- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Tracing Spurious Network Traffic
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-07-2008 07:15 AM
тАО04-07-2008 07:15 AM
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-07-2008 07:26 AM
тАО04-07-2008 07:26 AM
SolutionAny Unix or Linux server on the network can run the command tcpdump.
That sniffs the network.
First run tcpdump to see if you can find the source system of the traffic.
tcpdump host sprotterlt
That tcpdump command takes a look at all traffic from a host, in this case my laptop at work.
You may narrow it down to a particular port which will give you something to look at.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-07-2008 04:55 PM
тАО04-07-2008 04:55 PM
Re: Tracing Spurious Network Traffic
Identifying the process will be easier once you see what type of message (and port) is being used.
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-08-2008 04:01 AM
тАО04-08-2008 04:01 AM
Re: Tracing Spurious Network Traffic
http://www.openpacket.org
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-18-2008 02:58 AM
тАО04-18-2008 02:58 AM
Re: Tracing Spurious Network Traffic
10:43:07.119806 IP (tos 0x0, ttl 64, id 21165, offset 0, flags [DF], proto TCP (6), length 40) s900503.ad03.local.856 > 10.178.20.22.printer: R, cksum 0x84fb (incorrect (-> 0x2b88), 164048493:164048493(0) win 49640
Killing this off however, has proved to be more problematic. First off we couldn't identify the queue in question. By process of elimination we think we have removed all the defunct/misconfigured queues on the system, but even after cleaning out the queues and restarting the print services, there is still a process polling this bogus ip intermittantly. Considering a reboot. This turned out to be a Solaris10 box BTW. Anyway - thanks for the help.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-19-2008 03:32 AM
тАО04-19-2008 03:32 AM
Re: Tracing Spurious Network Traffic
man snoop
snoop - capture and inspect network packets
snoop prints all packets that are sent through a network interface.
Example: snoop -d eri0 host oraprd1 monitors all traffic on network port "eri0" that is exchanged with host "oraprd1".
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-05-2008 12:42 AM
тАО06-05-2008 12:42 AM