NetworkPacketRecording

NetworkPacketRecording[t]

records information on network packets transmitted or received through all network interfaces on your computer for t seconds.

NetworkPacketRecording[t,service]

records only packets associated with the specified network service.

NetworkPacketRecording[t,port]

records only packets associated with the specified port.

NetworkPacketRecording[t,{port1,port2,}]

records only packets associated with any of the ports porti.

NetworkPacketRecording[t,spec]

records only packets matching the specification spec.

Details

  • t can be a number of seconds or a Quantity object representing the time to record for.
  • In NetworkPacketRecording[,service], possible forms for service include:
  • "name"an IANA named service (e.g. "HTTP")
    entityan entity of type "NetworkService"
  • Entities can be entered using free-form linguistics with .
  • In NetworkPacketRecording[,ports], network ports can be specified as follows:
  • nsingle port number n
    nmin;;nmaxa range of ports from nmin to nmax
    {n1,n2,}a list of ports
  • In NetworkPacketRecording[,spec], spec can be given in the form key->value, or as an association containing multiple keys and values. Possible keys include:
  • "IPAddress"source or destination IP address
    "SourceIPAddress"source IP address
    "DestinationIPAddress"destination IP address
    "IPAddressType"source or destination IP address type (e.g. "IPv4" or "IPv6")
    "SourceIPAddressType"source IP address type
    "DestinationIPAddressType"destination IP address type
    "Port"source or destination port
    "SourcePort"source port
    "DestinationPort"destination port
    "Interface"network interface (e.g. "en0")
    "PCAPFilter"raw PCAP filter specification as a string
  • IP addresses can be given as strings or IPAddress objects.
  • Possible values for the "Interface" key can be any element in $NetworkInterfaces, a list of these or All.
  • Any setting given for "PCAPFilter" overrides all other settings.
  • On Windows computers, SystemInstall["WinPcap"] may be needed before NetworkPacketRecording is used.
  • NetworkPacketRecording typically requires that the Wolfram kernel be run with elevated permissions (e.g. as root) on Linux and Mac.

Examples

open allclose all

Basic Examples  (5)

Record all network activity for two seconds:

Record all HTTP packets for two seconds:

Record all network activity on port 80:

Record all network activity on a specific network interface:

Record packets using a direct PCAP filter string:

Scope  (1)

Use multiple keys to filter on multiple conditions:

Wolfram Research (2018), NetworkPacketRecording, Wolfram Language function, https://reference.wolfram.com/language/ref/NetworkPacketRecording.html.

Text

Wolfram Research (2018), NetworkPacketRecording, Wolfram Language function, https://reference.wolfram.com/language/ref/NetworkPacketRecording.html.

CMS

Wolfram Language. 2018. "NetworkPacketRecording." Wolfram Language & System Documentation Center. Wolfram Research. https://reference.wolfram.com/language/ref/NetworkPacketRecording.html.

APA

Wolfram Language. (2018). NetworkPacketRecording. Wolfram Language & System Documentation Center. Retrieved from https://reference.wolfram.com/language/ref/NetworkPacketRecording.html

BibTeX

@misc{reference.wolfram_2024_networkpacketrecording, author="Wolfram Research", title="{NetworkPacketRecording}", year="2018", howpublished="\url{https://reference.wolfram.com/language/ref/NetworkPacketRecording.html}", note=[Accessed: 30-December-2024 ]}

BibLaTeX

@online{reference.wolfram_2024_networkpacketrecording, organization={Wolfram Research}, title={NetworkPacketRecording}, year={2018}, url={https://reference.wolfram.com/language/ref/NetworkPacketRecording.html}, note=[Accessed: 30-December-2024 ]}