Experimente netstat
com argumentos adicionais:
sudo netstat -wtpeav
O sudo
está lá para garantir que você o execute como root, caso contrário, ele não mostrará tudo.
As opções são:
-w, --raw
Show raw sockets.
-t, --tcp
Show TCP protocol sockets.
-p, --program
Show the PID and name of the program to which each socket
belongs.
-e, --extend
Display additional information. Use this option twice for
maximum detail.
-a, --all
Show both listening and non-listening sockets. With the
--interfaces option, show interfaces that are not up
--verbose , -v
Tell the user what is going on by being verbose. Especially
print some useful informa‐ tion about unconfigured address
families.
Além disso, as colunas no final de /proc/net/tcp
estão documentadas na árvore de fontes do kernel em Documentação / rede / proc_net_tcp.txt . Os campos finais são:
1000 0 54165785 4 cd1e6040 25 4 27 3 -1
| | | | | | | | | |--> slow start size threshold,
| | | | | | | | | or -1 if the threshold
| | | | | | | | | is >= 0xFFFF
| | | | | | | | |----> sending congestion window
| | | | | | | |-------> (ack.quick<<1)|ack.pingpong
| | | | | | |---------> Predicted tick of soft clock
| | | | | | (delayed ACK control data)
| | | | | |------------> retransmit timeout
| | | | |------------------> location of socket in memory
| | | |-----------------------> socket reference count
| | |-----------------------------> inode
| |----------------------------------> unanswered 0-window probes
|---------------------------------------------> uid