Created
October 2, 2020 20:02
-
-
Save RusseII/03b352e4bfe42a702b293b8f74e9d221 to your computer and use it in GitHub Desktop.
netstat
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
netstat: sysctl: net.inet.ip.input_perf_data: No such file or directory | |
tcp: | |
0 packet sent | |
0 data packet (0 byte) | |
0 data packet (0 byte) retransmitted | |
0 resend initiated by MTU discovery | |
0 ack-only packet (0 delayed) | |
0 URG only packet | |
0 window probe packet | |
0 window update packet | |
0 control packet | |
0 data packet sent after flow control | |
0 challenge ACK sent due to unexpected SYN | |
0 challenge ACK sent due to unexpected RST | |
0 checksummed in software | |
0 segment (0 byte) over IPv4 | |
0 segment (0 byte) over IPv6 | |
0 packet received | |
0 ack (for 0 byte) | |
0 duplicate ack | |
0 ack for unsent data | |
0 packet (0 byte) received in-sequence | |
0 completely duplicate packet (0 byte) | |
0 old duplicate packet | |
0 received packet dropped due to low memory | |
0 packet with some dup. data (0 byte duped) | |
0 out-of-order packet (0 byte) | |
0 packet (0 byte) of data after window | |
0 window probe | |
0 window update packet | |
0 packet recovered after loss | |
0 packet received after close | |
0 bad reset | |
0 discarded for bad checksum | |
0 checksummed in software | |
0 segment (0 byte) over IPv4 | |
0 segment (0 byte) over IPv6 | |
0 discarded for bad header offset field | |
0 discarded because packet too short | |
0 connection request | |
0 connection accept | |
0 bad connection attempt | |
0 listen queue overflow | |
0 connection established (including accepts) | |
0 connection closed (including 0 drop) | |
0 connection updated cached RTT on close | |
0 connection updated cached RTT variance on close | |
0 connection updated cached ssthresh on close | |
0 connection initialized RTT from route cache | |
0 connection initialized RTT variance from route cache | |
0 connection initialized ssthresh from route cache | |
0 embryonic connection dropped | |
0 segment updated rtt (of 0 attempt) | |
0 retransmit timeout | |
0 connection dropped by rexmit timeout | |
0 connection dropped after retransmitting FIN | |
0 unnecessary packet retransmissions | |
0 persist timeout | |
0 connection dropped by persist timeout | |
0 keepalive timeout | |
0 keepalive probe sent | |
0 connection dropped by keepalive | |
0 correct ACK header prediction | |
0 correct data packet header prediction | |
0 SACK recovery episode | |
0 segment rexmit in SACK recovery episodes | |
0 byte rexmit in SACK recovery episodes | |
0 SACK option (SACK blocks) received | |
0 SACK option (SACK blocks) sent | |
0 SACK scoreboard overflow | |
0 LRO coalesced packet | |
0 time LRO flow table was full | |
0 collision in LRO flow table | |
0 time LRO coalesced 2 packets | |
0 time LRO coalesced 3 or 4 packets | |
0 time LRO coalesced 5 or more packets | |
0 limited transmit done | |
0 early retransmit done | |
0 time cumulative ack advanced along with SACK | |
0 probe timeout | |
0 time retransmit timeout triggered after probe | |
0 time probe packets were sent for an interface | |
0 time couldn't send probe packets for an interface | |
0 time fast recovery after tail loss | |
0 time recovered last packet | |
0 SACK based rescue retransmit | |
0 client connection attempted to negotiate ECN | |
0 client connection successfully negotiated ECN | |
0 time graceful fallback to Non-ECN connection | |
0 time lost ECN negotiating SYN, followed by retransmission | |
0 server connection attempted to negotiate ECN | |
0 server connection successfully negotiated ECN | |
0 time lost ECN negotiating SYN-ACK, followed by retransmission | |
0 time received congestion experienced (CE) notification | |
0 time CWR was sent in response to ECE | |
0 time sent ECE notification | |
0 connection received CE atleast once | |
0 connection received ECE atleast once | |
0 connection using ECN have seen packet loss but no CE | |
0 connection using ECN have seen packet loss and CE | |
0 connection using ECN received CE but no packet loss | |
0 connection fell back to non-ECN due to SYN-loss | |
0 connection fell back to non-ECN due to reordering | |
0 connection fell back to non-ECN due to excessive CE-markings | |
0 connection fell back caused by connection drop due to RST | |
0 connection fell back due to drop after multiple retransmits | |
0 connection fell back due to RST after SYN | |
0 time packet reordering was detected on a connection | |
0 time transmitted packets were reordered | |
0 time fast recovery was delayed to handle reordering | |
0 time retransmission was avoided by delaying recovery | |
0 retransmission not needed | |
0 retransmission due to tail loss | |
0 time DSACK option was sent | |
0 time DSACK option was received | |
0 time DSACK was disabled on a connection | |
0 time recovered from bad retransmission using DSACK | |
0 time ignored DSACK due to ack loss | |
0 time ignored old DSACK options | |
0 time PMTU Blackhole detection, size reverted | |
0 connection were dropped after long sleep | |
0 connection had stretch ack algorithm disabled | |
0 time a TFO-cookie has been announced | |
0 SYN with data and a valid TFO-cookie have been received | |
0 SYN with TFO-cookie-request received | |
0 time an invalid TFO-cookie has been received | |
0 time we requested a TFO-cookie | |
0 time the peer announced a TFO-cookie | |
0 time we combined SYN with data and a TFO-cookie | |
0 time our SYN with data has been acknowledged | |
0 time a connection-attempt with TFO fell back to regular TCP | |
0 time a TFO-connection blackhole'd | |
0 time a TFO-cookie we sent was wrong | |
0 time did not received a TFO-cookie we asked for | |
0 time TFO got disabled due to heuristicsn | |
0 time TFO got blackholed in the sending direction | |
0 time maximum segment size was changed to default | |
0 time maximum segment size was changed to medium | |
0 time maximum segment size was changed to low | |
0 timer drift less or equal to 1 ms | |
0 timer drift less or equal to 10 ms | |
0 timer drift less or equal to 20 ms | |
0 timer drift less or equal to 50 ms | |
0 timer drift less or equal to 100 ms | |
0 timer drift less or equal to 200 ms | |
0 timer drift less or equal to 500 ms | |
0 timer drift less or equal to 1000 ms | |
0 timer drift greater than to 1000 ms | |
udp: | |
849854 datagrams received | |
0 with incomplete header | |
0 with bad data length field | |
0 with bad checksum | |
13 with no checksum | |
848682 checksummed in software | |
847753 datagrams (461665838 bytes) over IPv4 | |
929 datagrams (204647 bytes) over IPv6 | |
1019 dropped due to no socket | |
1494 broadcast/multicast datagrams undelivered | |
0 time multicast source filter matched | |
0 dropped due to full socket buffers | |
0 not for hashed pcb | |
847341 delivered | |
1049177 datagrams output | |
1046943 checksummed in software | |
1046107 datagrams (561651300 bytes) over IPv4 | |
836 datagrams (133637 bytes) over IPv6 | |
icmp: | |
2211 calls to icmp_error | |
0 error not generated 'cuz old message was icmp | |
Output histogram: | |
echo reply: 1 | |
destination unreachable: 2209 | |
0 message with bad code fields | |
0 message < minimum length | |
0 bad checksum | |
0 message with bad length | |
0 multicast echo requests ignored | |
0 multicast timestamp requests ignored | |
Input histogram: | |
echo reply: 101 | |
destination unreachable: 1804 | |
echo: 1 | |
time exceeded: 25 | |
1 message response generated | |
ICMP address mask responses are disabled | |
igmp: | |
0 message received | |
0 message received with too few bytes | |
0 message received with wrong TTL | |
0 message received with bad checksum | |
0 V1/V2 membership queries received | |
0 V3 membership queries received | |
0 membership queries received with invalid field(s) | |
0 general queries received | |
0 group queries received | |
0 group-source queries received | |
0 group-source queries dropped | |
0 membership report received | |
0 membership report received with invalid field(s) | |
0 membership report received for groups to which we belong | |
0 V3 report received without Router Alert | |
2 membership reports sent | |
ipsec: | |
0 inbound packet processed successfully | |
0 inbound packet violated process security policy | |
0 inbound packet with no SA available | |
0 invalid inbound packet | |
0 inbound packet failed due to insufficient memory | |
0 inbound packet failed getting SPI | |
0 inbound packet failed on AH replay check | |
0 inbound packet failed on ESP replay check | |
0 inbound packet considered authentic | |
0 inbound packet failed on authentication | |
0 outbound packet processed successfully | |
0 outbound packet violated process security policy | |
0 outbound packet with no SA available | |
0 invalid outbound packet | |
0 outbound packet failed due to insufficient memory | |
0 outbound packet with no route | |
arp: | |
15 broadast ARP requests sent | |
0 unicast ARP request sent | |
678 ARP replies sent | |
0 ARP announcement sent | |
963 ARP requests received | |
202 ARP replies received | |
1165 total ARP packets received | |
0 ARP conflict probe sent | |
0 invalid ARP resolve request | |
0 total packet dropped due to lack of memory | |
0 total packet held awaiting ARP reply | |
1 total packet dropped due to no ARP entry | |
6 total packets dropped during ARP entry removal | |
8 ARP entries timed out | |
0 Duplicate IP seen | |
mptcp: | |
0 data packet sent | |
0 data byte sent | |
0 data packet received | |
0 data byte received | |
0 packet with an invalid MPCAP option | |
0 packet with an invalid MPJOIN option | |
0 time primary subflow fell back to TCP | |
0 time secondary subflow fell back to TCP | |
0 DSS option drop | |
0 other invalid MPTCP option | |
0 time the MPTCP subflow window was reduced | |
0 bad DSS checksum | |
0 time received out of order data | |
0 subflow switch | |
0 subflow switch due to advisory | |
0 subflow switch due to rtt | |
0 subflow switch due to rto | |
0 subflow switch due to peer | |
0 number of subflow probe | |
ip6: | |
52014 total packets received | |
0 with size smaller than minimum | |
0 with data size < data length | |
4 with data size > data length | |
0 packet forced to software checksum | |
0 with bad options | |
0 with incorrect version number | |
0 fragment received | |
0 dropped (dup or out of space) | |
0 dropped after timeout | |
0 exceeded limit | |
0 reassembled ok | |
0 atomic fragments received | |
51228 packets for this host | |
0 packet forwarded | |
0 packet not forwardable | |
0 redirect sent | |
0 multicast packet which we don't join | |
0 packet whose headers are not continuous | |
0 tunneling packet that can't find gif | |
0 packet discarded due to too may headers | |
0 forward cache hit | |
0 forward cache miss | |
0 packet dropped due to no bufs for control data | |
0 input packet dropped due to too short length | |
0 input packet dropped due to missing CLAT46 IPv6 address | |
0 input packet dropped due to missing CLAT46 IPv4 address | |
0 input packet dropped due to CLAT46 IPv4 address derivation failure | |
0 input packet dropped due to CLAT46 IP header translation failure | |
0 input packet dropped due to CLAT46 protocol translation failure | |
0 input packet dropped due to CLAT46 fragment translation failure | |
0 input packet dropped due to invalid pbuf | |
0 input IPv4 packet dropped on CLAT46 enabled interface | |
0 input packet dropped due to CLAT46 failures | |
0 input packet successfully translated from IPv6 to IPv4 | |
47033 packets sent from this host | |
0 packet sent with fabricated ip header | |
0 output packet dropped due to no bufs, etc. | |
12321 output packets discarded due to no route | |
0 output datagram fragmented | |
0 fragment created | |
0 datagram that can't be fragmented | |
0 packet that violated scope rules | |
0 packet dropped due to NECP policy | |
0 output packet dropped due to missing CLAT46 IPv6 address | |
0 output packet dropped due to CLAT46 IPv6 address synthesis failure | |
0 output packet dropped due to CLAT46 IP header translation failure | |
0 output packet dropped due to CLAT46 protocol translation failure | |
0 output packet dropped due to CLAT46 fragment translation failure | |
0 output packet dropped due to invalid pbuf | |
0 output packet dropped due to CLAT46 failures | |
0 output packet successfully translated from IPv4 to IPv6 | |
Input histogram: | |
TCP: 49877 | |
UDP: 1351 | |
ICMP6: 786 | |
Mbuf statistics: | |
394 one mbuf | |
two or more mbuf: | |
lo0= 422 | |
51198 one ext mbuf | |
0 two or more ext mbuf | |
0 failure of source address selection | |
source addresses on an outgoing I/F | |
0 addresses scope=0 | |
0 node-local | |
0 link-local | |
0 addresses scope=3 | |
0 addresses scope=4 | |
0 site-local | |
0 addresses scope=6 | |
0 addresses scope=7 | |
0 addresses scope=8 | |
0 addresses scope=9 | |
0 addresses scope=a | |
0 addresses scope=b | |
0 addresses scope=c | |
0 addresses scope=d | |
0 global | |
0 addresses scope=f | |
source addresses on a non-outgoing I/F | |
0 addresses scope=0 | |
0 node-local | |
0 link-local | |
0 addresses scope=3 | |
0 addresses scope=4 | |
0 site-local | |
0 addresses scope=6 | |
0 addresses scope=7 | |
0 addresses scope=8 | |
0 addresses scope=9 | |
0 addresses scope=a | |
0 addresses scope=b | |
0 addresses scope=c | |
0 addresses scope=d | |
0 global | |
0 addresses scope=f | |
source addresses of same scope | |
0 addresses scope=0 | |
0 node-local | |
0 link-local | |
0 addresses scope=3 | |
0 addresses scope=4 | |
0 site-local | |
0 addresses scope=6 | |
0 addresses scope=7 | |
0 addresses scope=8 | |
0 addresses scope=9 | |
0 addresses scope=a | |
0 addresses scope=b | |
0 addresses scope=c | |
0 addresses scope=d | |
0 global | |
0 addresses scope=f | |
source addresses of a different scope | |
0 addresses scope=0 | |
0 node-local | |
0 link-local | |
0 addresses scope=3 | |
0 addresses scope=4 | |
0 site-local | |
0 addresses scope=6 | |
0 addresses scope=7 | |
0 addresses scope=8 | |
0 addresses scope=9 | |
0 addresses scope=a | |
0 addresses scope=b | |
0 addresses scope=c | |
0 addresses scope=d | |
0 global | |
0 addresses scope=f | |
deprecated source addresses | |
0 addresses scope=0 | |
0 node-local | |
0 link-local | |
0 addresses scope=3 | |
0 addresses scope=4 | |
0 site-local | |
0 addresses scope=6 | |
0 addresses scope=7 | |
0 addresses scope=8 | |
0 addresses scope=9 | |
0 addresses scope=a | |
0 addresses scope=b | |
0 addresses scope=c | |
0 addresses scope=d | |
0 global | |
0 addresses scope=f | |
source address selection | |
20255 rules default | |
0 rule prefer same address | |
0 rule prefer appropriate scope | |
0 rule avoid deprecated addresses | |
0 rule prefer home addresses | |
0 rule prefer outgoing interface | |
6 rules prefer matching label | |
0 rule prefer temporary addresses | |
0 rule prefer addresses on alive interfaces | |
0 rule use longest matching prefix | |
0 duplicate address detection collision | |
0 duplicate address detection NS loop | |
0 time ignored source on secondary expensive I/F | |
icmp6: | |
1 call to icmp_error | |
0 error not generated because old message was icmp error or so | |
0 error not generated because rate limitation | |
Output histogram: | |
unreach: 1 | |
router solicitation: 6 | |
neighbor solicitation: 397 | |
neighbor advertisement: 389 | |
MLDv2 listener report: 16 | |
0 message with bad code fields | |
0 message < minimum length | |
0 bad checksum | |
0 message with bad length | |
Input histogram: | |
unreach: 1 | |
neighbor solicitation: 389 | |
neighbor advertisement: 396 | |
Histogram of error messages to be generated: | |
0 no route | |
0 administratively prohibited | |
0 beyond scope | |
0 address unreachable | |
1 port unreachable | |
0 packet too big | |
0 time exceed transit | |
0 time exceed reassembly | |
0 erroneous header field | |
0 unrecognized next header | |
0 unrecognized option | |
0 redirect | |
0 unknown | |
0 message response generated | |
0 message with too many ND options | |
0 message with bad ND options | |
0 bad neighbor solicitation message | |
0 bad neighbor advertisement message | |
0 bad router solicitation message | |
0 bad router advertisement message | |
0 bad redirect message | |
0 path MTU change | |
0 dropped fragmented NDP message | |
ipsec6: | |
0 inbound packet processed successfully | |
0 inbound packet violated process security policy | |
0 inbound packet with no SA available | |
0 invalid inbound packet | |
0 inbound packet failed due to insufficient memory | |
0 inbound packet failed getting SPI | |
0 inbound packet failed on AH replay check | |
0 inbound packet failed on ESP replay check | |
0 inbound packet considered authentic | |
0 inbound packet failed on authentication | |
0 outbound packet processed successfully | |
0 outbound packet violated process security policy | |
0 outbound packet with no SA available | |
0 invalid outbound packet | |
0 outbound packet failed due to insufficient memory | |
0 outbound packet with no route | |
rip6: | |
0 message received | |
0 checksum calculation on inbound | |
0 message with bad checksum | |
0 message dropped due to no socket | |
0 multicast message dropped due to no socket | |
0 message dropped due to full socket buffers | |
0 delivered | |
0 datagram output | |
pfkey: | |
2 requests sent to userland | |
32 bytes sent to userland | |
histogram by message type: | |
dump: 1 | |
x_spddump: 1 | |
0 message with invalid length field | |
0 message with invalid version field | |
0 message with invalid message type field | |
0 message too short | |
0 message with memory allocation failure | |
0 message with duplicate extension | |
0 message with invalid extension type | |
0 message with invalid sa type | |
0 message with invalid address extension | |
2 requests sent from userland | |
32 bytes sent from userland | |
histogram by message type: | |
dump: 1 | |
x_spddump: 1 | |
0 message toward single socket | |
0 message toward all sockets | |
0 message toward registered sockets | |
0 message with memory allocation failure | |
kevt: | |
24 current kernel control sockets | |
4990 kernel control generation count | |
0 bad vendor failure | |
1657 message too big failures | |
0 out of memory failure | |
0 message dropped due to full socket buffers | |
87196 messages posted | |
kctl: | |
0 total kernel control module registered | |
15 current kernel control modules registered | |
57 current kernel control sockets | |
168 kernel control generation count | |
105 connection attempts | |
0 connection failure | |
0 send failure | |
0 send list failure | |
0 enqueue failure | |
0 packet dropped due to full socket buffers | |
0 failure with bad kern_ctl_ref | |
0 register failure because of too many kern_ctl_ref | |
0 enqueuedata failure because could not allocate a packet | |
0 enqueuedata failure due to full socket buffers | |
xbkidle: | |
1 max per process | |
600 maximum time (seconds) | |
131072 high water mark | |
0 socket option not supported failure | |
0 too many sockets failure | |
0 total socket requested OK | |
0 extended bk idle socket | |
0 no cellular failure | |
0 no time failures | |
0 forced defunct socket | |
0 resumed socket | |
0 timeout expired failure | |
0 timer rescheduled | |
0 no delegated failure | |
net_api: | |
4 interface filters currently attached | |
4 interface filters attached since boot | |
4 interface filters attached since boot by OS | |
0 IP filter currently attached | |
0 IP filter attached since boot | |
0 IP filter attached since boot by OS | |
4 socket filters currently attached | |
4 socket filters attached since boot | |
4 socket filters attached since boot by OS | |
206983 sockets allocated since boot | |
12 sockets allocated in-kernel since boot | |
12 sockets allocated in-kernel by OS | |
1289 sockets with NECP client UUID since boot | |
21611 local domain sockets allocated since boot | |
99 route domain sockets allocated since boot | |
123381 inet domain sockets allocated since boot | |
54514 inet6 domain sockets allocated since boot | |
2617 system domain sockets allocated since boot | |
0 multipath domain socket allocated since boot | |
2 key domain sockets allocated since boot | |
0 ndrv domain socket allocated since boot | |
0 other domains socket allocated since boot | |
104917 IPv4 stream sockets created since boot | |
18464 IPv4 datagram sockets created since boot | |
1770 IPv4 datagram sockets connected | |
14750 IPv4 DNS sockets | |
14707 IPv4 datagram sockets without data | |
19162 IPv6 stream sockets created since boot | |
35352 IPv6 datagram sockets created since boot | |
12250 IPv6 datagram sockets connected | |
0 IPv6 DNS socket | |
35321 IPv6 datagram sockets without data | |
25 socket multicast joins since boot | |
25 socket multicast joins since boot by OS | |
0 IPv4 stream nexus flow added since boot | |
0 IPv4 datagram nexus flow added since boot | |
0 IPv6 stream nexus flow added since boot | |
0 IPv6 datagram nexus flow added since boot | |
19 interfaces currently allocated | |
24 interfaces allocated since boot | |
19 interfaces currently allocated by OS | |
24 extended interfaces allocated since boot by OS | |
227 PF addrule operations since boot | |
0 PF addrule operation since boot by OS | |
0 vmnet start since boot |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment