- How do I display a list of Wi-Fi connections using netsh
- 2 Answers 2
- How can I display the other wireless connections?
- Netsh Commands for Wireless Local Area Network (WLAN)
- Windows Netstat Command Tutorial
- netstat Command Syntax
- Display All TCP and UDP Connections with Listening Ports
- TCP States for netstat Command
- Display Ethernet Statistics
- Display Numeric Presentation of Ports and Hostname
- Display Connection or Ports Process ID
- Display Connection or Ports Process Name
- Display Fully Qualified Domain Name
- Display Only TCP Protocol
- Display Only UDP Protocol
- Display Only IPv4 Ports and Sockets
- Display Only IPv6 Ports and Sockets
- Display IPv4 ve IPv6 Statistics
- Display Only TCP Protocol Statistics
- Display Only ICMP Protocol Statistics
- Display Routing Table
- Display Information Interactively
- How can I see all active connections?
- 6 Answers 6
- TCPView v4.0
- Introduction
- Using TCPView
- Using Tcpvcon
- Microsoft TCPView KB Article
How do I display a list of Wi-Fi connections using netsh
Using command netsh wlan show profiles through a command prompt shows a list of all the all Wi-Fi available at that time to which my computer can connect.
But it only shows one Wi-Fi which is I am using whereas when I click the network and sharing center icon on right side of status bar it shows various Wi-Fi both secured and unsecured to which my computer can connect.
How can I display the other wireless connections?
2 Answers 2
How can I display the other wireless connections?
command netsh wlan show profiles through command prompt shows list of all the all Wi-Fi available at that time to which my computer can connect.
The above command shows only those connections which have profiles.
They are connections you have previously connected to and have saved configurations.
It will always show your current connection (if you are using wireless).
These connections may not be available from your current location.
To list all available connections you need to use a different netsh command:
- These connections are available at your current location.
Example output (names have been obscured):
Netsh Commands for Wireless Local Area Network (WLAN)
Displays a list of wireless networks that are visible on the computer.
show networks [[interface=]InterfaceName] [[mode=]
show profiles
Displays a list of wireless profiles that are configured on the computer.
show profiles [[name=]ProfileName] [[interface=]InterfaceName] [Windows list all connections and
Windows Netstat Command Tutorial
Netstat is used to display active TCP connections and related listening ports in the computer or system. Actually, there are more features provided by netstat like display statistics about network stack protocols, IPv4, IPv6, TCP, UDP, etc.
netstat Command Syntax
The syntax of the netstat command is like below. Simply we can use the following options.
- OPTIONS will set different options and arguments about the netstat command behavior.
Display All TCP and UDP Connections with Listening Ports
TCP is the most used protocol for the transmission of packets between different hosts. In a regular usage for a host, there will be a lot of TCP connections in different phases. We can display all these connections with -a option like below.
We can see that while listing listening ports following information about these ports is provided.
- Proto is the protocol the listening port is running. Generally, TCP and UDP are used.
- Local Address is the local or current system IP address and ports number. The IP address and the port number are delimited with the : . 0.0.0.0 means all local IP addresses or network interfaces where 127.0.0.1 means only localhost or current system.
- Foreign Address is the remote IP address which is initiated a connection. Like Local address, IP address and the port number are delimited with the : .
- State will provide the current status of the given port. A port can be listening which means accepting connections or CLOSED recently closed etc. More details about the port or TCP states can be found below.
TCP States for netstat Command
As we know TCP protocol provides reliable data transfer between hosts. TCP implements sessions to provide this reliability. From start to end there are different states in a TCP session. Here the sequence and meaning of TCP states.
- LISTENING means the port is listening but do not have any connection with a remote host
- ESTABLISHED the connection established and communicating with the remote host
- TIME_WAIT the connection is in a wait situations
- CLOSE_WAIT the connection is the closing phase
- CLOSED the connection is closed
- SYN_RECEIVED the sync flag received to start the connection
Display Ethernet Statistics
Ethernet or MAC generally used for the same meaning. Ethernet is a Layer 2 protocol used to communicate in our LAN with other hosts and mostly with a gateway that is used to access other networks or the internet. We can list detailed information about the ethernet protocol. We will use -e option to list ethernet statistics.
Following information about Ethernet Statistics will be provided.
- Received column is used to specify the received sizes.
- Sent column is used to specify the sent sizes.
- Bytes is used successfully completed transfers.
- Unicast packets generally related to the UDP protocol where there is no connection and session management.
- Non-unicast
- Discards is the packets that are discarded because of the problems.
- Errors show the sizes of the packets where errors occurred.
- Unknown protocols show the protocols currently unknown by the TCP/IP stack.
Display Numeric Presentation of Ports and Hostname
Host and ports generally have numeric and text presentations. netstat command by default try to resolve the hostname and port name into text format. If we need to get the host and port numeric information like IP address and the port number we can use -n option.
Display Connection or Ports Process ID
All ports and connections are opened and managed by processes in the operating system. For example, Apache is a web server and uses TCP 80 for listening to HTTP requests. We can list processes id of given connection or port with -o option.
We can see that also PID or Process ID is provided which is the current application process ID which listens given port and interface.
Display Connection or Ports Process Name
Like the previous example, we can list established connection or listening port process name with -b option. But this option requires Administrator privileges.
We can see from the output that chrome.exe. established a connection with a remote host over https protocol.
Display Fully Qualified Domain Name
Normally netstat will list hostnames in a simple manner and in a fast way. It can skip some domain names too. We can for netstat to print fully qualified domain names with -f option.
We can see that only resolved DNS names or fully qualified domain names are shown like oracle.com .
Display Only TCP Protocol
netstat command provides extensive filtering options according to protocols. We can provide a filter option with -p and protocol name. In this example, we will filter and show only TCP protocol.
