How to Filter by Port with Wireshark

Wireshark represents the world’s most used protocol analyzer. By using it, you can check everything that’s going on within your network, troubleshoot different problems, analyze and filter your network traffic using various tools, etc.

How to Filter by Port with Wireshark

If you want to learn more about Wireshark and how to filter by port, make sure you keep reading.

What Exactly Is Port Filtering?

Port filtering represents a way of filtering packets (messages from different network protocols) based on their port number. These port numbers are used for TCP and UDP protocols, the best-known protocols for transmission. Port filtering represents a form of protection for your computer since, by port filtering, you can choose to allow or block certain ports to prevent different operations within the network.

There is a well-established system of ports used for different internet services, such as file transfer, e-mail, etc. In fact, there are over 65,000 different ports. They exist in “allow” or “closed” mode. Some applications on the internet can open these ports, thus making your computer more exposed to hackers and viruses.

By using Wireshark, you can filter different packets based on their port number. Why would you want to do this? Because in that way, you can filter out all the packets you don’t want in your computer for different reasons.

What Are the Important Ports?

There are 65,535 ports. They can be divided into three different categories: ports from 0 – 1023 are well-known ports, and they are assigned to common services and protocols. Then, from 1024 to 49151 are registered ports – they are assigned by ICANN to a specific service. And public ports are ports from 49152-65535, they can be used by any service. Different ports are used for different protocols.

If you want to learn about the most common ones, check out the following list:

Port numberService nameProtocol
20, 21File transfer protocol – FTPTCP
22Secure shell – SSHTCP and UDP
23TelnetTCP
25Simple Mail Transfer ProtocolTCP
53Domain Name System – DNSTCP and UDP
67/68Dynamic Host Configuration Protocol – DHCPUDP
80HyperText Transfer Protocol – HTTPTCP
110Post Office Protocol – POP3TCP
123Network Time Protocol – NTPUDP
143Internet Message Access Protocol (IMAP4)TCP and UDP
161/162Simple Network Management Protocol –SNMPTCP and UDP
443HTTP with Secure Sockets Layer – HTTPS (HTTP over SSL/TLS)TCP

Analysis in Wireshark

The process of analysis in Wireshark represents monitoring of different protocols and data inside a network.

Before we start with the process of analysis, make sure you know the type of traffic you are looking to analyze, and various types of devices that emit traffic:

  1. Do you have promiscuous mode supported? If you do, this will allow your device to collect packets that are not originally intended for your device.
  2. What devices do you have inside your network? It’s important to keep in mind that different kinds of devices will transmit different packets.
  3. What type of traffic do you want to analyze? The type of traffic will depend on the devices within your network.

Knowing how to use different filters is extremely important for capturing the intended packets. These filters are used before the process of packet capturing. How do they work? By setting a specific filter, you immediately remove the traffic that does not meet the given criteria.

Within Wireshark, a syntax called Berkley Packet Filter (BPF) syntax is used for creating different capture filters. Since this is the syntax that is most commonly used in packet analysis, it’s important to understand how it works.

The Berkley Packet Filter syntax captures filters based on different filtering expressions. These expressions consist of one or several primitives, and primitives consist of an identifier (values or names that you’re trying to find within different packets), followed by one or several qualifiers.

Qualifiers can be divided into three different kinds:

  1. Type – with these qualifiers, you specify what kind of thing the identifier represents. Type qualifiers include port, net, and host.
  2. Dir (direction) – these qualifiers are used in order to specify a transfer direction. In that way, “src” marks the source, and “dst” marks the destination.
  3. Proto (protocol) – with protocol qualifiers, you can specify the specific protocol you would like to capture.

You can use a combination of different qualifiers in order to filter out your search. Also, you can use operators: for example, you can use the concatenation operator (&/and), negation operator (!/not), etc.

