Wireshark is a network analysis tool that is formerly known as Ethereal, and what it does is to capture packets in real time and display them in human-readable format. Wireshark includes filters, color-coding option, and other features that let you go deep into network traffic and inspect individual packets.
To start, there are 4 devices available on my network, not everyone has packets available to track or capture. Here, I am capturing my Ethernet on my network as an example.
Packets are highlighted in different colors. After research, I realize they mean different things: by default, green is TCP traffic, dark blue is DNS traffic, light blue is UDP traffic, and black identifies TCP packets with problems, for example, they could have been delivered out-of-order.
Most of the time, my network is traffic is outbound, packet going from my labtop (mac IP in source column) to another IP address.
Here is what a packet look like if I go to a website, say Google, and type “Test internet speed” is the search bar. I tried to look my search keyword in hypertext protocol, but they are to readable.