Flow Graph in Wireshark Last Updated : 23 Jul, 2025 Comments Improve Suggest changes Like Article Like Report The Wireshark's Flow graph feature displays the sender and a receiver view of the packet flow. The window shows connections between hosts. It is very helpful for network analysis and packet capturing. We can analyze the traffic flow of data. We can check the network latency with the help of these you can analyze the flow of traffic which is between two conversations or sources or destinations. With the help of this flow graph, we can check how much duplicate acknowledgement will be occurring in our network. Flow Graph for a Trace File :To open the "Flow Graph" in Wireshark for a trace file follow the below steps: Start the Wireshark by selecting the network we want to analyze.Now go into the Wireshark and click on Statistics→ Flow Graph menu or toolbar item. This will then bring up Wireshark's "Flow Graph" window. The screenshot above of the Flow Graph window displays issues with a TCP connection, such as timeouts, re-transmitted frames, or dropped connections. Note: Each vertical line in the graph represents the specific host.The numbers present at the left of the Flow Graph window represent the time packet. We can also change the format in the View → Time Display Format menu or toolbar item. To apply the changes we must relaunch the Flow Graph window to observe the time in a new format.The number present at both ends of each horizontal arrow between two hosts represents the port numbers.If we select any packet in the Flow Graph that packet is automatically highlighted in the main Wireshark window. Control of Flow Graph Window:Limit to display filter: It displays all the connections matching the display filter. If the display filter is active the checkbox is checked.Flow type: limits the type of protocol flows.Addresses: It allows switching shown addresses in the diagramReset Diagram: It resets the view position and zooms to the default state.Export: It allows us to export diagrams as images in multiple different formats like PDF, PNG, BMP, JPEG, etc. Comment More infoAdvertise with us Next Article SIP Flows Window in Wireshark K kaalel Follow Improve Article Tags : Ethical Hacking Wireshark - Working With Captured Packets Similar Reads ARP in Wireshark Address resolution protocols are used to dynamically discover mappings between layer 3 (protocol) and layer 2 (hardware) addresses. A common usage is to map an IP address (e.g., 192.168.0.10) to an underlying Ethernet address (e.g., 01:02:03:04:05:06). These addresses are determined via his ARP, so 5 min read ANCP in Wireshark The ANCP (Automatic Network Configuration Protocol) is a protocol that allows for the configuration of devices over an ASCII serial link. Originally designed by Lucent Technologies, it was later standardized by the TIA and called âTIA/EIA-1057â.ANCP messages typically include information such as dev 4 min read SIP Flows Window in Wireshark In this digital era, most of the information is transmitted over a network and for this reason the network must be secure so that an attacker does not sniff the essential information so to solve this problem network engineers developed network analyzing tools so to block the security holes in the ne 3 min read I/O Graphs Window in Wireshark One of the really handy parts of the Wireshark is being able to see all the data that we have captured in really useful ways such as a graph. This can be very useful if we want to see how much traffic is flowing across our network and is very useful if we have a huge amount of data to sift through. 3 min read BACnet in Wireshark Digital information is more precious than any other asset in this information era, so it becomes the necessity of each and every organization to secure the data and provide a safe transfer of data over the network. Network in itself is very complex and transferring data attracts unwanted users and a 3 min read IP Filtering in Wireshark Wireshark is a network packet analyzer or tracer. Network Packet Analyzer displays captured packet data in as much detail as possible. It is a popular open-source network protocol analyzer used by ethical hackers to analyze network traffic to identify vulnerabilities or potential security breaches. 3 min read Like