Page 1 of 1

Traffic: In and out, who is making that download or upload???

Posted: May 2nd, 2017, 7:54 pm
by ramses2010
Hello,

Sometimes I see a spike in the numbers for Traffic In: It goes 20 or 30 MB a sec, how do I find out which specific internal host/or IP address is making that download or upload at specific time? Is there something in the web interface or command line that would at least give me an IP address making that download in real time?

I am referring to real time not the report in Status>Connections.

Thank you for your help,
Francis

Re: Traffic: In and out, who is making that download or upload???

Posted: May 2nd, 2017, 9:19 pm
by Alorotom
Hello Francis,

no there is nothing like a real time monitor in the standard IPFire. But this has been discussed a few days before here in the forum. There seems to be an add on which could do the job. Or try iftop on the command line.

E.g. "iftop -i green0"
will show you very exactly what is passing the green0 interface.

Alorotom

Re: Traffic: In and out, who is making that download or upload???

Posted: May 2nd, 2017, 9:57 pm
by ramses2010
Hi,

So I tried the command you gave me: iftop -i green0 at the command line and its doesnt do anything. it says command not found. Any ideas?

Thanks.F
Alorotom wrote:Hello Francis,

no there is nothing like a real time monitor in the standard IPFire. But this has been discussed a few days before here in the forum. There seems to be an add on which could do the job. Or try iftop on the command line.

E.g. "iftop -i green0"
will show you very exactly what is passing the green0 interface.

Alorotom

Re: Traffic: In and out, who is making that download or upload???

Posted: May 2nd, 2017, 10:19 pm
by ramses2010

Re: Traffic: In and out, who is making that download or upload???

Posted: May 3rd, 2017, 1:21 pm
by bloater99
ramses2010 wrote:Hi,

So I tried the command you gave me: iftop -i green0 at the command line and its doesnt do anything. it says command not found. Any ideas?

Thanks.F
You have to install iftop first under Pakfire.