As we can see there is no UDP protocol related port and connection information.
Display Only UDP Protocol
We can also filter and show only UDP protocol ports with -p udp option. Here we provided -a to list UDP too.
As we can see there is no TCP related port or connection information in this example and all UDP ports are currently listening mode without a connection state. This is because the UDP protocol is a connectionless protocol that does not create a session for data transmission.
Display Only IPv4 Ports and Sockets
We can use -p ip option to filter and show only IPv4 connections. This can be useful generally because the IPv6 protocol is not common.
Display Only IPv6 Ports and Sockets
We can use -p ipv6 option to filter and show only IPv6 connections about the netstat command.
Display IPv4 ve IPv6 Statistics
netstat command provides a lot of statistical information about the network stack. These statistics provide detailed metrics about protocols. We can list this statistical information with -s option.
We can see that the following information about IPv4 and IPv6 protocol is provided.
- Packets Received : The total IP packets received.
- Received Header Errors : The total number of headers errors of the received packets.
- Received Address Errors : The total number of address errors of the received packets.
- Unknown Protocols Received : The total number of protocols which is unknown.
- Received Packets Discarded : The total number of packets that are discarded after received.
Display Only TCP Protocol Statistics
We can only list TCP protocol-related statistics with -s -p tcp option.
As we can see from output there is the following information
- Active Opens will list currently opened connection count. In this example, this is 104.
- a Passive Opens will list open connections but not transferred any data recently. In this example, this is 15.
- Failed Connection Attempts will list connection tries or attempts not completed so there are no started connections which are 4.
- Reset Connections will list connections that ended with the RST TCP flag.
- Current Connections will list currently opened connection count which is 5 in this example.
- Segments Received will list the count of received TCP segments.
- Segments Sent will list the count of sent TCP segments.
- Segments Retransmitted will list the count of retransmitted TCP segments.
Display Only ICMP Protocol Statistics
We can list only ICMP related statistics with -s -p icmp option.
- Messages : ICMP Messages.
- Errors : ICMP Errors.
- Destination Unreachable : ICMP Destination Unreachable Messages.
- Echo Replies : ICMP Echo replies which are generally used for ping or ping command.
Display Routing Table
Routing is used to set IP packets first-hop according to their destination. Our system route information can be listed with -r option.
As we can see the default route is printed in the first line which IP address is 192.168.122.1 .
Display Information Interactively
If we need to list given options output interactively to monitor the metrics we can use interactive mode. Interactive mode is enabled by providing interval value to print output. This feature does not needs any option we will only provide interval value which is 2 in this case.
How can I see all active connections?
My Internet connection has been slow lately, and I think it might be a possible attack. A friend has told me to use Wireshark, but it is a big install, and I do not have the time to learn how to use it. Is there an easier way to see all the connections on my PC so I can take further action?
6 Answers 6
You are looking for the netstat command. This command should provide what you’re looking for:
if you would also like to see what programs are using the specified ports you can use:
to use the netstat program:
- Go to the start menu (or press Win + r and skip to step 3)
- If on XP, click «Run», If on vista or later, search for cmd in the search box and skip to step 4.
- type cmd
- after cmd opens, type netstat -a
- a list of all open connections with their ports will be displayed
more info about netstat:
I would also recommend running Autoruns and Process Explorer, also in the Sysinternals Suite to help diagnose your problem.
If you’re looking for a simple look at which connections are hungry on Windows 7 onwards, then bring up Task Manager, Performance tab, Resource Monitor, Network tab.
Prio (http://www.prnwatch.com/prio.html) can provide, as part of the Windows Task Manager, an updating list connections with some additional context that may help you make sense of what is going on.
You can see the active ports aligned with the processes in use.
It adds a lot of functionality to the task manager and it is all contained in one area.
I am not a computer scientist but I find that netstat is a bit slow and many connections pass through unrecorded, wireshark is fast but has too many packets to filter through and windows resource monitor is too hard to look through the list to see who is making connections.
TCPView v4.0
By Mark Russinovich
Published: March 23, 2021
Download TCPView (1.4 MB)
Run now from Sysinternals Live.
Introduction
TCPView is a Windows program that will show you detailed listings of all TCP and UDP endpoints on your system, including the local and remote addresses and state of TCP connections. On Windows Server 2008, Vista, and XP, TCPView also reports the name of the process that owns the endpoint. TCPView provides a more informative and conveniently presented subset of the Netstat program that ships with Windows. The TCPView download includes Tcpvcon, a command-line version with the same functionality.
Using TCPView
When you start TCPView it will enumerate all active TCP and UDP endpoints, resolving all IP addresses to their domain name versions. You can use a toolbar button or menu item to toggle the display of resolved names. On Windows XP systems, TCPView shows the name of the process that owns each endpoint.
By default, TCPView updates every second, but you can use the Options|Refresh Rate menu item to change the rate. Endpoints that change state from one update to the next are highlighted in yellow; those that are deleted are shown in red, and new endpoints are shown in green.
You can close established TCP/IP connections (those labeled with a state of ESTABLISHED) by selecting File|Close Connections, or by right-clicking on a connection and choosing Close Connections from the resulting context menu.
You can save TCPView’s output window to a file using the Save menu item.
Using Tcpvcon
Tcpvcon usage is similar to that of the built-in Windows netstat utility:
Usage:
Parameter | Description |
---|---|
-a | Show all endpoints (default is to show established TCP connections). |
-c | Print output as CSV. |
-n | Don’t resolve addresses. |
Microsoft TCPView KB Article
This Microsoft KB article references TCPView:
Download TCPView (1.4 MB)
Run now from Sysinternals Live.
Runs on:
- Client: Windows 8.1 and higher.
- Server: Windows Server 2012 and higher.
—>