netstat - Linux Command to Display Networking Information

In linux, one of great commands for finding out information about your network connections is "netstat". It provides you interface information, statistics, connections, and a lot of other really great information about your computer.

There are many intricate commands that you can use with this program, and I won't be discussing all of them. If you would like a full review of the program, check your man or info files for more information. Below I will discuss the basic and most commonly used commands with netstat.

netstat -i (interface)

This command will give you an overview of networking on your PC. It will give you your local loopback (lo) and any network cards in your PC. This information is useful, so later you can specify a specific network interface card (NIC) that you wish to gain information on.

netstat

Using netstat alone, will give you some pretty good quick information. It gives you a list of active connections, the protocol that it is using, local and foreign address and the state of the connection. More often than not, you will not just use netstat by itself, most people add -a which gives you all listings, including ports that are actively listening.

netstat -s (statistics)

The statistics command gives you a load of great information about the data passing through your computer. It's broken down in to several main categories, IP, ICMP, TCP, UDP, and TCPEXT. Basically this command gives you a quick summery of your total packets and different kinds of connections and activities. It will give you information on failed packets, malformed packets and much more.

netstat -ap (all and process information / pid)

This is really an excellent command for finding the bulk of the information you want in a hurry. The -a gives you a full listing of all listening and active connections, and the -p gives you the process information, process name, and the pid of the program. This of course helps you trouble shoot or kill a program should you require to do so. It's also a handy way to find and kill pids that you might deem questionable by yours users.

netstat -c (continuous listing of command)

This is a pretty basic feature of the netstat command, all it does is continuously outputs the netstat data you requested over and over, every second. This is a neat little way to monitor your connections if you have a feeling something sneaky might be going on. Just leave a prompt open and running this command if you are in xwindows. Keep in mind the constant refresh will use up some processor time though.

netstat -e (extended listing)

This gives you just that little bit more information about your connections and processes. There isn't a huge difference, the primary differences you will notice right off the bat are it shows the user running the command, and the inode of the program.

Ken Dennis http://kendennis-rss.homeip.net/

reliable maid service Highland Park ..
In The News:

Chrome extension spyware disguised as a free VPN service highlights security risks after it captured private browsing data from trusted sites.
New research shows how fatty acids in cooking oil can safely dissolve and recover silver from circuit boards without harmful chemicals or environmental damage.
The Fox News AI newsletter gives you information on the latest AI technology advancements, and about the challenges and opportunities AI presents now and for the future.
Anthropic investigates alarming AI abuse case where hacker automated entire cybercrime campaign using Claude, stealing sensitive data from defense and healthcare firms.
TikTok, Meta and YouTube restrict Charlie Kirk shooting videos with age gates and warnings while X faces criticism for allowing continued circulation.
Cybercriminals use fake troubleshooting websites to trick Mac users into running terminal commands that install Shamos malware through ClickFix tactics.
San Francisco startup Fable launches Showrunner, an AI platform dubbed the 'Netflix of AI' that generates animated episodes from text descriptions with Amazon support.
Apple raised iPhone prices for some models despite receiving tariff relief from President Donald Trump, with the new lineup starting at $799 for the base model.
A two-story 3D concrete printed home in Western Australia demonstrates faster construction methods that could reshape American housing amid rising costs.
Credit scores remain important during retirement for insurance rates and housing applications, while seniors become prime targets for identity theft and financial scams.
Scammers now send unexpected packages with QR codes that redirect victims to fraudulent websites or download malicious software to steal sensitive information.
Meeting AI tools record private conversations alongside work discussions, creating privacy risks that can be managed with proper settings and awareness.
Hotel privacy concerns are valid but rare, with methods to detect hidden tech using smartphone flashlights, mirror tests and scanning apps.
Improve your Wi-Fi speed and reliability with 10 simple router optimization tips that don't require special apps or expensive subscriptions.
A Columbia University breach exposed names, Social Security numbers and academic records of nearly 869,000 people, with notifications beginning in August.
Rental car drivers use AI-powered apps like Proofr to protect themselves from unfair damage fees as major companies deploy automated inspection tools.
Fox News' AI newsletter brings you the latest on technology advancements around artificial intelligence.
OnTrac data breach between April 13-15, 2025, exposed personal information of over 40,000 people including Social Security numbers and medical records.
A woman named Wika announces her engagement to an AI chatbot sparking worldwide debate about virtual relationships and technology.
The notorious people search site National Public Data relaunches despite a previous breach affecting 3 billion individuals, raising fresh privacy concerns.
Revolutionary TRAUMAGEL gel controls life-threatening bleeding from gunshot wounds and traumatic injuries, helping first responders prevent prehospital deaths.
Protect your home network by enabling proper encryption, creating strong passwords, checking connected devices and using VPN and antivirus software.
The Navy's solar-powered Skydweller drone flew nonstop for 73 hours in Mississippi, proving renewable energy can power long-endurance military missions.
Moving and downsizing expose seniors to identity theft and scams as data brokers collect real estate records and personal information to sell to criminals.
ShengShu's Vidar technology revolutionizes humanoid robot training by using AI-generated synthetic video, reducing required training data from hours to just 20 minutes.

