List open SSH tunnels
--------------------------------------------------
Rise to the top 3% as a developer or hire one of them at Toptal: https://topt.al/25cXVn
--------------------------------------------------
Music by Eric Matyas
https://www.soundimage.org
Track title: Hypnotic Puzzle3
--
Chapters
00:00 List Open Ssh Tunnels
00:48 Accepted Answer Score 118
01:38 Answer 2 Score 16
02:10 Answer 3 Score 29
02:20 Answer 4 Score 23
02:37 Thank you
--
Full question
https://superuser.com/questions/248389/l...
--
Content licensed under CC BY-SA
https://meta.stackexchange.com/help/lice...
--
Tags
#ssh #shell #sshtunnel
#avk47
Rise to the top 3% as a developer or hire one of them at Toptal: https://topt.al/25cXVn
--------------------------------------------------
Music by Eric Matyas
https://www.soundimage.org
Track title: Hypnotic Puzzle3
--
Chapters
00:00 List Open Ssh Tunnels
00:48 Accepted Answer Score 118
01:38 Answer 2 Score 16
02:10 Answer 3 Score 29
02:20 Answer 4 Score 23
02:37 Thank you
--
Full question
https://superuser.com/questions/248389/l...
--
Content licensed under CC BY-SA
https://meta.stackexchange.com/help/lice...
--
Tags
#ssh #shell #sshtunnel
#avk47
ACCEPTED ANSWER
Score 118
if you only want to list tunnels created by ssh
:
% sudo lsof -i -n | egrep '\<ssh\>'
ssh 19749 user 3u IPv4 148088244 TCP x.x.x.x:39689->y.y.y.y:22 (ESTABLISHED)
ssh 19749 user 4u IPv6 148088282 TCP [::1]:9090 (LISTEN)
ssh 19749 user 5u IPv4 148088283 TCP 127.0.0.1:9090 (LISTEN)
(that would be a -L 9090:localhost:80 tunnel)
if you want to see the tunnels / connections made to a sshd
:
% sudo lsof -i -n | egrep '\<sshd\>'
sshd 15767 root 3u IPv4 147401205 TCP x.x.x.x:22->y.y.y.y:27479 (ESTABLISHED)
sshd 15842 user 3u IPv4 147401205 TCP x.x.x.x:22->y.y.y.y:27479 (ESTABLISHED)
sshd 15842 user 9u IPv4 148002889 TCP 127.0.0.1:33999->127.0.0.1:www (ESTABLISHED)
sshd 1396 user 9u IPv4 148056581 TCP 127.0.0.1:5000 (LISTEN)
sshd 25936 root 3u IPv4 143971728 TCP *:22 (LISTEN)
the ssh-daemon listens on port 22 (last line), 2 subprocesses are spawned (first 2 lines, login of 'user'), a -R tunnel created on port 5000, and a -L tunnel which forwards a port from my (local) machine to localhost:80 (www).
ANSWER 2
Score 29
Try this command, it might be useful:
ps aux | grep ssh
ANSWER 3
Score 23
not exactly the solution for your problem, but also handy sometimes:
From within an ssh session:
- press enter
- type ~ and then #
shows you a list of all open connections over your tunnels for that session.
ANSWER 4
Score 16
netstat -tpln | grep ssh
- t: TCP
- p: show process
- l: listening
- n: numeric values
EDIT: example for @akira comment:
(header added, tested on Debian wheezy)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:1443 0.0.0.0:* LISTEN 4036/ssh
Which can be read as: SSH (not SSHd) is listening to local TCP port 1443.