** Lisi <hantslug@???> [2010-02-17 11:42]:
> On Tuesday 16 February 2010 14:23:31 Kelly Dunlop wrote:
> [snip]
> Tux:/home/lisi# netstat -atn
> Active Internet connections (servers and established)
> Proto Recv-Q Send-Q Local Address           Foreign Address         State
> tcp        0      0 0.0.0.0:59782           0.0.0.0:*               LISTEN
> tcp        0      0 127.0.0.1:1004          0.0.0.0:*               LISTEN
> tcp        0      0 0.0.0.0:111             0.0.0.0:*               LISTEN
> tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN
> tcp        0      0 127.0.0.1:631           0.0.0.0:*               LISTEN
> tcp        0      0 0.0.0.0:7741            0.0.0.0:*               LISTEN
> tcp        0      0 192.168.0.2:43311       92.122.211.37:1935      
> ESTABLISHED
> tcp6       0      0 :::22                   :::*                    LISTEN
> tcp6       0      0 ::1:631                 :::*                    LISTEN
> Tux:/home/lisi# ps -ef | grep sshd
> root      2341     1  0 06:38 ?        00:00:00 /usr/sbin/sshd
> root     15602 15392  0 11:08 pts/1    00:00:00 grep sshd
> Tux:/home/lisi#
> 
> If I have understood correctly, that is a bit worrying.  (The ESTABLISHED 
> one.)  So have I understood?  I hope that I have not. ;-0.
> 
> If it _is_ ominous, I can block that IP.  But I presumably need to close some 
> open ports as well?
** end quote [Lisi]
Given the IP address involved looks to be owned by Akamai, and the port number
is related to the Flash Communications server, I would speculate that you have
(or possible have had in a recent session) a web page open owned by a sizeable
organisation that utilises Flash. That's pure guesswork though :)
-- 
Paul Tansom | Aptanet Ltd. | 
http://www.aptanet.com/ | 023 9238 0001
======================================================================
Registered in England  |  Company No: 4905028  |  Registered Office:
Crawford House, Hambledon Road, Denmead, Waterlooville, Hants, PO7 6NU