当我使用 netstat 时,我收到这样的信息 - PID 4 表示 HTTP.SYS
Active Connections
Proto Local Address Foreign Address State PID
TCP 0.0.0.0:80 0.0.0.0:0 LISTENING 4
TCP 10.140.126.48:80 10.140.126.139:57030 ESTABLISHED 4
TCP 10.140.126.48:80 10.140.126.181:57918 ESTABLISHED 4
TCP [::]:80 [::]:0 LISTENING 4
Run Code Online (Sandbox Code Playgroud)
因此,使用netsh
我可以接收有关 HTTP 层上特定侦听器的信息
netsh http show servicestate view=requestq verbose=no
Run Code Online (Sandbox Code Playgroud)
:
Snapshot of HTTP service state (Request Queue View):
-----------------------------------------------------
Request queue name: Other Application Pool
Version: 2.0
State: Active
Request queue 503 verbosity level: Limited
Max requests: 1000
Number of active …
Run Code Online (Sandbox Code Playgroud)