

We can even do this inverse of this and filter out the specific IP Filtering Out (Excluding) Specific IP in Wireshark

This expression translates to “pass all traffic with a source IPv4 address of 192.168.2.11 or a destination IPv4 address of 192.168.2.11.”Īs you can see the packets displayed in the Packet List Pane all contain 192.168.2.11 in either the source or the destination column. Use the following display filter to show all packets that contain the specific IP in either or both the source and destination columns: ip.addr = 192.168.2.11 Related: Wireshark User Interface (GUI) Overview Filtering Specific IP in Wireshark It’s also possible to filter out packets to and from IPs and subnets.īeyond that, you can use IP filters as both capture filters (only capture packets based on the filter) and display filters (filter the display of captured packets). We can filter to show only packets to a specific destination IP, from a specific source IP, and even to and from an entire subnet. With Wireshark we can filter by IP in several ways. One of the most common, and important, filters to use and know is the IP address filter. This amounts to a lot of data that would be impractical to sort through without a filter.įortunately, filters are part of the core functionality of Wireshark and the filter options are numerous. Unless you’re using a capture filter, Wireshark captures all traffic on the interface you selected when you opened the application. To do this, click View > Name Resolution and select “Resolve Network Addresses.The ability to filter capture data in Wireshark is important. The details of the highlighted packet are displayed in the two lower panes in the Wireshark interface.Ī simple way to make reading the trace easier is to have Wireshark provide meaningful names for the source and destination IP addresses of the packets. The packets are presented in time order, and color coded according to the protocol of the packet. If Wireshark isn’t capturing packets, this icon will be gray.Ĭlicking the red square icon will stop the data capture so you can analyze the packets captured in the trace. This gives you the opportunity to save or discard the captured packets, and restart the trace. Shark fin with circular arrow: If this is green, clicking it will stop the currently running trace.If Wireshark isn’t capturing packets, this icon will be gray. Square: If this is red, clicking it will stop a running packet capture.Shark fin: If this is blue, clicking it will start a packet capture. If Wireshark is capturing packets, this icon will be gray.
