Advertisement
Guest User

Untitled

a guest
Feb 14th, 2014
295
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.13 KB | None | 0 0
  1. root@bb3ff912e8ce:/# tcpdump
  2. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  3. listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
  4. 13:17:59.894532 IP 172.17.42.1.39729 > bb3ff912e8ce.http: Flags [S], seq 1258457235, win 29200, options [mss 1460,sackOK,TS val 102486806 ecr 0,nop,wscale 7], length 0
  5. 13:17:59.894593 IP 172.17.42.1.39729 > 172.17.0.2.http: Flags [S], seq 1258457235, win 29200, options [mss 1460,sackOK,TS val 102486806 ecr 0,nop,wscale 7], length 0
  6. 13:17:59.894913 IP 172.17.42.1.39730 > bb3ff912e8ce.http: Flags [S], seq 3385697056, win 29200, options [mss 1460,sackOK,TS val 102486806 ecr 0,nop,wscale 7], length 0
  7. 13:17:59.894931 IP 172.17.42.1.39730 > 172.17.0.2.http: Flags [S], seq 3385697056, win 29200, options [mss 1460,sackOK,TS val 102486806 ecr 0,nop,wscale 7], length 0
  8. 13:17:59.944313 IP bb3ff912e8ce.36231 > google-public-dns-a.google.com.domain: 50610+ PTR? 1.42.17.172.in-addr.arpa. (42)
  9. 13:17:59.993832 IP google-public-dns-a.google.com.domain > bb3ff912e8ce.36231: 50610 NXDomain 0/0/0 (42)
  10. 13:17:59.994222 IP bb3ff912e8ce.45905 > google-public-dns-a.google.com.domain: 50636+ PTR? 2.0.17.172.in-addr.arpa. (41)
  11. 13:18:00.057274 IP google-public-dns-a.google.com.domain > bb3ff912e8ce.45905: 50636 NXDomain 0/0/0 (41)
  12. 13:18:00.057675 IP bb3ff912e8ce.36227 > google-public-dns-a.google.com.domain: 30049+ PTR? 8.8.8.8.in-addr.arpa. (38)
  13. 13:18:00.109860 IP google-public-dns-a.google.com.domain > bb3ff912e8ce.36227: 30049 1/0/0 PTR google-public-dns-a.google.com. (82)
  14. 13:18:00.145645 IP 172.17.42.1.39735 > bb3ff912e8ce.http: Flags [S], seq 3358162734, win 29200, options [mss 1460,sackOK,TS val 102486869 ecr 0,nop,wscale 7], length 0
  15. 13:18:00.145713 IP 172.17.42.1.39735 > 172.17.0.2.http: Flags [S], seq 3358162734, win 29200, options [mss 1460,sackOK,TS val 102486869 ecr 0,nop,wscale 7], length 0
  16. 13:18:00.893376 IP 172.17.42.1.39729 > bb3ff912e8ce.http: Flags [S], seq 1258457235, win 29200, options [mss 1460,sackOK,TS val 102487056 ecr 0,nop,wscale 7], length 0
  17. 13:18:00.893479 IP 172.17.42.1.39729 > 172.17.0.2.http: Flags [S], seq 1258457235, win 29200, options [mss 1460,sackOK,TS val 102487056 ecr 0,nop,wscale 7], length 0
  18. 13:18:00.893387 IP 172.17.42.1.39730 > bb3ff912e8ce.http: Flags [S], seq 3385697056, win 29200, options [mss 1460,sackOK,TS val 102487056 ecr 0,nop,wscale 7], length 0
  19. 13:18:00.893493 IP 172.17.42.1.39730 > 172.17.0.2.http: Flags [S], seq 3385697056, win 29200, options [mss 1460,sackOK,TS val 102487056 ecr 0,nop,wscale 7], length 0
