Articles on: General

How to create a packet capture for DDoS Traffic analysis


This guide will help you create a pcap (packet capture) file using tcpdump, a powerful command-line packet analyzer. This file will be used by our support team to investigate potential DDoS attacks.


Access to the Server during the attack: Depending on the type of attack you might not be able to access the server via SSH, ensure you can access the server via the console (on VPS services) or IPMI (on dedicated servers).

1. Install tcpdump

Most Linux distributions come with tcpdump pre-installed. If it's not installed, you can install it using your package manager.

For Ubuntu/Debian:

sudo apt update
sudo apt install tcpdump

For Alma/Rocky/RHEL:

sudo yum install tcpdump

2. Capture Traffic and Save to a pcap File

To capture traffic and save it to a file, use the -w option followed by the filename. For example:

sudo tcpdump -w capture.pcap

Ensure the tcpdump command is only running during an attack.

To stop the packet capture simply press ctrl + c

3. Verify the Capture File

You can verify that the capture file was created and contains data using tcpdump itself:

tcpdump -r capture.pcap

4. Downloading the pcap File

To download the pcap file you can connect to the server using sFTP, once connected you will find the pcap file inside the same directory you ran the command.

5. Uploading the pcap File

Once you have the pcap file, you can send this to our support team by upload it to a file sharing platform or via email.


Following these steps will help you create a pcap file using tcpdump, enabling our support team to analyze the traffic and investigate potential DDoS attacks. If you encounter any issues or need further assistance, please contact our support team.

Updated on: 04/07/2024

Was this article helpful?

Share your feedback


Thank you!