How can I find out which processes are using or listening on which network interfaces?How to kill processes using a network interfaceHow do I fix Debian that refuses to connect to the internet in VirtualBox?Detecting which application is using which network interfaceWhen are interfaces names? (Scripts under /etc/sysconfig/network-scripts)Two LXC containers using two different physical network interfacesHow can I change the priority of network interfaces?Why are some network interfaces named eth1 or wlan0 while others are named wlp4s0?rx_drops_no_pbuf drops on Emulex Corporation OneConnect 10Gb NICWhich programs configure the network based on the settings in /etc/network/interfaces?Can you assign different DNS servers to different network interfaces?

Can I Retrieve Email Addresses from BCC?

How can I replace every global instance of "x[2]" with "x_2"

Trouble understanding overseas colleagues

Hide Select Output from T-SQL

What is the intuitive meaning of having a linear relationship between the logs of two variables?

Where in the Bible does the greeting ("Dominus Vobiscum") used at Mass come from?

How do I rename a LINUX host without needing to reboot for the rename to take effect?

What would happen if the UK refused to take part in EU Parliamentary elections?

How do we know the LHC results are robust?

Is there a problem with hiding "forgot password" until it's needed?

Why Were Madagascar and New Zealand Discovered So Late?

Can somebody explain Brexit in a few child-proof sentences?

What does this 7 mean above the f flat

Understanding "audieritis" in Psalm 94

Why are on-board computers allowed to change controls without notifying the pilots?

Is it correct to write "is not focus on"?

Coordinate position not precise

Is there any reason not to eat food that's been dropped on the surface of the moon?

Why does John Bercow say “unlock” after reading out the results of a vote?

Why did Kant, Hegel, and Adorno leave some words and phrases in the Greek alphabet?

Increase performance creating Mandelbrot set in python

Was Spock the First Vulcan in Starfleet?

Failed to fetch jessie backports repository

Is this Spell Mimic feat balanced?



How can I find out which processes are using or listening on which network interfaces?


How to kill processes using a network interfaceHow do I fix Debian that refuses to connect to the internet in VirtualBox?Detecting which application is using which network interfaceWhen are interfaces names? (Scripts under /etc/sysconfig/network-scripts)Two LXC containers using two different physical network interfacesHow can I change the priority of network interfaces?Why are some network interfaces named eth1 or wlan0 while others are named wlp4s0?rx_drops_no_pbuf drops on Emulex Corporation OneConnect 10Gb NICWhich programs configure the network based on the settings in /etc/network/interfaces?Can you assign different DNS servers to different network interfaces?













0















ifconfig lists several network interfaces, some of which are virtual ones.



How can I find out which processes are using or listening on which network interfaces? Thanks.



$ ifconfig
docker0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
inet 172.17.0.1 netmask 255.255.0.0 broadcast 172.17.255.255
ether 02:42:a6:79:a6:bc txqueuelen 0 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

enp0s25: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
ether txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
device interrupt 20 memory 0xfc400000-fc420000

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 3102389 bytes 174723039 (174.7 MB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 3102389 bytes 174723039 (174.7 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

virbr0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.122.1 netmask 255.255.255.0 broadcast 192.168.122.255
ether 52:54:00:b1:aa:1f txqueuelen 1000 (Ethernet)
RX packets 708 bytes 68468 (68.4 KB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 316 bytes 51806 (51.8 KB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

vnet0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet6 fe80::fc54:ff:fe99:5eee prefixlen 64 scopeid 0x20<link>
ether fe:54:00:99:5e:ee txqueuelen 1000 (Ethernet)
RX packets 257 bytes 28494 (28.4 KB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 23514 bytes 1240204 (1.2 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

wlx8: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.97 netmask 255.255.255.0 broadcast 192.168.1.255
inet6 prefixlen 64 scopeid 0x20<link>
ether 80:1f:02:b5:c3:89 txqueuelen 1000 (Ethernet)
RX packets 1269625 bytes 1045069752 (1.0 GB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 646600 bytes 101897054 (101.8 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0









share|improve this question






















  • Network Interface? They're listening on addresses, or say holding an opened socket, if on POSIX system.

