?
Solved

How can I tell what is listening on port 1000?

Posted on 2006-10-29
4
Medium Priority
?
357 Views
Last Modified: 2010-04-03
I need port 10000 on a Win2k3 server for Backup Exec 9.1 Remote Agent but it is already being used by some application.  (If I change it, I will have to change it on several dozen other servers that have BUE RA installed as well).  NETSTAT -a reveals the following:  

TCP    <ServerName>:10000    <ServerName>.<DomainName>:0    LISTENING
TCP    <ServerName>:10000    <ServerName>.<DomainName>:1038    ESTABLISHED
TCP    <ServerName>:10000    <ServerName>.<DomainName>:kpop    ESTABLISHED

How can I tell what application is using port 10000 so I can change it?  

Louis
0
Comment
Question by:LWood
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 29

Accepted Solution

by:
Nightman earned 1000 total points
ID: 17829869
try netstat -o (will show you the pid - look for this in task manager)

otherwise download tcpview from www.sysinternals.com
0
 
LVL 11

Expert Comment

by:jimbecher
ID: 17830710
Running MAS90 by any chance?
0
 
LVL 2

Expert Comment

by:Machin__Shin
ID: 17833243
0
 
LVL 16

Expert Comment

by:btassure
ID: 17834130
netstat -ano will list all open and listening connections, their states and the PID that the program is using. You can then open task manager, go to view => select columns => check the pid box and then find the pid that you are looking for in netstat by looking for its port.

If there are loads of open ports (on servers etc) try netstat -ano > c:\netstat.txt and view it in notepad
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question