1 Dumpcap (Wireshark) 4.5.0 (v4.5.0rc0-48-g7b7ca8210417)
2 Capture network packets and dump them into a pcapng or pcap file.
3 See https://www.wireshark.org for more information.
5 Usage: dumpcap [options] ...
8 -i <interface>, --interface <interface>
9 name or idx of interface (def: first non-loopback),
10 or for remote capturing, use this format:
12 --ifname <name> name to use in the capture file for a pipe from which
14 --ifdescr <description>
15 description to use in the capture file for a pipe
16 from which we're capturing
17 -f <capture filter> packet filter in libpcap filter syntax
18 -s <snaplen>, --snapshot-length <snaplen>
19 packet snapshot length (def: appropriate maximum)
20 -p, --no-promiscuous-mode
21 don't capture in promiscuous mode
22 -I, --monitor-mode capture in monitor mode, if available
23 -B <buffer size>, --buffer-size <buffer size>
24 size of kernel buffer in MiB (def: 2MiB)
25 -y <link type>, --linktype <link type>
26 link layer type (def: first appropriate)
27 --time-stamp-type <type> timestamp method for interface
28 -D, --list-interfaces print list of interfaces and exit
29 -L, --list-data-link-types
30 print list of link-layer types of iface and exit
31 --list-time-stamp-types print list of timestamp types for iface and exit
32 --update-interval interval between updates with new packets (def: 100ms)
33 -d print generated BPF code for capture filter
34 -k <freq>,[<type>],[<center_freq1>],[<center_freq2>]
35 set channel on wifi interface
36 -S print statistics for each interface once per second
37 -M for -D, -L, and -S, produce machine-readable output
40 -c <packet count> stop after n packets (def: infinite)
41 -a <autostop cond.> ..., --autostop <autostop cond.> ...
42 duration:NUM - stop after NUM seconds
43 filesize:NUM - stop this file after NUM kB
44 files:NUM - stop after NUM files
45 packets:NUM - stop after NUM packets
47 -w <filename> name of file to save (def: tempfile)
48 -g enable group read access on the output file(s)
49 -b <ringbuffer opt.> ..., --ring-buffer <ringbuffer opt.>
50 duration:NUM - switch to next file after NUM secs
51 filesize:NUM - switch to next file after NUM kB
52 files:NUM - ringbuffer: replace after NUM files
53 packets:NUM - ringbuffer: replace after NUM packets
54 interval:NUM - switch to next file when the time is
55 an exact multiple of NUM secs
56 printname:FILE - print filename to FILE when written
57 (can use 'stdout' or 'stderr')
58 -n use pcapng format instead of pcap (default)
59 -P use libpcap format instead of pcapng
60 --capture-comment <comment>
61 add a capture comment to the output file
63 --temp-dir <directory> write temporary files to this directory
67 --log-level <level> sets the active log level ("critical", "warning", etc.)
68 --log-fatal <level> sets level to abort the program ("critical" or "warning")
69 --log-domains <[!]list> comma-separated list of the active log domains
70 --log-fatal-domains <list>
71 list of domains that cause the program to abort
72 --log-debug <[!]list> list of domains with "debug" level
73 --log-noisy <[!]list> list of domains with "noisy" level
74 --log-file <path> file to output messages to (in addition to stderr)
77 -N <packet_limit> maximum number of packets buffered within dumpcap
78 -C <byte_limit> maximum number of bytes used for buffering packets
80 -t use a separate thread per interface
81 -q don't report packet capture counts
82 -v, --version print version information and exit
83 -h, --help display this help and exit
85 Dumpcap can benefit from an enabled BPF JIT compiler if available.
86 You might want to enable it by executing:
87 "echo 1 > /proc/sys/net/core/bpf_jit_enable"
88 Note that this can make your system less secure!
90 Example: dumpcap -i eth0 -a duration:60 -w output.pcapng
91 "Capture packets from interface eth0 until 60s passed into output.pcapng"
93 Use Ctrl-C to stop capturing at any time.