Network Monitor
Network Monitor provides real-time visibility into your network connections and bandwidth usage. See which applications are communicating over the network, how much data they're transferring, and identify anything unexpected.
Understanding the Display
Network Monitor shows live network statistics updated in real-time:
| Download Speed | Current incoming data rate (Mbps or Kbps) |
| Upload Speed | Current outgoing data rate |
| Total Downloaded | Cumulative data received this session |
| Total Uploaded | Cumulative data sent this session |
| Active Connections | Number of open network connections |
The graph displays bandwidth over time, making it easy to spot patterns and spikes.
Monitoring Active Connections
The connections list shows every active network connection on your system. For each connection, you'll see:
Process name. Which application owns the connection. This helps identify unexpected network activity.
Remote address. The IP address or hostname the connection is communicating with.
Remote port. Which service port is being used (80 for HTTP, 443 for HTTPS, etc.).
Protocol. TCP, UDP, or other network protocols.
State. Whether the connection is established, listening, or in another state.
Identifying Unusual Activity
Network Monitor helps you spot potential security issues:
Unknown processes. If you see a process you don't recognize making network connections, investigate it. It could be legitimate background software or something malicious.
Unexpected destinations. Connections to unfamiliar countries or suspicious domains warrant investigation.
High bandwidth usage. If your connection is slow, identify which application is consuming bandwidth.
Unusual ports. Most legitimate traffic uses standard ports. Connections on unusual ports may indicate malware or misconfigured software.
Process Investigation
Click on any connection to see more details about the process:
- Full executable path
- Process ID (PID)
- Data transferred by this connection
- Connection duration
If you find a suspicious process, you can:
- Right-click to end the process (use caution)
- Open the file location to investigate
- Search online for the process name
- Ask StealthAI about the process
Bandwidth Analysis
Use Network Monitor to understand your bandwidth usage patterns:
Identify bandwidth hogs. Sort connections by data transferred to find which applications use the most bandwidth.
Verify VPN routing. Check that traffic is flowing through the VPN interface as expected.
Diagnose slow connections. If browsing feels slow, Network Monitor reveals whether the issue is bandwidth saturation, high latency, or something else.
VPN Integration
When VPN is connected, Network Monitor shows traffic through the VPN tunnel. You can verify:
- Traffic is routing through the VPN interface
- Split-tunneled apps are correctly bypassing VPN
- DNS queries are using secure DNS servers
- No unexpected connections are leaking outside VPN
Best Practices
Check periodically. Regular monitoring helps you understand normal patterns, making anomalies obvious.
Investigate unknowns. Don't ignore unfamiliar processes. Take time to verify they're legitimate.
Use with Stealth Firewall. If you find unwanted connections, use Stealth Firewall to block that application's network access.