How can I see 127.0.0.1 traffic on Windows using Wireshark?
up vote
23
down vote
favorite
Every time I try to filter to just show a specific IP address, I get an error indicating that it is "not an interface or a field." I have no idea what that means. Furthermore, I don’t really see any localhost traffic in the logs anyway.
How can I show TCP localhost traffic?
Platform: Windows 7
windows networking tcp wireshark loopback
migrated from stackoverflow.com Nov 21 '12 at 10:14
This question came from our site for professional and enthusiast programmers.
add a comment |
up vote
23
down vote
favorite
Every time I try to filter to just show a specific IP address, I get an error indicating that it is "not an interface or a field." I have no idea what that means. Furthermore, I don’t really see any localhost traffic in the logs anyway.
How can I show TCP localhost traffic?
Platform: Windows 7
windows networking tcp wireshark loopback
migrated from stackoverflow.com Nov 21 '12 at 10:14
This question came from our site for professional and enthusiast programmers.
1
how exactly are you trying to do this?
– Oleksandr Kravchuk
Nov 21 '12 at 1:44
3
Please try Npcap: github.com/nmap/npcap, it is based on WinPcap and supports loopback traffic capturing on Windows. After you installed Npcap, you can capture the loopback traffic using Wireshark.
– Yang Luo
Nov 8 '15 at 8:24
add a comment |
up vote
23
down vote
favorite
up vote
23
down vote
favorite
Every time I try to filter to just show a specific IP address, I get an error indicating that it is "not an interface or a field." I have no idea what that means. Furthermore, I don’t really see any localhost traffic in the logs anyway.
How can I show TCP localhost traffic?
Platform: Windows 7
windows networking tcp wireshark loopback
Every time I try to filter to just show a specific IP address, I get an error indicating that it is "not an interface or a field." I have no idea what that means. Furthermore, I don’t really see any localhost traffic in the logs anyway.
How can I show TCP localhost traffic?
Platform: Windows 7
windows networking tcp wireshark loopback
windows networking tcp wireshark loopback
edited Sep 4 '15 at 20:45
user164970
asked Nov 21 '12 at 1:32
glutz
223124
223124
migrated from stackoverflow.com Nov 21 '12 at 10:14
This question came from our site for professional and enthusiast programmers.
migrated from stackoverflow.com Nov 21 '12 at 10:14
This question came from our site for professional and enthusiast programmers.
1
how exactly are you trying to do this?
– Oleksandr Kravchuk
Nov 21 '12 at 1:44
3
Please try Npcap: github.com/nmap/npcap, it is based on WinPcap and supports loopback traffic capturing on Windows. After you installed Npcap, you can capture the loopback traffic using Wireshark.
– Yang Luo
Nov 8 '15 at 8:24
add a comment |
1
how exactly are you trying to do this?
– Oleksandr Kravchuk
Nov 21 '12 at 1:44
3
Please try Npcap: github.com/nmap/npcap, it is based on WinPcap and supports loopback traffic capturing on Windows. After you installed Npcap, you can capture the loopback traffic using Wireshark.
– Yang Luo
Nov 8 '15 at 8:24
1
1
how exactly are you trying to do this?
– Oleksandr Kravchuk
Nov 21 '12 at 1:44
how exactly are you trying to do this?
– Oleksandr Kravchuk
Nov 21 '12 at 1:44
3
3
Please try Npcap: github.com/nmap/npcap, it is based on WinPcap and supports loopback traffic capturing on Windows. After you installed Npcap, you can capture the loopback traffic using Wireshark.
– Yang Luo
Nov 8 '15 at 8:24
Please try Npcap: github.com/nmap/npcap, it is based on WinPcap and supports loopback traffic capturing on Windows. After you installed Npcap, you can capture the loopback traffic using Wireshark.
– Yang Luo
Nov 8 '15 at 8:24
add a comment |
4 Answers
4
active
oldest
votes
up vote
19
down vote
accepted
If you are trying to this on a Windows computer, unfortunately it is not possible out of the box. You will need to install some additional software that will capture data on the loopback interface.
On a Linux computer, you will need to capture from the loopback interface which is lo
most of the time. Most other Unix operating systems use lo0.
add a comment |
up vote
4
down vote
Although you found the answer before I could respond, you can also use Socket Sniffer, which looks at Winsock calls and monitors network sockets; the download link is at the bottom of the page.
add a comment |
up vote
2
down vote
To keep this current, as hsluoyz said, install npcap
http://wiki.wireshark.org/CaptureSetup/Loopback
When installed on Windows Vista or later (including Win7, Win8 and
Win10) with option "Support loopback traffic ("Npcap Loopback Adapter"
will be created)" selected, it will create an Npcap Loopback Adapter
that can be selected in Wireshark so as to capture IPv4/IPv6 loopback
traffic.
add a comment |
up vote
0
down vote
Use RawCap, to capture traffic of localhost (127.0.0.1). You just need to download Rawcap.exe and run it. It will open its command prompt listing interfaces. Now select one of the interface which has loopback address 127.0.0.1.
New contributor
add a comment |
4 Answers
4
active
oldest
votes
4 Answers
4
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
19
down vote
accepted
If you are trying to this on a Windows computer, unfortunately it is not possible out of the box. You will need to install some additional software that will capture data on the loopback interface.
