Provides direct access to Wireshark network analysis capabilities, enabling packet capture, PCAP file analysis, protocol statistics generation, and network interface management for network troubleshooting and monitoring.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Wireshark MCP Servercapture 50 packets from Wi-Fi interface to check for unusual traffic"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Wireshark MCP Server
A comprehensive Model Context Protocol (MCP) server that provides AI assistants with professional-grade network analysis capabilities. Combines Wireshark packet analysis with nmap scanning, threat intelligence, and modern MCP features for enhanced network troubleshooting and security analysis.
Features
Core Wireshark Capabilities
Live Packet Capture: Real-time network traffic capture from any interface
PCAP File Analysis: Advanced analysis of capture files with filtering
Protocol Statistics: Comprehensive protocol hierarchy and conversation stats
Stream Following: Reconstruct TCP/UDP conversations from captures
Data Export: Export packets to JSON, CSV formats
Network Scanning (Nmap Integration)
Port Scanning: Multiple scan types (SYN, connect, UDP)
Service Detection: Identify services and versions
OS Fingerprinting: Operating system detection
Vulnerability Scanning: NSE vulnerability detection scripts
Quick & Comprehensive Scans: Flexible scan options
Security Features
Threat Intelligence: URLhaus and AbuseIPDB integration
Malicious IP Detection: Automatic threat checking
Security Audit Workflows: Guided security analysis prompts
Credential Scanning: Detect cleartext credentials
Defense in Depth: Multiple layers of input validation
Modern MCP Features
MCP Resources: Dynamic access to interfaces and captures
MCP Prompts: Guided workflows for security audits and troubleshooting
Structured JSON Output: LLM-optimized response formats
Rate Limiting: Prevent abuse of scanning operations
Async Operations: Non-blocking high-performance analysis
Related MCP server: Farcaster MCP Server
Installation
Quick Install (PyPI)
Development Install
Requirements
System Requirements
Python 3.8+ with pip
Wireshark/TShark installed and in PATH
Nmap (optional, for scanning features)
Network capture permissions (see setup below)
Installation Commands
Ubuntu/Debian
macOS
Windows
Network Permissions
Linux (Recommended)
Configuration
Claude Desktop
Edit your Claude Desktop config:
Windows:
%APPDATA%\Claude\claude_desktop_config.jsonmacOS:
~/Library/Application Support/Claude/claude_desktop_config.jsonLinux:
~/.config/Claude/claude_desktop_config.json
Environment Variables
Available Tools
Network Interface & Capture (5 tools)
get_network_interfaces()
Lists all available network interfaces
capture_live_packets(interface, count, capture_filter, timeout, format)
Captures live packets with BPF filtering
Supports JSON and text output formats
analyze_pcap_file(filepath, display_filter, max_packets)
Analyzes PCAP files with Wireshark display filters
get_protocol_statistics(filepath)
Generates protocol hierarchy and IP conversations
get_capture_file_info(filepath)
Retrieves capture file metadata
Stream Analysis (3 tools)
follow_tcp_stream(filepath, stream_index, format)
Reconstructs TCP conversations (ASCII, hex, raw)
follow_udp_stream(filepath, stream_index, format)
Reconstructs UDP conversations
list_tcp_streams(filepath)
Lists all TCP conversations in capture
Data Export (3 tools)
export_packets_json(filepath, display_filter, max_packets)
Exports packets to structured JSON
export_packets_csv(filepath, fields, display_filter)
Exports custom fields to CSV
convert_pcap_format(filepath, output_format)
Converts between pcap/pcapng formats
Nmap Scanning (6 tools)
nmap_port_scan(target, ports, scan_type, format)
Scans for open ports (connect, SYN, UDP)
nmap_service_detection(target, ports)
Detects service versions
nmap_os_detection(target)
Identifies operating system (requires root)
nmap_vulnerability_scan(target, ports)
Runs NSE vulnerability scripts
nmap_quick_scan(target)
Fast scan of top 100 ports
nmap_comprehensive_scan(target)
Full scan with all features
Threat Intelligence (2 tools)
check_ip_threat_intel(ip_or_filepath, providers)
Checks IPs against URLhaus, AbuseIPDB
scan_capture_for_threats(filepath, providers)
Comprehensive threat scan of PCAP file
MCP Resources
wireshark://interfaces/
Dynamic list of network interfaces
wireshark://captures/
Available PCAP files in common directories
wireshark://system/info
System capabilities and tool availability
network://help
Comprehensive tool documentation
MCP Prompts
security_audit
Guided security analysis workflow
network_troubleshooting
Network diagnostics workflow
incident_response
Security incident investigation workflow
Usage Examples
Basic Network Capture
Security Analysis Workflow
Scan & Capture Workflow
Threat Intelligence Check
Security
Input Validation
IP/CIDR/hostname validation
Port range validation
BPF and display filter sanitization
File path resolution and sandboxing
Command Injection Prevention
shell=False enforced in ALL subprocess calls
List-based command construction
No user input directly in shell commands
Rate Limiting
Max 10 nmap scans per hour
Configurable scan history tracking
Privilege Management
Detects when root/sudo required
Never auto-escalates privileges
Clear error messages for permission issues
Audit Logging
All scans logged with timestamps
Security-relevant operations tracked
Validation failures recorded
Development
Running Tests
Project Structure
Troubleshooting
"TShark not found"
"Permission denied" for capture
"Nmap not available"
Threat Intelligence Not Working
License
MIT License - see LICENSE file for details
Acknowledgments
Built on the Model Context Protocol (MCP) by Anthropic
Powered by Wireshark network analysis toolkit
Integrated with Nmap security scanner
Threat intelligence from URLhaus and AbuseIPDB
Support
Issues: GitHub Issues
Documentation: See
network://helpresource in MCPSecurity: Report vulnerabilities via GitHub Security Advisories
Roadmap
GeoIP enrichment for IP addresses
HTTP/TLS credential extraction
Real-time WebSocket streaming
VirusTotal integration
AlienVault OTX integration
Machine learning traffic classification
Anomaly detection algorithms
PCAP merging and splitting tools
Statistics visualization export
Transform your network analysis with AI-powered Wireshark + Nmap integration