Lotus Notes Domino and Microsoft CRM Integration

Well, even if the combination might look very unusual, we... Read More

Backing Up And Restoring Your MySQL Database

If you've been using MySQL database to store your important... Read More

Think Of This

Think of this, first we had the HAM Radio, then... Read More

The Hidden Power of Online Manual

Writing software manuals is boring, isn't it? We often think:... Read More

How Do I Get Rid Of That Darn Spyware?

Ad-Aware and Spybot are probably the two most well known... Read More

Microsoft Great Plains Implementation in Russia ? Overview for Consultant

Microsoft Business Solutions Great Plains is very popular ERP platform... Read More

Know-how in Microsoft Publisher

For those who still don't know, Microsoft Publisher helps computer... Read More

10 Ways to Learn a Software

Following tips help you to learn a software in lesser... Read More

Microsoft Great Plains Integration Manager ? Working With Text File

Microsoft Business Solutions main middle market ERP application - Microsoft... Read More

Open Source Concepts: Dual Licensing Explained

We were recently faced with a decision: either to let... Read More

Will Adobe Manage to Replace Industry Work Horse Quark Express by Giving Adobe InDesign for Free?

Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More

10 Programming Tips

(1) Avoid using the same variable again and again for... Read More

Manufacturing Outsourcing: Microsoft Great Plains Implementation, Customization & Reporting

Manufacturing in the USA is far away down from mid... Read More

The Religion And Philosophy Of Small Internet Business

I have always had a tendency to focus on the... Read More

Great Plains Bill of Materials Setup & Customization for Process Manufacturing ? Overview

Microsoft Great Plains has full-featured Manufacturing suite of modules: Capacity... Read More

Microsoft Great Plains: carpet, textile, fabric, felt distributor ? implementation overview

In this small article we will show you the possible... Read More

Free Preventive Maintenance Software

While several preventive maintenance software manufacturers offer free trials for... Read More

Things You Can Do With Windows XP!

Did you ever give a thought to the number of... Read More

Linux for Home Users

Hey Guys! Don't raise your eyebrows or fear by hearing... Read More

Microsoft Great Plains, Navision, Axapta ? Selection Considerations

During the years of our consulting practice, which comes back... Read More

Looking for an Alternative to Microsoft Office? You Should Be!

Now is the time to look at an alternative to... Read More

Passwords Used In Microsoft Word Documents

You would like to protect your documents, wouldn't you? Reasons... Read More

Benefits of Integrating Online Chat Software with CRM

Customer Relationship Management (CRM) is a strategy and processes used... Read More

Defining OLAP Solutions and Data Warehouse design

This tutorial covers OLAP solutions used by Data warehouses and... Read More

What is Spyware? Are You Being Watched?

Find out why Spyware Removal from computers is important and... Read More

house cleaning company Lincolnshire ..