V2 Preview — Display Filter Bar, Rogue AP / Evil Twin, AP Neighbour Report — available in preview modeV2 Preview — Filter Bar • Rogue AP • Neighbour Report
AirMagnet discontinued December 2025
There’s a gap in the market. WiFi Analyser is the free, browser-based alternative — no install, no licence key, no expiry date.
Free to use — no install required

See exactly what
802.11 is doing
and why it fails

WiFi Analyser reads 802.11 at the frame level — decoding every handshake, RSN IE, EAP exchange, and roaming event with AI explanation. No PCAP? Describe your symptoms. Get a root cause in seconds.

0
Anomaly detectors
0
Total features
0
Install required
AI
Root cause engine
802.11 Protocol Intelligence — wlananalyser.com
>
Protocols
WPA2-Personal WPA2-Enterprise WPA3-SAE 802.11r FT OKC Roaming Wi-Fi 7 MLO EAP-PEAP / TLS / TTLS EAPOL 4-Way DFS U-NII-2A/2C
5,000+LinkedIn impressions
65+Anomaly detectors
229+Total features
CWNEValidated by #3 • #337
15Years 802.11 experience
FreeNo install • No signup
Wi-Fi 7802.11be ready
137Day-1 visitors • 5 countries
AirMagnetDiscontinued Dec 2025 — we fill the gap
5,000+LinkedIn impressions
65+Anomaly detectors
229+Total features
CWNEValidated by #3 • #337
15Years 802.11 experience
FreeNo install • No signup
Wi-Fi 7802.11be ready
137Day-1 visitors • 5 countries
AirMagnetDiscontinued Dec 2025 — we fill the gap

No other tool sees
this deep into Wi-Fi

Other tools work at the RF layer (signal strength) or IP layer (ping/latency). WiFi Analyser works at the 802.11 MAC layer — where auth failures, roaming problems, and security issues actually live.

WiFi
AnalyserTHIS TOOL
Netgear
SupportVENDOR KB
TP-Link
SupportVENDOR KB
Cisco
TACENTERPRISE
Ubiquiti
UniFiCOMMUNITY
NetSpotRF LAYER WiresharkRAW BYTES Speedtest
OoklaIP LAYER
PingPlotterIP LAYER nOversightBROWSER 802.11
Accessibility & Setup
Browser-based, zero installPartialPartial
Vendor-agnostic (any AP brand)
No PCAP / symptom-first modeCLI req.Forum
Time to first answer15 secMinutesMinutesHours–daysForum waitMinutesMinutesInstantInstantMinutes
802.11 Protocol Intelligence
MAC-layer frame decodeCLI only
RSN IE / cipher suite analysisManualPartial
EAP / 802.1X diagnosisRADIUS logsManualPartial
Roaming SLA / FT analysisCLI onlyManual
65+ automated anomaly detectors
AI & Root Cause Engine
AI root cause explanation
Vendor fix commands (Cisco / Aruba / Ubiquiti)Own onlyOwn onlyCisco onlyUniFi only
CVE-referenced security findingsSome
Measurement & Reporting
RF signal strength / heatmapBasic
Internet speed test (DL / UL / ping / jitter)Ping only
Speed + PCAP cross-correlation
Client-ready PDF report
Free — no paid tierLimitedFreemium
V1.1 New Features (Build 2026.03.31)
Scope Classifier (single vs multi-device vs infra)
802.11r FT auto-detect & MDIE/FTIE parsingCLI onlyManual
DFS radar event detection (U-NII-2A/2C)Manual
Symptom-first AI guided diagnosis (no PCAP)Forum
Session Card export (Slack / Jira / JSON / Markdown)
vs Vendor Support

Why not just call Cisco TAC?

Every enterprise Wi-Fi engineer knows the TAC drill. Here is the real timeline — versus WiFi Analyser.

