Solved

Tracing http port to the program using it

Posted on 2004-10-04
5
154 Views
Last Modified: 2010-04-14
how can you figure out what program is utilizing port 80. I have a server screaming when I try to start IIS web saying that the port is already in use. I've seen it using netstat -a, but I'm wondering what program is causing this. I've done a full scan for viruses and trojans with no results. Any help would be great.

0
Comment
Question by:deadhead626
5 Comments
 
LVL 86

Expert Comment

by:jkr
ID: 12218701
TCPViev (http://www.sysinternals.com/ntw2k/source/tcpview.shtml) can do that. You can achieve the same using 'netstat -o' and the task manager.
0
 
LVL 19

Expert Comment

by:Zaheer Iqbal
ID: 12220407
It might summat that is started when setting IIS up reboot and see if it clears..
0
 

Author Comment

by:deadhead626
ID: 12223043
Did both suggestions, nothing changed. Still says Address already in use.
0
 
LVL 2

Accepted Solution

by:
stravze earned 125 total points
ID: 12237739
I would use TCPView but choose options and select Resolve Addresses CTRL + R
This will tell you its your machine access port 80 or something else.

Do you have anything like Microsoft ISA or McAfee Epolicy Orchestrator running on the machine ??
0
 
LVL 2

Expert Comment

by:stravze
ID: 12246516
thanks
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Although a lot of people devote their energy toward marketing for specific industries, there are some basic principles that can be applied to any sector imaginable. We’ll look at four steps to take and examine how those steps were put into action fo…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question