MikroTik Torch and Packet Sniffer

Monitoring network traffic is essential in any environment where uptime, performance, and visibility matter. MikroTik routers provide two built-in tools that help engineers and system administrators observe traffic: Torch and Packet Sniffer.

This guide explains how to use these tools, with examples and practical insights. Whether you’re troubleshooting an issue, identifying suspicious activity, or optimizing performance, understanding how to use Torch and Packet Sniffer can save time and improve outcomes.

Table of Contents

Why Analyze MikroTik Traffic?

MikroTik routers are widely used in ISPs, SMBs, and enterprise networks. Traffic analysis helps with:

  • Identifying bandwidth abuse
  • Spotting misconfigured devices
  • Detecting malware or scanning activity
  • Verifying QoS and firewall effectiveness
  • Diagnosing slow connections or performance problems

Torch vs. Packet Sniffer: When to Use Each

Feature Torch Packet Sniffer
Type Real-time, lightweight Deep packet inspection
Use case See top talkers, protocols Export traffic for detailed review
Interface CLI / Winbox CLI / Winbox
Output IPs, ports, protocols, speed .pcap file for Wireshark
Performance Low impact Medium to high impact

Torch: Real-Time Traffic Analysis Tool

What is MikroTik Torch?

Torch is a built-in traffic monitoring tool that displays real-time flow data through a selected interface. It shows:

  • Source and destination IP addresses
  • Source and destination ports
  • Protocols (TCP, UDP, ICMP, etc.)
  • TX and RX speeds in bits per second

How to Use Torch via Winbox

  1. Open Winbox and log in.
  2. Go to Tools > Torch.
  3. Select the interface (e.g., ether1).
  4. Click Start.

You will see live traffic data sorted by IPs, ports, and speed.

How to Use Torch via CLI

/tool torch interface=ether1

Filter by protocol:

/tool torch interface=ether1 protocol=tcp

Filter by port:

/tool torch interface=ether1 port=80

Filtering Options in Torch

Filter Example
Interface interface=ether1
Protocol protocol=udp
Src/Dst IP src-address=192.168.1.100
Port port=443
/tool torch interface=ether1 src-address=10.0.0.1 port=80

Example: Diagnosing a Slow Connection

/tool torch interface=ether1

Look for IPs with high TX or RX values. Limit their usage or apply queues to manage bandwidth.

Packet Sniffer: Deep Traffic Capture Tool

What is MikroTik Packet Sniffer?

Packet Sniffer captures packets on specified interfaces and saves them to a .pcap file. You can open these files in tools like Wireshark.

How to Start Packet Sniffer in Winbox

  1. Go to Tools > Packet Sniffer.
  2. Select the interface.
  3. Set filter options (IP, port, MAC).
  4. Enter a file name.
  5. Click Start and then Stop when done.

How to Start Packet Sniffer in CLI

/tool sniffer set interface=ether1 file-name=sniff1.pcap filter-ip-address=192.168.88.1
/tool sniffer start
/tool sniffer stop

Common Sniffer Configuration Options

Option Example
Interface interface=bridge-local
IP Filter filter-ip-address=192.168.1.10
Port Filter filter-port=443
File Name file-name=https_capture.pcap
Stream to Host streaming-enabled=yes
Streaming Server streaming-server=192.168.1.100

Example: Capturing DNS Traffic

/tool sniffer set interface=ether1 filter-port=53 file-name=dns_capture.pcap
/tool sniffer start
/tool sniffer stop

Exporting and Analyzing Captures in Wireshark

  1. Download the .pcap file from the router.
  2. Open it in Wireshark.
  3. Apply filters like ip.addr == 192.168.1.10 or dns.
  4. Inspect TCP streams and packet flags.

Streaming MikroTik Sniffer to Wireshark

  1. Start Wireshark and capture on your network interface.
  2. Run the following on MikroTik:
/tool sniffer set streaming-enabled=yes streaming-server=192.168.88.100 interface=ether1
/tool sniffer start

Best Practices for Torch and Packet Sniffer

  • Use interface-specific captures
  • Apply filters to reduce noise
  • Monitor CPU usage on large networks
  • Use off-peak times for deep captures
  • Restrict access to monitoring tools

Real-World Use Cases

  • Malware detection: Use Sniffer to inspect unusual ports or domains
  • Bandwidth abuse: Identify top talkers with Torch
  • NAT debugging: Capture WAN/LAN traffic to compare translation
  • SIP call drops: Analyze RTP/5060 traffic using Sniffer and Wireshark

Troubleshooting Torch and Sniffer

  • Torch shows no data: Check interface and filters
  • No .pcap file: Verify file name and storage space
  • Wireshark error: Confirm valid format and complete capture

Conclusion

Torch and Packet Sniffer give MikroTik users direct access to detailed traffic analysis. Use Torch for fast, real-time visibility. Use Packet Sniffer for deep inspection and forensics. Combine both to solve performance and security problems more efficiently.

Additional Resources

FAQ

What is MikroTik Torch used for?

Torch is used for real-time analysis of IP traffic on a selected interface. It shows IPs, ports, protocols, and speeds.

How do I export MikroTik traffic to Wireshark?

Use the Packet Sniffer to create a .pcap file or stream live traffic to Wireshark by enabling streaming mode.

Is MikroTik Packet Sniffer safe to use in production?

It is safe for small captures, but avoid running long sessions during high traffic hours, as it may impact performance.

Can Torch analyze encrypted traffic?

Torch shows protocol and bandwidth data but cannot decode encrypted traffic like HTTPS.

Where are packet capture files saved?

Files are stored in the Files section in Winbox. You can also access them via FTP or WebFig.

Check our list of MikroTik guides.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *