Where traffic disappears. How to find out Internet traffic: magic lattices, asterisks and zeros. Sending "service information" can also waste the Internet

Sooner or later, the question arises where the money goes on the Internet. Often, users need information that fully provides step-by-step instructions for acquiring information - what the traffic is used for when connecting to the Internet via the DRO. This special technology will be useful when clarifying the reasons for the increased traffic consumption.

Instructions

1. You need to run the command line cmd.exe. To do this, select the "Run" item from the "Start" menu.

2. In the window that has opened, in the line with the blinking cursor, type cmd.exe. Press enter. A standard interpreter window has opened: it is permissible to skip this step and go directly to the next step in the command line of your file administrator, for example, FAR. 111111

3. Next, you need to type the network command netstat.exe /? (Primitive netstat /? Is allowed). It is allowed to start it by pressing the "Enter" key. As a result, we get a list with hints, namely, what result the network program can produce when operating certain keys. In this case, we will be interested in more detailed information about the activity of network ports and specific application names.

4. Next, we need to check if some criminal is now scanning our car. Enter in the command line: Netstat -p tcp –n or Netstat -p tcp –n. Here it is required to draw your attention to the fact that often the same external IP-address does not repeat too much (the 1st IP is the local address of your machine). In addition, a huge number of entries of this type: SYN_SENT, TIME_WAIT from one IP can also indicate an intrusion attempt. Frequent repetitions of network ports 139, 445 of the TCP protocol, and 137, and 445 of the UDP protocol, from an external IP, are allowed to be considered dangerous.

6. We type the following: Netstat –b (manager rights are required here). As a result, a large protocol will be unloaded with statistics of all your applications on the Internet: This section of the protocol shows that the uTorrent.exe program (a customer for downloading and distributing files on the BitTorrent network) was distributing files to two machines on the network from open local ports 1459 and 1461.

7. Your right to decide whether to stop this application. Perhaps there is some sense in removing it from startup. Here, the activity of other legal programs that work with network services is more closely detected: Skype, Miranda, and the second one works through the secure https protocol.

8. The final goal of this review should be to identify unknown applications that, without your knowledge, connect to the Internet (you don't know what they transmit). Further, you are more closely obliged to apply different methods of dealing with "harmful" applications, starting with disabling them from startup and ending with checking with special utilities.

Internet control traffic will help to save on its use and protect against such actions, which are usually called interception traffic... In addition, there is an additional chance of protecting yourself from information loss and from spyware and Trojans. There is a fair number of software products working in this direction.

Instructions

1. For check traffic use the Traffic Inspector program, prepared in order to take into account and save traffic on the Internet. The program allows you to systematically monitor and control tariffs, to control the speed and load of the channel. With the help of Traffic Inspector, it is allowed to check for the presence of viruses in mail and web traffic, take into account all letters, filter spam. The program allows you to block ads and pop-ups, as well as unwanted sites.

2. Download a free program like BitTally that can provide everything you need to record, monitor and review your network traffic .

3. Many enterprises and companies are now installing ProxyInspector - an accounting system traffic... The above program is designed for accounting traffic the Internet and control over the targeted use of the Internet by the company's employees. But these are all multifunctional programs.

4. There are a number of dozen comfortable free programs with a close specialization aimed at counting traffic and control of Internet costs. These programs are perfect for working on a local network. These include - free software products vAv Traffic Watcher and vAv iNet StatistiX (av4sx.nm.ru). The first one examines every byte in detail and scrupulously and will promptly remind you that the daily or monthly limit has been exceeded or even will break the connection on its own in order to prevent overspending of funds.

5. If you need to calculate your financial investments in banknotes of any country, calculate the schedule for the loss of money that occurred during the week, and determine the current state of the account, download vAv iNet StatistiX (av4sx.nm.ru).

6. More powerful program TMeter (www.tmeter.ru), is able to maintain and control statistical data concerning traffic separately for the local network and the Internet, it has a strong filter system, by means of which it is allowed to count only the traffic that is suitable.

7. All programs have a subconsciously intelligible interface and user menu, and therefore the downloaded software only needs to be launched. The result of the program is given in the form of tables.

Traffic in relation to computer information networks is the number of information transmitted or received over a certain period of time. Internet users have to follow it exclusively observationally if the amount of payment for the provider's services in any billing period depends on this indicator. There are several ways to find out the amount of used Internet traffic.

You will need

  • Internet connection agreement or login and password for an individual account.

Instructions

1. Use the subscriber's "personal account" on the website of your Internet provider - this is probably the easiest way to find out the amount of traffic spent in the current billing period or for any of the past months. The link to enter such an account is usually placed on the main page of the company, and the login and password are issued together with the documents for connecting to the service.

2. Each provider develops its own version of the user interface for the office, therefore, unfortunately, there are no complete recommendations for all, where exactly in the office should be looked for indicators of used traffic. For example, when using the "Home Internet" from the "Beeline" company, immediately after authorization, go to the "Internet" tab and click the "Statistics" link. On the page that eventually opens, you will see a table where, for all of the last 13 months (including the current one), the number of traffic spent on purchasing and sending, as well as the total amount of time spent on the network will be separately indicated. If you do not use one of the unlimited tariffs, then this table will indicate the amount of payment corresponding to these indicators.

3. The names of the months in this table are clickable - if you want to know more about the exact division of traffic by days within a month, click on the link to it. The table, broken down by day, in turn, makes it possible to see an even more accurate division of traffic within any day - by session.

4. Use the customer support phone number of your Internet provider if your personal account is unreachable for some reason. It is allowed to find out the phone number in the Internet connection agreement or instructions received together with it. It must also be listed on the company's website. Call this number and ask the operator about the amount of traffic you have spent. In this case, be prepared to give the number of the contract and the surname / name / patronymic of the person to whom it is issued.

5. Install some program for calculating received and sent traffic. True, applications of this kind are more comfortable for calculating the distribution of the consumed traffic by computers on your local network, and may not coincide with the statistics of the Internet provider.

A computer connected to the Internet in some way has a unique address to identify it. You can find out the address of your PC using the menu of special online services.

You will need

  • - a computer;
  • - Internet connection.

Instructions

1. Check if your computer has an energetic internet connection. If so, then your computer was mechanically assigned an IP address when connecting to the network. In case you need to determine your external IP address, open your browser and follow the further link: http://2ip.ru/whois/. The displayed information will indicate the address of the computer. When reconnecting, it may change depending on the ISP you are using. If you were provided with a dynamic IP (relevant for most cases of connections using the special Dial Up technology and with a dedicated Internet), then when you reconnect, most likely each, your computer will have a different external IP. If your provider provides you with a static (continuous) address, then it will not change.

2. If you want to find out the IP address of another computer, use a firewall and programs for exchanging messages and files over a direct connection, for example, Skype or Miranda. Contact the owner of the computer whose external address you care about. Start the firewall by adding the messaging program to the list of exceptions in advance, if this was not previously provided by the security settings on your computer.

3. Send your interlocutor a file from your computer, note that you need to accept data on his part, otherwise you will not see his IP address. After the file starts uploading, open your firewall and view the stream of information being sent. The external address of the recipient's computer will also be indicated there.

4. If you do not want other Internet users to find out your external IP address, hide it using special programs or anonymizing sites. They work on the thesis of assigning a mask address to your computer, after which it will be displayed as your external IP on various sites or with direct connections.

Related Videos

Helpful advice
For safety reasons, do not use direct connections.

Many Internet surfers spend day and night on the world wide web, so their traffic quickly goes away and often ends at an inopportune moment. To prevent this from happening, the owners of PCs and mobile devices were allowed to control the gigabytes that the modem distributes, or that are part of the SIM card tariff plan in the phone.

How to find out the Internet traffic on a computer

When the internet stops working, there is a bit of confusion. It would seem that he typed into his search line "How to check Internet traffic", and then the results for any operators flew out: the check is provided by Rostelecom, Iota, Vin Mobile ... To avoid this, take care of the available number of gigabytes in advance.

The lion's share of PCs runs on Windows 10. This operating system allows you to easily find out how much traffic is consumed on your computer and where the Internet goes. To obtain the necessary data, you need to make a few simple clicks: go to Start-Settings-Internet Network. The last section contains all information on network interfaces.

Here you can see the downloaded gigabytes, download speed, which applications spend the most home Internet. In Windows 10, you can keep information about traffic consumption close at hand. To do this, go to the "Data Usage" section and pin it to the home screen of the monitor. The information tile will appear immediately after pressing the "Yes" key.

There are many applications on the world wide web that help you check the amount of remaining traffic. Judging by the reviews, good programs that really help can be fit into a list of three:

  • GlassWire;
  • NetLimiter;
  • TMeter.

Applications are downloaded and used on a PC. There you can find out where the paid Internet is spent, which device spends it.

You can also determine the consumption of gigabytes on a PC by calling the support service of each provider. For example, Rostelecom announces the balance by calling 8-800-1000-800. By calling this number, you can find out the threshold at which the connection speed is reduced to the minimum or change the tariff plan to a more convenient one.

Mobile Internet is now distributed by many cellular providers. Finding out the rest of the traffic on your phone is quite simple: online through your personal account or using your smartphone. USSD commands for checking the remainder of packets:

  • Tele2 give information about gigabytes by command * 155 * 0 #;
  • Megaphone - * 105 * 00 #;
  • Vin mobile is a relatively new operator in Crimea - * 815 #;
  • Wave mobile - also a Crimean mobile service provider - gives out the rest of the packages on the command * 101 *;
  • how to find out the Internet traffic on MTS? By number * 107 # or by SMS to number 5340;
  • The motive will tell you everything about the traffic by the number * 114 * 102 #;
  • But Beeline was cheated, and the rest of the traffic from them can only be checked in the LC.

Since black and yellow networkers are so cunning, we cannot ignore them. A decent number of people use Beeline's mobile Internet. The question of how to check the Internet on Beeline does not lose its relevance, because the number of subscribers is constantly growing, and the operator's check functions are not so easy to find.

The easiest way is to ask the answering machine how long you still have to use the Internet. You can ask this question by dialing 06745 (or not, you will still be answered). In addition, getting data will help:

  • internet command * 102 #. Here you will find out the balance, but additional options will tell you about the traffic;
  • online personal account. This will require registration and filling in the data, but you will always be in the know;
  • "My Beeline" - the same, only in the application on the smartphone.

Sitting in our age without the Internet because of your forgetfulness is simply insulting. Especially if you have a Megafon tariff plan. This provider gives users of the popular All Inclusive VIP tariff 20 GB per month, but many smartphone owners manage to spend a month's supply in a couple of weeks without any problems. These people need the ability to control the rest of the Internet. You can do this in any way:

  • using the aforementioned USSD command or * 558 # combination. Information about the remaining gigabytes will be sent to the mobile device in the form of an SMS message;
  • in your personal account on the website;
  • in the mobile application;
  • call the operator at the toll-free number 8-800-550-05-00. You can call it from mobile and city numbers throughout Russia. The big disadvantage of this method is the queue to the operator. Connecting with company representatives does not always happen very quickly.

A good way to control the Internet is the personal account of a subscriber of any tariff plan. You can use this method through any browser: you just need to go to the official website of the operator and fill out the login form. Enter your phone number in the login field, and the password for activating your personal account will come in the form of SMS to your mobile. After completing the authentication, go to the "Service packages".

Where is traffic flowing to? How to find a "leak" by the simplest means.

They say that there are two mysteries in nature: where does the dust come from, and where does the money go? Similarly, the Internet has its own riddle: where does the traffic "flow"? Of course, in stationary conditions, with modern high-speed lines, this problem has lost its relevance - but as soon as we go on vacation, to nature, to a village, where the only way to connect to the Internet is cellular communication, this problem rises to its full extent. We buy a package of 1-2-4-8 gigabytes from the operator, they seem to have done nothing, but it was used up ((. Where did it go? And is it possible to somehow find the "source of leakage" by "improvised means"?
In general, if you are going to "nature" and will use the Internet with limited traffic, it is highly desirable in advance put a traffic control program. For example, the completely free NetLimiter Monitor. Then, looking at its statistics, we will see, for example, that incoming and outgoing traffic is consumed by the FireFox browser (in the first example) ... or only incoming traffic is consumed by the instant messenger Miranda. Everything is simple and transparent.

All that remains is to look at the amount of traffic and make a decision on disabling, permanent or temporary, the program - an unnecessary consumer of traffic. But what if such a program is not installed in advance and you cannot reboot the system (and after installing NetLimiter Monitor it will be required)? Or is there no way to download this or a similar program at all? "No exit?" (tsy). It turns out that everything is not so sad.
For radio amateurs, when it is not possible to use an accurate, "qualitative" meter, they often use a "quantitative" meter - which is usually called a tester. In our traffic control system, the tester will be an indicator of a local network / wireless network / modem - in general interface through which the computer is connected to the interface. Also, such a tester can be an indicator of the amount of incoming / outgoing traffic of the Dashboard of a cellular modem (cellular modem control program).
How to determine which indicator to target? There may be several network / wireless / modem indicators in the tray. It's very simple if you exactly If you have no idea what indicator to look at, then you can track the one we need by changing the activity. Try, for example, to load any website in a browser and see which indicator has become active - lit up or blinked frequently. If there is a red cross next to the indicator, you can immediately ignore it. In the example screenshot, the active interface is marked with a green dot, and the inactive one is marked with a red one.
Having found the indicator of our Internet connection, we can now start the audit. First, let's roughly estimate - there is a "leak" in general. Let's stop accessing the Internet, wait for all sites to load, etc. - and look at our indicator. It should not burn. If it does not ignite for a long time, even for a short time, most likely there is no "unproductive leak". But, most likely, you will notice that it "flashes" periodically. It means that some program is accessing the Internet. Let's try to find - which of the programs (or browser tabs) does this.
How to determine which of the heap of programs that are currently active in the computer is accessing the Internet? Let's use the "Wolf method" from "Just Wait!" Remember when, chasing the Hare, he ran into the TV store? To determine where the Hare was hiding, he began to turn off the televisions - and in the end he found him. So we will try to find a "hare" or "hares".
To do this, we will use the TaskManager. With the "normal" system TaskManager, we unload programs when they freeze. Is it possible for them, on the contrary, to introduce programs into a controlled "freeze"? Unfortunately not - the standard system TaskManager cannot. But there are a huge number of alternative TaskManagers that can do it. We will not consider all such programs - we will limit ourselves to only two.
The first and powerful enough is. Despite such a loud name, it is completely safe for the system and very powerful in terms of research and management of running programs and processes. Download and install it - it will help you not only in this matter - many issues of the system operation can be clarified with its help. If you are unable or unable to install the program (for example, if the installation of programs is prohibited or do not want to add it to the program group), download the portable version. It will allow you to start exploring the system "on the fly", without unnecessary installations. In addition, you can record the portable version on a USB flash drive and use it anywhere.
Run it and let's take a look at the main window, the Processes tab. You will see many programs and processes running on your system. The lower the program is in the window, the later it is launched. The lowest program in the window was launched last.

By the way, this program also indirectly shows which program is accessing the Internet (although not only). Looks at the I / O Total column. If the program has non-zero digits in this column, then the program is engaged in data exchange with the "outside world" - in relation to the program memory, of course. If programs related to the Internet (the list will be at the end of the article) this figure is non-zero, we can safely include it in the list of suspects.
Now how are we going to search for programs that are "active" with the help of this program? Very simple. Starting from the bottom (with the most recent ones), let's start "freezing" Internet programs. To do this, right-click on the name of the program and select from the menu Suspend Process... After that, we look at our indicator - have you stopped accessing the Internet? If yes, then we found all programs that "feed" traffic (there are probably more than one of them). If the calls have not stopped - but the "rate" of blinking has changed - then the "frozen" program is almost certainly one of "those". If nothing has changed - "unfreeze" the program by right-clicking on the name of the program and selecting Resume Process.

After the "list of the accused" is ready, we will assess what to do with it. If the list includes only instant messaging and communication programs - for example, like Skype (skype.exe), ICQ (icq.exe), Qip (qip.exe), Miranda (miranda32.exe) - then you need to think about whether to keep them constantly active. The fact is that these programs constantly exchange data over the Internet - and this cannot be avoided. Some consume little traffic (for example - ICQ, Qip, Miranda), others - a little more (for example Skype) - but the exchange will be in any case. So if you want to save money on these programs, quit them when you are not using them. Or "freeze" the TaskManager for idle time. But, by the way, any of these programs consumes very little traffic - so if you do not have a very limited traffic package, you can leave these programs running all the time.
Another group of programs that can consume traffic even in a "dormant" state are browsers. Such as Internet Explorer (iexplorer.exe), Mozilla FireFox (firefox.exe), Mozilla SeaMonkey (seamonkey.exe), Opera (opera.exe), Google Chrome (chrome.exe), Safari (safari.exe) - well, maybe others. Some of the pages on the sites you open may be configured to periodically download information to update the screen state. Its volume can be significant at times. Unfortunately, there is no easy way to "freeze" a browser bookmark. Therefore, in the "first pass" you will have to bypass all bookmarks and close all suspicious ones. For the future, having identified such pages, do not leave them after viewing - but close them. The sites themselves can be very different - for example, this year I saw that the pages of the GisMeteo site are periodically (and quite often) updated - although the weather does not change so quickly)).
There may also be "forgotten" programs that are automatically loaded when the system boots - most often these are programs for working with torrents (trackers) - for example, muTorrent (uTorrent.exe). Just forbid such programs to start automatically - while you are in conditions of limited traffic.
If the program does not belong to the above and it is not a system one (see the list below), then there is a reason to be alerted. It is very likely that your system is infected with a virus / trojan - and it quietly does its "dirty deed" without notifying you. "Freeze" such processes and do not "unfreeze" them - and search the Internet for what kind of program it is. If this is a harmless program, then just turn it off for the duration of the "limited exchange". If, according to information on the Internet, it is a Trojan / Virus program - disinfect your computer.
If the traffic is consumed by a system program, then it is best to enable the firewall in the system - a system program or an external program - and prohibit unnecessary calls. Configuring furewall is a matter of a separate article, but the Internet is full of all kinds of configuration descriptions. Use what you understand. The firewall will allow you to control traffic more precisely and will allow you to block access to the Internet for those programs that you do not want to "release".
But, you say, this one is difficult enough for beginners. Isn't there anything of the same functionality - but as simple as possible? It turns out there is! This is an extremely simple, but at the same time quite powerful Task Manager, which has the ability to "freeze" / "unfreeze" programs - and at the same time does not require installation. its size is generally negligible - 38.4k the program itself and about 100k - all files. This size will not "ruin" your traffic packet much.
After you run it (it is better to put it in startup at all - it needs very little memory) you can call it by the keyboard shortcut Ctr + Shift + ~... We will see a window with a list of running programs - the higher the program, the later it is launched. The most recent is at the top of the list.
In order to "freeze" the program, click on it and through the context menu (invoked by the right mouse button) select "Pause / Continue the process". The symbol will appear to the left of this program. To "defrost" once again through the context menu, select "Pause / Continue process". The program is "defrosting", the symbol disappears. Thus, we can quickly "freeze" all suspicious programs and see how the activity of the network / wireless network / modem indicator changes from this. By the way - clicking on the "cross" of closing the program does not end its work, but only "hides" its window, which can be called up again by Ctr + Shift + ~.
Now, using one of these programs, you can find the "source of the leak" and decide what to do with this program / programs.

