Features FAQ Upload Price View Pcaps πŸ”’ My Pcaps Sign In


Online pcap file analyzer

Allow read and view pcap file, analyze IPv4/IPv6, HTTP, Telnet, FTP, DNS, SSDP, WPA protocols, build map of network structure and nodes activity graph, sniff and analyze network traffic and other pcap data.

Analyse pcap files to view HTTP headers and data, extract transferred binaries, files, office documents, pictures and find passwords.

View analyzed pcaps Upload pcap file


Bring intellectual network traffic analysis into Cloud. Open pcap files online with our pcapng viewer.


View HTTP headers and HTTP communication

Deep packet inspection allows you to dive into HTTP communications: requests, responses, services information and payloads, collect post data and analyze pcap content.

Wonder which HTTP sessions are established, which credentials are sent ? Which files are transferred? A-Packets network traffic analysis will done it for you with integrated pcap file viewer.

Analyze pcap file to investigate HTTP streams with in-built HTTP analyzer, view network traffic, rebuild client-server communications step by step.

Find devices on network

You can easily get pcap visualization to explore network devices map, all communications between devices and classify network nodes by their type through pcap analysis. Visualize TCP/UDP communications from pcap file with network graph.

Quick read pcap files to detect DNS, DHCP and LDAP servers and sniff DNS requests in pcap file. Running services for each host will be detected in the captured traffic and analyzed with passive fingerprinting.

Devices map displays network traffic like other pcap tools for DNS/HTTP/HTTPS/SMB/SSH/RDP and other protocols and allows explore individual protocol links between network nodes.

Gather WiFi Information

View wireless networks information extracted from pcap file: you can find Access Points and their SSIDs (network names), reveal previously-associated networks for client devices using probe requests.

You can also look into encrypted network and sniff multicast traffic trying to detect used network protocols and services.

In case of WPA/WPA2 handshakes will be found in analyzed pcap file you can view and download them as .hccapx file to try to recover password with Hashcat.

Extract files from pcap

Pcap reader allows locate and extract pictures, office documents and other file formats detected during analyzing of uploaded pcap file. You can quick preview found files in network traffic and download them.

Comprehensive pcap file analysis provide you with all information about files in HTTP stream.


SMB Sniffer

SMB and NetBIOS packets provide a lot of information in broadcast packets about LAN structure. You can extract from pcap file information like versions of installed OS, NetBIOS names, workstation/server roles, admin comments for nodes.

Another one interesting thing could be found in SMB is NTLMv2-SSP authentication between nodes. Upload pcap file and you can try to crack found hashes with appropriated tools.

DNS queries investigation

You can explore all name resolution protocols like classic DNS, mDNS (Multicast DNS) and NBNS (NetBIOS Name Service) to gather information about network structure and activity of running services.

Filters allow separate DNS traffic by type and analyze queried names, targert servers or multicast/broadcast addresses (in case of mDNS and NBNS).


Analyze ARP packets

(Address Resolution Protocol) ARP messages contains valuable information about devices topology and used MAC addresses on Layer 2 (OSI). You can elicit device-IP correspondences right from ARP requests and responses, investigate gratuitous ARP messages during devices' boot.

Basic automatic analyze enables to detect various anomalies in ARP communications, detect routers and smart switches, WiFi access points integrated into LAN. It is possible to detect malicious activities like ARP spoofing nodes.

Find passwords in pcap file

A-Packets scans uploaded pcap file for various protocols to find plain text passwords in authorization headers or detect cryptographic hashes, including complex challenge-base auth protocols.

You can extract passwords/hashes from HTTP Basic/Digest/Negotiate, SIP Digest, NTLMv1/v2 (SMB), Kerberos, LDAP, SNMP, IMAP, SMTP, Postgres, MSSQL (TDS 7.0+), Telnet and FTP sessions. Original passwords can be restored from obtained hashes with any hash-crack tool.

Frequently Asked Questions

Got a question? We've got answers. If you have some other questions, contact us.

Is it free?

Yes, it is free. You can upload, download and analyze pcap files (and pcapng) for free. It does not require any personalization or any charge. Please note that free usage is limited by 25Mb for .pcap files.

What information am I sharing when I upload a pcap file ?

Everything stored within the pcap file, including the file itself. Please be sure to read the privacy policy before submitting your the first file.

Which files I can upload to the service for further analyze ?

Now the supported file formats are restricted by only pcap and pcapng files. Please see instructions on upload pcap page how to read pcap files.