Skip to content

TCP Table

Evidence: TCP Table
Description: Collect TCP Table
Category: Network
Platform: windows
Short Name: tcpt
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Windows maintains a table of all active TCP connections including local/remote addresses, ports, connection state, and the process ID that owns each connection.

Active TCP connections can reveal malware C2 communications, lateral movement, data exfiltration, and unauthorized network access in progress.

This collector gathers structured data about tcp table.

FieldDescriptionExample
StateConnection state5 (ESTABLISHED)
LocalLocal IP address192.168.1.100
LocalPortLocal port number49152
RemoteRemote IP address93.184.216.34
RemotePortRemote port number443
ProcessIDOwning process ID1234

This collector uses Windows API to enumerate TCP connections:

  • GetExtendedTcpTable with TCP_TABLE_OWNER_PID_ALL flag
  • Includes all TCP connection states
  • Associates connections with process IDs

TCP states include: CLOSED, LISTEN, SYN_SENT, SYN_RECEIVED, ESTABLISHED, FIN_WAIT_1, FIN_WAIT_2, CLOSE_WAIT, CLOSING, LAST_ACK, TIME_WAIT.

Active TCP connections can reveal ongoing malicious activity. Investigators use this data to identify active C2 communications, detect data exfiltration in progress, track lateral movement connections, identify unauthorized remote access, correlate network activity with processes, and detect suspicious port usage.