Application - names of programs and their executable files that appear in the list of TaskManagers:

Browsers:
Internet Explorer - iexplorer.exe
Mozilla FireFox - firefox.exe
Mozilla SeaMonkey - seamonkey.exe
Opera - opera.exe
Google Chrome - chrome.exe
Safari - safari.exe
Maxthon Browser - maxthon.exe

Instant messaging and communication programs:
Skype - skype.exe
ICQ - icq.exe
Qip - qip.exe
Miranda - miranda32.exe
R&Q - rnq.exe

P2P programs (for torrenting and direct file sharing):
muTorrent - uTorrent.exe
Edonkey - edonkey.exe
Emule - emule.exe

System programs - do not "freeze" them unnecessarily - a complete "freeze" of the system is possible !:
System Idle Process
System
smss.exe
winlogon.exe
services.exe
lsass.exe
svchost.exe

The list is given more as an example, only the most famous programs are listed. If you see a program not from this list - look on the Internet what kind of executable file it is

The article is discussed on the General Forum in this top.
A copy of the article has been posted

An urgent problem for owners of tariffs with a limit on the speed or amount of information (as well as USB modems) or "low-speed Internet". It seems that the Internet is there, but the speed is not enough even to open pages on the Internet. If you are accustomed to this and resigned yourself, then you can continue not to pay attention. But still, I think everyone will be interested in what programs or applications use Internet traffic.
By the way, sometimes in this way you can recognize and see some unfamiliar process or application that you do not know, and it can be a virus or spyware that sends your data (or monitors your actions) and sends it to someone through the Internet.

You can find out what your Internet traffic is eating in several ways.

1) Through the standard one. But there is one big drawback - only in Windows 8 does it show in the tab Processes in a collumn Network.

In other editions (versions) of "Windows" there is no such thing. More precisely, there is, but there is not what is needed.

2) Through and various firewalls that provide.
But there is also a catch - not everyone gives such an opportunity, and there are also paid options. Although I use it and it suits me. Shows, by the way, that he uses the Internet too. Like all firewalls in principle.

3) Through third-party special programs.
I consider this option to be the best and most effective, because it is suitable for all versions of the OS and you do not need to pay, because all programs are free.

The first program to be universally recognized is TCPView from .

On the positive side, it can be noted that it does not require installation (portable) and takes up little space (284 kb). The only negative thing about it is that it does not have a Russian-language interface. But to understand it will not be difficult.

After starting the file, the main window looks like this:


It immediately displays all programs that use the Internet, with such characteristics as the port used, and others.
In addition, you can save this list to a text file, as well as customize the display.
When you right-click on a process, you can find out the properties of the process (Process Properties), end it (End Process), close the connection (Close Connection), copy (Copy) and find out what the system thinks about it (Whois ...) (it didn't work for me )

The second program is NetWorx

It does everything the same as the previous program, namely, it tracks and shows which programs are surfing the Internet. The most important and pleasant difference is that it is Russified and has many functions.

After installation and / or launch, the program is minimized in and when you right-click on the icon, the following menu appears:


In fact, the main thing that we need is to find out which programs are eating the Internet. It's on the menu Instruments - Connections


In it, you can also find out what applications are using and you can complete the process by right-clicking on it.

The disadvantage I think is that you cannot find out the properties of the file, and therefore you can only guess what kind of file is and where it is located.
This is probably why many functions are included in it, such as:
- General statistics, in which you can find out how much was received / sent per day / week / month or from other users (if there are several accounts).
- Graph of the current speed.
- Measure the speed of the Internet connection.
- Set up a limit (quota) for the use of Internet traffic. You determine how much you can spend per hour / day / week / month, and then the program will notify you of the limit.
- You can trace or ping the route. In simple words - write the ip address or url of the site, and the program determines how long it takes to send / receive a response and request. In general, this is for more advanced users.

Well, that's all there is to it. With the main task, namely how to find out which programs and applications consume the Internet connection, you figured it out and know what to do.