CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More
Get access to immediate incident response assistance.
Follow the steps below to determine if a network port is being used on a server, and the specific application using the port:
Active Connections
Proto Local Address Foreign Address State PID TCP 0.0.0.0:80 0.0.0.0:0 LISTENING 4
Can not obtain ownership information TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 872 RpcSs [svchost.exe] TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
Can not obtain ownership information TCP 0.0.0.0:8080 0.0.0.0:0 LISTENING 2308 [WMProxy.exe] TCP 0.0.0.0:8081 0.0.0.0:0 LISTENING 2308 [WMProxy.exe] TCP 0.0.0.0:19100 0.0.0.0:0 LISTENING 2792 [WMArrayMGR.exe] TCP 0.0.0.0:19101 0.0.0.0:0 LISTENING 2792 [WMArrayMGR.exe] TCP 0.0.0.0:19102 0.0.0.0:0 LISTENING 2984 [WMController.exe] TCP 0.0.0.0:49152 0.0.0.0:0 LISTENING 544 [wininit.exe] TCP 0.0.0.0:49153 0.0.0.0:0 LISTENING 996 EventLog [svchost.exe] TCP 0.0.0.0:49154 0.0.0.0:0 LISTENING 244 Schedule [svchost.exe] TCP 0.0.0.0:49155 0.0.0.0:0 LISTENING 636 [lsass.exe] TCP 0.0.0.0:49160 0.0.0.0:0 LISTENING 624 [services.exe] TCP 0.0.0.0:49165 0.0.0.0:0 LISTENING 1796 [sqlservr.exe] TCP 0.0.0.0:49182 0.0.0.0:0 LISTENING 1744 [sqlservr.exe] TCP 10.64.21.63:139 0.0.0.0:0 LISTENING 4
Can not obtain ownership information TCP 10.64.21.63:49165 10.64.21.63:49167 ESTABLISHED 1796 [sqlservr.exe] TCP 10.64.21.63:49167 10.64.21.63:49165 ESTABLISHED 2792 [WMArrayMGR.exe]
Results displayed can vary depending on your permissions, and the results sometimes take a long time to generate.
In some cases you might find that the following steps allow you to get more information more quickly:
To contact Trustwave about this article or to request support:
This is a bot-free zone. Please check the box to let us know you're human.
Download Now
Read complimentary reports and insightful stories in the Trustwave Resource Center
One of our sales specialists will be in touch shortly.