Advertisement
Guest User

Untitled

a guest
Apr 20th, 2011
144
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 44.85 KB | None | 0 0
  1. 14:11:27.075702 IP 192.168.1.5.ssh > 64.55460: Flags [P.], seq 1102739408:1102739604, ack 2647727040, win 259, length 196
  2. 14:11:27.077255 IP 192.168.1.5.47042 > qwestmodem.domain.actdsltmp.domain: 2978+ PTR? 178.118.198.64.in-addr.arpa. (45)
  3. 14:11:27.084509 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  4. 14:11:27.099223 IP qwestmodem.domain.actdsltmp.domain > 192.168.1.5.47042: 2978- 1/0/0 PTR 64. (61)
  5. 14:11:27.099763 IP 192.168.1.5.39746 > qwestmodem.domain.actdsltmp.domain: 14126+ PTR? 5.1.168.192.in-addr.arpa. (42)
  6. 14:11:27.332841 IP 64.55460 > 192.168.1.5.ssh: Flags [.], ack 196, win 16220, length 0
  7. 14:11:28.620811 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  8. 14:11:28.991460 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 84
  9. 14:11:29.084465 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  10. 14:11:29.211710 IP 64.53872 > 192.168.1.5.ssh: Flags [P.], seq 1011719168:1011719220, ack 2418934307, win 16335, length 52
  11. 14:11:29.211752 IP 192.168.1.5.ssh > 64.53872: Flags [.], ack 52, win 142, length 0
  12. 14:11:29.219561 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 1:53, ack 52, win 142, length 52
  13. 14:11:29.355648 IP 64.53872 > 192.168.1.5.ssh: Flags [P.], seq 52:104, ack 53, win 16322, length 52
  14. 14:11:29.363558 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 53:121, ack 104, win 142, length 68
  15. 14:11:29.615736 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 121, win 16305, length 0
  16. 14:11:29.884099 IP 64.53872 > 192.168.1.5.ssh: Flags [P.], seq 104:156, ack 121, win 16305, length 52
  17. 14:11:29.891587 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 121:237, ack 156, win 142, length 116
  18. 14:11:30.136094 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 237, win 16276, length 0
  19. 14:11:30.411819 IP 64.53872 > 192.168.1.5.ssh: Flags [P.], seq 156:208, ack 237, win 16276, length 52
  20. 14:11:30.419567 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 237:321, ack 208, win 142, length 84
  21. 14:11:30.665827 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 321, win 16255, length 0
  22. 14:11:31.084510 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  23. 14:11:31.147737 IP 64.53872 > 192.168.1.5.ssh: Flags [P.], seq 208:260, ack 321, win 16255, length 52
  24. 14:11:31.155725 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 321:373, ack 260, win 142, length 52
  25. 14:11:31.219714 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 373:425, ack 260, win 142, length 52
  26. 14:11:31.219825 IP 192.168.1.5.33904 > qwestmodem.domain.actdsltmp.domain: 60030+ A? mirror.pnl.gov. (32)
  27. 14:11:31.222539 IP 192.168.1.5.54507 > qwestmodem.domain.actdsltmp.domain: 59305+ A? archive.ubuntu.com. (36)
  28. 14:11:31.266229 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 425, win 16229, length 0
  29. 14:11:31.315321 IP qwestmodem.domain.actdsltmp.domain > 192.168.1.5.33904: 60030 1/0/0 A 192.101.102.2 (48)
  30. 14:11:31.315795 IP 192.168.1.5.47724 > mirror.pnl.gov.www: Flags [S], seq 1621969608, win 5840, options [mss 1460,sackOK,TS val 67034570 ecr 0,nop,wscale 6], length 0
  31. 14:11:31.361852 IP qwestmodem.domain.actdsltmp.domain > 192.168.1.5.54507: 59305 8/0/0 A 91.189.88.30, A 91.189.88.31, A 91.189.88.40, A 91.189.88.45, A 91.189.88.46, A 91.189.92.169, A 91.189.92.170, A 91.189.92.171 (164)
  32. 14:11:32.131497 IP 192.168.1.5.47527 > qwestmodem.domain.actdsltmp.domain: 41783+ PTR? 1.1.168.192.in-addr.arpa. (42)
  33. 14:11:32.139911 IP 192.168.1.5.54083 > qwestmodem.domain.actdsltmp.domain: 48935+ PTR? c.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa. (90)
  34. 14:11:32.158613 IP archive.ubuntu.com.www > 192.168.1.5.45452: Flags [P.], seq 2062886787:2062887342, ack 1619390406, win 79, options [nop,nop,TS val 810927920 ecr 67034748], length 555
  35. 14:11:32.159150 IP 192.168.1.5.45452 > archive.ubuntu.com.www: Flags [P.], seq 1:176, ack 555, win 165, options [nop,nop,TS val 67034780 ecr 810927920], length 175
  36. 14:11:32.163645 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 2401:2581, ack 260, win 142, length 180
  37. 14:11:32.212625 IP 64.53872 > 192.168.1.5.ssh: Flags [P.], seq 260:312, ack 2581, win 16114, length 52
  38. 14:11:40.673862 IP 192.168.1.5.54514 > qwestmodem.domain.actdsltmp.domain: 27564+ PTR? 82.171.111.208.in-addr.arpa. (45)
  39. 14:11:49.473277 IP 192.168.1.5.44458 > qwestmodem.domain.actdsltmp.domain: 12072+ PTR? 2.102.101.192.in-addr.arpa. (44)
  40. 14:11:49.529949 IP qwestmodem.domain.actdsltmp.domain > 192.168.1.5.44458: 12072- 1/0/0 PTR mirror.pnl.gov. (72)
  41. 14:11:49.530501 IP 192.168.1.5.32808 > qwestmodem.domain.actdsltmp.domain: 43925+ PTR? 30.88.189.91.in-addr.arpa. (43)
  42. 14:11:49.584715 IP qwestmodem.domain.actdsltmp.domain > 192.168.1.5.32808: 43925- 1/0/0 PTR archive.ubuntu.com. (75)
  43. 14:11:49.667613 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 8985:9053, ack 348, win 142, length 68
  44. 14:11:49.914010 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9053, win 16106, length 0
  45. 14:11:50.167607 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9053:9121, ack 348, win 142, length 68
  46. 14:11:50.413133 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9121, win 16089, length 0
  47. 14:11:50.671604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9121:9189, ack 348, win 142, length 68
  48. 14:11:50.918246 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9189, win 16072, length 0
  49. 14:11:51.084504 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  50. 14:11:51.171600 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9189:9257, ack 348, win 142, length 68
  51. 14:11:51.417902 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9257, win 16425, length 0
  52. 14:11:51.621827 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  53. 14:11:51.671610 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9257:9325, ack 348, win 142, length 68
  54. 14:11:51.917287 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9325, win 16408, length 0
  55. 14:11:52.171606 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9325:9393, ack 348, win 142, length 68
  56. 14:11:52.423128 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9393, win 16391, length 0
  57. 14:11:52.477800 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 1335586522:1335586536, ack 3365874471, win 17144, length 14
  58. 14:11:52.478187 IP 192.168.1.5.40471 > qwestmodem.domain.actdsltmp.domain: 51043+ PTR? 125.148.249.72.in-addr.arpa. (45)
  59. 14:11:52.503856 IP qwestmodem.domain.actdsltmp.domain > 192.168.1.5.40471: 51043- 1/0/0 PTR pv5.planetventrilo.com. (81)
  60. 14:11:52.656723 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 14, win 65143, length 0
  61. 14:11:52.671615 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9393:9461, ack 348, win 142, length 68
  62. 14:11:52.917327 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9461, win 16374, length 0
  63. 14:11:53.084494 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  64. 14:11:53.171622 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9461:9529, ack 348, win 142, length 68
  65. 14:11:53.417243 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9529, win 16357, length 0
  66. 14:11:53.675596 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9529:9597, ack 348, win 142, length 68
  67. 14:11:53.922317 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9597, win 16340, length 0
  68. 14:11:54.175601 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9597:9665, ack 348, win 142, length 68
  69. 14:11:54.421393 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9665, win 16323, length 0
  70. 14:11:54.621996 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  71. 14:11:54.675607 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9665:9733, ack 348, win 142, length 68
  72. 14:11:54.921085 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9733, win 16306, length 0
  73. 14:11:55.084499 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  74. 14:11:55.175604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9733:9801, ack 348, win 142, length 68
  75. 14:11:55.421474 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9801, win 16289, length 0
  76. 14:11:55.675601 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9801:9869, ack 348, win 142, length 68
  77. 14:11:55.921416 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9869, win 16272, length 0
  78. 14:11:56.039962 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 84
  79. 14:11:56.175607 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9869:9937, ack 348, win 142, length 68
  80. 14:11:56.421747 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 9937, win 16255, length 0
  81. 14:11:56.675601 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 9937:10005, ack 348, win 142, length 68
  82. 14:11:56.921460 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10005, win 16238, length 0
  83. 14:11:57.084488 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  84. 14:11:57.179605 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10005:10073, ack 348, win 142, length 68
  85. 14:11:57.425991 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10073, win 16221, length 0
  86. 14:11:57.531746 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [P.], seq 1:15, ack 14, win 65143, length 14
  87. 14:11:57.532168 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 14:28, ack 15, win 17130, length 14
  88. 14:11:57.679597 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10073:10141, ack 348, win 142, length 68
  89. 14:11:57.797863 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 28, win 65129, length 0
  90. 14:11:57.925667 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10141, win 16204, length 0
  91. 14:11:58.179606 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10141:10209, ack 348, win 142, length 68
  92. 14:11:58.426020 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10209, win 16187, length 0
  93. 14:11:58.622453 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  94. 14:11:58.679599 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10209:10277, ack 348, win 142, length 68
  95. 14:11:58.925931 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10277, win 16170, length 0
  96. 14:11:59.084488 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  97. 14:11:59.179604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10277:10345, ack 348, win 142, length 68
  98. 14:11:59.425626 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10345, win 16153, length 0
  99. 14:11:59.679600 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10345:10413, ack 348, win 142, length 68
  100. 14:11:59.926034 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10413, win 16136, length 0
