Created
August 13, 2020 07:48
-
-
Save yeled/e5dd7455f0a20bd4692ae2c2fe6bac54 to your computer and use it in GitHub Desktop.
broken
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
bootstrap@ubnt1804template:~$ sudo tcpdump -ln -i ens160 net 151.101.0.0/16 | |
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode | |
listening on ens160, link-type EN10MB (Ethernet), capture size 262144 bytes | |
07:47:32.104821 IP 10.10.0.100.50406 > 151.101.64.70.443: Flags [S], seq 3008037005, win 29200, options [mss 1460,sackOK,TS val 2040635067 ecr 0,nop,wscale 7], length 0 | |
07:47:32.105277 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [S.], seq 1697483880, ack 3008037006, win 43440, options [mss 1460,sackOK,TS val 1925858942 ecr 2040635067,nop,wscale 9], length 0 | |
07:47:32.105317 IP 10.10.0.100.50406 > 151.101.64.70.443: Flags [.], ack 1, win 229, options [nop,nop,TS val 2040635068 ecr 1925858942], length 0 | |
07:47:32.105708 IP 10.10.0.100.50406 > 151.101.64.70.443: Flags [P.], seq 1:315, ack 1, win 229, options [nop,nop,TS val 2040635068 ecr 1925858942], length 314 | |
07:47:32.106184 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [.], ack 315, win 85, options [nop,nop,TS val 1925858943 ecr 2040635068], length 0 | |
07:47:32.107611 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [.], seq 1:1449, ack 315, win 85, options [nop,nop,TS val 1925858944 ecr 2040635068], length 1448 | |
07:47:32.107622 IP 10.10.0.100.50406 > 151.101.64.70.443: Flags [.], ack 1449, win 251, options [nop,nop,TS val 2040635070 ecr 1925858944], length 0 | |
07:47:32.107631 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [.], seq 1449:2897, ack 315, win 85, options [nop,nop,TS val 1925858944 ecr 2040635068], length 1448 | |
07:47:32.107653 IP 10.10.0.100.50406 > 151.101.64.70.443: Flags [.], ack 2897, win 274, options [nop,nop,TS val 2040635070 ecr 1925858944], length 0 | |
07:47:32.107659 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [.], seq 2897:4345, ack 315, win 85, options [nop,nop,TS val 1925858944 ecr 2040635068], length 1448 | |
07:47:32.107666 IP 10.10.0.100.50406 > 151.101.64.70.443: Flags [.], ack 4345, win 296, options [nop,nop,TS val 2040635070 ecr 1925858944], length 0 | |
07:47:32.107678 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [P.], seq 4345:4357, ack 315, win 85, options [nop,nop,TS val 1925858944 ecr 2040635068], length 12 | |
07:47:32.107681 IP 10.10.0.100.50406 > 151.101.64.70.443: Flags [.], ack 4357, win 296, options [nop,nop,TS val 2040635070 ecr 1925858944], length 0 | |
07:47:32.108076 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [R], seq 1697485329, win 0, length 0 | |
07:47:32.108103 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [R], seq 1697486777, win 0, length 0 | |
07:47:32.108127 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [R], seq 1697488225, win 0, length 0 | |
07:47:32.108131 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [R], seq 1697488237, win 0, length 0 | |
07:47:32.127055 IP 151.101.64.70.443 > 10.10.0.100.50406: Flags [P.], seq 4345:4357, ack 315, win 85, options [nop,nop,TS val 1925858964 ecr 2040635068], length 12 | |
07:47:32.127088 IP 10.10.0.100.50406 > 151.101.64.70.443: Flags [R], seq 3008037320, win 0, length 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment