
Some Additional Filters Are: tcp.port=8080įilters packets to show a port of your own choosing – in this case, port 8080 If a particular system is active and using an IPv6 address on our network, we can open another Wireshark window and apply the below rule: ipv6.dst = 2607:f8b0:400a:15::b !ip.addr=18.224.161.65Īlso, we are not limited to IPv4 addresses. We can also decide to filter out a specific IP address using the below filter. If we choose “Selected”, then Wireshark will create a filter that shows only packets with that IP address in it. Once we select the IP address, right-click, and then select the Apply As Filter Option. ip.addr=18.224.161.65Īlternatively, we can highlight the IP address of a packet and then create a filter for it. We will create the following command line, and put it into the filter window. Suppose we want to see packets that have only an IP address of 18.224.161.65 somewhere inside. Let’s start with an example of how to inspect packets using filters. If there is any mistake then the box will turn into vivid pink. The Filters which are valid have a green color. Means “not,” as in, do not show a particular IP address or source port Means “equal,” as in “Choose only IP address 192.168.2.1” Wireshark filters use key phrases as follows: ip.addr

In the Display Filter window, at the top of the screen.So to apply Filters in Wireshark, we have two ways: Here in this blog we will see how to apply Filters and inspect packets.
