Windows 10: More Monontonous Netstat Stuff

Discus and support More Monontonous Netstat Stuff in AntiVirus, Firewalls and System Security to solve the problem; So I'm sure you've all seen this same questions a million times. Just please bare with me on this because I'd do the same. All this LISTENENING ports... Discussion in 'AntiVirus, Firewalls and System Security' started by Intr0v3rt, Jun 8, 2020.

  1. Intr0v3rt Win User

    More Monontonous Netstat Stuff


    So I'm sure you've all seen this same questions a million times. Just please bare with me on this because I'd do the same.


    All this LISTENENING ports has me a little uneasy. Is this normal Window's netstat out or should I be concerned?


    Thanks! BTW I'm just a regular desktop user.


    TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 984
    TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
    TCP 0.0.0.0:5040 0.0.0.0:0 LISTENING 5096
    TCP 0.0.0.0:7680 0.0.0.0:0 LISTENING 996
    TCP 0.0.0.0:17500 0.0.0.0:0 LISTENING 9392
    TCP 0.0.0.0:49664 0.0.0.0:0 LISTENING 748
    TCP 0.0.0.0:49665 0.0.0.0:0 LISTENING 668
    TCP 0.0.0.0:49666 0.0.0.0:0 LISTENING 1660
    TCP 0.0.0.0:49667 0.0.0.0:0 LISTENING 1464
    TCP 0.0.0.0:49668 0.0.0.0:0 LISTENING 3420
    TCP 0.0.0.0:49669 0.0.0.0:0 LISTENING 740
    TCP 127.0.0.1:843 0.0.0.0:0 LISTENING 9392
    TCP 127.0.0.1:17600 0.0.0.0:0 LISTENING 9392
    TCP 127.0.0.1:49831 127.0.0.1:49832 ESTABLISHED 9392
    TCP 127.0.0.1:49832 127.0.0.1:49831 ESTABLISHED 9392
    TCP 127.0.0.1:49838 127.0.0.1:49839 ESTABLISHED 9392
    TCP 127.0.0.1:49839 127.0.0.1:49838 ESTABLISHED 9392
    TCP 127.0.0.1:50091 0.0.0.0:0 LISTENING 10288
    TCP 127.0.0.1:50093 0.0.0.0:0 LISTENING 10288
    TCP 127.0.0.1:50094 0.0.0.0:0 LISTENING 10288
    TCP 127.0.0.1:50095 0.0.0.0:0 LISTENING 10288
    TCP 127.0.0.1:50437 127.0.0.1:50438 ESTABLISHED 7052
    TCP 127.0.0.1:50438 127.0.0.1:50437 ESTABLISHED 7052
    TCP 127.0.0.1:50439 127.0.0.1:50440 ESTABLISHED 1508
    TCP 127.0.0.1:50440 127.0.0.1:50439 ESTABLISHED 1508
    TCP 127.0.0.1:50445 127.0.0.1:50446 ESTABLISHED 9464
    TCP 127.0.0.1:50446 127.0.0.1:50445 ESTABLISHED 9464
    TCP 127.0.0.1:50452 127.0.0.1:50453 ESTABLISHED 6736
    TCP 127.0.0.1:50453 127.0.0.1:50452 ESTABLISHED 6736
    TCP 127.0.0.1:50513 127.0.0.1:50514 ESTABLISHED 9196
    TCP 127.0.0.1:50514 127.0.0.1:50513 ESTABLISHED 9196
    TCP 127.0.0.1:50534 127.0.0.1:50535 ESTABLISHED 5080
    TCP 127.0.0.1:50535 127.0.0.1:50534 ESTABLISHED 5080
    TCP 192.168.1.90:139 0.0.0.0:0 LISTENING 4
    TCP 192.168.1.90:49750 52.242.211.89:443 ESTABLISHED 3960
    TCP 192.168.1.90:49819 52.230.222.68:443 ESTABLISHED 8984
    TCP 192.168.1.90:49845 162.125.6.13:443 CLOSE_WAIT 9392
    TCP 192.168.1.90:50345 162.125.6.13:443 CLOSE_WAIT 9392
    TCP 192.168.1.90:50364 162.125.3.7:443 CLOSE_WAIT 9392
    TCP 192.168.1.90:50374 52.206.156.176:443 CLOSE_WAIT 9392
    TCP 192.168.1.90:50443 104.16.249.249:443 ESTABLISHED 7052
    TCP 192.168.1.90:50448 54.69.165.95:443 ESTABLISHED 7052
    TCP 192.168.1.90:50520 162.125.36.1:443 CLOSE_WAIT 9392
    TCP 192.168.1.90:50585 23.67.64.221:80 TIME_WAIT 0
    TCP 192.168.1.90:50586 52.84.125.103:443 ESTABLISHED 7052
    TCP 192.168.1.90:50587 34.98.75.36:443 ESTABLISHED 7052
    TCP 192.168.1.90:50588 72.21.91.29:80 ESTABLISHED 7052
    TCP 192.168.1.90:50591 52.183.220.149:443 TIME_WAIT 0
    TCP 192.168.1.90:50592 104.126.65.122:443 ESTABLISHED 7052
    TCP 192.168.1.90:50593 23.33.85.47:443 ESTABLISHED 7052
    TCP 192.168.1.90:50594 40.90.22.191:443 ESTABLISHED 7052
    TCP 192.168.1.90:50596 52.96.79.50:443 ESTABLISHED 5152
    TCP 192.168.1.90:50597 52.96.79.50:443 ESTABLISHED 5152
    TCP 192.168.1.90:50598 162.125.19.131:443 ESTABLISHED 9392
    TCP 192.168.56.1:139 0.0.0.0:0 LISTENING 4
    TCP [::]:135 [::]:0 LISTENING 984
    TCP [::]:445 [::]:0 LISTENING 4
    TCP [::]:7680 [::]:0 LISTENING 996
    TCP [::]:17500 [::]:0 LISTENING 9392
    TCP [::]:49664 [::]:0 LISTENING 748
    TCP [::]:49665 [::]:0 LISTENING 668
    TCP [::]:49666 [::]:0 LISTENING 1660
    TCP [::]:49667 [::]:0 LISTENING 1464
    TCP [::]:49668 [::]:0 LISTENING 3420
    TCP [::]:49669 [::]:0 LISTENING 740
    UDP 0.0.0.0:5050 *:* 5096
    UDP 0.0.0.0:5353 *:* 2432
    UDP 0.0.0.0:5355 *:* 2432
    UDP 0.0.0.0:17500 *:* 9392
    UDP 127.0.0.1:1900 *:* 1740
    UDP 127.0.0.1:55828 *:* 3780
    UDP 127.0.0.1:57197 *:* 1740
    UDP 192.168.1.90:137 *:* 4
    UDP 192.168.1.90:138 *:* 4
    UDP 192.168.1.90:1900 *:* 1740
    UDP 192.168.1.90:57195 *:* 1740
    UDP 192.168.56.1:137 *:* 4
    UDP 192.168.56.1:138 *:* 4
    UDP 192.168.56.1:1900 *:* 1740
    UDP 192.168.56.1:57196 *:* 1740
    UDP [::]:5353 *:* 2432
    UDP [::]:5355 *:* 2432
    UDP [::1]:1900 *:* 1740
    UDP [::1]:57194 *:* 1740

    :)
     
    Intr0v3rt, Jun 8, 2020
    #1

  2. netstat -a results?

    Hi,

    In order for us to efficiently assist you, we just have few questions for you:

    • Are you experiencing any issues with your computer, thus running netstat - a
      command?
    • If you suspect that your computer is infected with a virus, have you already run the

      Windows

      Defender
      ?
    • What troubleshooting steps have you done so far?

    Regards.
     
    Darian Tab, Jun 8, 2020
    #2
  3. how to use netstat to check for malware?

    netstat is a command-line tool (used from a

    command prompt
    ) that displays incoming and outgoing network connections, ports on which the computer is listening, routing tables, and a number of network interface statistics. It can be used to obtain Local/Foreign Addresses,
    PID, listening state and for troubleshooting networking issues.


