Detection, Mitigation & Response

Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.

All features →
Learn
Documentation Quick Start API Reference Agent Setup DDoS Protection Landscape State of DDoS 2026 REPORT Free Certifications NEW
Research & Guides
Mirai Botnet Kill Switch Research memcached Amplification Dynamic Baselines PCAP Forensics PagerDuty Setup
Company
About Us Partners White Label Referral Program Pay with Crypto System Status
Legal & Support
Contact Us Terms Privacy SLA
Who Uses Flowtriq

From indie hosts to ISPs, see how teams like yours use Flowtriq to detect and stop DDoS attacks.

Talk to Us →
Infrastructure
Hosting Providers ISPs MSPs Small Operators Routers Edge Node Defense
Gaming
Game Server Hosting Game Studios
Business
SaaS Platforms E-Commerce Financial Services

Free Tool

PCAP Upload Analyzer

Upload a PCAP or PCAPNG capture file for instant client-side DDoS analysis. Your file never leaves your browser: all parsing and classification happens locally.

Drag & drop your .pcap or .pcapng file here

or click to browse: max 150 MB, parsed entirely in your browser

  • Reading file header...
  • Parsing packet records...
  • Classifying traffic patterns...
  • Generating analysis report...

Capture Overview

Attack Classification

Risk Score

Top Source IPs

Top Destination Ports

Protocol Distribution

TCP Flag Analysis

Peak Traffic

Recommended Mitigation

    How the PCAP Analyzer Works

    This tool reads raw PCAP and PCAPNG binary files directly in your browser using JavaScript's FileReader and DataView APIs. Your capture file is never uploaded to any server: all parsing and analysis is performed client-side in real time.

    The analyzer extracts and inspects:

    • Ethernet headers: Source and destination MAC addresses, EtherType for protocol identification.
    • IPv4 headers: Source/destination IPs, protocol number, TTL, total length, and fragmentation flags.
    • TCP headers: Port numbers and flag analysis (SYN, ACK, RST, FIN, PSH) to detect connection-state attacks.
    • UDP headers: Port numbers and payload sizes to identify amplification and volumetric floods.
    • ICMP headers: Type and code fields to detect ICMP-based floods and unreachable floods.

    Attack Types Detected

    The classification engine uses traffic heuristics to identify common DDoS attack patterns:

    • SYN Flood: High ratio of SYN packets without corresponding ACKs, indicating a TCP handshake exhaustion attack.
    • UDP Flood: Large volumes of UDP traffic targeting specific ports, often with spoofed source addresses.
    • DNS Amplification: UDP port 53 traffic with large response payloads, typical of reflective amplification attacks.
    • NTP Amplification: UDP port 123 traffic exploiting monlist commands for bandwidth amplification.
    • ICMP Flood: Excessive ICMP Echo Requests or other ICMP types saturating network capacity.
    • TCP RST Flood: High volume of RST packets attempting to tear down legitimate connections.
    • Volumetric / Mixed: Multi-vector attacks combining multiple protocols and techniques.

    Supported Capture Formats

    The tool supports standard PCAP files (libpcap magic 0xa1b2c3d4 and byte-swapped 0xd4c3b2a1) as well as PCAPNG files (Section Header Block 0x0a0d0d0a with Enhanced Packet Blocks). Captures from tcpdump, Wireshark, tshark, and most network monitoring tools are compatible.

    Go Beyond Packet Captures

    Flowtriq detects DDoS attacks in real time: 1-second detection, automatic classification, and instant alerting across all your nodes.

    Start Your Free Trial
    Export your results