Home Operation and Maintenance Linux Operation and Maintenance How to check port occupancy in Linux

How to check port occupancy in Linux

Mar 13, 2019 pm 01:40 PM
Port occupied

Linux methods to check port occupancy include: lsof -i method is used to check the occupancy of a certain port; netstat -tunlp|grep method is used to check the process status of the specified port number

We are here When deploying projects, we often encounter the problem of port occupancy, which causes our project to not proceed normally. We need to stop the process that occupies the port before starting a new service to use this port. So how to check the port occupancy in Linux? Well, I will give you a detailed introduction in the article. I hope it will be helpful to you

How to check port occupancy in Linux

[Recommended courses: Linux tutorial

The methods to check the port occupancy are:

Method 1: lsof -i:port number

Method 2: netstat -tunlp|grep port number

##lsof -i:port number

lsof -i is used to display processes that meet the conditions. lsof (list open files) is a tool that lists open files in the current system. Use the root user to execute the lsof -i command

lsof -i: The port number is used to check the occupancy of a certain port, such as checking the usage of port 8000, lsof -i:8000

# lsof -i:8000COMMAND   PID USER   FD   TYPE  DEVICE SIZE/OFF NODE NAME
lwfs    22065 root    6u  IPv4 4395053      0t0  TCP *:irdmi (LISTEN)

pass From the above we can see that port 8000 has been occupied by the lightweight file system forwarding service lwfs

netstat -tunlp|grep port number

netstat -tunlp is mainly used for display Tcp, udp ports and processes and other related information.

netstat -tunlp|grep port is generally used to check the process status of the specified port number. For example, to check the status of port 8000, we can use the following command to check the

netstat -tunlp |grep 8000
# netstat -tunlp 
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address               Foreign Address             State       PID/Program name   
tcp        0      0 0.0.0.0:111                 0.0.0.0:*                   LISTEN      4814/rpcbind        
tcp        0      0 0.0.0.0:5908                0.0.0.0:*                   LISTEN      25492/qemu-kvm      
tcp        0      0 0.0.0.0:6996                0.0.0.0:*                   LISTEN      22065/lwfs          
tcp        0      0 192.168.122.1:53            0.0.0.0:*                   LISTEN      38296/dnsmasq       
tcp        0      0 0.0.0.0:22                  0.0.0.0:*                   LISTEN      5278/sshd           
tcp        0      0 127.0.0.1:631               0.0.0.0:*                   LISTEN      5013/cupsd          
tcp        0      0 127.0.0.1:25                0.0.0.0:*                   LISTEN      5962/master         
tcp        0      0 0.0.0.0:8666                0.0.0.0:*                   LISTEN      44868/lwfs          
tcp        0      0 0.0.0.0:8000                0.0.0.0:*                   LISTEN      22065/lwfs

parameters. Meaning

-T (TCP) indicates that only the options related to TCP are displayed

u ((UDP) indicate only UDP-related options

-n means rejecting Display aliases, all numbers that can be displayed are converted into numbers

-l means only the service status listed in Listen (listening)

-p means display the name of the program that establishes the relevant link

Summary: The above is the entire content of this article. I hope this article can help everyone learn to check Linux port occupancy.

The above is the detailed content of How to check port occupancy in Linux. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

PHP Tutorial
1509
276
How to use the `shutdown` command How to use the `shutdown` command Jul 15, 2025 am 12:26 AM

The shutdown command of Linux/macOS can be shut down, restarted, and timed operations through parameters. 1. Turn off the machine immediately and use sudoshutdownnow or -h/-P parameters; 2. Use the time or specific time point for the shutdown, cancel the use of -c; 3. Use the -r parameters to restart, support timed restart; 4. Pay attention to the need for sudo permissions, be cautious in remote operation, and avoid data loss.

