STOMP is a GUI application that will reveal every remote IP address that sends/receives a user-defined number of network packets for a user-defined protocol and port number within a user-defined time period. In addition, it gives the option to block any of the IP addresses in Windows Firewall by setting both inbound and outbound traffic rules.
Only listens on one network device. Only listens/blocks one port/protocol.
- Npcap
- If running the .py script, install required python packages with cmd
pip install scapy pyperclip wmi
Default config.ini file:
[Settings]
# REQUIRED SETTINGS:
PROTOCOL = UDP # Protocol to monitor (UDP/TCP)
PORT = # Port number to monitor
FOUND_PACKETS_REQUIRED = 50 # Number of packets to confirm match
TIMEOUT_SECONDS = 5 # Timeout in seconds for detection
# OPTIONAL SETTINGS:
FIREWALL_RULE_BASENAME = # Optional prefix for final firewall rule name
ADDITIONAL_BPF_FILTER = # Optional additional BPF filter rules
NETWORK_INTERFACE = # Network interface name (leave blank for selection)
FOUND_PACKETS_REQUIRED
includes both inbound and outbound traffic.
FIREWALL_RULE_BASENAME
will be prefixed to the final firewall rule name after you fill out the "Firewall rule name" input box.
ADDITONAL_BPF_FILTER
allows you to set more BPF filters.
NETWORK_INTERFACE
uses the Npcap network device name. Leave this blank to have the app prompt you to select a network device (by friendly Windows name + Npcap name) that will be saved to config.