On 02/17/2017 01:49 PM, Bob Goodwin wrote: > On 02/17/17 15:33, Rick Stevens wrote: >>> Now to figure out how I can look at my network activity? >> A fairly useful tool there is "iptraf-ng" (available in the repos). >> It's a curses-based (terminal) app that shows source and destination >> packet addresses, ports, etc. in real time and it supports filters. >> It's best if run as root. >> >> We use it to watch servers and such (ssh to the server, run iptraf-ng >> in that terminal with a filter that excludes the ssh traffic between >> the two systems involved.) >> ---------------------------------------------------------------------- >> - Rick Stevens, Systems > + > > Ok, I have "iptraf-ng" running and can see the link to my wireless video > cameras in the barn. now I assume there is a way to feed that into > wireshark and perhaps extract more information? This looks pretty > complex and I will have to experiment with it for a while ... I'm > already in over my head! Uhm, yeah. You now have the IP addresses and ports of the cameras. Open wireshark. On the opening page, click on the network interface of your machine you're interested in (e.g. "eno1" or whatever). Then click on "Capture Options". In the "Capture Filter" box, enter: host <IP address of camera> and then click "Start". Let it capture data for some period of time, then hit the big red square to stop the capture. You should now see data that went to/came from that IP address. ---------------------------------------------------------------------- - Rick Stevens, Systems Engineer, AllDigital ricks@xxxxxxxxxxxxxx - - AIM/Skype: therps2 ICQ: 226437340 Yahoo: origrps2 - - - ---------------------------------------------------------------------- _______________________________________________ users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx