

R is don't do privilege revocation logic q is be quiet (don't print packet reception hash marks) Nohup tcpdump -nq -s 0 -i eth0 -G3600 -w /tmp/trace/sip-%F-%H-%M-%S.pcap port 5080 or port 5060 &ĭaemonize and log 2 ports, rotate log every hour, and place into hierarchical directory structure. Tcpdump -nq -s 0 -i eth0 -G3600 -w /tmp/trace/sip-%F-%H-%M-%S.pcap port 5060ĭaemonize and log 2 ports, rotate log every hour. Save a new time-stamped file approximately once per hour on the specified port

Tcpdump -nq -s 0 -i eth0 -w /tmp/dump.pcap port 5060 Tcpdump -nq -s 0 -A -vvv -i eth0 port 5060 Real-time traffic dump (full packets) to stdout: Else, use tshark if you want a "text only" view of the SIP traffic without all the headers and extra information. Use tcpdump if you want a pcap to open up in Wireshark later.
