小编Tom*_* Cz的帖子

如何找到与 HTTP.SYS 进程的 TCP 连接背后的确切进程

当我使用 netstat 时,我收到这样的信息 - PID 4 表示 HTTP.SYS

Active Connections

  Proto  Local Address          Foreign Address        State           PID
  TCP    0.0.0.0:80             0.0.0.0:0              LISTENING       4
  TCP    10.140.126.48:80       10.140.126.139:57030   ESTABLISHED     4
  TCP    10.140.126.48:80       10.140.126.181:57918   ESTABLISHED     4
  TCP    [::]:80                [::]:0                 LISTENING       4
Run Code Online (Sandbox Code Playgroud)

因此,使用netsh我可以接收有关 HTTP 层上特定侦听器的信息

netsh http show servicestate view=requestq verbose=no
Run Code Online (Sandbox Code Playgroud)

Snapshot of HTTP service state (Request Queue View): 
----------------------------------------------------- 

Request queue name: Other Application Pool
    Version: 2.0
    State: Active
    Request queue 503 verbosity level: Limited
    Max requests: 1000
    Number of active …
Run Code Online (Sandbox Code Playgroud)

windows port networking netstat http.sys

6
推荐指数
0
解决办法
706
查看次数

标签 统计

http.sys ×1

netstat ×1

networking ×1

port ×1

windows ×1