Or, sign up with your e-mail address:
Already have an account? Log in here.
Drag and drop captures right into your browser, or upload using your personal API key. CloudShark organizes your uploads so all of your capture files can be tagged, searched, or deleted.
CloudShark's web-enhanced analysis and collaboration tools raise the bar on what you can learn from packet-capture data. Save annotations right on the packets so you don't repeat work.
Instantly link to the work you've already done to share with co-workers or customers. Publish network analysis with others through blogs, support forums, or troubleshooting emails.
Trying to debug a network problem or 3rd-party application and someone from a forum asks you to send a capture file? Post it to CloudShark and share it with others without fear of viruses. Use annotations to describe problems.
Build a collection of example capture files for your blog, newsletter, or course materials. Readers can access advacned analysis from any device without needing special software.
Need a centralized spot to store capture files from your servers, customers, or data-centers? CloudShark lives on the internet and can act like a drop-box for the files you generate while on the road.
CloudShark supports all of the display filters in Wireshark and helps you remember what they are by autocompleting as you type. The filter is automatically added to the URL for easy sharing.
As you do analysis, save your thoughts and notes directly on the packets as you come across them. When you come back to the capture, the annotations will be there waiting.
View application layer conversations from TCP, UDP, and SSL streams. Link directly to the stream you're looking at to make shared troubleshooting even easier.
Trace protocols and conversations in a graphical representation of your capture files. Apply display filters, sort and hide nodes to get exactly the view that helps you.
See the top-talkers in your capture. Sort by the total number of packets or bytes received or transmitted. CloudShark ships with the GeoLite database from MaxMind to provide GeoLocation services on public IP addresses.
Easily decrypt and debug 802.11 traffic when you know the WPA/WPA2 passphrase. CloudShark lets you enter known WPA decryption keys for captured 802.11 traffic to decrypt data, management, and group keys.
Zero in on your top talkers, show client/server interactions, and discover unxpected sources of traffic. Conversations can be viewed at the MAC, IPv4/IPv6, or TCP/UDP application layer, and deliver the Follow Stream view for the chosen conversation with a single click.
Quickly get an answer to what kind of traffic your capture file contains or if one application is taking the majority of the bandwidth. This is often the first step when diagnosing problems within a network. Go from this view to filtering specific protocols with a single click.
CloudShark is the perfect tool for working with SIP conversations and VoIP call traffic. Use the built-in SIP Call Flow visual diagram for an easy to follow view of signaling between endpoints. Diagnose issues or confirm configurations by looking at the SIP headers, which are never more than a click away.
Playback RTP audio from captured traffic without leaving your web browser. CloudShark is able to decode G.711, G.722, G.729, and GSM audio. Listen to VoIP calls to diagnose quality issues and drop-outs. Share audio with others without sending large files.
HTTP Request analysis can help track down problems in your web application traffic or discover which websites are offering up what traffic to your users. CloudShark's HTTP Analysis tools let you drill down to the actual packets containing requests, and zoom out to see a high-level overview of response and error codes.
Reassemble and extract scripts, images, documents, and even videos from HTTP conversations within capture files. These documents can be previewed from inside of CloudShark, or downloaded for further offline analysis.
Discover rogue access points, check for signal coverage, and analyze your BYOD deployment by analyzing raw wireless capture data. Inspect the easy to read list of SSID's, vendor information, signal-strentgh, and security profile information from WiFi Beacons and Probe responses in your capture.