Advanced Wireshark commands for network troubleshooting

Upcoming

9/20/20253 min read

In this section, we’ll be discussing the following Wireshark tools and filtering techniques that help in day-to-day network troubleshooting inside organizations:

  • Capture Filters vs Display Filters

  • Filtering by Protocols

  • IP Address Based Filters

  • Port-Based Filters

  • Combine Multiple Filters

  • Time-Based Analysis

  • Follow TCP/UDP Streams

  • Advanced DNS Troubleshooting

  • Performance Analysis (Latency & Retransmissions)

  • Export & Share Captures

Capture Filters vs Display Filters

Wireshark provides two powerful filtering options: Capture Filters (applied before capturing traffic) and Display Filters (applied after packets are collected). Capture Filters reduce noise and improve performance, while Display Filters help refine the data already captured.

Capture only HTTP traffic:
tcp port 80

Display only packets from a specific IP:
ip.addr == 192.168.1.10

Use case: Reduce unnecessary packets and zoom directly into the traffic causing issues

HTTP traffic only → http

DNS packets only → dns

ICMP (ping) traffic only → icmp

Filtering by Protocols

Wireshark can filter traffic by common protocols to isolate problems faster.

IP Address Based Filters

These filters let you focus on traffic from, to, or involving specific IP addresses.

Use case: Troubleshoot slow browsing (HTTP), DNS failures, or connectivity issues with ping (ICMP).

Source IP only → ip.src == 192.168.1.1

Destination IP only → ip.dst == 192.168.1.100

Any traffic involving a host → ip.addr == 10.0.0.5

Use case: Track suspicious or heavy traffic from a single device.

Port-Based Filters

Port filters are essential when diagnosing service-specific traffic like HTTPS or DNS.

HTTPS traffic → tcp.port == 443

DNS queries → udp.port == 53

High ports → tcp.port >= 1024

Use case: Investigate slow HTTPS connections, DNS failures, or suspicious high-port activity.

Combine Multiple Filters

You can combine multiple conditions for precise troubleshooting.

Specific IP and HTTP traffic → ip.src == 192.168.1.5 && tcp.port == 80

Traffic from either of two hosts → (ip.addr == 192.168.1.10) || (ip.addr == 192.168.1.20)

Use case: Troubleshoot issues between particular hosts and services.

Time-Based Analysis

Wireshark allows filtering packets by timestamps to narrow down incidents.

frame.time >= "2025-09-13 10:00:00" && frame.time <= "2025-09-13 11:00:00"

Use case: Analyze network packets during a specific outage window.

Follow TCP/UDP Streams

Right-click any packet → Follow → TCP Stream (or UDP Stream). This shows the entire conversation between endpoints.

Use case: Debug broken connections, view HTTP requests/responses, or detect suspicious data transfers.

Advanced DNS Troubleshooting

DNS filters help detect failed lookups or misconfigured servers.

Filter by domain → dns.qry.name == "example.com"

Find failed queries → dns.flags.rcode != 0

Use case: Identify DNS latency or failed lookups impacting applications.

Performance Analysis (Latency & Retransmissions)

Wireshark includes filters for analysing network performance issues.

Retransmissions → tcp.analysis.retransmission

Round-trip time (RTT) → tcp.analysis.ack_rtt

TCP analysis flags → tcp.analysis.flags

Use case: Detect packet loss, delays, and retransmissions that slow down the network.

Export & Share Captures

You can export specific packet results for collaboration.

Navigate: File → Export Specified Packets

Save filtered results in .pcapng format

Use case: Share filtered captures with teammates or security analysts for deeper investigation.