PCAP Conversations
Upload a PCAP/PCAPNG and get top endpoints and pairs (IP:port, proto, packets, bytes). Optional display filter & DNS mapping.
Top Pairs
| Proto | Source | Destination | Packets | Bytes |
|---|
If analysis fails, ensure the capture isn’t corrupted. Very large PCAPs may be truncated by the server limit.
About
When you need a quick overview of a capture, endpoint and pair summaries are the fastest way to orient yourself. Upload a PCAP/PCAPNG and the tool returns top endpoints and top pairs with packets/bytes and protocol labels.
Use Wireshark display filters to narrow scope (for example only TCP, or only a target subnet). Group-by-IP mode collapses port-level noise for a simpler view; disable it to see IP:port endpoints when ports matter.
The output can be downloaded as JSON for reporting, automation, or further enrichment. It’s a practical starting point before you dive into packet payloads.
Search activity
FAQ
›What are “pairs”?
›What does “group by IP only” do?
›Can I include DNS names?
›Can I filter the capture?
›Is my capture stored?
Related Tools
- PCAP → Flows CSV/tools/pcap-to-flows
- PCAP → JSON/tools/pcap-to-json
- DNS Propagation Checker/tools/network/dns-check
- ASN / Prefix Lookup/tools/network/asn
- HTTP Headers & Redirects/tools/network/headers