cpu_port example :
nagumahu1@ubuntunagumahu1:~/mysde$ sudo tshark -i enp4s0f1
Running as user "root" and group "root". This could be dangerous.
tshark: Lua: Error during loading:
[string "/usr/share/wireshark/init.lua"]:44: dofile has been disabled due to running Wireshark as superuser. See https://wiki.wireshark.org/CaptureSetup/CapturePrivileges for help in running Wireshark as an unprivileged user.
Capturing on 'enp4s0f1'
1 0.000000000 aa:aa:aa:aa:aa:aa → 00:cc:00:01:02:03 0xc002 281 Ethernet II
2 30.002933848 aa:aa:aa:aa:aa:aa → 00:cc:00:01:02:03 0xc002 281 Ethernet II
Sniffing packets which are egress mirrored:
nagumahu1@ubuntunagumahu1:~/mysde$ sudo tcpdump -i enp4s0f1
[sudo] password for nagumahu1:
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on enp4s0f1, link-type EN10MB (Ethernet), capture size 262144 bytes
15:23:08.368348 aa:aa:aa:aa:aa:aa (oui Unknown) > 00:cc:00:01:02:03 (oui Unknown), ethertype Unknown (0xc002), length 767:
0x0000: c300 1c00 0000 0500 0003 1efd 3262 3f03 ............2b?.
0x0010: 1efd 3262 6900 0000 0000 0003 1efd 3263 ..2bi.........2c
0x0020: d100 0000 0000 0000 0000 0000 0000 0000 ................
0x0030: 00ff ffff ffff ff0c 42a1 4f2f 6608 0045 ........B.O/f..E
0x0040: 0002 b200 0100 0040 06f4 f0c0 a801 03c0 .......@........
0x0050: a801 01ca 0914 5100 0000 0000 0000 0050 ......Q........P
0x0060: 0220 00fd e000 0049 5943 5347 3131 4b4a .......IYCSG11KJ
0x0070: 5551 4649 5949 594c 4e4a 4850 574a 424d UQFIYIYLNJHPWJBM
0x0080: 594c 3147 4851 504b 5851 4e45 5354 4844 YL1GHQPKXQNESTHD
0x0090: 534d 4c50 5451 5a54 5252 524d 4943 5144 SMLPTQZTRRRMICQD
0x00a0: 4353 4547 4948 4a47 5452 4d52 5250 4353 CSEGIHJGTRMRRPCS
0x00b0: 4955 4b31 5143 4b48 4650 5a4a 5a59 4531 IUK1QCKHFPZJZYE1
0x00c0: 4249 5345 5255 424b 4357 5a52 4d46 4e58 BISERUBKCWZRMFNX
0x00d0: 4b4c 4a45 5a4c 5754 4e51 4c55 5946 5857 KLJEZLWTNQLUYFXW
0x00e0: 5044 5949 5a31 5042 4655 474e 4e5a 5555 PDYIZ1PBFUGNNZUU
0x00f0: 4953 4659 4a54 4a45 4d54 5447 454d 444d ISFYJTJEMTTGEMDM
0x0100: 4b58 5153 494f 4f4c 5244 5051 5248 4651 KXQSIOOLRDPQRHFQ
0x0110: 4b51 5952 5650 4250 4f50 314a 4643 585a KQYRVPBPOP1JFCXZ
0x0120: 4851 4648 4b45 314c 444d 495a 4357 4647 HQFHKE1LDMIZCWFG
0x0130: 4345 5a55 4956 544a 4e46 5845 4a51 5549 CEZUIVTJNFXEJQUI
0x0140: 4f44 5554 4e46 4942 5343 4d43 474b 4a4f ODUTNFIBSCMCGKJO
0x0150: 584b 424a 5358 4857 4352 4c4c 4842 4c44 XKBJSXHWCRLLHBLD
0x0160: 5456 4753 4d4e 5155 4d31 5948 4e4a 4231 TVGSMNQUM1YHNJB1
0x0170: 4246 4f4e 4c49 4951 4f5a 4442 4846 5742 BFONLIIQOZDBHFWB
0x0180: 5447 4756 5547 3158 5731 4f58 4b4f 4548 TGGVUG1XW1OXKOEH
0x0190: 4b47 564a 514c 5743 5044 545a 4556 455a KGVJQLWCPDTZEVEZ
0x01a0: 3156 4c52 594d 594c 4a50 4951 4450 5a5a 1VLRYMYLJPIQDPZZ
0x01b0: 4e48 5352 514a 5946 4448 564e 474d 514b NHSRQJYFDHVNGMQK
0x01c0: 4b56 5250 524b 4c57 454d 4752 4759 3149 KVRPRKLWEMGRGY1I
0x01d0: 5553 5042 4a54 494d 5859 5954 5a53 5751 USPBJTIMXYYTZSWQ
0x01e0: 4256 4d55 5a5a 5458 574c 4e49 5859 5749 BVMUZZTXWLNIXYWI
0x01f0: 4c31 4553 4f57 4851 4f44 5259 4d57 3143 L1ESOWHQODRYMW1C
0x0200: 435a 554e 5651 514e 4f54 464c 4e4c 5258 CZUNVQQNOTFLNLRX
0x0210: 5757 4a57 5831 4d52 544f 4755 5749 524d WWJWX1MRTOGUWIRM
0x0220: 4556 4754 554d 5548 4a54 4c58 4f4c 504d EVGTUMUHJTLXOLPM
0x0230: 5942 5a4c 4e55 564e 4b45 4250 5155 444d YBZLNUVNKEBPQUDM
0x0240: 554e 4a46 584d 584a 4959 4a53 5431 4342 UNJFXMXJIYJST1CB
0x0250: 4547 4f4e 5258 4845 5457 5a52 4954 4b58 EGONRXHETWZRITKX
0x0260: 5944 5056 4f55 4c4f 4e4b 4a4e 4856 4c46 YDPVOULONKJNHVLF
0x0270: 5143 5049 4749 4d50 514f 5153 4f53 5a43 QCPIGIMPQOQSOSZC
0x0280: 534a 5646 504e 5757 4543 5454 4248 5a54 SJVFPNWWECTTBHZT
0x0290: 4247 4b43 5548 5055 5955 554e 534f 5247 BGKCUHPUYUUNSORG
0x02a0: 4650 4a51 4f31 314c 4e44 5147 5450 4557 FPJQO11LNDQGTPEW
0x02b0: 4759 564d 5847 4c56 4851 5442 594a 4c56 GYVMXGLVHQTBYJLV
0x02c0: 5552 4e59 5453 454e 554d 4f54 584b 5158 URNYTSENUMOTXKQX
0x02d0: 494b 4c42 4a42 4e50 4754 4244 4543 4542 IKLBJBNPGTBDECEB
0x02e0: 5447 5055 4651 464a 4849 5757 5055 474a TGPUFQFJHIWWPUGJ
0x02f0: 46
We are sniffing on enp4s0f1
, cpu_port
The location of scraping tool for ETHERNET packets : dtn3:~/scrap_c002