dump traffic on a network
-i Listen on interface. If unspecified, tcpdump searches the system interface list for the lowest
numbered, configured up interface (excluding loopback). Ties are broken by choosing the earliest
On Linux systems with 2.2 or later kernels, an interface argument of ``any'' can be used to
capture packets from all interfaces. Note that captures on the ``any'' device will not be done in
If the -D flag is supported, an interface number as printed by that flag can be used as the
-n Don't convert addresses (i.e., host addresses, port numbers, etc.) to names.
-s Snarf snaplen bytes of data from each packet rather than the default of 65535 bytes. Packets
truncated because of a limited snapshot are indicated in the output with ``[|proto]'', where proto
is the name of the protocol level at which the truncation has occurred. Note that taking larger
snapshots both increases the amount of time it takes to process packets and, effectively,
decreases the amount of packet buffering. This may cause packets to be lost. You should limit
snaplen to the smallest number that will capture the protocol information you're interested in.
Setting snaplen to 0 sets it to the default of 65535, for backwards compatibility with recent
older versions of tcpdump.
-w Write the raw packets to file rather than parsing and printing them out. They can later be
printed with the -r option. Standard output is used if file is ``-''. See pcap-savefile(5) for a
description of the file format.