  20. 13:18:01.145339 IP 172.17.42.1.39735 > bb3ff912e8ce.http: Flags [S], seq 3358162734, win 29200, options [mss 1460,sackOK,TS val 102487119 ecr 0,nop,wscale 7], length 0
  21. 13:18:01.145419 IP 172.17.42.1.39735 > 172.17.0.2.http: Flags [S], seq 3358162734, win 29200, options [mss 1460,sackOK,TS val 102487119 ecr 0,nop,wscale 7], length 0
  22. 13:18:02.897332 IP 172.17.42.1.39729 > bb3ff912e8ce.http: Flags [S], seq 1258457235, win 29200, options [mss 1460,sackOK,TS val 102487557 ecr 0,nop,wscale 7], length 0
  23. 13:18:02.897422 IP 172.17.42.1.39729 > 172.17.0.2.http: Flags [S], seq 1258457235, win 29200, options [mss 1460,sackOK,TS val 102487557 ecr 0,nop,wscale 7], length 0
  24. 13:18:02.897345 IP 172.17.42.1.39730 > bb3ff912e8ce.http: Flags [S], seq 3385697056, win 29200, options [mss 1460,sackOK,TS val 102487557 ecr 0,nop,wscale 7], length 0
  25. 13:18:02.897441 IP 172.17.42.1.39730 > 172.17.0.2.http: Flags [S], seq 3385697056, win 29200, options [mss 1460,sackOK,TS val 102487557 ecr 0,nop,wscale 7], length 0
  26. 13:18:03.149337 IP 172.17.42.1.39735 > bb3ff912e8ce.http: Flags [S], seq 3358162734, win 29200, options [mss 1460,sackOK,TS val 102487620 ecr 0,nop,wscale 7], length 0
  27. 13:18:03.149410 IP 172.17.42.1.39735 > 172.17.0.2.http: Flags [S], seq 3358162734, win 29200, options [mss 1460,sackOK,TS val 102487620 ecr 0,nop,wscale 7], length 0
  28. 13:18:04.909334 ARP, Request who-has 172.17.0.2 tell bb3ff912e8ce, length 28
  29. 13:18:04.909326 ARP, Request who-has bb3ff912e8ce tell 172.17.42.1, length 28
  30. 13:18:04.909389 ARP, Reply bb3ff912e8ce is-at 6e:87:15:cf:4b:c9 (oui Unknown), length 28
  31. 13:18:04.909429 ARP, Reply 172.17.0.2 is-at de:15:2a:3e:91:19 (oui Unknown), length 28
  32. 13:18:06.909337 IP 172.17.42.1.39729 > bb3ff912e8ce.http: Flags [S], seq 1258457235, win 29200, options [mss 1460,sackOK,TS val 102488560 ecr 0,nop,wscale 7], length 0
  33. 13:18:06.909424 IP 172.17.42.1.39729 > 172.17.0.2.http: Flags [S], seq 1258457235, win 29200, options [mss 1460,sackOK,TS val 102488560 ecr 0,nop,wscale 7], length 0
  34. 13:18:06.909347 IP 172.17.42.1.39730 > bb3ff912e8ce.http: Flags [S], seq 3385697056, win 29200, options [mss 1460,sackOK,TS val 102488560 ecr 0,nop,wscale 7], length 0
  35. 13:18:06.909436 IP 172.17.42.1.39730 > 172.17.0.2.http: Flags [S], seq 3385697056, win 29200, options [mss 1460,sackOK,TS val 102488560 ecr 0,nop,wscale 7], length 0
  36. 13:18:07.157361 IP 172.17.42.1.39735 > bb3ff912e8ce.http: Flags [S], seq 3358162734, win 29200, options [mss 1460,sackOK,TS val 102488622 ecr 0,nop,wscale 7], length 0
  37. 13:18:07.157433 IP 172.17.42.1.39735 > 172.17.0.2.http: Flags [S], seq 3358162734, win 29200, options [mss 1460,sackOK,TS val 102488622 ecr 0,nop,wscale 7], length 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement