A plugin for Paper and Velocity that passively sniffs TCP/IP SYN packets to give deeper insight into player connections. This can be used to reveal information such as the Operating System or VPN.
- Java 21
- pcap native library (libpcap, WinPcap, Npcap)
- Administrator privileges or Capabilities (Linux)
Command | Description | Permission |
---|---|---|
/fingerprint <player> |
View raw TCP/IP fingerprint info | synsniff.command-fingerprint |
/predictos <player> |
Show the predicted operating system | synsniff.command-predictos |
First make Sure you meet all the Requirements
If you run a single Paper server which is not running behind any proxy, follow these instructions to install the plugin. Otherwise, view Installation (proxy)
- Download the latest Jar ending in
-paper
from the Releases page. - Place the
.jar
into your serversplugins/
directory - Start the server once to generate the default config
- Open
plugins/SynSniff/config.yml
and configure the plugin - Restart the Server
ip link show
(Linux/macOS) or netsh interface show interface
(Windows).
You should use the interface your server uses to connect to the internet or local network.
First make Sure you meet all the Requirements
If your servers run behind a Velocity proxy, follow these instructions to install the plugin. Otherwise, view Installation (Without proxy)
- Download the latest Jar ending in
-velocity
from the Releases page. - Place the
.jar
into your serversplugins/
directory - Start the server once to generate the default config
- Open
plugins/syn-sniff/config.yml
and configure the plugin - Restart the Server
ip link show
(Linux/macOS) or netsh interface show interface
(Windows).
You should use the interface your server uses to connect to the internet or local network.
We provide a simple API for plugin developers to access fingerprinting data.
Check out the Wiki for detailed documentation on installation and usage of the API.
This project is under active development and there is plenty of room to contribute.
Below is a list of stuff that still needs to be done:
- More sophisticated OS prediction using more sample Records
- Support for IPv6
- Optional Persistence of Fingerprints
- Velocity Support
- More modular code structure possibly supporting different kinds of servers
- API for plugin devs