[Twisted-Python] sniffing multicast traffic

Ben Barker ben at bbarker.co.uk
Wed Mar 10 05:35:01 EST 2010


Hello - I wonder if someone can help:

We have some status info being sent by various machines using
multicast addressed udp packets. I have been attempting to use twisted
to write a python script that will passively monitor on the relevant
port for any udp packets with the specified multicast address, which I
can then parse the payloads of as required.

I have been looking at the examples here:

http://code.activestate.com/recipes/425975-simple-udp-multicast-client-server-using-twisted/

But I seem to have trouble getting them to receive anything at all.

I have managed to use tshark to display the packets :

tshark -i eth0  -x -l -f udp

so I know the data is there (coming isn on address 224.0.0.4, port 901)

Any suggestions?

B



More information about the Twisted-Python mailing list