Wireshark Filters
Wireshark display filters and capture filters for network analysis.
Protocol Filters
tcpShow only TCP packets
udpShow only UDP packets
httpShow only HTTP traffic
httpsShow only HTTPS traffic
dnsShow only DNS traffic
sshShow only SSH traffic
ftpShow only FTP traffic
smtpShow only SMTP traffic
icmpShow only ICMP packets
arpShow only ARP packets
IP Address Filters
ip.addr == 192.168.1.1Show packets from or to specific IP
ip.src == 192.168.1.1Show packets from specific source IP
ip.dst == 192.168.1.1Show packets to specific destination IP
ip.addr == 192.168.1.0/24Show packets from or to specific subnet
!(ip.addr == 192.168.1.1)Exclude specific IP address
ip.src != 192.168.1.1Exclude packets from source IP
Port Filters
tcp.port == 80Show packets on TCP port 80
tcp.srcport == 80Show packets from source TCP port 80
tcp.dstport == 443Show packets to destination TCP port 443
udp.port == 53Show packets on UDP port 53
tcp.port >= 1024Show TCP packets on ports 1024 and above
tcp.port == 80 || tcp.port == 443Show HTTP or HTTPS traffic
HTTP Filters
http.requestShow only HTTP requests
http.responseShow only HTTP responses
http.request.method == "GET"Show only HTTP GET requests
http.request.method == "POST"Show only HTTP POST requests
http.host == "example.com"Filter by HTTP host
http.request.uri contains "login"Filter URLs containing "login"
http.response.code == 200Show HTTP 200 OK responses
http.response.code >= 400Show HTTP error responses
http.cookie contains "session"Filter by cookie content
http.user_agent contains "Mozilla"Filter by user agent
TCP Flags
tcp.flags.syn == 1Show SYN packets (connection initiation)
tcp.flags.ack == 1Show ACK packets
tcp.flags.fin == 1Show FIN packets (connection termination)
tcp.flags.reset == 1Show RST packets (connection reset)
tcp.flags.push == 1Show PSH packets (push data)
tcp.flags == 0x002Show SYN packets only
tcp.flags == 0x012Show SYN-ACK packets
tcp.analysis.retransmissionShow TCP retransmissions
tcp.analysis.duplicate_ackShow duplicate ACKs
DNS Filters
dns.qry.name == "example.com"Filter by DNS query name
dns.qry.type == 1Show A record queries
dns.qry.type == 28Show AAAA record queries
dns.qry.type == 15Show MX record queries
dns.flags.response == 0Show DNS queries only
dns.flags.response == 1Show DNS responses only
dns.flags.rcode != 0Show DNS errors
TLS/SSL Filters
sslShow all TLS/SSL traffic
ssl.handshakeShow TLS handshake packets
ssl.handshake.type == 1Show Client Hello messages
ssl.handshake.type == 2Show Server Hello messages
ssl.handshake.extensions_server_nameShow SNI extensions
ssl.record.content_type == 23Show application data
ssl.alert_messageShow TLS alert messages
Logical Operators
tcp && ip.addr == 192.168.1.1AND operator (both conditions)
tcp || udpOR operator (either condition)
!(http)NOT operator (exclude HTTP)
tcp.port == 80 && ip.addr == 192.168.1.1Multiple AND conditions
(tcp.port == 80 || tcp.port == 443) && ip.src == 192.168.1.1Complex filter with grouping
String Search
tcp contains "password"Find "password" in TCP packets
http.request.uri contains "admin"Find "admin" in URIs
frame contains "secret"Find "secret" in any packet
tcp matches "(?i)password"Case-insensitive regex search
data.text contains "login"Search in packet data text
Time Filters
frame.time >= "2024-01-01 00:00:00"Packets after specific time
frame.time_delta > 1Packets with > 1 second gap
tcp.time_delta > 0.1TCP packets with > 100ms gap
frame.number > 100Packets after frame 100
Size Filters
frame.len > 1000Packets larger than 1000 bytes
frame.len < 64Packets smaller than 64 bytes
tcp.len > 0TCP packets with payload
http.content_length > 10000HTTP responses > 10KB
Capture Filters
host 192.168.1.1Capture traffic to/from specific host
net 192.168.1.0/24Capture traffic from subnet
port 80Capture traffic on port 80
tcp port 443Capture TCP traffic on port 443
not broadcast and not multicastExclude broadcast/multicast
src host 192.168.1.1Capture from source host only
dst host 192.168.1.1Capture to destination host only
ether host aa:bb:cc:dd:ee:ffCapture by MAC address