Skip to content
MikroTik RouterOS Docs

MikroTik RouterOS Torch: Real-Time Traffic Monitoring

MikroTik RouterOS Torch: Real-Time Traffic Monitoring

Section titled “MikroTik RouterOS Torch: Real-Time Traffic Monitoring”

RouterOS Version: 6.x / 7.x Difficulty: Beginner Estimated Time: 15 minutes

Torch is a real-time traffic monitoring tool that shows you exactly what’s flowing through your router’s interfaces. Unlike packet sniffers that capture data for later analysis, Torch displays live traffic statistics organized by protocol, IP address, port, MAC address, VLAN, or DSCP - giving you instant visibility into your network’s behavior.

Use Torch when you need to:

  • Identify what’s consuming bandwidth
  • Find which hosts are generating traffic
  • Discover unknown or suspicious connections
  • Debug connectivity issues
  • Verify traffic is flowing through expected paths

Key insight: Torch shows traffic before firewall filtering. This means you’ll see packets that get dropped by firewall rules, which is useful for debugging but can be confusing if you expect to only see allowed traffic.

Navigate to Tools > Torch, select an interface, configure filters, and click Start.

/tool torch interface=ether1

Press Ctrl+C to stop.

Navigate to Tools > Torch, configure options, and click Start.

/tool torch interface=ether1

Example Output:

MAC-PROTOCOL IP-PROTOCOL SRC-ADDRESS DST-ADDRESS TX-RATE RX-RATE
ip tcp 192.168.1.100 142.250.185.206 1.2Mbps 156kbps
ip tcp 192.168.1.100 151.101.1.140 89kbps 1.8Mbps
ip udp 192.168.1.100 8.8.8.8 2kbps 2kbps
ip icmp 192.168.1.50 8.8.8.8 1kbps 1kbps
/tool torch interface=ether1 src-address=0.0.0.0/0 dst-address=0.0.0.0/0 port=any

Torch supports multiple filter parameters to focus on specific traffic:

ParameterDescriptionExample
interfaceInterface to monitor (required)ether1, bridge1
src-addressFilter by source IP192.168.1.0/24
dst-addressFilter by destination IP8.8.8.8
src-address6Filter by source IPv62001:db8::/32
dst-address6Filter by destination IPv62001:4860:4860::8888
portFilter by port number80, 443, 53
ip-protocolFilter by IP protocoltcp, udp, icmp
mac-protocolFilter by MAC protocolip, arp, ipv6
vlan-idFilter by VLAN tag100
dscpFilter by DSCP value46

Monitor LAN interface to see which hosts use the most bandwidth:

/tool torch interface=bridge-lan

Sort results by TX or RX rate to identify heavy users.

Track all traffic to/from a particular device:

/tool torch interface=bridge-lan src-address=192.168.1.100

Filter for HTTP and HTTPS:

/tool torch interface=ether1-wan port=80,443 ip-protocol=tcp
/tool torch interface=bridge-lan port=53 ip-protocol=udp

Filter for SIP and RTP:

/tool torch interface=ether1 port=5060,10000-20000 ip-protocol=udp
/tool torch interface=ether1 mac-protocol=ipv6
/tool torch interface=ether1 vlan-id=100

Check traffic with specific QoS markings:

/tool torch interface=ether1 dscp=46
FieldDescription
MAC-PROTOCOLLayer 2 protocol (ip, arp, ipv6, etc.)
IP-PROTOCOLLayer 3/4 protocol (tcp, udp, icmp, etc.)
SRC-ADDRESSSource IP address
DST-ADDRESSDestination IP address
SRC-PORTSource port number
DST-PORTDestination port number
TX-RATETransmit rate (data leaving the interface)
RX-RATEReceive rate (data entering the interface)
TXTotal bytes transmitted
RXTotal bytes received
VLAN-IDVLAN tag if present
DSCPDSCP value
SRC-MACSource MAC address
DST-MACDestination MAC address
/tool torch interface=ether1-wan dst-address=8.8.8.8

Expected: Should show traffic when clients access internet.

/tool torch interface=bridge-lan

Expected: Review for unexpected protocols or destinations.

/tool torch interface=ether1 vlan-id=100

Expected: Only traffic tagged with VLAN 100.

Problem: “TX shows 0 but RX shows traffic”

Section titled “Problem: “TX shows 0 but RX shows traffic””

Cause: Hardware offloading is enabled on a bridge, bypassing software processing.

Solution:

  1. Check bridge settings:
    /interface bridge settings print
  2. Disable hardware offloading if you need full Torch visibility:
    /interface bridge settings set use-ip-firewall=yes
    Or on the specific bridge:
    /interface bridge set bridge1 fast-forward=no

Note: Disabling hardware offloading reduces performance. Only do this for troubleshooting.

Problem: “Can’t see traffic between wireless clients”

Section titled “Problem: “Can’t see traffic between wireless clients””

Cause: Client-to-client forwarding happens without going through the router CPU.

Solution: This is expected behavior. Traffic between wireless clients with forwarding enabled doesn’t pass through Torch. To monitor, you’d need to disable client-to-client forwarding (not recommended for production).

Problem: “Torch shows traffic but firewall should block it”

Section titled “Problem: “Torch shows traffic but firewall should block it””

Cause: Torch displays traffic before firewall processing.

Solution: This is normal behavior. Torch shows all incoming packets regardless of firewall rules. Use firewall logs or connection tracking to verify what’s actually allowed.

Problem: “High CPU usage when running Torch”

Section titled “Problem: “High CPU usage when running Torch””

Cause: Torch is CPU-intensive, especially on busy interfaces.

Solution:

  1. Apply filters to reduce processed traffic
  2. Run Torch for short periods only
  3. Avoid running on high-throughput interfaces during peak times
  4. Use specific filters rather than monitoring all traffic

Cause: Bridge hardware offloading or fast-forward enabled.

Solution: For complete visibility:

/interface bridge set bridge1 fast-forward=no

Remember this impacts performance.

1. Expecting Torch to Show Only Allowed Traffic

Section titled “1. Expecting Torch to Show Only Allowed Traffic”

Wrong assumption: “Torch shows what’s passing through my network”

Reality: Torch shows traffic before firewall filtering. Dropped packets still appear.

2. Running Torch Without Filters on Busy Interface

Section titled “2. Running Torch Without Filters on Busy Interface”

Wrong:

/tool torch interface=ether1-wan # On a 1Gbps link

Right: Apply filters to reduce load:

/tool torch interface=ether1-wan src-address=192.168.1.100

3. Forgetting Hardware Offloading Limitations

Section titled “3. Forgetting Hardware Offloading Limitations”

Problem: Only seeing partial traffic on bridge interfaces.

Check:

/interface bridge settings print

If use-ip-firewall=no, bridged traffic bypasses CPU and Torch.

Remember:

  • TX = Traffic going OUT of the interface (transmit)
  • RX = Traffic coming INTO the interface (receive)

On a WAN interface:

  • RX = Downloads (data from internet)
  • TX = Uploads (data to internet)

On a LAN interface:

  • TX = Downloads (data to client)
  • RX = Uploads (data from client)

Torch continuously uses CPU resources. Always stop it when done:

  • WinBox: Click Stop
  • CLI: Press Ctrl+C

Find which device or service is consuming bandwidth:

/tool torch interface=bridge-lan

Look for high TX/RX rates and identify the source address.

Identify suspicious connections:

/tool torch interface=ether1-wan

Look for:

  • Unexpected destination IPs
  • Unusual ports
  • High traffic volumes from single hosts

Verify traffic is marked correctly:

/tool torch interface=ether1 dscp=46

Should show only VoIP or priority traffic.

Verify traffic is reaching the router:

/tool torch interface=ether2 src-address=192.168.1.100

If client traffic appears but connectivity fails, the issue is likely routing or firewall, not Layer 2.

  • No historical data - Torch shows real-time only; no logging or graphs
  • CPU intensive - High resource usage on busy interfaces
  • Hardware offloading blind spots - Bridge fast-forward traffic invisible
  • Wireless client-to-client - Not visible with forwarding enabled
  • No payload inspection - Shows metadata only, not packet contents
  • Pre-firewall view - Shows dropped traffic too
  • Graphing - historical bandwidth graphs
  • SNMP - remote monitoring