How to configure NTP server How to configure NTP server Jul 15, 2025 am 12:17 AM

The steps to configure an NTP server include installing services, modifying configuration files, checking synchronization status, and setting up a firewall. 1. Install NTP service: Use sudoapt on Ubuntu/Debian, use sudoyum to install on CentOS/RHEL, start and enable the service after installation; 2. Modify the configuration file /etc/ntp.conf: Add trusted upstream servers such as serverntp.aliyun.comiburst and servertime.windows.comiburst, and set allow access to network segments such as restrict192.168.1.0mask255.255.255.0nomod

How to check active network connections How to check active network connections Jul 22, 2025 am 12:35 AM

If you want to know the network connection on your current computer, you can view it through the command line tool; use netstat-ano on Windows to view all connections and PIDs, use ss-tulnp and lsof-i-P to obtain detailed information, and can also be monitored in real time through graphical interface tools such as resource monitor, nethogs, etc.

How to create LVM volume group How to create LVM volume group Jul 21, 2025 am 12:55 AM

To create an LVM volume group, you must first prepare a physical volume (PV) and then create a VG. 1. Use pvcreate to initialize the hard disk or partition into PV, such as pvcreate/dev/sdb1; 2. Use the vgcreate command to combine one or more PVs into VG, such as vgcreatemy_volume_group/dev/sdb1/dev/sdc1; 3. You can customize the PE size through the -s parameter and use vgdisplay to view information; 4. You can dynamically expand VG in the future and add a new PV using vgextend; 5. Before deleting VG, you must confirm that there is no LV and delete it with vgremove.

How to configure NFS server How to configure NFS server Jul 17, 2025 am 12:53 AM

The steps to configure an NFS server are as follows: 1. Install the nfs-utils or nfs-kernel-server package; 2. Start and enable nfs-server and related RPC services; 3. Edit /etc/exports to configure shared directories and permissions, such as rw, ro, sync, etc.; 4. Execute exportfs-a and open the firewall port; 5. The client uses the mount command to mount or configure fstab to achieve automatic mount; Common problems include permission control, ID mapping, RPC service not being started and configuration not being refreshed, and needs to be checked in conjunction with logs.

How to trace network path using traceroute How to trace network path using traceroute Aug 02, 2025 am 12:23 AM

When you encounter a problem with slow network connection, traceroute can help you locate the bottleneck. It is a command line tool that displays the path through which the data packets pass from your computer to the target server by sending probe packets and recording the response time of each step. How to use it is tracertexample.com under Windows and tracerouteexample.com under macOS/Linux/Unix. In the output result, each line represents an intermediate node, including the number of hops, three round trip times and the corresponding IP or host name; if all hops are *, it may be firewall blocking or network failure. Check the jump with delay burst to determine the location of the problem; combined with multiple domain name tests, you can distinguish between general

How to encrypt files on Linux How to encrypt files on Linux Jul 16, 2025 am 12:11 AM

Encrypted files on Linux can be implemented in many ways, the key is to choose the right tool. 1. Use GPG to quickly encrypt a single file, support symmetric and asymmetric encryption, suitable for temporary protection of files; 2. eCryptfs is suitable for encrypting the entire directory, and automatically encrypted by mounting encrypted folders, suitable for protecting user private data; 3. Create an encrypted container, combining dd, lostup and cryptsetup tools to create an encrypted space similar to TrueCrypt, suitable for storing sensitive information for a long time. Each method is suitable for different scenarios. When using it, you should pay attention to saving passwords and keys to avoid data loss.

What tools are used for Linux monitoring What tools are used for Linux monitoring Jul 21, 2025 am 12:08 AM

Linux monitoring involves a variety of tools, system performance monitoring tools include top/htop real-time viewing of resource usage, vmstat displays virtual memory status, iostat detects disk IO bottlenecks, and sar records historical performance data. The log monitoring tool includes journalctl filtering service logs, dmesg debugging kernel issues, logrotate management log life cycle, and rsyslog/syslog-ng centralized forwarding logs. In terms of network monitoring, SS/NNSTAT checks the connection status, NMap scans open ports, TCPDump captures traffic analysis, and iftop monitors bandwidth usage. Remote monitoring solutions such as Nagios implement deep custom alarms, Zab

See all articles