tshark
Packet analysis tool, CLI version of Wireshark. More information: https://tshark.dev/.
-
Monitor everything on localhost:
tshark
-
Only capture packets matching a specific capture filter:
tshark -f '{{udp port 53}}'
-
Only show packets matching a specific output filter:
tshark -Y '{{http.request.method == "GET"}}'
-
Decode a TCP port using a specific protocol (e.g. HTTP):
tshark -d tcp.port=={{8888}},{{http}}
-
Specify the format of captured output:
tshark -T {{json|text|ps|…}}
-
Select specific fields to output:
tshark -T {{fields|ek|json|pdml}} -e {{http.request.method}} -e {{ip.src}}
-
Write captured packet to a file:
tshark -w {{path/to/file}}
-
Analyze packets from a file:
tshark -r {{path/to/file.pcap}}
License and Disclaimer
The content on this page is copyright © 2014—present the tldr-pages team and contributors.This page is used with permission under Creative Commons Attribution 4.0 International License.
While we do attempt to make sure content is accurate, there isn't a warranty of any kind.