Suspicious Traffic Found – What Are the Next Steps?

Tshark Examples for Extracting IP Fields