|Product Version||Fiddler Everywhere 1.0.0 and above|
When the system capturing is enabled, Fiddler Everywhere sets itself as a system proxy. That means that all HTTP/HTTPS/WebSocket traffic from client applications that respect the system proxy will be captured and output as session entries in the Live Traffic list.
Modern applications are often generating hundreds and even thousands of requests, which might pollute your list with a lot of unwanted information. This article reveals some of the options you can use to filter the captured traffic.
Each column from the Live Traffic list has its own filtering menu. Each filter condition contains different logical operations, for example, contains, starts with, ends with, is equal to, and so on. Each condition combines with the filter value which, depending on the column type, can be a string, number, or boolean. You can apply up to two filter conditions per each column filter.
Below, you will find column filters examples and a short description of their use.
One of the most common scenarios is to observe traffic from a single API endpoint or single domain name.
To filter traffic from a specific application, use the Process column.
When Fiddler Everywhere captures traffic only from the host machine, the Client IP column will always have an identical value which usually is a localhost address such as
:ffff:127.0.0.1. However, that is not the case when Fiddler captures traffic from multiple hosts, that is, through Allow remote computers to connect and when the remote machines are set to follow the Fiddler proxy. Here is where filtering by the Client IP column is beneficial because it allows you to filter the traffic that comes from a specific IP.
When you filter by a domain name or a specific API endpoint, you can still observe some sessions which contain the filter term and which come from third parties like Google Analytics, click trackers, and so on. You can further restrict the output by explicitly filtering by the Remote IP column, which indicates the server IP address that is used for this request.
The Advanced Filters toolbar option enables you to apply complex filtering solutions such as creating multiple filtering conditions and combining them with logical operations when all, any, or none conditions are met, using regular expressions, and tracking in real-time if the filters match captured sessions.
The following example demonstrates five filter conditions that match 18 sessions in the current Live Traffic tab. The filter is applied when all conditions are satisfied, and each condition does the following:
- The first condition (
fiddler-everywhere) will match when the URL address contains the
- The second condition (
is equal to>
:ffff:127.0.0.1) will match only the localhost IP address. The
:ffff:is a subnet prefix for IPv4 (32 bit) addresses that are placed inside an IPv6 (128 bit) space.
- The third condition (
is equal to>
::1) will match only when the request comes from the localhost. The
::1is the loopback address in IPv6. This specific condition is useful when testing HTTP/HTTPS sessions from a localhost development environment, but it can also be applied to any real-life IP server address.
- The fourth condition (
filter|column|ip|url) will match only a session where the Response Body contains any terms set through the regular expression. The used regex can be interpreted as
- The fifth condition (
brave) will match only requests coming from a client application in which the local OS process name contains
The predefined browser capturing opens a separate instance of your default Chromium browser and captures traffic from that instance only. Using this option while Live Traffic capturing is paused will ensure that only traffic from the browser instance is output in the Live Traffic list. All additional columns and advanced filters are still applicable.
While bypassing the proxy is not technically related to filtering, requests to specific domains may not be going through the Fiddler proxy but directly through the upstream proxy. As a result, these sessions won't pollute your Live Traffic tab. You can set a list of domains to bypass (not available for processes) through the Connections menu.