'Show me all the DHCP servers running on this network'

[root@shadowrun ~]# tshark -i eth0 -n port 68 -R 'bootp.type == 2'
...<snip>...
36.347674 192.168.200.11 -> 255.255.255.255 DHCP 342 DHCP Offer    - Transaction ID 0x45c2f96c
36.931708 192.168.200.25 -> 255.255.255.255 DHCP 342 DHCP Offer    - Transaction ID 0x45c2f96c
57.018616 192.168.200.11 -> 255.255.255.255 DHCP 342 DHCP Offer    - Transaction ID 0x7a7d114c
57.931998 192.168.200.25 -> 255.255.255.255 DHCP 342 DHCP Offer    - Transaction ID 0x7a7d114c
...</snip>...

Two DHCP servers?(!) That's not good.

https://www.wireshark.org/docs/man-pages/tshark.html

https://wiki.wireshark.org/BOOTP

TShark is a network protocol analyzer. It lets you capture packet data from a live network, or read packets from a previously saved capture file, either printing a decoded form of those packets to the standard output or writing the packets to a file. TShark's native capture file format is pcap format, which is also the format used by tcpdump and various other tools.

Without any options set, TShark will work much like tcpdump. It will use the pcap library to capture traffic from the first available network interface and displays a summary line on stdout for each received packet.