yes there is:

NETSTAT [-a] [-b] [-e] [-f] [-n] [-o] [-p proto] [-r] [-s] [-t] [interval]

 -a            Displays all connections and listening ports.
-b Displays the executable involved in creating each connection or
               listening port. In some cases well-known executables host
               multiple independent components, and in these cases the
               sequence of components involved in creating the connection
               or listening port is displayed. In this case the executable
name is in [] at the bottom, on top is the component it called,
               and so forth until TCP/IP was reached. Note that this option
can be time-consuming and will fail unless you have sufficient
-e Displays Ethernet statistics. This may be combined with the -s
 -f            Displays Fully Qualified Domain Names (FQDN) for foreign
 -n            Displays addresses and port numbers in numerical form.
-o Displays the owning process ID associated with each connection.
 -p proto      Shows connections for the protocol specified by proto; proto
may be any of: TCP, UDP, TCPv6, or UDPv6. If used with the -s option to display per-protocol statistics, proto may be any of:
               IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, or UDPv6.
 -r            Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, and UDPv6; the -p option may be used to specify a subset of the default.
 -t            Displays the current connection offload state.
 interval      Redisplays selected statistics, pausing interval seconds
               between each display.  Press CTRL+C to stop redisplaying
               statistics.  If omitted, netstat will print the current
               configuration information once.

Wjhonson wrote:
There is no -f option on netstat

-----Original Message-----
From: Jeff Schasny <>
To: U2 Users List <>
Sent: Thu, Sep 6, 2012 12:15 pm
Subject: Re: [U2] [Windows]

netstat -f

Wjhonson wrote:
When a remote PC, asks the Windows server to open a Telnet session, Windows
assigns a Process ID to that request. While the telnet session is open,that Process ID will appear in the Windows Task Manager.
Is there a way to tell, WHO ask for that Telnet session to be opened? That
is, the name of the remote PC, Foreign Address, Mac Address, IP or something of that sort that identifies the requestor/asker ?
This has to be done *outside of* Universe, not inside it, for a particular
Anyone know the answer?

U2-Users mailing list

Jeff Schasny - Denver, Co, USA
jschasny at gmail dot com
U2-Users mailing list

Reply via email to