    – 炸鱼薯条德里克
    yesterday















0















ifconfig lists several network interfaces, some of which are virtual ones.



How can I find out which processes are using or listening on which network interfaces? Thanks.



$ ifconfig
docker0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
inet 172.17.0.1 netmask 255.255.0.0 broadcast 172.17.255.255
ether 02:42:a6:79:a6:bc txqueuelen 0 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

enp0s25: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
ether txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
device interrupt 20 memory 0xfc400000-fc420000

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 3102389 bytes 174723039 (174.7 MB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 3102389 bytes 174723039 (174.7 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

virbr0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.122.1 netmask 255.255.255.0 broadcast 192.168.122.255
ether 52:54:00:b1:aa:1f txqueuelen 1000 (Ethernet)
RX packets 708 bytes 68468 (68.4 KB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 316 bytes 51806 (51.8 KB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

vnet0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet6 fe80::fc54:ff:fe99:5eee prefixlen 64 scopeid 0x20<link>
ether fe:54:00:99:5e:ee txqueuelen 1000 (Ethernet)
RX packets 257 bytes 28494 (28.4 KB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 23514 bytes 1240204 (1.2 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

wlx8: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.97 netmask 255.255.255.0 broadcast 192.168.1.255
inet6 prefixlen 64 scopeid 0x20<link>
ether 80:1f:02:b5:c3:89 txqueuelen 1000 (Ethernet)
RX packets 1269625 bytes 1045069752 (1.0 GB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 646600 bytes 101897054 (101.8 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0









share|improve this question






















  • Network Interface? They're listening on addresses, or say holding an opened socket, if on POSIX system.

    – 炸鱼薯条德里克
    yesterday













0












0








0








ifconfig lists several network interfaces, some of which are virtual ones.



How can I find out which processes are using or listening on which network interfaces? Thanks.



$ ifconfig
docker0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
inet 172.17.0.1 netmask 255.255.0.0 broadcast 172.17.255.255
ether 02:42:a6:79:a6:bc txqueuelen 0 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

enp0s25: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
ether txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
device interrupt 20 memory 0xfc400000-fc420000

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 3102389 bytes 174723039 (174.7 MB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 3102389 bytes 174723039 (174.7 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

virbr0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.122.1 netmask 255.255.255.0 broadcast 192.168.122.255
ether 52:54:00:b1:aa:1f txqueuelen 1000 (Ethernet)
RX packets 708 bytes 68468 (68.4 KB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 316 bytes 51806 (51.8 KB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

vnet0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet6 fe80::fc54:ff:fe99:5eee prefixlen 64 scopeid 0x20<link>
ether fe:54:00:99:5e:ee txqueuelen 1000 (Ethernet)
RX packets 257 bytes 28494 (28.4 KB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 23514 bytes 1240204 (1.2 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

wlx8: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.97 netmask 255.255.255.0 broadcast 192.168.1.255
inet6 prefixlen 64 scopeid 0x20<link>
ether 80:1f:02:b5:c3:89 txqueuelen 1000 (Ethernet)
RX packets 1269625 bytes 1045069752 (1.0 GB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 646600 bytes 101897054 (101.8 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0









share|improve this question














ifconfig lists several network interfaces, some of which are virtual ones.



How can I find out which processes are using or listening on which network interfaces? Thanks.



$ ifconfig
docker0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
inet 172.17.0.1 netmask 255.255.0.0 broadcast 172.17.255.255
ether 02:42:a6:79:a6:bc txqueuelen 0 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

enp0s25: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
ether txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
device interrupt 20 memory 0xfc400000-fc420000

