<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>top talkers Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/top-talkers/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/top-talkers/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Mon, 04 May 2020 14:10:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>How to find out TOP talkers in your network</title>
		<link>https://itblogsec.com/top-talkers-by-using-tcpdump/</link>
					<comments>https://itblogsec.com/top-talkers-by-using-tcpdump/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 30 Dec 2016 22:44:59 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[tcpdump]]></category>
		<category><![CDATA[top talkers]]></category>
		<category><![CDATA[unix]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=21</guid>

					<description><![CDATA[<p>Sometimes it is very useful to find out current top talkers in your network. You can figure out what it's going on and what IP can be possible source of congestion.</p>
<p>The post <a href="https://itblogsec.com/top-talkers-by-using-tcpdump/">How to find out TOP talkers in your network</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How to find out TOP talkers in your network</h2>
<p style="text-align: justify;">Sometimes it is very useful to find out current top talkers in your network, affecting your local interface. You can figure out what it&#8217;s going on and what IP can be possible source of congestion.</p>
<h3>UNIX/LINUX procedure</h3>
<p>Issue following command, by parameter -c you can configure amount of packets what will be captured, by parameter -i specify interface you want to sniff on:</p>
<pre class="lang:default decode:true">sudo tcpdump -tnn -c 40 -i eth0  | awk -F "." '{print $1"."$2"."$3"."$4}' | sort | uniq -c | sort -nr | head</pre>
<p>&nbsp;</p>
<div id="attachment_369" style="width: 1108px" class="wp-caption alignnone"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-369" class="border-image wp-image-369 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/top_talkers.jpg" width="1098" height="161" srcset="https://itblogsec.com/wp-content/uploads/2016/12/top_talkers.jpg 1098w, https://itblogsec.com/wp-content/uploads/2016/12/top_talkers-300x44.jpg 300w, https://itblogsec.com/wp-content/uploads/2016/12/top_talkers-768x113.jpg 768w, https://itblogsec.com/wp-content/uploads/2016/12/top_talkers-1024x150.jpg 1024w" sizes="(max-width: 1098px) 100vw, 1098px" /><p id="caption-attachment-369" class="wp-caption-text">Output of analyzing 40 packets</p></div>
<p>&nbsp;</p>
<h3>WINDOWS procedure</h3>
<p style="text-align: justify;">In Windows OS we will use well-known application <a href="https://www.wireshark.org/download.html">Wireshark</a>. Normally a network interface will only &#8220;receive&#8221; packets directly addressed to the interface. Promiscuous mode allows the interface to receive all packets that it sees whether they are addressed to the interface or not. By enabling interface in promiscuous mode you can easily sniff traffic and based on further analyse you can figure out who is possible top-talker. It is very useful in case you are experiencing some kind of broadcast (multicast) storm and want to identify source of your congestion.</p>
<div id="attachment_379" style="width: 1146px" class="wp-caption alignnone"><img decoding="async" aria-describedby="caption-attachment-379" class="border-image wp-image-379 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01.png" width="1136" height="582" srcset="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01.png 1136w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01-300x154.png 300w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01-768x393.png 768w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01-1024x525.png 1024w" sizes="(max-width: 1136px) 100vw, 1136px" /><p id="caption-attachment-379" class="wp-caption-text">Selection of interface and starting packets capture</p></div>
<p><span style="color: #ff0000;">1. Click button to open capture interface settings<br />
</span><span style="color: #ff0000;">2. Select interface which you want to capture traffic on<br />
</span><span style="color: #ff0000;">3. Click &#8220;Start&#8221; button to start capturing</span></p>
<div id="attachment_381" style="width: 1257px" class="wp-caption alignnone"><img decoding="async" aria-describedby="caption-attachment-381" class="border-image wp-image-381 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03.png" width="1247" height="397" srcset="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03.png 1247w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03-300x96.png 300w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03-768x245.png 768w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03-1024x326.png 1024w" sizes="(max-width: 1247px) 100vw, 1247px" /><p id="caption-attachment-381" class="wp-caption-text">Stopping capture and selecting Conversations</p></div>
<p><span style="color: #ff0000;">4. After a few seconds you can &#8220;Stop&#8221; capturing of traffic</span><br />
<span style="color: #ff0000;">5. Select &#8220;Statistics&#8221;</span><br />
<span style="color: #ff0000;">6. Choose &#8220;Conversations&#8221;</span></p>
<div id="attachment_384" style="width: 1017px" class="wp-caption alignnone"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-384" class="border-image wp-image-384 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04.png" width="1007" height="241" srcset="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04.png 1007w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04-300x72.png 300w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04-768x184.png 768w" sizes="(max-width: 1007px) 100vw, 1007px" /><p id="caption-attachment-384" class="wp-caption-text">Conversations dialog where you can filter and see full statistics of captured packets</p></div>
<p style="text-align: justify;">Simply by selecting desired port, ordering based on &#8220;Bytes&#8221; you can see souce/destination IP which is originating the most packets. Do not forget that you will not be able to see all traffic in your network but you can capture traffic which does not have to be addressed directly to your interface but can influence also your network performance (e.g. broadcast storm &#8230;).</p>
<p>The post <a href="https://itblogsec.com/top-talkers-by-using-tcpdump/">How to find out TOP talkers in your network</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/top-talkers-by-using-tcpdump/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/162 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-11-29 03:39:39 by W3 Total Cache
-->