Here are some examples of capture filters you can use in Wireshark:

FiltersDescription
host 192.168.1.2All traffic associated with 192.168.1.2
tcp port 22All traffic associated with port 22
src 192.168.1.2All traffic originating from 192.168.1.2

It is possible to create capture filters in the protocol header fields. The syntax looks like this: proto[offset:size(optional)]=value. Here, proto represents the protocol you want to filter, offset represents the position of the value in the header of the packet, the size represents the length of the data, and value is the data you’re looking for.

Display Filters in Wireshark

Unlike capture filters, display filters don’t discard any packets, they simply hide them while viewing. This is a good option since once you discard packets, you won’t be able to recover them.

Display filters are used to check for the presence of a certain protocol. For example, if you would like to display packets that contain a particular protocol, you can type the name of the protocol in Wireshark’s “Display filter” toolbar.

Other Options

There are various other options you can use to analyze packets in Wireshark, depending on your needs.

  1. Under the “Statistics” window in Wireshark, you can find different basic tools you can use to analyze packets. For example, you can use the “Conversations” tool to analyze the traffic between two different IP addresses.
  2. Under the “Expert Infos” window, you can analyze the anomalies or uncommon behavior within your network.

Filtering by Port in Wireshark

Filtering by port in Wireshark is easy thanks to the filter bar that allows you to apply a display filter.

For example, if you want to filter port 80, type this into the filter bar: “tcp.port == 80.” What you can also do is type “eq” instead of “==”, since “eq” refers to “equal.”

You can also filter multiple ports at once. The || signs are used in this case.

For example, if you want to filter ports 80 and 443, type this into the filter bar: “tcp.port == 80 || tcp.port == 443”, or “tcp.port eq 80 || tcp.port eq 443.”

Additional FAQs

How Do I Filter Wireshark by IP Address and Port?

There are several ways in which you can filter Wireshark by IP address:

1. If you’re interested in a packet with a particular IP address, type this into the filter bar: “ip.adr == x.x.x.x.

2. If you’re interested in packets coming from a particular IP address, type this into the filter bar: “ip.src == x.x.x.x.

3. If you’re interested in packets going to a particular IP address, type this into the filter bar: “ip.dst == x.x.x.x.

If you want to apply two filters, such as IP address and port number, check out the next example: “ip.adr == 192.168.1.199.&&tcp.port eq 443.” Since “&&” represent symbols for “and”, by writing this, you are able to filter your search by IP address (192.168.1.199) and by port number (tcp.port eq 443).

How Does Wireshark Capture Port Traffic?

Wireshark captures all the network traffic as it happens. It will capture all the port traffic and show you all the port numbers in the specific connections.

If you would like to start the capture, follow these steps:

1. Open “Wireshark.”

2. Tap “Capture.”

3. Select “Interfaces.”

4. Tap “Start.”

If you want to focus on a specific port number, you can use the filter bar.

When you want to stop the capture, press ‘’Ctrl + E.’’

What Is the Capture Filter for a DHCP Option?

Dynamic Host Configuration Protocol (DHCP) option represents a kind of network management protocol. It is used for automatically assigning IP addresses to devices that are connected to the network. By using a DHCP option, you don’t have to manually configure various devices.

If you want to see only the DHCP packets in Wireshark, type “bootp” in the filter bar. Why bootp? Because it represents the older version of DHCP, and they both use the same port numbers – 67 & 68.

Why Should I Use Wireshark?

Using Wireshark has numerous advantages, some of which are:

1. It’s free – you can analyze your network traffic completely free!

2. It can be used for different platforms – you can use Wireshark on Windows, Linux, Mac, Solaris, etc.

3. It’s detailed – Wireshark offers a deep analysis of numerous protocols.

4. It offers live data – this data can be gathered from various sources such as Ethernet, Token Ring, FDDI, Bluetooth, USB, etc.

5. It’s widely used – Wireshark is the most popular network protocol analyzer.

Wireshark Doesn’t Bite!

Now you’ve learned more about Wireshark, its abilities, and filtering options. If you want to be sure that you can troubleshoot and identify any type of network issues or inspect the data coming in and out of your network, thus keeping it secure, you should definitely try Wireshark.

Have you ever used Wireshark? Tell us about it in the comment section below.

Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way.