|Developer(s)||Riccardo Ghetta, Juan Toledo, Zev Weiss|
|Initial release||February 17, 2000|
0.9.15 / February 10, 2017
|Operating system||Linux and Unix-like|
|License||GNU General Public License|
Network traffic is displayed using a graphical interface. Each node represents a specific host. Links represent connections to hosts. Nodes and links are color-coded to represent different protocols forming the various types of traffic on the network. Individual nodes and their connecting links grow and shrink in size with increases and decreases in network traffic.
Originally authored by Juan Toledo, the first version of EtherApe (version 0.0.1) was released on February 18, 2000. In a 2006 survey, Insecure.org named EtherApe number 43 on its list of the "Top 100 Network Security Tools". The most recent version of EtherApe, authored by Zev Weiss and Riccardo Ghetta, is 0.9.15 and was released on February 10, 2017.
Some of the features listed about EtherApe include (the following list refers to version 0.9.15 of EtherApe):
- graphical network traffic display
- color-coded node and links for most used protocols
- optional background image
- traffic may be viewed on one's own network, end to end (IP) or port to port (TCP)
- a variety of frame and packet types are supported
- data view can be manipulated using a network filter
- clicking a node or link provides additional information regarding including protocol and traffic information
- summary protocol and node table
- can read traffic from a file or an actual network
- handles traffic on Ethernet, WLAN, VLAN plus several other media and encapsulation types
- supports both IPv4 and IPv6
- XML export of node statistics
- "central node ring" mode.
- "column" mode.
- optional name resolving using c-ares library
- packet capture and display run on different processes
EtherApe requires root privileges to capture packets (but not to replay captured files). As of release 0.9.15 capturing is delegated to a separate process, while the main interface can run with lower privileges, significantly reducing the risk associated with capturing packets from untrusted sources (e.g. Internet).