All Products
Search
Document Center

:Troubleshoot high network bandwidth on a Windows instance

Last Updated:Mar 25, 2026

In Windows, you can use tools like Task Manager, Resource Monitor, or Wireshark to view network traffic metrics. This topic describes how to identify and resolve issues related to high bandwidth utilization on a Windows ECS instance.

Symptoms

You may experience the following issues when using a Windows ECS instance.

  • Slow service response times or access timeouts.

  • When you monitor network metrics for the instance in the ECS console, you observe high network bandwidth utilization. Utilization greater than 80% is generally considered high.

  • You receive alerts indicating that network bandwidth utilization has exceeded the configured threshold.

Possible causes

High bandwidth utilization may be caused by the following:

  • Frequent access from normal services consumes high bandwidth.

  • Malicious activities, such as application-layer CC attacks, DDoS attacks, viruses, or trojans, trigger network traffic.

    Note

    In some cases, third-party malware may disguise itself by using the names of operating system processes such as svchost.exe or tcpsvcs.exe, leading to high bandwidth utilization for these processes.

  • Built-in Windows services, such as the Windows Update service, consume high network traffic.

Procedure

View network metrics in Resource Monitor

Windows provides several tools to identify the cause of high bandwidth utilization, including Task Manager, Resource Monitor, Performance Monitor, and Process Explorer. You can also use Wireshark to capture network packets over a period for in-depth traffic analysis.

Note

In Windows Server 2008 and later, the built-in Resource Monitor is commonly used to monitor bandwidth.

  1. Log on to the Windows instance by using Workbench.

  2. On the taskbar, click Search, enter Resource Monitor, and press Enter.

  3. In the Resource Monitor window, identify the processes that are consuming excessive bandwidth.

    image

    Note

    To view detailed information about a process, use Task Manager. In the Processes tab of Task Manager, find the abnormal process that you identified in Resource Monitor. Right-click the process name and select Properties, Go to details, or Open file location. Use this information to determine whether the process is malicious.

(Optional) Use TCPView for network connections

If Resource Monitor shows no processes with high bandwidth utilization but the instance's overall bandwidth utilization remains high, external services are likely accessing your instance. In this case, use Microsoft's official TCPView tool for further analysis. This tool displays a detailed list of all TCP and UDP network connections on your system, including local and remote addresses and the state of TCP connections.

  1. Download and decompress the TCPView tool.

    Visit the official Microsoft website to download the TCPView tool, and then decompress the downloaded package.

  2. Double-click to open the TCPView tool and view network bandwidth details.

    image

    As shown in the figure, the remote address 123.xxx.xxx.74 is transferring data to the instance and consuming the most network bandwidth.

(Optional) Use Wireshark to analyze traffic

For in-depth analysis of traffic data, you can use Wireshark to capture and analyze network packets.

  1. Install and start the Wireshark tool.

    Visit the Wireshark official website, obtain the Wireshark installation package, and then install the Wireshark tool.

  2. Choose Capture> Options.

  3. On the Wireshark Capture Options page, select a network interface for packet capture based on the interface name or IP address and click Start.

    image

  4. In the Wireshark toolbar, choose Statistics>Conversations.

  5. On the Conversations page, you can view all network communications and detailed traffic information for the data link, IP, and TCP layers, including traffic between both endpoints. Capturing packets over time allows you to analyze which connections and ports are consuming the most traffic.

    image.png

Note

You can further analyze network data by capturing packets. For more information, see Use Wireshark on a Windows instance.

Resolve high network bandwidth

The following table describes common causes of high network bandwidth utilization and their solutions.

Problem description

Cause

Solution

An abnormal user program or process consumes excessive network resources for an extended period, or an unauthorized IP address maliciously accesses the service, resulting in a high network load.

The program or process is abnormal and consumes excessive network resources at runtime.

  • Use Resource Monitor to find the process ID (PID) of the program consuming excessive network resources, and then end the process by using Resource Monitor or Task Manager.

    Warning

    Before you end a process, understand its function to avoid interrupting business services.

  • If the attacker's source IP address is known, configure a security group rule to block the malicious access. For more information, see Manage security group rules.

  • If you experience low-to-medium frequency application-layer CC attacks from distributed source IPs, we recommend deploying Web Application Firewall (WAF) for protection. For more information, see Use WAF to defend against CC attacks for an ECS instance.

  • If you are under a high-frequency DDoS or CC attack where the peak traffic exceeds the black hole threshold of Anti-DDoS Origin Basic, your cloud service may enter a black hole state and become inaccessible. In this scenario, enable Anti-DDoS Premium to ensure service availability.

  • If you suspect the process contains a malicious program, perform virus detection and removal.

A normal user program or process consumes excessive network resources for an extended period, or a specific IP address accesses the service frequently, resulting in a high network load.

The program is a normal business process that consumes excessive network resources at runtime.

High network traffic and CPU usage can occur due to frequent business access or native Windows services, such as updates. If your instance experiences a network performance bottleneck, choose a solution based on your specific situation.

  • Check if a Windows Update is running in the background.

  • Upgrade the instance's bandwidth. For more information, see Modify the bandwidth configuration.

    Note

    If the instance's bandwidth reaches its maximum limit but still cannot meet your business needs, consider separating your applications. Host different services on different instances. For example, you can use RDS to host your database service, which reduces the resource consumption and internal calls on your ECS instance.

  • Optimize your business application.

    Consider optimizing your code and adjusting application configuration parameters, such as the number of connections, cache settings, and web and database configurations.

A single business program or process occasionally causes a brief and infrequent spike in network resource usage.

This issue indicates that the business application requires optimization to handle high network consumption triggered by specific scenarios, such as large file uploads or downloads.

Optimize your business application.

Consider optimizing your code and adjusting application configuration parameters, such as the number of connections, cache settings, and web and database configurations.

No single program or process is consuming excessive network resources, but the overall network load is high.

The network resources required by the services on the instance exceed its available network bandwidth.

If the instance experiences a network performance bottleneck, you can upgrade the bandwidth. For more information, see Modify the bandwidth configuration.

Note

If the instance's bandwidth reaches its maximum limit but still cannot meet your business needs, consider separating your applications. Host different services on different instances. For example, you can use RDS to host your database service, which reduces the resource consumption and internal calls on your ECS instance.

Related documents