📞
Cisco TAC / Vendor Support
Enterprise troubleshooting path
1
Open support ticket. Describe symptoms to L1 agent.
+0–30 min queue wait
2
L1 runs generic checklist. Asks for show commands, logs, firmware version.
+1–3 hours
3
Escalated to L2. They request a full PCAP. You collect it, upload, wait for review.
+4–24 hours
4
L2 reads PCAP manually. Replies with findings and a clarification round.
+4–48 hours
5
Root cause confirmed. Fix command provided. Ticket closed.
+1–2 days
Total time 24–72 hrs
VS
WiFi Analyser
Frame-level AI root cause
1
Upload your PCAP — or describe symptoms in plain English. No ticket, no queue.
0 seconds wait
2
65+ anomaly detectors scan every frame. EAPOL, RSN IE, roaming, cipher — all decoded automatically. Scope Classifier instantly flags single-device vs infrastructure problems.
~8 seconds
3
AI explains root cause in plain English. Cites the 802.11 spec clause and CVE if applicable.
~15 seconds (analysis complete)
4
Vendor-specific fix command generated for Cisco, Aruba, Ubiquiti, Ruckus, or TP-Link.
Instant
5
Export PDF report. Share with your team or manager. Done.
5 minutes total
Total time 5 min

Ubiquiti community? You are waiting hours for a forum reply, hoping someone with your exact setup responds. WiFi Analyser reads your frames directly — no guessing, no waiting, no "works for me" answers.

vs Speedtest by Ookla

Ookla tells you the score.
We tell you why.

A speed test shows you a number. It cannot tell you that your client is stuck at MCS-2, that retry rate is at 38%, or that −76 dBm RSSI is the reason your 500 Mbps line delivers 41 Mbps to the laptop in the corner office.

WiFi Analyser connects the throughput measurement to the 802.11 frame evidence — so you know not just what is slow, but exactly why and how to fix it.

Run a correlated test →
Speedtest / Ookla result
41 Mbps
Download speed.
No further context.
WiFi Analyser — root cause
Found it
MCS-2 (BPSK 3/4) 38% retry rate RSSI −76 dBm Sticky client BTM not configured Fix: enable 802.11v

Eight tools.
One browser tab.

Every tool an 802.11 professional needs — from frame forensics to planning calculators. No download, no licence key, no waiting.

🧠
Symptom-First Diagnosis V1.1
No PCAP? Select symptoms, environment, and AP vendor. AI returns ranked root causes, probability scores, and a step-by-step action checklist. Works for 95% of real-world troubleshooting calls.
No PCAP needed
📡
Frame-Level PCAP Analysis
Upload any .pcap or .pcapng. Every 802.11 management, EAPOL, EAP, DHCP frame decoded with phase classification, timing, RSN IE fields, and IE-level anomaly detection.
65+ detectors
🤖
AI Frame Agent
Ask anything about any frame. The agent explains 802.11 mechanics, flags security risks with CVE references, and generates vendor fix commands for Cisco, Aruba, Ubiquiti, Ruckus, and TP-Link.
Plain English
🛡
Security Posture Analysis
Cipher suite audit, PMF status, PMKID attack surface, TKIP downgrade detection, Dragonblood WPA3 patterns, KRACK sequence detection, and deauth flood indicators. Every finding IEEE-referenced.
CVE-referenced
📊
PDF Report
Professional multi-session report with health score, security posture matrix, anomaly evidence table, priority-ordered remediation roadmap, and 802.11 quick reference card. Share with your team or stakeholders directly.
Shareable report
🛠
Planning Tools
Channel conflict planner, AP density calculator, roaming SLA tracker, latency budget tool, bandwidth estimator, 802.11 standards checker — built for engineers designing and validating deployments.
Field-ready
📈
Wi-Fi Health Score V1.1
Composite 0–100 score across Security, Performance, Roaming, RF quality and Configuration. A–F grade for instant triage. Auto-computed on every PCAP upload — no manual input needed.
0–100 score
🔌
DFS Radar Detection V1.1
Detects radar-triggered channel change events in PCAP. Maps DFS event timestamps to client impact — retry spike, reassociation storm. Covers all U-NII-2A/2C channels. No other free tool does this.
Wi-Fi 7 ready

Integrated Speed Test V1.1 NEW

Measure download, upload, ping, and jitter — then correlate against your PCAP MCS index, retry rate, and RSSI in the same session. The only speed test that explains why the number is what it is.

