1 The following is an example of connections. As inbound TCP connections are
2 established their details are printed out. This includes the UID, PID and
3 CMD of the server process that is listening on that port,
6 UID PID CMD TYPE PORT IP_SOURCE
7 0 242 inetd tcp 79 192.168.1.1
8 0 359 sshd tcp 22 192.168.1.1
9 100 1532 Xorg tcp 6000 192.168.1.1
13 In another window snoop was running for comparison,
15 # snoop 'tcp[13:1] = 0x02'
16 Using device /dev/rtls0 (promiscuous mode)
17 mars -> jupiter FINGER C port=56760
18 mars -> jupiter TCP D=22 S=56761 Syn Seq=3264782212 Len=0 ...
19 mars -> jupiter XWIN C port=56763
21 snoop can already tell me that these connections are happening - but does not
22 print out details of the server that accepted the connection.