1N/AThe following is an example of connections. As inbound TCP connections are
1N/Aestablished their details are printed out. This includes the UID, PID and
1N/ACMD of the server process that is listening on that port,
1N/A
1N/A # connections
1N/A UID PID CMD TYPE PORT IP_SOURCE
1N/A 0 242 inetd tcp 79 192.168.1.1
1N/A 0 359 sshd tcp 22 192.168.1.1
1N/A 100 1532 Xorg tcp 6000 192.168.1.1
1N/A ^C
1N/A
1N/A
1N/AIn another window snoop was running for comparison,
1N/A
1N/A # snoop 'tcp[13:1] = 0x02'
1N/A Using device /dev/rtls0 (promiscuous mode)
1N/A mars -> jupiter FINGER C port=56760
1N/A mars -> jupiter TCP D=22 S=56761 Syn Seq=3264782212 Len=0 ...
1N/A mars -> jupiter XWIN C port=56763
1N/A
1N/Asnoop can already tell me that these connections are happening - but does not
1N/Aprint out details of the server that accepted the connection.
1N/A