In a command window, I have the following output:
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:WindowsSystem32>netstat -a
Active Connections
Proto Local Address Foreign Address State
TCP 0.0.0.0:135 KLKPC9:0 LISTENING
TCP 0.0.0.0:445 KLKPC9:0 LISTENING
TCP 0.0.0.0:554 KLKPC9:0 LISTENING
TCP 0.0.0.0:2869 KLKPC9:0 LISTENING
TCP 0.0.0.0:5357 KLKPC9:0 LISTENING
TCP 0.0.0.0:10243 KLKPC9:0 LISTENING
TCP 0.0.0.0:49152 KLKPC9:0 LISTENING
TCP 0.0.0.0:49153 KLKPC9:0 LISTENING
TCP 0.0.0.0:49154 KLKPC9:0 LISTENING
TCP 0.0.0.0:49155 KLKPC9:0 LISTENING
TCP 0.0.0.0:49157 KLKPC9:0 LISTENING
TCP 0.0.0.0:49158 KLKPC9:0 LISTENING
TCP aaa.bbb.xxx.yyy:139 KLKPC9:0 LISTENING
TCP [::]:135 KLKPC9:0 LISTENING
TCP [::]:445 KLKPC9:0 LISTENING
TCP [::]:554 KLKPC9:0 LISTENING
TCP [::]:2869 KLKPC9:0 LISTENING
TCP [::]:3587 KLKPC9:0 LISTENING
TCP [::]:5357 KLKPC9:0 LISTENING
TCP [::]:10243 KLKPC9:0 LISTENING
TCP [::]:49152 KLKPC9:0 LISTENING
TCP [::]:49153 KLKPC9:0 LISTENING
TCP [::]:49154 KLKPC9:0 LISTENING
TCP [::]:49155 KLKPC9:0 LISTENING
TCP [::]:49157 KLKPC9:0 LISTENING
TCP [::]:49158 KLKPC9:0 LISTENING
What is available to identify the processes that are listening on these ports?
Under UNIX, I use the lsof (list open files) which provides the necessary output. What is available under Windows?