

And every process has an ID, and its called PID. TCP 192.168.43.15:52590 server-13-33-179-97:https TIME_WAIT Show PID used by port numberĮvery connection is a process internally. Netstat | findstr TIME_WAIT C:\Windows\system32> netstat | findstr TIME_WAIT TCP 192.168.43.15:52584 ec2-34-227-121-63:https CLOSE_WAITįinally, use the TIME_WAIT flag to get information about all the connections that are in TIME_WAIT state. Similarly, run the following command to see all the connections that are in CLOSE_WAIT state. netstat | findstr LISTENING C:\Windows\system32> netstat | findstr LISTENING TCP 192.168.43.15:139 DESKTOP-A0PM5GD:0 LISTENING You will get the information about connections that are in the listening state as follows. To see the connections that are in LISTENING state change ESTABLISHED keyword in the previous command to LISTENING. Note: to view LISTEN, CLOSE_WAIT, TIME_WAIT you can just use as follows. Netstat | findstr ESTABLISHED C:\Windows\system32> netstat | findstr ESTABLISHED You can use below syntax to view all established connections from/to your Windows server. We have seen the state in the connection information. We can filter the connections in different ways.

You will see a header with Proto, Local Address, Foreign Address, and State.

Proto Local Address Foreign Address State You will see all the active connections from different states as shown below. To start with netstat, let’s see the command that displays all connections. Let’s get it started… Show all connections
