Infoblox’s global team of threat hunters uncovers a DNS operation with the ability to bypass traditional security measures and control the Great Firewall of China. Read about “Muddling Meerkat” and the many other threat actors discovered by Infoblox Threat Intel here.

Best Practices


WAPI example of Traffic Capture Download

The attached script is an example of using the WAPI to trigger a traffic capture and then download it. It written in Perl, but used the WAPI and not the PAPI. Rename traffic_capture_to_file.txt to



To get help use: --help --man


Help information also attached in HTML format.


Hope that helps someone,



Showing results for 
Search instead for 
Did you mean: