e50d81eb5c85b2cdd3ce67af8408c024abe58c06
besides ::ffff:123.45.67.89, IPv6 packets now also really enter the system. characterisation of local addresses and direction of the stream don't work yet, so they are often filed under 'unknown' instead of their respective process.
= NETHOGS = http://nethogs.sf.net == INTRODUCTION == NetHogs is a small 'net top' tool. Instead of breaking the traffic down per protocol or per subnet, like most tools do, it groups bandwidth by process. NetHogs does not rely on a special kernel module to be loaded. If there's suddenly a lot of network traffic, you can fire up NetHogs and immediately see which PID is causing this. This makes it easy to indentify programs that have gone wild and are suddenly taking up your bandwidth. Since NetHogs heavily relies on /proc, it currently runs on Linux only. == STATUS == Ideas/ToDo for new releases: * Only IPv4 TCP is currently supported * Sort the output by other values than network usage * Monitor specific processes * Make it work correctly on machines with multiple IP addresses * Integrate into another tool?? == LICENSE == GPL.
Description
Languages
C++
58.5%
HTML
18.1%
C
10.4%
Python
4.3%
Shell
3.8%
Other
4.9%