A network traffic monitor and logger. Monitor all your network connections in real-time or browse historical reports. See what, when and where with a built-in packet sniffer. Automatically resolves IP addresses to hostnames. Supports proxies.
There are many reasons why you may want to monitor your Internet traffic flows. I'll point out only a few of the most popular reasons. No anti-virus can guarantee you 100% protection from Trojan Horses and malicious spyware or adware programs. Some of them are highly customized and checking against anti-virus databases does nothing. They also slow down your Internet connection. Needless to say that identity theft or using your computer as a peer-to-peer network hub for pirated software, music and video downloads without you even knowing about this may certainly have unwanted consequences. If you share your computer with family members or you administer computers in your office, knowing the Internet traffic details becomes essential. Network load balance, security reasons and more...
Recently I've come across a wonderful utility that serves just this purpose. IP Traffic Monitor sits in your system tray and monitors all your network connections. You can either monitor the active connections in real-time or browse historical logs. The program shows extensive information about each connection: remote host IP, remote host name (if available), amounts of incoming and outgoing traffic through this connection, timestamps of the first and last activity of this connection, name of the process that initiated or accepted this connection, full path to the application the process belongs to, etc. The traffic summary indicator shows an upload and download speed graph and traffic totals. In addition it draws pie chart diagrams that illustrate the percentage of certain hosts in the total incoming and outgoing traffic.
It would be naive to expect packet sniffer functionality from a $39.95 utility. Yet, IP Traffic Monitor includes a full-featured sniffer. You can easily capture and analyze TCP packets. Captured packets can be saved to a log file or analyzed in place. For example, you can analyze HTTP requests including passwords and other data that is sent to servers from your PC.