Usage

<< Click to Display Table of Contents >>

Navigation:  Network Tools > IPMon+ >

Usage

Capturing Traffic

To capture traffic, click the Options button and select the interface to capture traffic on. The first interface with a valid IP address will be selected by default. As such, you will only need to manually select an interface if the computer that you are capturing on has more than one network interface with a valid IP address.

 

The Options dialog also allows you to enable promiscuous mode, which ensures that all packets, even when not sent to the local MAC address, are captured and displayed. If the network card is connected to a switch, then the port to which the NIC is connected to will need to be configured to forward all network traffic to this port. Most managed switches support this functionality.

 

ipmonplus_interfaces

 

Once the correct interface is selected, clicking the Start button will start capturing traffic. Once clicked, the start button will be renamed to Stop. Click Stop to suspend capturing traffic. Clicking the Stop button will not automatically clear collected information. Clicking the Clear button will erase all collected information from the display.

 

Threat Intel

IPMon+ can provide threat intel on all processed IP addresses in real time utilizing the OTX black list along with supplemental threat details from AbuseIPDB. Supplemental threat details are only available if an AbuseIPDB API key (free plan available as of 4/2019) is configured in the Options dialog. Checking the "Threat Intelligence" check box will enable the collection of threat intel, also checking the "Threats Only" check box will only display traffic with hosts that are deemed potentially malicious.

 

Filtering Traffic

 

ipmonplus_displayfilter

By default, all UDP, TCP, ICMP, ARP traffic statistics are displayed in the main grid window. By toggling the check boxes next to a protocol name (e.g. TCP), all traffic matching this protocol will immediately be hidden. Toggling the check boxes will not affect traffic being captured, it will only filters information from the main grid. All UDP, TCP, ICMP, ARP traffic statistics are always captured, regardless of the display filter.

 

You can also filter traffic based on UDP/TCP ports. Simply enter the port number in the Port(s) field, and only traffic that was sent to or from those ports will be displayed. You can specify multiple ports by separating them with a comma (e.g. 80, 443).

 

Threats Only

Requires that "Threat Intelligence" is checked. Will only display traffic from hosts that are deemed potentially malicious.

 

 

Statistics

Displays how many network packets and total number of kbytes that have been captured. Changing the current filter has no effect on the statistics, which always show the overall total.

 

Sorting, Copy & Paste

Data in the grad can by sorted by clicking any of the column headers. Rows in the grid an be selected and copied to the clipboard by pressing the CTRL+C key combination.