使用netstat -anp 查看正在监听该端口的程序的PID,然后使用ps命令根据该PID得到对应的程序
如:
[root@Admin root]# netstat -anp
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:32768 0.0.0.0:* LISTEN 2124/
tcp 0 0 127.0.0.1:32769 0.0.0.0:* LISTEN 2248/xinetd
tcp 0 0 127.0.0.1:8005 0.0.0.0:* LISTEN 2226/java
tcp 0 0 127.0.0.1:8009 0.0.0.0:* LISTEN 2226/java
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 2105/
tcp 0 0 192.168.0.16:80 0.0.0.0:* LISTEN 2226/java
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:32768 0.0.0.0:* LISTEN 2124/
tcp 0 0 127.0.0.1:32769 0.0.0.0:* LISTEN 2248/xinetd
tcp 0 0 127.0.0.1:8005 0.0.0.0:* LISTEN 2226/java
tcp 0 0 127.0.0.1:8009 0.0.0.0:* LISTEN 2226/java
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 2105/
tcp 0 0 192.168.0.16:80 0.0.0.0:* LISTEN 2226/java
得到监听80端口的程序的PID为2226
然后执行ps -ef |grep 2226
[root@Admin root]# ps -ef |grep 2226
root 2226 1 0 Apr11 ? 00:01:29 /home/admin/j2sdk1.4.0_01//bin/java -Djava.endorsed.dirs=/home/admin/jakarta-tomcat-4.1.18/bin:/home/admin/jakarta-tomcat-4.1.18/common/endorsed -classpath /home/admin/j2sdk1.4.0_01//lib/tools.jar:/home/admin/jakarta-tomcat-4.1.18/bin/bootstrap.jar -Dcatalina.base=/home/a
root 3615 3578 0 13:45 pts/1 00:00:00 grep 2226
root 2226 1 0 Apr11 ? 00:01:29 /home/admin/j2sdk1.4.0_01//bin/java -Djava.endorsed.dirs=/home/admin/jakarta-tomcat-4.1.18/bin:/home/admin/jakarta-tomcat-4.1.18/common/endorsed -classpath /home/admin/j2sdk1.4.0_01//lib/tools.jar:/home/admin/jakarta-tomcat-4.1.18/bin/bootstrap.jar -Dcatalina.base=/home/a
root 3615 3578 0 13:45 pts/1 00:00:00 grep 2226
从而确定该程序为 :/home/admin/jakarta-tomcat-4.1.18