You dont sniff based on the verant server ip, you sniff on your local ip address, whatever that is. The sniffer looks at your local interface for traffic.
All you should have to do is this, this is how I run it..
packetcollector.exe 192.168.0.2
My EQ machine is on my local subnet, and his ip address is 192.168.0.2. Run this for awhile, then when you finish, goto the cmd window you ran him from, hit CTRL-C, then you should see it connect to getfrags and upload the content.
That ip you are using is the verant ip, it wont work that way...
Hope this helps!
|