of a cracker?

2007-11-10 Thread Ralph Katz
On 11/10/2007 04:40 PM, Gabriel Parrondo wrote: > El sáb, 10-11-2007 a las 12:46 +, Adam Hardy escribió: > [...] >> I can't see anything running on the server now that might be using those >> ports, but then if it's rootkitted, I wouldn't would I? Is there a >> website out there that I can us

Re: netstat output evidence of a cracker?

2007-11-10 Thread Gabriel Parrondo
El sáb, 10-11-2007 a las 12:46 +, Adam Hardy escribió: [...] > > I can't see anything running on the server now that might be using those > ports, but then if it's rootkitted, I wouldn't would I? Is there a > website out there that I can use from outside my firewall which I can > get a good

Re: netstat output evidence of a cracker?

2007-11-10 Thread Mike Bird
On Saturday 10 November 2007 04:46, Adam Hardy wrote: > One routine check that I do on my webserver to check it's OK is netstat, > and this time it looks like I was under attack from some muppet out > there via what seems to be a brute force attempt to crack my ssh login. > > Trying to understand t

netstat output evidence of a cracker?

2007-11-10 Thread Adam Hardy
One routine check that I do on my webserver to check it's OK is netstat, and this time it looks like I was under attack from some muppet out there via what seems to be a brute force attempt to crack my ssh login. Trying to understand the info, what is the foreign address - is that the attacker

Re: netstat output

2005-12-22 Thread Roberto Sanchez
Adam Hardy wrote: Is this some brute force dictionary attack in progress on my webserver? The full foreign address is zns551-ga01a.us.yokogawa.com. Those nasty people in Yokogawa! Original Message Date: Thu, 22 Dec 2005 05:00:07 + (GMT) Active Internet connections (serve

netstat output

2005-12-22 Thread Adam Hardy
Is this some brute force dictionary attack in progress on my webserver? The full foreign address is zns551-ga01a.us.yokogawa.com. Those nasty people in Yokogawa! Original Message Date: Thu, 22 Dec 2005 05:00:07 + (GMT) Active Internet connections (servers and established)

Re: a question re "netstat" output

2000-05-07 Thread brian moore
On Sun, May 07, 2000 at 01:20:35AM -0700, Eric G . Miller wrote: > > Those would be the port numbers methinks. If I'm not mistaken, it'd be > typical to establish a connection to a web server on port 80, but the > data transfers would go over a high port. Otherwise you'd only be able > to have one

Re: a question re "netstat" output

2000-05-07 Thread Eric G . Miller
On Sun, May 07, 2000 at 01:06:42AM -0700, t s a d i wrote: > hello everyone ! > > when i do _~$ netstat_ on my web server, i get the ff: > > > bangus:~$ netstat > Active Internet connections (w/o servers) > Proto Recv-Q Send-Q Local Address Foreign Address > State > tcp

a question re "netstat" output

2000-05-07 Thread t s a d i
hello everyone ! when i do _~$ netstat_ on my web server, i get the ff: bangus:~$ netstat Active Internet connections (w/o servers) Proto Recv-Q Send-Q Local Address Foreign Address State tcp0 39595 bangus.myphilippine:www ME21-66.i-manila.c:1520 ESTABLISHED tcp

Re: understanding netstat output

1999-07-27 Thread Wayne Topa
Subject: understanding netstat output Date: Tue, Jul 27, 1999 at 01:14:02PM +0800 In reply to:Chad A. Adlawan Quoting Chad A. Adlawan([EMAIL PROTECTED]): > hello all, > > can someone please tell me what they all mean ? or maybe direct me to docs > that i could

Re: understanding netstat output

1999-07-27 Thread Carl Mummert
>Active UNIX domain sockets (w/o servers) >Proto RefCnt Flags Type State I-Node Path >unix 2 [ ] STREAM 824491 /tmp/.X11-unix/X0 >unix 2 [ ] STREAM CONNECTED 824490 >unix 2 [ ] STREAM 824228

Re: understanding netstat output

1999-07-27 Thread Andrei Ivanov
1054 > > can someone please tell me what they all mean ? or maybe direct me to docs > that i could read so that ill know what they are. > TIA, > Chad The list of streams you get in the netstat output is showing you what

understanding netstat output

1999-07-27 Thread Chad A. Adlawan
hello all, when i invoke netstat, i get the following : Active UNIX domain sockets (w/o servers) Proto RefCnt Flags Type State I-Node Path unix 2 [ ] STREAM 824491 /tmp/.X11-unix/X0 unix 2 [ ] STREAM CONNECTED 824490 unix