Key Facts
- Category
- Developer & Web
- Input Types
- file, select, text
- Output Type
- html
- Sample Coverage
- 4
- API Ready
- Yes
Overview
The Network Packet Analyzer is a browser-based utility designed for fast triage of .pcap and basic .pcapng capture files. It extracts packet summaries, protocol counts, top IPs, and session statistics without requiring heavy desktop software. Users can filter traffic by protocol or specific IPv4 addresses and export the resulting packet summaries as JSON or CSV for further analysis.
When to Use
- •When you need to quickly inspect a packet capture file without installing heavy desktop analysis software.
- •When isolating specific HTTP or DNS traffic from a noisy network capture to troubleshoot connectivity issues.
- •When extracting a list of top communicating IP addresses and ports to include in a security or network audit report.
How It Works
- •Upload a standard .pcap or basic .pcapng file containing Ethernet and IPv4 packets.
- •Select a protocol filter (TCP, UDP, HTTP, or DNS) and optionally enter a specific IPv4 address to narrow down the traffic.
- •Review the generated HTML report, which displays packet counts, top IPs, active ports, and a coarse timeline of network bursts.
- •Choose JSON or CSV as the export format to copy or download the filtered packet summaries for external use.
Use Cases
Examples
1. Extracting DNS Queries from a Capture
System Administrator- Background
- A server is experiencing intermittent resolution failures, and the admin has captured a brief network trace.
- Problem
- Need to quickly see which domains the server is trying to resolve without parsing the entire capture manually.
- How to Use
- Upload the capture file, set the Protocol Filter to 'DNS', and set the Export Format to 'JSON'.
- Example Config
-
Protocol Filter: DNS Export Format: JSON - Outcome
- The report filters out all non-DNS traffic, displaying the top queried domains and providing a JSON array of DNS packet summaries.
2. Isolating Traffic for a Specific Endpoint
Security Analyst- Background
- An alert flagged a specific workstation (192.168.1.50) for unusual network behavior.
- Problem
- Need to isolate all packets involving this specific IP to see its communication peers and ports.
- How to Use
- Upload the .pcap file, leave the Protocol Filter on 'All', and enter '192.168.1.50' into the IP Filter field.
- Example Config
-
IP Filter: 192.168.1.50 Export Format: CSV - Outcome
- The dashboard updates to show only sessions involving 192.168.1.50, revealing the top external IPs it communicated with, ready for CSV export.
Try with Samples
image, png, fileRelated Hubs
FAQ
What file formats are supported?
The tool accepts standard .pcap files and basic .pcapng files containing Ethernet packets.
Can this tool decrypt TLS or HTTPS traffic?
No, the analyzer focuses on surface-level packet headers and basic unencrypted payloads like HTTP and DNS. It does not perform TLS decryption or deep application payload inspection.
Does it support IPv6 traffic?
Currently, the tool is optimized for Ethernet frames carrying IPv4 traffic. IPv6, ARP, and ICMP packets are not fully decoded.
How does the timeline feature work?
The timeline groups packets by the second, allowing you to easily spot sudden bursts of network traffic or identify periods of inactivity.
Can I export the filtered packet data?
Yes, you can export the filtered packet summaries in either JSON or CSV format for use in other reporting or analysis tools.