I’m taking a ton of port scan attempts on the WAN input - consuming 4-20 Mb of bandwidth for the last month. They haven’t gotten through the firewall, but I want to reach out to the ISP’s that the scanners are originating from. The only logical way I can do this is to figure out how to capture the data I see on Torch - but there is no option to export or aggregate that data.
Yeah torch is more a “quick view” of current flows, but AFAIK there is no “print as-value” or “monitor” in CLI for it that allow some “export”.
You can use /tool/sniffer to save packets and then use Wireshark to extract flow (like torch) & more.
But there is also “streaming mode” in /tool/sniffer that lets you forward packets to a PC running Wireshark. It uses the TZSP protocol, so in Wireshark you typically use BPF filter on the TZSP port so you see just the router “streaming” traffic, not all traffic on PC interface.
And if you can actually use the firewall action action=sniff-tzsp in mangle rule which will do same a /tool/sniffer but streaming only packets matched by the mangle rule. This let you only capture packets that “would be” blocked if the mangle rule was put in right spot for your config.