Network Monitor

Network Monitor

Network Monitor provides real-time visibility into your network connections and bandwidth usage. See which applications are communicating over the network, how much data they're transferring, and identify anything unexpected.

Understanding the Display

Network Monitor shows live network statistics updated in real-time:

Download SpeedCurrent incoming data rate (Mbps or Kbps)
Upload SpeedCurrent outgoing data rate
Total DownloadedCumulative data received this session
Total UploadedCumulative data sent this session
Active ConnectionsNumber of open network connections

The graph displays bandwidth over time, making it easy to spot patterns and spikes.

Monitoring Active Connections

The connections list shows every active network connection on your system. For each connection, you'll see:

Process name. Which application owns the connection. This helps identify unexpected network activity.

Remote address. The IP address or hostname the connection is communicating with.

Remote port. Which service port is being used (80 for HTTP, 443 for HTTPS, etc.).

Protocol. TCP, UDP, or other network protocols.

State. Whether the connection is established, listening, or in another state.

Identifying Unusual Activity

Network Monitor helps you spot potential security issues:

Unknown processes. If you see a process you don't recognize making network connections, investigate it. It could be legitimate background software or something malicious.

Unexpected destinations. Connections to unfamiliar countries or suspicious domains warrant investigation.

High bandwidth usage. If your connection is slow, identify which application is consuming bandwidth.

Unusual ports. Most legitimate traffic uses standard ports. Connections on unusual ports may indicate malware or misconfigured software.

Tip: With VPN active, most connections should route through Stealth's VPN interface. Connections bypassing VPN may be from split-tunneled apps or system processes.

Process Investigation

Click on any connection to see more details about the process:

  • Full executable path
  • Process ID (PID)
  • Data transferred by this connection
  • Connection duration

If you find a suspicious process, you can:

  1. Right-click to end the process (use caution)
  2. Open the file location to investigate
  3. Search online for the process name
  4. Ask StealthAI about the process

Bandwidth Analysis

Use Network Monitor to understand your bandwidth usage patterns:

Identify bandwidth hogs. Sort connections by data transferred to find which applications use the most bandwidth.

Verify VPN routing. Check that traffic is flowing through the VPN interface as expected.

Diagnose slow connections. If browsing feels slow, Network Monitor reveals whether the issue is bandwidth saturation, high latency, or something else.

VPN Integration

When VPN is connected, Network Monitor shows traffic through the VPN tunnel. You can verify:

  • Traffic is routing through the VPN interface
  • Split-tunneled apps are correctly bypassing VPN
  • DNS queries are using secure DNS servers
  • No unexpected connections are leaking outside VPN

Best Practices

Check periodically. Regular monitoring helps you understand normal patterns, making anomalies obvious.

Investigate unknowns. Don't ignore unfamiliar processes. Take time to verify they're legitimate.

Use with Stealth Firewall. If you find unwanted connections, use Stealth Firewall to block that application's network access.