command-line-murders/i-0d4b0e04bf12106df
by SadServersMore by SadServers
systemd-tmpfiles-setup.service loade systemd-udev-trigger.service loade systemd-udevd.service loade systemd-update-utmp.service loade systemd-user-sessions.service loade unattended-upgrades.service loade -.slice loade system-getty.slice loade system-modprobe.slice loade system-serial\x2dgetty.slice loade system-systemd\x2dgrowfs.slice loadeadmin@i-0f0e461e060a319f7:~$ admin@i-0f0e461e060a319f7:~$ admin@i-0f0e461e060a319f7:~$ admin@i-0f0e461e060a319f7:~$ lso
paris/i-0f0e461e060a319f7 02:58
by SadServers(Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) admin@i-0b9f3cd0094de1d6e:~$ netstat -anlp|grep 172 (Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) tcp 0 0 172.31.42.227:59464 172.31.21.181:9000 TIME_WAIT tcp 0 0 172.31.42.227:59462 172.31.21.181:9000 TIME_WAIT tcp 0 0 172.31.42.227:59460 172.31.21.181:9000 TIME_WAIT tcp6 0 0 172.31.42.227:8080 172.31.16.109:54422 ESTABLISHED admin@i-0b9f3cd0094de1d6e:~$ curl ^C admin@i-0b9f3cd0094de1d6e:~$ nmap -sV 172.31.21.181 -p 9000 Starting Nmap 7.80 ( https://nmap.org ) at 2023-10-01 16:08 UTC Note: Host seems down. If it is really up, but blocking our ping probes, try -PnNmap done: 1 IP address (0 hosts up) scanned in 4.87 seconds admin@i-0b9f3cd0094de1d6e:~$ ip a
taipei/i-0b9f3cd0094de1d6e 04:20
by SadServerstmpfs 228M 12K 228M 1% /dev/shm tmpfs 5.0M 0 5.0M 0% /run/lock /dev/nvme0n1p15 124M 5.9M 118M 5% /boot/efi admin@i-0fc7184f11dca317e:~$ lsblk -l NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT nvme0n1 259:0 0 8G 0 disk nvme2n1 259:1 0 1G 0 disk nvme0n1p1 259:2 0 7.9G 0 part / nvme0n1p14 259:3 0 3M 0 part nvme0n1p15 259:4 0 124M 0 part /boot/efi nvme1n1 259:5 0 1G 0 disk admin@i-0fc7184f11dca317e:~$ pvcreate /dev/nvme1n1 /dev/nvme2n1 WARNING: Running as a non-root user. Functionality may be unavailable. /run/lock/lvm/P_global:aux: open failed: Permission denied admin@i-0fc7184f11dca317e:~$ sudo