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 3102389 bytes 174723039 (174.7 MB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 3102389 bytes 174723039 (174.7 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

virbr0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.122.1 netmask 255.255.255.0 broadcast 192.168.122.255
ether 52:54:00:b1:aa:1f txqueuelen 1000 (Ethernet)
RX packets 708 bytes 68468 (68.4 KB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 316 bytes 51806 (51.8 KB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

vnet0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet6 fe80::fc54:ff:fe99:5eee prefixlen 64 scopeid 0x20<link>
ether fe:54:00:99:5e:ee txqueuelen 1000 (Ethernet)
RX packets 257 bytes 28494 (28.4 KB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 23514 bytes 1240204 (1.2 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

wlx8: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.1.97 netmask 255.255.255.0 broadcast 192.168.1.255
inet6 prefixlen 64 scopeid 0x20<link>
ether 80:1f:02:b5:c3:89 txqueuelen 1000 (Ethernet)
RX packets 1269625 bytes 1045069752 (1.0 GB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 646600 bytes 101897054 (101.8 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0






network-interface socket






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked yesterday









TimTim

28.1k78269490




28.1k78269490












  • Network Interface? They're listening on addresses, or say holding an opened socket, if on POSIX system.

    – 炸鱼薯条德里克
    yesterday

















  • Network Interface? They're listening on addresses, or say holding an opened socket, if on POSIX system.

    – 炸鱼薯条德里克
    yesterday
















Network Interface? They're listening on addresses, or say holding an opened socket, if on POSIX system.

– 炸鱼薯条德里克
yesterday





Network Interface? They're listening on addresses, or say holding an opened socket, if on POSIX system.

– 炸鱼薯条德里克
yesterday










1 Answer
1






active

oldest

votes


















1














ss -plnt will list processes listening numerically on tcp ports and will show you the IP and port bound to, as well as relevant PIDs and file descriptors:



$ sudo ss -plnt | grep -E ':(22|8384)[^0-9]'
LISTEN 0 128 192.168.42.2:8384 0.0.0.0:* users:(("syncthing",pid=14565,fd=8))
LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=6099,fd=3))
LISTEN 0 128 [::]:22 [::]:* users:(("sshd",pid=6099,fd=4))


Compare the same from the older netstat -plnt:



$ sudo netstat -plnt | grep -E ':(22|8384)[^0-9]'
tcp 0 0 192.168.42.2:8384 0.0.0.0:* LISTEN 14565/syncthing
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 6099/sshd
tcp6 0 0 :::22 :::* LISTEN 6099/sshd


Shown are the secure shell daemon (listening on all interfaces), and my local install of SyncThing (which has its management interface is bound explicitly to one network address).






share|improve this answer

























  • Strange ss -plnt did not show ssh for me, but netstat does.

    – Luciano Andress Martini
    yesterday












  • Try looking for the numerical port: ss -plnt | grep ':22'.

    – DopeGhoti
    yesterday











  • netstat looks better! Is it being deprecated? ( I always used it, never heared about ss replacing it, I thinked it is just an alternative, seems that every alternative in Linux are replacing the old ones )

    – Luciano Andress Martini
    yesterday












  • I prefer netstat as well, though admittedly largely due to familiarity from long usage. As to the why of it? That is beyond my pay-grade.

    – DopeGhoti
    yesterday










Your Answer








StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "106"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f508545%2fhow-can-i-find-out-which-processes-are-using-or-listening-on-which-network-inter%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









1














ss -plnt will list processes listening numerically on tcp ports and will show you the IP and port bound to, as well as relevant PIDs and file descriptors:



$ sudo ss -plnt | grep -E ':(22|8384)[^0-9]'
LISTEN 0 128 192.168.42.2:8384 0.0.0.0:* users:(("syncthing",pid=14565,fd=8))
LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=6099,fd=3))
LISTEN 0 128 [::]:22 [::]:* users:(("sshd",pid=6099,fd=4))


Compare the same from the older netstat -plnt:



$ sudo netstat -plnt | grep -E ':(22|8384)[^0-9]'
tcp 0 0 192.168.42.2:8384 0.0.0.0:* LISTEN 14565/syncthing
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 6099/sshd
tcp6 0 0 :::22 :::* LISTEN 6099/sshd


Shown are the secure shell daemon (listening on all interfaces), and my local install of SyncThing (which has its management interface is bound explicitly to one network address).






share|improve this answer

























  • Strange ss -plnt did not show ssh for me, but netstat does.

    – Luciano Andress Martini
    yesterday












  • Try looking for the numerical port: ss -plnt | grep ':22'.

