当我使用netstat时,我收到这样的信息 - PID 4表示HTTP.SYS
netsh
因此,使用netsh http show servicestate view=requestq verbose=no
我可以收到有关HTTP层上特定侦听器的信息
Snapshot of HTTP service state (Request Queue View):
-----------------------------------------------------
Request queue name: Other Application Pool
Version: 2.0
State: Active
Request queue 503 verbosity level: Limited
Max requests: 1000
Number of active processes attached: 1
Controller process ID: 1216
Process IDs:
3684
URL groups:
URL group ID: FD00000140000003
State: Active
Request queue name: Other Application Pool
Number of registered URLs: 1
Registered URLs:
HTTP://*:80/
Server session ID: FF00000020000004
Version: 2.0
State: Active
URL group ID: FD00000040000001
State: Active
Request queue name: Other Application Pool
Number of registered URLs: 1
Registered URLs:
HTTP://*:80/UI/
Server session ID: FF00000020000004
Version: 2.0
State: Active
URL group ID: FC00000140000002
State: Active
Request queue name: Other Application Pool
Number of registered URLs: 1
Registered URLs:
HTTP://*:80/API2/
Server session ID: FF00000020000004
Version: 2.0
State: Active
Request queue name: Request queue is unnamed.
Version: 2.0
State: Active
Request queue 503 verbosity level: Basic
Max requests: 1000
Number of active processes attached: 1
Process IDs:
7948
URL groups:
URL group ID: F600000040000002
State: Active
Request queue name: Request queue is unnamed.
Number of registered URLs: 1
Registered URLs:
HTTP://*:80/ADMINISTRATION/
Server session ID: F700000020000004
Version: 2.0
State: Active
netstat
可以在同一端口上侦听多个进程,例如PID 7948和3684。
是否有可能区分哪个进程属于appcmd.exe list requests
输出中列出的同一端口的每个连接?
如果是IIS服务器,则可以列出活动请求
Edittext
,但其他流程呢?
是否有任何API调用,以获取信息?