    Using Netstat to investigate for malicious activity.

     
    quietman7 - MVP, Jun 8, 2020
    #3
  4. newtekie1 Win User

    More Monontonous Netstat Stuff

    NEED help with IP, and netstat -a?? please

    All netstat -a does is list what is using your network connection. It is normal for there to be a few things in there, and the list will also grow as you do thing(netstat keeps running and adds to the list as more things use your network interface).

    So basically, they are full of sh*t.

    Try running speedtest again, but this time manually select a server, and make sure to pick one that isn't run by your ISP. If you just press the "Begin Test" button, the test will pick the "best" server based on ping. In a lot of cases this server is run by your ISP, so it doesn't really give you an idea of how fast your ISP is communicating with the rest of the world.
     
    newtekie1, Jun 8, 2020
    #4
Thema:

More Monontonous Netstat Stuff

Loading...
  1. More Monontonous Netstat Stuff - Similar Threads - More Monontonous Netstat

  2. Netstat -aon question

    in Windows 10 Ask Insider
    Netstat -aon question: [ATTACH] Long time viewer- first time poster. I’ve been looking at a script running on my win 10 System. I have been tracing down programs, reading dump files, and exe. I came across a PID 4 on my system. I did task kill and it shut my system down and this file was on my...
  3. Netstat scan

    in Windows 10 Gaming
    Netstat scan: Can someone please explain to me what a typical netstat scan should look like? Im worried someone is monitoring my network and my netstat scan seems to be extremely long and is always changingI would upload the netstat results but im not sure if that would compromise my...
  4. Netstat scan

    in Windows 10 Software and Apps
    Netstat scan: Can someone please explain to me what a typical netstat scan should look like? Im worried someone is monitoring my network and my netstat scan seems to be extremely long and is always changingI would upload the netstat results but im not sure if that would compromise my...
  5. Forein adress in NETSTAT

    in Windows 10 Gaming
    Forein adress in NETSTAT: When i ran netstat command on cmd there was a foreing adress which on IP lookup was a differen location to mine and was part of MICROSOFT-CORP-MSN-AS-BLOCK. If it is a virus how do i remove it...
  6. Netstat

    in Windows 10 Gaming
    Netstat: Netstat is extremely confusing, it starts with the average small length of connection lines and then it expands into almost two sentences! It even has weird names for domains. It's extremely odd and all the "see if your computer is hack" barely explains how they find the...
  7. Netstat

    in Windows 10 Software and Apps
    Netstat: Netstat is extremely confusing, it starts with the average small length of connection lines and then it expands into almost two sentences! It even has weird names for domains. It's extremely odd and all the "see if your computer is hack" barely explains how they find the...
  8. Netstat connections

    in AntiVirus, Firewalls and System Security
    Netstat connections: Hello I was playing with my cmd and I noticed several netstat connections labelled as "Bad6" does anyone know what this may be? Also if this is malicious could someone please tell me how to terminate the connection. Thank you for any and all answers!...
  9. netstat is this normal?

    in Windows 10 Network and Sharing
    netstat is this normal?: Proto Local Address Foreign Address State TCP 127.0.0.1:51339 MSI:61870 ESTABLISHED TCP 127.0.0.1:54161 MSI:54162 ESTABLISHED TCP 127.0.0.1:54162 MSI:54161 ESTABLISHED TCP 127.0.0.1:54166 MSI:54167 ESTABLISHED TCP 127.0.0.1:54167 MSI:54166 ESTABLISHED TCP 127.0.0.1:54200...
  10. Netstat connections, is this normal?

    in Windows 10 Network and Sharing
    Netstat connections, is this normal?: Just wondering if this is normal when I type netstat in cmd.... Proto Local Address Foreign Address State TCP 127.0.0.1:49790 DESKTOP-GOVM7NU:wsd TIME_WAIT TCP 192.168.1.151:49787 a-0001:https ESTABLISHED TCP...