PCAP Conversations
Upload a PCAP/PCAPNG and get top endpoints and pairs (IP:port, proto, packets, bytes). Optional display filter & DNS mapping.
Top Pairs
| Proto | Source | Destination | Packets | Bytes |
|---|
If analysis fails, ensure the capture isn’t corrupted. Very large PCAPs may be truncated by the server limit.
About
When you need a quick overview of a capture, endpoint and pair summaries are the fastest way to orient yourself. Upload a PCAP/PCAPNG and the tool returns top endpoints and top pairs with packets/bytes and protocol labels.
Use Wireshark display filters to narrow scope (for example only TCP, or only a target subnet). Group-by-IP mode collapses port-level noise for a simpler view; disable it to see IP:port endpoints when ports matter.
The output can be downloaded as JSON for reporting, automation, or further enrichment. It’s a practical starting point before you dive into packet payloads.
This page covers a practical workflow for PCAP → Endpoint.
PCAP Conversations is designed to be straightforward: pick your input, choose the output settings, and generate a result you can copy or download. We focus on predictable defaults so you can get a usable output quickly, then fine-tune only when you need to.
If you’re using this tool for work, treat the result like any other export: verify a small sample first, then run the full job. Small checks (file size, encoding, preview, or a spot-check of values) prevent surprises later when you publish, upload, or share the output.
Quality and compatibility often pull in different directions. When you want maximum compatibility, choose widely supported options. When you want smaller size or faster delivery, pick modern formats and compression settings—but keep an original copy so you can re-export without compounding losses.
Privacy matters. Some tools run fully in your browser, while others may need server-side processing (for heavy conversions or specialized libraries). Where uploads are required, keep files non-sensitive and avoid including secrets in inputs. Always review the final output before sharing publicly.
Troubleshooting tips: if the output looks wrong, try changing one setting at a time, and confirm your input is what you think it is (color profile, transparency, encoding, delimiters, or line endings). Many issues come from an unexpected input variant rather than a broken converter.
For best UX, we keep the interface minimal and the results easy to copy. If you’re on mobile, prefer shorter inputs and smaller files, and use Wi‑Fi for large uploads. On desktop, batch workflows are usually faster and easier to verify.
A practical workflow looks like this: (1) start from the highest-quality source you have, (2) run a quick test with default settings, (3) adjust only one parameter at a time if needed, and (4) validate the output in the place it will actually be used (website, app, email, print, or a media player). This keeps results consistent and makes it clear which setting caused which change.
If you repeat the same task often, consistency is more valuable than tiny optimizations. Use stable naming (include format, size, and date in the filename), keep a “known good” sample for comparison, and save your preferred settings as a habit. When exporting multiple items, process them in small batches so you can spot problems early.
FAQ
›What are “pairs”?
›What does “group by IP only” do?
›Can I include DNS names?
›Can I filter the capture?
›Is my capture stored?
›Is it free to use?
Related Tools
- PCAP → Flows CSV/tools/pcap-to-flows
- PCAP → JSON/tools/pcap-to-json
- DNS Propagation Checker/tools/network/dns-check
- ASN / Prefix Lookup/tools/network/asn
- HTTP Headers & Redirects/tools/network/headers