tcpsnoop 1m "$Date:: 2007-10-04 #$" "USER COMMANDS"
NAME
tcpsnoop - snoop TCP network packets by process. Uses DTrace.
SYNOPSIS
tcpsnoop [-a|hjsvZ] [-n name] [-p pid]
DESCRIPTION
This analyses TCP network packets and prints the responsible PID and UID,
plus standard details such as IP address and port. This captures traffic
of newly created TCP connections that were established while this program
was running. It can help identify which processes is causing TCP traffic.
Since this uses DTrace, only the root user or users with the
dtrace_kernel privilege can run this command.
OS
Solaris 10 3/05
STABILITY
unstable - this script uses fbt provider probes which may change for
future updates of the OS, invalidating this script. Please read
Docs/Notes/ALLfbt_notes.txt for further details about these fbt scripts.
OPTIONS
-a print all data
-j print project ID
-s print time, us
-v print time, string
-Z print zone ID
-n name command name to snoop
-p PID process ID to snoop
EXAMPLES
Default output, snoop TCP network packets with details, # tcpsnoop
Print human readable timestamps, # tcpsnoop -v
Print zonename, # tcpsnoop -Z
Print sshd traffic only, # tcpsnoop -n sshd
FIELDS
UID user ID
PID process ID
CMD command name
LADDR local IP address
RADDR remote IP address
LPORT local port number
RPORT remote port number
DR direction
SIZE packet size, bytes
TIME timestamp, us
STRTIME human readable timestamp, string
ZONE zone ID
PROJ project ID
DOCUMENTATION
See the DTraceToolkit for further documentation under the
Docs directory. The DTraceToolkit docs may include full worked
examples with verbose descriptions explaining the output.
EXIT
tcpsnoop will print traffic until Ctrl-C is hit.
AUTHOR
Brendan Gregg
[Sydney, Australia]
SEE ALSO
tcptop(1M), dtrace(1M)