-h Print usage message.
-v Print full lines, with long event type names and network namespace numbers.
-t Include timestamp on output
-p PID Trace this process ID only (filtered in-kernel).
-N NETNS Trace this network namespace only (filtered in-kernel).
--cgroupmap MAPPATH Trace cgroups in this BPF map only (filtered in-kernel).
--mntnsmap MAPPATH Trace mount namespaces in the map (filtered in-kernel).
-4 Trace IPv4 family only.
-6 Trace IPv6 family only.
Trace all TCP established connections: # tcptracer
Trace all TCP established connections with verbose lines: # tcptracer -v
Trace PID 181 only: # tcptracer -p 181
Trace connections in network namespace 4026531969 only: # tcptracer -N 4026531969
Trace a set of cgroups only (see special_filtering.md from bcc sources for more details): # tcptracer --cgroupmap /sys/fs/bpf/test01
Trace IPv4 family only: # tcptracer -4
Trace IPv6 family only: # tcptracer -6
TYPE Type of event. In non-verbose mode: C for connect, A for accept, X for close.
PID Process ID
COMM Process name
IP IP address family (4 or 6)
SADDR Source IP address.
DADDR Destination IP address.
SPORT Source port.
DPORT Destination port.
NETNS Network namespace where the event originated.
Also look in the bcc distribution for a companion _examples.txt file containing example usage, output, and commentary for this tool.