6x parallel streams
Ready to diagnose?

Upload a PCAP. Get answers in 15 seconds.

No account. No install. Works on any 802.11 capture from any vendor.

Launch WiFi Analyser →

Questions that used to
take hours to answer

WiFi Analyser turns hard 802.11 questions into instant answers. These are real scenarios from network engineers and Wi-Fi professionals.

Auth failure
"Why did Key 4/4 fail at 2am for 400 laptops?"
✘ Before: Open Wireshark, manually trace each EAPOL frame, check RADIUS logs, guess at the issue
✔ Now: Upload PCAP → anomaly detector flags RADIUS cert expiry → fix command generated in 15 seconds
Roaming problem
"Client sticks to -78 dBm AP instead of roaming"
✘ Before: Walk the floor with a laptop, guess at 802.11k/v/r config, open Ubiquiti docs
✔ Now: Symptom-First → sticky client detected → BTM + RRM recommendations with config commands
Security audit
"Is this network compliant? What's the cipher?"
✘ Before: Manually read RSN IE bytes in Wireshark, cross-reference 802.11 spec, write up findings
✔ Now: PCAP → Security Posture Matrix → PMF, cipher, PMKID, AKM all graded with CVE references
Field report
"Stakeholder wants proof the Wi-Fi is healthy"
✘ Before: Build a Word doc manually, screenshot Wireshark, write your own findings, 2-3 hours work
✔ Now: PCAP → Health Score → PDF with remediation roadmap → share in 5 minutes

Three ways to get
a diagnosis

01
Upload or Describe
Upload a .pcap / .pcapng, or choose from grouped scenarios (Authentication / Roaming / Security). Switch to Symptom-First Mode and describe the problem in plain English — no PCAP needed. Auto-Detect identifies your scenario on upload.
02
Instant Analysis
The pipeline decodes every frame, classifies exchange phases, runs 65+ anomaly detectors, computes health scores, and identifies root causes — in under 15 seconds.
03
Act and Report
Ask the AI agent anything. Export a PDF report. Copy a Wireshark filter. Get vendor fix commands. Share results with your team or colleagues in minutes.

Built for
Wi-Fi professionals

From field engineers troubleshooting deployments to CWNEs doing deep protocol analysis — anyone who needs to understand what 802.11 is actually doing.

Field Engineers / Managed Wi-Fi
Troubleshoot faster. Report smarter.
  • Upload PCAP from any deployment
  • Get root cause in 15 seconds
  • Generate shareable PDF report
  • Track health score across sites
Enterprise IT / Network Engineer
From symptoms to fix commands.
  • Diagnose auth failures at scale
  • Detect cipher downgrades and PMF gaps
  • Validate FT roaming timing against SLA
  • Audit 802.11 security posture
Wi-Fi Security / CWSP
CVE-referenced, IEEE-cited findings.
  • RSN IE mismatch and downgrade detection
  • PMKID attack surface assessment
  • Deauth flood / rogue AP indicators
  • WPA3 Dragonblood pattern detection
Security & Privacy

Built to handle real captures safely

🚫
Zero Data Retention
PCAPs processed in memory and discarded immediately. Nothing written to disk. Nothing logged.
🔒
Server-Side AI Proxy
AI is included at no cost. Anthropic API key never touches your browser — all calls go through our backend proxy.
🧡
CORS Locked
Backend only accepts requests from wlananalyser.com. Rate limiting and HSTS in progress.
🌍
GDPR Compliant
No personal data collected. Sub-processors listed. See Privacy Policy and Terms of Service.
In action

See every layer of your capture

Frame timeline, anomaly detection, AI root cause, and protocol intelligence — all in the browser. No install, no account.