    – DopeGhoti
    yesterday











  • netstat looks better! Is it being deprecated? ( I always used it, never heared about ss replacing it, I thinked it is just an alternative, seems that every alternative in Linux are replacing the old ones )

    – Luciano Andress Martini
    yesterday












  • I prefer netstat as well, though admittedly largely due to familiarity from long usage. As to the why of it? That is beyond my pay-grade.

    – DopeGhoti
    yesterday















1














ss -plnt will list processes listening numerically on tcp ports and will show you the IP and port bound to, as well as relevant PIDs and file descriptors:



$ sudo ss -plnt | grep -E ':(22|8384)[^0-9]'
LISTEN 0 128 192.168.42.2:8384 0.0.0.0:* users:(("syncthing",pid=14565,fd=8))
LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=6099,fd=3))
LISTEN 0 128 [::]:22 [::]:* users:(("sshd",pid=6099,fd=4))


Compare the same from the older netstat -plnt:



$ sudo netstat -plnt | grep -E ':(22|8384)[^0-9]'
tcp 0 0 192.168.42.2:8384 0.0.0.0:* LISTEN 14565/syncthing
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 6099/sshd
tcp6 0 0 :::22 :::* LISTEN 6099/sshd


Shown are the secure shell daemon (listening on all interfaces), and my local install of SyncThing (which has its management interface is bound explicitly to one network address).






share|improve this answer

























  • Strange ss -plnt did not show ssh for me, but netstat does.

    – Luciano Andress Martini
    yesterday












  • Try looking for the numerical port: ss -plnt | grep ':22'.

    – DopeGhoti
    yesterday











  • netstat looks better! Is it being deprecated? ( I always used it, never heared about ss replacing it, I thinked it is just an alternative, seems that every alternative in Linux are replacing the old ones )

    – Luciano Andress Martini
    yesterday












  • I prefer netstat as well, though admittedly largely due to familiarity from long usage. As to the why of it? That is beyond my pay-grade.

    – DopeGhoti
    yesterday













1












1








1







ss -plnt will list processes listening numerically on tcp ports and will show you the IP and port bound to, as well as relevant PIDs and file descriptors:



$ sudo ss -plnt | grep -E ':(22|8384)[^0-9]'
LISTEN 0 128 192.168.42.2:8384 0.0.0.0:* users:(("syncthing",pid=14565,fd=8))
LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=6099,fd=3))
LISTEN 0 128 [::]:22 [::]:* users:(("sshd",pid=6099,fd=4))


Compare the same from the older netstat -plnt:



$ sudo netstat -plnt | grep -E ':(22|8384)[^0-9]'
tcp 0 0 192.168.42.2:8384 0.0.0.0:* LISTEN 14565/syncthing
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 6099/sshd
tcp6 0 0 :::22 :::* LISTEN 6099/sshd


Shown are the secure shell daemon (listening on all interfaces), and my local install of SyncThing (which has its management interface is bound explicitly to one network address).






share|improve this answer















ss -plnt will list processes listening numerically on tcp ports and will show you the IP and port bound to, as well as relevant PIDs and file descriptors:



$ sudo ss -plnt | grep -E ':(22|8384)[^0-9]'
LISTEN 0 128 192.168.42.2:8384 0.0.0.0:* users:(("syncthing",pid=14565,fd=8))
LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:(("sshd",pid=6099,fd=3))
LISTEN 0 128 [::]:22 [::]:* users:(("sshd",pid=6099,fd=4))


Compare the same from the older netstat -plnt:



$ sudo netstat -plnt | grep -E ':(22|8384)[^0-9]'
tcp 0 0 192.168.42.2:8384 0.0.0.0:* LISTEN 14565/syncthing
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 6099/sshd
tcp6 0 0 :::22 :::* LISTEN 6099/sshd


Shown are the secure shell daemon (listening on all interfaces), and my local install of SyncThing (which has its management interface is bound explicitly to one network address).







share|improve this answer














share|improve this answer



share|improve this answer








edited yesterday

























answered yesterday









DopeGhotiDopeGhoti

46.6k56190




46.6k56190












  • Strange ss -plnt did not show ssh for me, but netstat does.

    – Luciano Andress Martini
    yesterday












  • Try looking for the numerical port: ss -plnt | grep ':22'.

    – DopeGhoti
    yesterday











  • netstat looks better! Is it being deprecated? ( I always used it, never heared about ss replacing it, I thinked it is just an alternative, seems that every alternative in Linux are replacing the old ones )

    – Luciano Andress Martini
    yesterday












  • I prefer netstat as well, though admittedly largely due to familiarity from long usage. As to the why of it? That is beyond my pay-grade.

    – DopeGhoti
    yesterday

















  • Strange ss -plnt did not show ssh for me, but netstat does.

    – Luciano Andress Martini
    yesterday












  • Try looking for the numerical port: ss -plnt | grep ':22'.

    – DopeGhoti
    yesterday











  • netstat looks better! Is it being deprecated? ( I always used it, never heared about ss replacing it, I thinked it is just an alternative, seems that every alternative in Linux are replacing the old ones )

    – Luciano Andress Martini
    yesterday












  • I prefer netstat as well, though admittedly largely due to familiarity from long usage. As to the why of it? That is beyond my pay-grade.

    – DopeGhoti
    yesterday
















Strange ss -plnt did not show ssh for me, but netstat does.

– Luciano Andress Martini
yesterday






Strange ss -plnt did not show ssh for me, but netstat does.

– Luciano Andress Martini
yesterday














Try looking for the numerical port: ss -plnt | grep ':22'.

– DopeGhoti
yesterday





Try looking for the numerical port: ss -plnt | grep ':22'.

– DopeGhoti
yesterday













netstat looks better! Is it being deprecated? ( I always used it, never heared about ss replacing it, I thinked it is just an alternative, seems that every alternative in Linux are replacing the old ones )

– Luciano Andress Martini
yesterday






netstat looks better! Is it being deprecated? ( I always used it, never heared about ss replacing it, I thinked it is just an alternative, seems that every alternative in Linux are replacing the old ones )

– Luciano Andress Martini
yesterday














I prefer netstat as well, though admittedly largely due to familiarity from long usage. As to the why of it? That is beyond my pay-grade.

– DopeGhoti
yesterday





I prefer netstat as well, though admittedly largely due to familiarity from long usage. As to the why of it? That is beyond my pay-grade.

– DopeGhoti
yesterday

















draft saved

draft discarded
















































Thanks for contributing an answer to Unix & Linux Stack Exchange!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f508545%2fhow-can-i-find-out-which-processes-are-using-or-listening-on-which-network-inter%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

getting Checkpoint VPN SSL Network Extender working in the command lineHow to connect to CheckPoint VPN on Ubuntu 18.04LTS?Will the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayVPN SSL Network Extender in FirefoxLinux Checkpoint SNX tool configuration issuesCheck Point - Connect under Linux - snx + OTPSNX VPN Ububuntu 18.XXUsing Checkpoint VPN SSL Network Extender CLI with certificateVPN with network manager (nm-applet) is not workingWill the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayImport VPN config files to NetworkManager from command lineTrouble connecting to VPN using network-manager, while command line worksStart a VPN connection with PPTP protocol on command linestarting a docker service daemon breaks the vpn networkCan't connect to vpn with Network-managerVPN SSL Network Extender in FirefoxUsing Checkpoint VPN SSL Network Extender CLI with certificate

Cannot Extend partition with GParted The 2019 Stack Overflow Developer Survey Results Are In Announcing the arrival of Valued Associate #679: Cesar Manara Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern) 2019 Community Moderator Election ResultsCan't increase partition size with GParted?GParted doesn't recognize the unallocated space after my current partitionWhat is the best way to add unallocated space located before to Ubuntu 12.04 partition with GParted live?I can't figure out how to extend my Arch home partition into free spaceGparted Linux Mint 18.1 issueTrying to extend but swap partition is showing as Unknown in Gparted, shows proper from fdiskRearrange partitions in gparted to extend a partitionUnable to extend partition even though unallocated space is next to it using GPartedAllocate free space to root partitiongparted: how to merge unallocated space with a partition

Marilyn Monroe Ny fiainany manokana | Jereo koa | Meny fitetezanafanitarana azy.