Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/x-way/iptables-tracer
Insert trace-points into the running configuration to observe the path of packets through the iptables chains.
https://github.com/x-way/iptables-tracer
golang iptables iptables-tracer netfilter nflog
Last synced: 2 days ago
JSON representation
Insert trace-points into the running configuration to observe the path of packets through the iptables chains.
- Host: GitHub
- URL: https://github.com/x-way/iptables-tracer
- Owner: x-way
- License: mit
- Created: 2018-11-04T19:18:56.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2024-09-10T08:18:58.000Z (3 months ago)
- Last Synced: 2024-12-08T20:54:21.951Z (5 days ago)
- Topics: golang, iptables, iptables-tracer, netfilter, nflog
- Language: Go
- Homepage:
- Size: 1.15 MB
- Stars: 257
- Watchers: 6
- Forks: 30
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-network-stuff - **43**星
README
# iptables-tracer
[![CircleCI](https://circleci.com/gh/x-way/iptables-tracer/tree/master.svg?style=svg)](https://circleci.com/gh/x-way/iptables-tracer/tree/master)
[![Go Report Card](https://goreportcard.com/badge/github.com/x-way/iptables-tracer)](https://goreportcard.com/report/github.com/x-way/iptables-tracer)
[![Codecov](https://codecov.io/gh/x-way/iptables-tracer/branch/master/graph/badge.svg)](https://codecov.io/gh/x-way/iptables-tracer/)Insert trace-points into the running configuration to observe the path of packets through the iptables chains.
## Usage
```
$ iptables-tracer -f "-s 192.0.2.1 -p tcp --dport 443" -t 30s
14:42:00.284882 raw PREROUTING 0x00000000 IP 192.0.2.1.36028 > 203.0.113.41.443: Flags [S], seq 3964691400, win 29200, length 0 [In:eth0 Out:]
14:42:00.287255 mangle PREROUTING 0x00008000 IP 192.0.2.1.36028 > 203.0.113.41.443: Flags [S], seq 3964691400, win 29200, length 0 [In:eth0 Out:]
14:42:00.288966 nat PREROUTING 0x00008000 IP 192.0.2.1.36028 > 203.0.113.41.443: Flags [S], seq 3964691400, win 29200, length 0 [In:eth0 Out:]
14:42:00.290545 mangle FORWARD 0x00008000 IP 192.0.2.1.36028 > 198.51.100.8.443: Flags [S], seq 3964691400, win 29200, length 0 [In:eth0 Out:eth1]
14:42:00.292123 filter FORWARD 0x00008002 IP 192.0.2.1.36028 > 198.51.100.8.443: Flags [S], seq 3964691400, win 29200, length 0 [In:eth0 Out:eth1]
14:42:00.293164 mangle POSTROUTING 0x00008002 IP 192.0.2.1.36028 > 198.51.100.8.443: Flags [S], seq 3964691400, win 29200, length 0 [In: Out:eth1]
14:42:00.293780 nat POSTROUTING 0x00008002 IP 192.0.2.1.36028 > 198.51.100.8.443: Flags [S], seq 3964691400, win 29200, length 0 [In: Out:eth1]
```