WiFi Analyser main interface showing frame timeline and anomaly detection
screenshot coming soon
Frame Timeline & Anomaly Detection
Every 802.11 management, EAPOL, and DHCP frame decoded in sequence. Anomalies flagged inline with plain-English explanations.
WiFi Analyser AI diagnosis and root cause analysis panel
screenshot coming soon
AI Root Cause Analysis
Ask in plain English or select any frame. Claude diagnoses the failure, identifies the protocol layer, and outputs vendor-specific fix commands.
WiFi Analyser security analysis showing RSN IE, PMKID and WPA3 detection
screenshot coming soon
Security Analysis
RSN IE decoder, PMKID exposure, WPA3 Dragonblood, KRACK, rogue AP / evil twin detection — with CVE references and Wireshark filter export.
WiFi Analyser roaming SLA and 802.11k/v/r analysis panel
screenshot coming soon
Roaming SLA & 802.11k/v/r
Roaming latency scored against VoIP SLA thresholds. Sticky client detection, BTM steering analysis, FT fast transition grading A–F.
To add screenshots: save PNGs to docs/screenshots/ and push to GitHub. Files load automatically. Recommended: 1280×720px, dark background.
Peer Recognition
Validated by the Wi-Fi community
TYPE: Peer-Endorsement
RSSI: ████ Strong
FROM:Keith Parsons
ROLE:Founder, WLPC Conference
CHANNEL:Wi-Fi Nomads • 29 March 2026
SEQ:0x0001 — First public reaction
Payload
"Good stuff"
Authenticated Verified CWNE Public record ↗ wlpc.us
TYPE: Committed-Use
RSSI: ████ Strong
FROM:Shreyas Gavnekar
ROLE:CWNE #337 • Cisco Engineer
CHANNEL:LinkedIn • April 5 2026
SEQ:0x0002 — Ongoing commitment
Payload
"I will try to use this in my packet analysis moving forward."
Authenticated CWNE #337 Public record ↗ LinkedIn post
0
LinkedIn impressions
Launch • 29 March 2026
137 visitors • 5 countries
21
Reactions • 14 comments
Keith Parsons (WLPC) engaged
on launch day
Try it now — real captures

Download Demo PCAP Files

Four synthetic 802.11 captures covering the most common Wi-Fi failure scenarios. Drop any of these into WiFi Analyser and see the anomaly detection, scope classification, and AI root cause in action — instantly.

SCENARIO 01 • WPA2-Personal
Join Failure — Wrong PSK
EAPOL 4-Way Handshake fails. MIC failure on M2 ×2. AP deauths with reason=2. WiFi Analyser flags the exact frame.
11 frames • 1.3 KB • Ch 6
SCENARIO 02 • WPA2-Enterprise
RADIUS Timeout
EAP Identity exchange completes. 5-second RADIUS silence. EAPOL Silence Detector fires. Deauth reason=1.
9 frames • 775 B • Ch 36
SCENARIO 03 • 802.11r FT
Fast Roam Baseline
FT Auth algo=2, MDIE, PTK from cached PMK-R1. Roam completes in <20ms. Use this as your benchmark.
12 frames • 2.3 KB • Ch 40
SCENARIO 04 • Roaming
Sticky Client
RSSI degrades -55 to -83 dBm. AP2 at -48 dBm beaconing. Client never roams. Sticky Client detector fires.
24 frames • 2.8 KB • Ch 1+6
💡 How to use: Download a PCAP above → open WiFi Analyser → click Upload PCAP → watch the analysis run in real time.
Community Impact

Trusted by Wi-Fi engineers
who have seen it all

Every endorsement below is a real person with a real credential, on the record. Click the source link to verify.

KP
Keith Parsons
CWNE #3 • Founder, WLPC Conference
CWNE #3
"shankarwifi.com is FANTASTIC — I’m going to share it with the WLPC community." Said he will use it in WLPC classroom sessions.
SG
Shreyas Gavnekar
CWNE #337 • Cisco Engineer • Blogger
CWNE #337
"I will try to use this in my packet analysis moving forward." Publicly endorsed on LinkedIn — from a practitioner who reads every frame.
TC
Tom Carpenter
CWNP Director • CWNE Author
CWNP Dir.
Praised the site structure and depth of shankarwifi.com — the 802.11 protocol library built alongside WiFi Analyser.

Start diagnosing
in 15 seconds

No install. No signup. Upload a PCAP or describe your symptoms — get frame-level 802.11 diagnosis with AI root cause analysis, free.

Launch WiFi Analyser →