Netstat, are we hacked?

Discussion in 'MacBook Pro' started by dmontoya99, Feb 15, 2011.

  1. dmontoya99 macrumors newbie

    Joined:
    Feb 15, 2011
    #1
    can anyone tell if we are being hacked by the posting of my netstat??


    Last login: Tue Feb 15 03:30:44 on ttys000
    You have new mail.
    kkll:~ vm$ netstat
    Active Internet connections
    Proto Recv-Q Send-Q Local Address Foreign Address (state)
    tcp4 0 0 192.168.1.72.64935 https-208-111-15.http CLOSE_WAIT
    tcp4 0 0 192.168.1.72.64934 68.152.64.2.epc SYN_SENT
    tcp4 0 0 192.168.1.72.13503 beachmesh.harbor.57621 ESTABLISHED
    tcp4 0 0 192.168.1.72.13503 beachmesh.harbor.57620 ESTABLISHED
    tcp4 0 0 192.168.1.72.64568 homeserver5.us.a.http LAST_ACK
    tcp4 0 0 192.168.1.72.64473 ia600100.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64447 ia700402.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64446 ia700309.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64444 ia700102.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64443 ia700305.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64436 ia700406.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64435 ia700202.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64430 ia700208.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64429 ia700107.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64426 ia700301.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64418 ia700200.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64414 ia700108.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64406 ia700204.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64400 ia700408.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64395 ia600304.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64392 ia700209.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64385 ia700201.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64383 ia700303.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64378 ia700302.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64377 ia700308.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64374 ia700304.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64373 ia700407.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64371 ia700104.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64364 ia700306.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64353 ia700401.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.13503 cpe-72-178-1-62..56532 ESTABLISHED
    tcp4 0 0 192.168.1.72.13503 cpe-72-178-1-62..56531 ESTABLISHED
    tcp4 0 0 192.168.1.72.64322 ia700409.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64320 ia700106.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64310 ia600100.us.arch.http LAST_ACK
    tcp4 0 0 192.168.1.72.64280 userverlua1.bett.http LAST_ACK
    tcp4 0 0 192.168.1.72.64259 a184-85-253-171..http LAST_ACK
    tcp4 0 0 192.168.1.72.64258 93.184.216.229.http LAST_ACK
    tcp4 0 0 192.168.1.72.64238 davidgrant.com.http LAST_ACK
    tcp4 0 0 192.168.1.72.64216 userverlua1.bett.http LAST_ACK
    tcp4 0 0 192.168.1.72.13503 ip68-104-1-22.lv.58334 ESTABLISHED
    tcp4 0 0 192.168.1.72.13503 ip68-104-1-22.lv.58333 ESTABLISHED
    tcp4 0 29 192.168.1.72.64146 66.211.169.65.https LAST_ACK
    tcp4 0 29 192.168.1.72.64145 66.211.169.65.https LAST_ACK
    tcp4 0 0 192.168.1.72.64143 ab.8c.7bae.stati.http LAST_ACK
    tcp4 0 0 192.168.1.72.64142 ab.8c.7bae.stati.http LAST_ACK
    tcp4 0 0 192.168.1.72.64131 208.93.142.145.http LAST_ACK
    tcp4 0 0 192.168.1.72.64127 208.93.142.145.http LAST_ACK
    tcp4 0 0 192.168.1.72.64126 mojofarm.mediapl.http LAST_ACK
    tcp4 0 0 192.168.1.72.64099 93.184.216.229.http LAST_ACK
    tcp4 0 0 192.168.1.72.63919 c-67-172-30-11.h.17055 ESTABLISHED
    tcp4 0 0 192.168.1.72.63918 c-67-172-30-11.h.17055 ESTABLISHED
    tcp4 0 0 192.168.1.72.62904 stun1a.voice.sp1.https ESTABLISHED
    tcp4 0 0 192.168.1.72.62903 sip109-p2.voice..https ESTABLISHED
    tcp4 0 0 192.168.1.72.62351 213.146.189.205.12350 ESTABLISHED
    tcp4 0 0 192.168.1.72.62349 35.211.202.68.cf.48547 ESTABLISHED
    tcp4 0 0 192.168.1.72.61316 cs206.msg.sp1.ya.mmcc ESTABLISHED
    tcp4 23 0 192.168.1.72.60402 68.64.11.26.https CLOSE_WAIT
    tcp4 0 0 192.168.1.72.60388 nwk-qtsoftware.a.http CLOSE_WAIT
    tcp4 23 0 192.168.1.72.60387 68.64.11.26.https CLOSE_WAIT
    tcp4 0 0 192.168.1.72.64937 ec2-174-129-210-.http TIME_WAIT
    tcp4 0 0 192.168.1.72.64936 ec2-174-129-210-.http TIME_WAIT
    tcp4 0 0 192.168.1.72.64938 ec2-174-129-210-.http TIME_WAIT
     
  2. GGJstudios macrumors Westmere

    GGJstudios

    Joined:
    May 16, 2008
  3. dmontoya99 thread starter macrumors newbie

    Joined:
    Feb 15, 2011
    #3
    me again

    no one else here at my home is on the www at this time, i'm the only person here

    i really appreciate this guys.:rolleyes:
     
  4. GGJstudios macrumors Westmere

    GGJstudios

    Joined:
    May 16, 2008
    #4
    Do you have a wireless network? If so, is it secured by a complex WPA2 password?
     
  5. dmontoya99 thread starter macrumors newbie

    Joined:
    Feb 15, 2011
    #5
    why i've been hacked?

    well, i do radio and this group of "trolls" have been stalking me and all this crap, with videos being made about me, and they have been confirmed hacking my iphone and my radio switchboard. but now, here at my HOME? oh no. :mad::mad::mad:
     
  6. dmontoya99 thread starter macrumors newbie

    Joined:
    Feb 15, 2011
  7. GGJstudios macrumors Westmere

    GGJstudios

    Joined:
    May 16, 2008
    #7
    If you change your network password and also have a password on your AirPort settings, you should be fine. Make sure both passwords are complex, containing a mix of upper and lower case letters, numbers and special characters. For additional security information:

     
  8. aristobrat macrumors G4

    Joined:
    Oct 14, 2005
    #8
    netstat shows all network usage, not just web browsing.

    For example, if any of the apps running in your dock "call out" to check for updates, report stats, etc ... their connections will show up on netstat as well.

    Also, finished www connections don't always instantly disappear from netstat, even if you close the browser.

    If you want to monitor the connections leaving your Mac, look for an app called Little Snitch.

    If you want to prevent any unauthorized incoming connections to your Mac, turn on the firewall. (Although if you connect to the Internet via a router, its most likely got a stateful firewall that makes random incoming connections from the Internet pretty much impossible)
     

Share This Page