Capture and decode (Ethereum) JSON RPC traffic
Project description
[![Build Status](https://travis-ci.org/alext234/rpc-sniffer.svg?branch=master)](https://travis-ci.org/alext234/rpc-sniffer)
# rpc-sniffer This tool captures network traffic and decode them if they contain (Ethereum) JSON RPC. This might be useful in the following scenarios:
You want to know the exact RPC requests and responses sent to and from your Ethereum node.
You want to debug and understand what web3 sends out.
You want to capture the contents web3 sends out in order to use them in a different program.
# Installation
The following assumes you already have Python virtualenv activated. If not you may need to add sudo in front of the setup.py command and the pip command.
Via the setup.py script
` git clone https://github.com/alext234/rpc-sniffer cd rpc-sniffer python setup.py install `
Or via pip
` pip install rpcsniffer `
# Usage TODO
# Limitations
This tool does not support encrypted SSL traffic (e.g. when you interact with an infura.io node).
This tool does not support RPC traffic that spans multiple packets (development is in progress for this feature).
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for rpcsniffer-0.1.1-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1bfc1580229916bc4425894bd90289e877444ae1976b2d9666f0d6f69d8b1bcb |
|
MD5 | 72f4b49149325f2818a1cb98010511e8 |
|
BLAKE2b-256 | 1dc3e67a179f05fd2561c17281df9ef95ee6a2b33ee719ccb8873ac8085aff96 |