xutil.dev
Login

Wireshark Display Filter Cheatsheet

Quick reference for Wireshark display and capture filters covering protocol filters, HTTP, DNS, TCP analysis, statistics, and export options

Related Categories:Network

67 commands

ip.addr == {ip}

Show packets for specific IP

ip.src == {ip}

Filter by source IP

ip.dst == {ip}

Filter by destination IP

ip.addr == {cidr}

Filter by subnet

eth.addr == {mac}

Filter by MAC address

frame.len > {n}

Frames larger than n bytes

frame.time >= "date"

Frames after specified time

frame.number == {n}

Show specific frame number

!(filter)

Negate filter (NOT)

filter1 && filter2

Combine filters with AND

filter1 || filter2

Combine filters with OR

host {ip}

Capture traffic for host

net {cidr}

Capture by network range

port {n}

Capture traffic on port

portrange {a}-{b}

Capture port range

tcp

Capture TCP only

udp

Capture UDP only

not broadcast

Exclude broadcast traffic

tcp

TCP protocol packets

udp

UDP protocol packets

icmp

ICMP protocol packets

arp

ARP protocol packets

tls

TLS/SSL protocol packets

ssh

SSH protocol packets

ftp

FTP protocol packets

smtp

SMTP protocol packets

http

HTTP protocol packets

http.request

Show HTTP requests only

http.response

Show HTTP responses only

http.request.method == "GET"

HTTP GET requests

http.request.method == "POST"

HTTP POST requests

http.request.uri contains "path"

Requests with URI containing string

http.host == "domain"

HTTP requests to specific domain

http.response.code == {n}

Specific HTTP status code

http.response.code >= 400

HTTP error responses

http.content_type contains "json"

HTTP packets with JSON content

dns

DNS protocol packets

dns.qry.name == "domain"

DNS queries for specific domain

dns.qry.name contains "str"

DNS queries containing string

dns.qry.type == 1

A record queries

dns.qry.type == 28

AAAA record queries

dns.qry.type == 15

MX record queries

dns.flags.response == 1

Show DNS responses only

dns.flags.rcode != 0

DNS error responses

tcp.port == {n}

Packets on specific TCP port

tcp.flags.syn == 1

Packets with SYN flag

tcp.flags.reset == 1

Packets with RST flag

tcp.flags.fin == 1

Packets with FIN flag

tcp.analysis.retransmission

TCP retransmission packets

tcp.analysis.duplicate_ack

Duplicate ACK packets

tcp.analysis.zero_window

Zero window packets

tcp.stream eq {n}

Follow specific TCP stream

tcp.window_size < {n}

Packets with small window size

Statistics > Conversations

Show conversations between hosts

Statistics > Endpoints

Show endpoint statistics

Statistics > Protocol Hierarchy

Protocol hierarchy statistics

Statistics > I/O Graphs

Display I/O graphs

Statistics > Flow Graph

Display flow graph

Analyze > Follow > TCP Stream

Follow TCP stream

Analyze > Expert Information

Show expert information

File > Export Objects > HTTP

Export HTTP objects

File > Export Packet Dissections

Export packet dissections

tshark -r {file}

Read pcap file from command line

tshark -Y "filter"

Apply display filter from CLI

tshark -T fields -e {field}

Extract specific fields

editcap -c {n} {in} {out}

Split pcap file by packet count

mergecap -w {out} {files}

Merge multiple pcap files