Wireshark

Wireshark

The world's most popular open-source network protocol analyzer — see everything

DeveloperWireshark Foundation
LicenseGPL-2.0-or-later
PlatformWindows / macOS / Linux
Version4.6.x
PriceFree

Features

Deep packet inspection: 1000+ protocol decodesLive capture and offline analysis: multiple capture formatsPowerful filters: BPF syntax for precise data filteringStatistics and graphs: traffic analysis, visual chartsCross-platform: Windows, macOS, and LinuxActive community: continuous updates, all major protocols supported

Alternatives

Wireshark: The X-Ray Vision for Network Packets

Wireshark: The X-Ray Vision for Network Packets

When something goes wrong on the network, do you guess based on experience — or can you see the “birth and death” of every packet? Wireshark makes the latter possible. It’s the Swiss Army knife of network analysis, whether you’re troubleshooting failures, debugging protocols, or conducting security research.

Overview

Wireshark is an open-source network protocol analyzer maintained by the Wireshark Foundation, originally created in 1998 (under the name Ethereal). Its core function is capturing network packets and decoding them into human-readable form.

In October 2025, Wireshark released version 4.6.0, a major update bringing numerous new features. The current stable series is 4.6.x.

Wireshark can parse over 1,000 network protocols, covering everything from the lowest Ethernet frames to the highest application-layer protocols — an essential tool for network engineers, security researchers, and developers alike.

Key Features

🔍 Deep Packet Inspection

Wireshark’s core capability is protocol decoding:

  • Layer-by-layer parsing: Shows the complete structure of each packet from physical to application layer
  • Protocol coverage: HTTP, DNS, TCP, UDP, TLS, SSH, QUIC, and all major protocols supported
  • Field-level detail: Every field’s hex value, meaning, and flags displayed alongside each other

When you’re troubleshooting “why did this request fail,” Wireshark can tell you directly: whether TCP three-way handshake never completed, TLS handshake failed, or the application layer returned an error code.

📡 Live Capture and Offline Analysis

Wireshark supports two modes:

Mode Best For
Live capture Network troubleshooting, real-time monitoring
Offline analysis Import existing pcap files, analyze historical traffic

Supports importing capture files from tcpdump, snoop, and various other formats.

🎯 Powerful Filters

Wireshark offers two filter types:

Capture filters (BPF): Filter at capture time, ideal for high-traffic scenarios

1
host 192.168.1.100 and port 80

Display filters: Filter within captured data, ideal for detailed analysis

1
tcp.flags.syn == 1 and tcp.flags.ack == 0

Display filters support protocol field-level precision filtering — you can find virtually anything you need.

📊 Statistics and Charts

Wireshark includes rich statistical analysis:

  • Protocol hierarchy: Protocol distribution by traffic percentage
  • Conversations: Communication endpoints, traffic volume, duration
  • I/O graphs: Visualize traffic over time
  • Expert Information: Auto-annotates anomalies (retransmissions, loss, errors)

Version 4.6.0 introduced the new Plots dialog, replacing the older I/O Graphs tool with scatter plots, multiple view panes, and auto-scrolling for live updates.

🖥️ Cross-Platform Support

Wireshark ships native versions on all three major platforms:

  • Windows: Requires Npcap driver (4.6.0 uses Npcap 1.83)
  • macOS: Universal package for both Intel and Apple Silicon
  • Linux: Install via package manager

⚠️ Note: 4.6.0 dropped support for legacy drivers WinPcap and AirPcap. Ensure you’re updated to Npcap.

🛡️ Security Analysis Capabilities

Wireshark is an essential tool for security professionals:

  • TLS decryption: With keys, view HTTPS content
  • NTP decryption: 4.6.0 adds Network Time Security support
  • MACsec decryption: Supports unwrapping via MKA dissector or pre-shared key lists
  • Anomaly detection: Auto-annotates suspicious patterns, retransmissions, unencrypted sensitive data

⏱️ Timestamp Improvements (4.6.0)

Version 4.6.0 enhanced timestamp handling:

  • Timestamps in JSON and other machine-readable outputs now use ISO 8601 UTC format
  • Eliminates timezone confusion during cross-regional analysis
  • Custom columns can now display the same format as the Packet Details pane
  • Numeric columns now sort numerically, not alphabetically

Use Cases

Ideal for Wireshark

  • Network engineers: Troubleshoot failures, analyze traffic patterns
  • Security researchers: Analyze attack traffic, forensics investigation
  • Backend developers: Debug APIs, investigate connection issues
  • Penetration testers: Understand target network traffic characteristics

Less Ideal

  • True beginners: Complex interface with a steep learning curve
  • Quick packet captures only: Command-line tcpdump is more efficient
  • Large-scale production analysis: Requires professional traffic analysis platforms

Comparison with Alternatives

Feature Wireshark tcpdump Fiddler
Interface GUI (powerful) Command-line GUI (HTTP only)
Protocol coverage ✅ 1000+ ✅ Basic decode ⚠️ HTTP only
Learning curve ⚠️ Steep ✅ Low ✅ Low
Platform All major Linux/Unix Windows primarily
Price ✅ Free ✅ Free Free + paid
Offline analysis ✅ Full ⚠️ Limited ⚠️ Limited
Security analysis ✅ Powerful ⚠️ Basic ⚠️ HTTP-only

Conclusion

Wireshark is the ultimate tool for network analysis — powerful, free, open-source, and continuously maintained. Version 4.6.0’s improvements (live compression, ISO 8601 timestamps, Plots dialog) make it even more practical.

For network engineers and security researchers, Wireshark is a must-master tool. Even for developers, basic packet capture skills help troubleshoot problems faster.

Remember: In the world of networks, Wireshark lets you see everything.