On a Linux computer, you will need to capture from the loopback interface which is lo
most of the time. Most other Unix operating systems use lo0.
add a comment |
up vote
19
down vote
accepted
If you are trying to this on a Windows computer, unfortunately it is not possible out of the box. You will need to install some additional software that will capture data on the loopback interface.
On a Linux computer, you will need to capture from the loopback interface which is lo
most of the time. Most other Unix operating systems use lo0.
add a comment |
up vote
19
down vote
accepted
up vote
19
down vote
accepted
If you are trying to this on a Windows computer, unfortunately it is not possible out of the box. You will need to install some additional software that will capture data on the loopback interface.
On a Linux computer, you will need to capture from the loopback interface which is lo
most of the time. Most other Unix operating systems use lo0.
If you are trying to this on a Windows computer, unfortunately it is not possible out of the box. You will need to install some additional software that will capture data on the loopback interface.
On a Linux computer, you will need to capture from the loopback interface which is lo
most of the time. Most other Unix operating systems use lo0.
edited May 7 at 19:05
cybermonkey
97552358
97552358
answered Nov 21 '12 at 3:03
yayay
30623
30623
add a comment |
add a comment |
up vote
4
down vote
Although you found the answer before I could respond, you can also use Socket Sniffer, which looks at Winsock calls and monitors network sockets; the download link is at the bottom of the page.
add a comment |
up vote
4
down vote
Although you found the answer before I could respond, you can also use Socket Sniffer, which looks at Winsock calls and monitors network sockets; the download link is at the bottom of the page.
add a comment |
up vote
4
down vote
up vote
4
down vote
Although you found the answer before I could respond, you can also use Socket Sniffer, which looks at Winsock calls and monitors network sockets; the download link is at the bottom of the page.
Although you found the answer before I could respond, you can also use Socket Sniffer, which looks at Winsock calls and monitors network sockets; the download link is at the bottom of the page.
answered Nov 21 '12 at 9:44
Mike Pennington
1,68212030
1,68212030
add a comment |
add a comment |
up vote
2
down vote
To keep this current, as hsluoyz said, install npcap
http://wiki.wireshark.org/CaptureSetup/Loopback
When installed on Windows Vista or later (including Win7, Win8 and
Win10) with option "Support loopback traffic ("Npcap Loopback Adapter"
will be created)" selected, it will create an Npcap Loopback Adapter
that can be selected in Wireshark so as to capture IPv4/IPv6 loopback
traffic.
add a comment |
up vote
2
down vote
To keep this current, as hsluoyz said, install npcap
http://wiki.wireshark.org/CaptureSetup/Loopback
When installed on Windows Vista or later (including Win7, Win8 and
Win10) with option "Support loopback traffic ("Npcap Loopback Adapter"
will be created)" selected, it will create an Npcap Loopback Adapter
that can be selected in Wireshark so as to capture IPv4/IPv6 loopback
traffic.
add a comment |
up vote
2
down vote
up vote
2
down vote
To keep this current, as hsluoyz said, install npcap
http://wiki.wireshark.org/CaptureSetup/Loopback
When installed on Windows Vista or later (including Win7, Win8 and
Win10) with option "Support loopback traffic ("Npcap Loopback Adapter"
will be created)" selected, it will create an Npcap Loopback Adapter
that can be selected in Wireshark so as to capture IPv4/IPv6 loopback
traffic.
To keep this current, as hsluoyz said, install npcap
http://wiki.wireshark.org/CaptureSetup/Loopback
When installed on Windows Vista or later (including Win7, Win8 and
Win10) with option "Support loopback traffic ("Npcap Loopback Adapter"
will be created)" selected, it will create an Npcap Loopback Adapter
that can be selected in Wireshark so as to capture IPv4/IPv6 loopback
traffic.
answered Jul 21 '16 at 23:07
KCD
2651311
2651311
add a comment |
add a comment |
up vote
0
down vote
Use RawCap, to capture traffic of localhost (127.0.0.1). You just need to download Rawcap.exe and run it. It will open its command prompt listing interfaces. Now select one of the interface which has loopback address 127.0.0.1.
New contributor
add a comment |
up vote
0
down vote
Use RawCap, to capture traffic of localhost (127.0.0.1). You just need to download Rawcap.exe and run it. It will open its command prompt listing interfaces. Now select one of the interface which has loopback address 127.0.0.1.
New contributor
add a comment |
up vote
0
down vote
up vote
0
down vote
Use RawCap, to capture traffic of localhost (127.0.0.1). You just need to download Rawcap.exe and run it. It will open its command prompt listing interfaces. Now select one of the interface which has loopback address 127.0.0.1.
New contributor
Use RawCap, to capture traffic of localhost (127.0.0.1). You just need to download Rawcap.exe and run it. It will open its command prompt listing interfaces. Now select one of the interface which has loopback address 127.0.0.1.
New contributor
New contributor
answered 2 days ago
Kinjal
1
1
New contributor
New contributor
add a comment |
add a comment |
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f508623%2fhow-can-i-see-127-0-0-1-traffic-on-windows-using-wireshark%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
1
how exactly are you trying to do this?
– Oleksandr Kravchuk
Nov 21 '12 at 1:44
3
Please try Npcap: github.com/nmap/npcap, it is based on WinPcap and supports loopback traffic capturing on Windows. After you installed Npcap, you can capture the loopback traffic using Wireshark.
– Yang Luo
Nov 8 '15 at 8:24