Save hours of time getting to know your network.

Teleseer helps automate the complex process of network analysis so you can focus on fixing and protecting it.

A cyber security professional sits at three monitors.

How it Works

Step 1

Collect

Gather traffic that you want to analyze from networking devices, endpoints, cloud environments, or existing PCAP storage locations with.

Step 2

Upload

Submit your PCAP to our simple and intuitive web interface in a variety of encodings and formats. API-based uploads coming soon.

See supported formats  -->
Step 3

Analyze

Quickly understand your network
with minimal effort. Become more
productive by adding visual network context into your daily workflows.

See capture types we support  -->
Networking Appliances

Collect from routers, switches, and
firewalls cover large segments at once.

Endpoint Devices

Gather from individual systems for a
deep dive inspection of those hosts.

Cloud Environments

Native cloud provider tools by let you
capture across all your cloud assets.

The Teleseer logo is surrounded by icons representing the different benefits of the system.
Deep Visual Analysis

See everything that’s happening on
your network across time and space.

Security-first by Design

Your data is encrypted at rest and in
transit to Google-backed infrastructure.

Many Formats Supported

We cover compressed, encapsulated,  
traffic and formats like Stenographer.

Drag and Drop

No more complex setups or scripts.
Upload direclty from your browser.

Blue Network switch.
Networking Appliances

Collect from routers, switches, and firewalls cover large segments at once.

Blue magnifying glass.
Deep Visual Analysis

See everything that’s happening on your network across time and space.

Blue Shield.
Security-first by Design

Your data is encrypted at rest and in transit to Google-backed infrastructure.

Many Formats Supported

We cover compressed, encapsulated, traffic and formats like Stenographer.

Blue Cloud
Cloud Environments

Native cloud provider tools by let you capture across all your cloud assets.

Blue finger pointing up.
Drag and Drop

No more complex setups or scripts. Upload direclty from your browser.

Blue computer
Endpoint Devices

Gather from individual systems for a deep dive inspection of those hosts.

Track unlimited assets  
on your network.

Identify 6,000+ protocols
and apps in your traffic

Get total visibility.

Our advanced content and behavioral inspection
engine helps you see traffic across Layers 1-7 with full clarity.

Investigate deeper than ever before with Teleseer.

  • Networking Switch
    Networking
  • Networked Printer
    Printing
  • Network Database
    Database
  • Network Game
    Gaming
  • Internet
    Web
  • Content Delivery
    Content Delivery
  • ReMote Access
    Remote Access
  • Email
    Email
  • Social Media
    Social Media
  • Chat
    Chat
  • VoIP
    VoIP
  • Streaming
    Streaming
  • File Server
    File Server
  • Authentication
    Authentication
  • Advertising
    Advertising
  • Adult Content
    Adult Content
and many more!
ICS abnd SCADA
ICS and SCADA

Teleseer supports 50+ protocols found in ICS/OT networks.

some examples:

  • Modbus
  • DNP3
  • ICCP
  • OPC UA
  • PROFINET
  • CIP
  • BACnet
  • MQTT
  • IEC 61850
Tunnel Parsing
Tunnel Parsing

Teleseer unwraps any combo of tunnels Multiple layers deep.

some examples:

  • 802.1Q
  • PPP(oE)
  • MPLS
  • EoMPLS
  • GRE
  • Geneve
  • GTP
  • VXLAN
  • TZSP
Anonymity Filter
Anonymity Filter

Track and identify 100+ VPN protocols and providers.

some examples:

  • IPsec
  • OpenVPN
  • Wireguard
  • SOCKS v4/5
  • ZeroTier
  • HTTP Tunnels
  • DNS Tunnels
  • WebSockets
  • I2P / Tor
Peer to Peer and File Sharing
P2P & File Sharing

Pinpoint 100s of popular file sharing protocols and software.

some examples:

  • Gnuntella
  • BitTorrent
  • uTorrent
  • eMule
  • RetroShare
  • Vuze Client
  • Kadmelia
  • Freenet
  • GNUnet
Open Credentials

Discover weak login credentials being
used on your network.

some examples:

  • HTTP
  • Telnet
  • FTP
  • SMTP
  • IMAP
  • POP3
  • SNMP
Insecure File Transfers

Find files that were transferred on your
network insecurely.

some examples:

  • HTTP
  • FTP / TFTP
  • SMB
  • SMTP
  • IMAP
  • POP3
Traffic Artifacts

Teleseer extracts various metadata
from packets for deeper analysis.

some examples:

  • JA3 / JA3S
  • HASSH
  • HTTP URIs
  • MAC Addresses
  • User Agents
  • Hostnames
Packet Capture file logo
Packet Captures

Upload your PCAP to a project for
maximum visibility into your network
traffic. Discover anomalies instantly.

Currently supported types:

Upload your PCAP to a project for maximum visibility into your network traffic. Discover anomalies instantly.

Currently supported types:

  • PCAP
  • PCAP-ng
A list of protocol icons
Zeek log logo
Zeek Logs

Upload your Zeek logs to a project
to quickly visualize events found in
your network log data.

Currently supported types:

Upload your Zeek logs to a project to quickly visualize events found in your network log data.

Currently supported types:

  • conn.log
  • ssh.log
  • ssl.log
  • dhcp.log
  • http.log
  • dns.log
  • ftp.log
  • sip.log
A list of protocol icons

FAQs

What is Teleseer?
How does Teleseer work?
What can I use Teleseer for?
What file formats does Teleseer support?
Do I need to install anything to use Teleseer?
What can Teleseer detect in my network traffic?
How long does it take to analyze a PCAP?
Does Teleseer support real-time monitoring and analysis?
How do you secure my data?
Is it safe to upload my network traffic to Teleseer?
How much does it cost?
Is there a limit to the amount of data I can upload?
Can Teleseer decode encrypted packet data?
Do you offer an on-premise or self-hosted solution?
Does Teleseer provide API access for automated analysis?
Why are my network assets appearing as the wrong device type?
Why does my network look like a hub-and-spoke topology?