Connections

The Connections screen is a live socket table. Every TCP / UDP flow the OS knows about, refreshed every 2 seconds.

Connections

Columns

Application

Process name. System for kernel-level flows (e.g. SMB, NetBIOS). Unknown (PID: X) when process metadata isn’t readable.

PID

OS process id.

Proto

TCP or UDP.

State

TCP state (LISTEN, ESTABLISHED, TIME_WAIT, …) or NONE for UDP.

Dir

INBOUND (the remote initiated) or OUTBOUND.

Remote

IP:port. 0.0.0.0:0 for listeners and unbound UDP.

Bytes ↑ / ↓

Cumulative since this socket opened.

Filters

  • Search box — substring match against application or remote address. Case-insensitive.

  • State dropdown — filter to LISTEN, ESTABLISHED, TIME_WAIT, … Useful for spotting dangling sockets.

Common workflows

"Who is this app talking to?"

Search by process name → look at the Remote column. Reverse-DNS lookup is not done by NetClamp (it would be slow + leak DNS for every flow), so the column is raw IPs. Use a separate WHOIS / IP-info tool.

"What’s that LISTEN socket?"

Filter to LISTEN. Anything bound on 0.0.0.0:port is reachable from the network; 127.0.0.1:port is loopback-only. NetClamp itself listens on 127.0.0.1:9845 (REST) and 127.0.0.1:9846 (gRPC) — they should always show up.

"I want to block this specific flow"

Right now, rules match by app + (optional) remote address/port. There’s no per-flow kill switch in the SPA. To kill a specific socket, use netsh interface tcp delete tcpsocket — outside NetClamp’s scope.

Self-protect

NetClamp’s own service connections are filtered out of the Connections view by the same self-protect filter that hides them on Dashboard. You’ll never see netclamp-service.exe or netclamp-tray.exe here.