Wireshark Display Filter Cheatsheet
Quick reference for Wireshark display and capture filters covering protocol filters, HTTP, DNS, TCP analysis, statistics, and export options
67 commands
ip.addr == {ip}Show packets for specific IP
ip.addr == 192.168.1.1ip.src == {ip}Filter by source IP
ip.src == 10.0.0.1ip.dst == {ip}Filter by destination IP
ip.dst == 10.0.0.2ip.addr == {cidr}Filter by subnet
ip.addr == 192.168.1.0/24eth.addr == {mac}Filter by MAC address
eth.addr == aa:bb:cc:dd:ee:ffframe.len > {n}Frames larger than n bytes
frame.len > 1000frame.time >= "date"Frames after specified time
frame.time >= "2024-01-01 00:00:00"frame.number == {n}Show specific frame number
frame.number == 100!(filter)Negate filter (NOT)
!(ip.addr == 10.0.0.1)filter1 && filter2Combine filters with AND
ip.src == 10.0.0.1 && tcp.port == 80filter1 || filter2Combine filters with OR
tcp.port == 80 || tcp.port == 443host {ip}Capture traffic for host
host 192.168.1.1net {cidr}Capture by network range
net 192.168.1.0/24port {n}Capture traffic on port
port 443portrange {a}-{b}Capture port range
portrange 8000-9000tcpCapture TCP only
tcpudpCapture UDP only
udpnot broadcastExclude broadcast traffic
not broadcast and not multicasttcpTCP protocol packets
tcpudpUDP protocol packets
udpicmpICMP protocol packets
icmparpARP protocol packets
arptlsTLS/SSL protocol packets
tlssshSSH protocol packets
sshftpFTP protocol packets
ftpsmtpSMTP protocol packets
smtphttpHTTP protocol packets
httphttp.requestShow HTTP requests only
http.requesthttp.responseShow HTTP responses only
http.responsehttp.request.method == "GET"HTTP GET requests
http.request.method == "GET"http.request.method == "POST"HTTP POST requests
http.request.method == "POST"http.request.uri contains "path"Requests with URI containing string
http.request.uri contains "/api"http.host == "domain"HTTP requests to specific domain
http.host == "example.com"http.response.code == {n}Specific HTTP status code
http.response.code == 404http.response.code >= 400HTTP error responses
http.response.code >= 400http.content_type contains "json"HTTP packets with JSON content
http.content_type contains "json"dnsDNS protocol packets
dnsdns.qry.name == "domain"DNS queries for specific domain
dns.qry.name == "example.com"dns.qry.name contains "str"DNS queries containing string
dns.qry.name contains "google"dns.qry.type == 1A record queries
dns.qry.type == 1dns.qry.type == 28AAAA record queries
dns.qry.type == 28dns.qry.type == 15MX record queries
dns.qry.type == 15dns.flags.response == 1Show DNS responses only
dns.flags.response == 1dns.flags.rcode != 0DNS error responses
dns.flags.rcode != 0tcp.port == {n}Packets on specific TCP port
tcp.port == 443tcp.flags.syn == 1Packets with SYN flag
tcp.flags.syn == 1tcp.flags.reset == 1Packets with RST flag
tcp.flags.reset == 1tcp.flags.fin == 1Packets with FIN flag
tcp.flags.fin == 1tcp.analysis.retransmissionTCP retransmission packets
tcp.analysis.retransmissiontcp.analysis.duplicate_ackDuplicate ACK packets
tcp.analysis.duplicate_acktcp.analysis.zero_windowZero window packets
tcp.analysis.zero_windowtcp.stream eq {n}Follow specific TCP stream
tcp.stream eq 5tcp.window_size < {n}Packets with small window size
tcp.window_size < 1000Statistics > ConversationsShow conversations between hosts
Statistics > ConversationsStatistics > EndpointsShow endpoint statistics
Statistics > EndpointsStatistics > Protocol HierarchyProtocol hierarchy statistics
Statistics > Protocol HierarchyStatistics > I/O GraphsDisplay I/O graphs
Statistics > I/O GraphsStatistics > Flow GraphDisplay flow graph
Statistics > Flow GraphAnalyze > Follow > TCP StreamFollow TCP stream
Analyze > Follow > TCP StreamAnalyze > Expert InformationShow expert information
Analyze > Expert InformationFile > Export Objects > HTTPExport HTTP objects
File > Export Objects > HTTPFile > Export Packet DissectionsExport packet dissections
File > Export Packet Dissections > As CSVtshark -r {file}Read pcap file from command line
tshark -r capture.pcaptshark -Y "filter"Apply display filter from CLI
tshark -Y "http.request" -r capture.pcaptshark -T fields -e {field}Extract specific fields
tshark -T fields -e ip.src -e ip.dst -r cap.pcapeditcap -c {n} {in} {out}Split pcap file by packet count
editcap -c 1000 large.pcap split.pcapmergecap -w {out} {files}Merge multiple pcap files
mergecap -w merged.pcap file1.pcap file2.pcap