  101. 14:12:00.183602 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10413:10481, ack 348, win 142, length 68
  102. 14:12:00.448557 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10481, win 16119, length 0
  103. 14:12:00.683604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10481:10549, ack 348, win 142, length 68
  104. 14:12:00.930223 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10549, win 16102, length 0
  105. 14:12:01.084492 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  106. 14:12:01.183614 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10549:10617, ack 348, win 142, length 68
  107. 14:12:01.445668 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10617, win 16085, length 0
  108. 14:12:01.622371 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  109. 14:12:01.683606 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10617:10685, ack 348, win 142, length 68
  110. 14:12:01.930051 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10685, win 16068, length 0
  111. 14:12:02.183611 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10685:10753, ack 348, win 142, length 68
  112. 14:12:02.429707 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10753, win 16425, length 0
  113. 14:12:02.489268 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 28:42, ack 15, win 17130, length 14
  114. 14:12:02.683601 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10753:10821, ack 348, win 142, length 68
  115. 14:12:02.719439 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 42, win 65115, length 0
  116. 14:12:02.930062 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10821, win 16408, length 0
  117. 14:12:03.084493 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  118. 14:12:03.180923 IP 192.168.1.5.netbios-ns > 192.168.1.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
  119. 14:12:03.181250 ARP, Request who-has 192.168.1.5 tell 192.168.1.7, length 46
  120. 14:12:03.181276 ARP, Reply 192.168.1.5 is-at 00:04:e2:0c:1b:60 (oui Unknown), length 28
  121. 14:12:03.181525 IP 192.168.1.7.netbios-ns > 192.168.1.5.netbios-ns: NBT UDP PACKET(137): QUERY; POSITIVE; RESPONSE; UNICAST
  122. 14:12:03.181806 IP 192.168.1.5.38108 > qwestmodem.domain.actdsltmp.domain: 17674+ PTR? 255.1.168.192.in-addr.arpa. (44)
  123. 14:12:03.183618 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10821:10889, ack 348, win 142, length 68
  124. 14:12:03.430190 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10889, win 16391, length 0
  125. 14:12:03.687590 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10889:10957, ack 348, win 142, length 68
  126. 14:12:03.890607 IP talk.google.com.xmpp-client > 192.168.1.3.57744: Flags [P.], seq 925748424:925748829, ack 412422530, win 47012, length 405
  127. 14:12:03.933253 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 10957, win 16374, length 0
  128. 14:12:04.090278 IP 192.168.1.3.57744 > talk.google.com.xmpp-client: Flags [.], ack 405, win 44913, length 0
  129. 14:12:04.187611 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 10957:11025, ack 348, win 142, length 68
  130. 14:12:04.433973 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 11025, win 16357, length 0
  131. 14:12:04.622549 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  132. 14:12:04.687611 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 11025:11093, ack 348, win 142, length 68
  133. 14:12:04.932610 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 11093, win 16340, length 0
  134. 14:12:05.057457 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 84
  135. 14:12:05.084430 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  136. 14:12:05.187615 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 11093:11161, ack 348, win 142, length 68
  137. 14:12:05.434230 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 11161, win 16323, length 0
  138. 14:12:05.687589 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 11161:11229, ack 348, win 142, length 68
  139. 14:12:05.932921 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 11229, win 16306, length 0
  140. 14:12:06.187602 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 11229:11297, ack 348, win 142, length 68
  141. 14:12:06.434288 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 11297, win 16289, length 0
  142. 14:12:06.528767 IP 192.168.1.3.59181 > 193.34.49.3.27031: Flags [S], seq 2131767990, win 8192, options [mss 1460,nop,nop,sackOK], length 0
  143. 14:12:06.675112 IP 193.34.49.3.27031 > 192.168.1.3.59181: Flags [S.], seq 4086005611, ack 2131767991, win 16384, options [mss 1452,nop,nop,sackOK], length 0
  144. 14:12:06.675342 IP 192.168.1.3.59181 > 193.34.49.3.27031: Flags [.], ack 1, win 17424, length 0
  145. 14:12:06.675411 IP 192.168.1.3.59181 > 193.34.49.3.27031: Flags [F.], seq 1, ack 1, win 17424, length 0
  146. 14:12:06.691618 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 11297:11365, ack 348, win 142, length 68
  147. 14:12:06.825331 IP 193.34.49.3.27031 > 192.168.1.3.59181: Flags [.], ack 2, win 65535, length 0
  148. 14:12:06.825726 IP 193.34.49.3.27031 > 192.168.1.3.59181: Flags [R.], seq 1, ack 2, win 0, length 0
  149. 14:12:07.563706 IP 192.168.1.5.42447 > qwestmodem.domain.actdsltmp.domain: 57739+ PTR? 7.1.168.192.in-addr.arpa. (42)
  150. 14:12:12.004210 IP 192.168.1.5.40811 > qwestmodem.domain.actdsltmp.domain: 3374+ PTR? 125.225.85.209.in-addr.arpa. (45)
  151. 14:12:12.016495 IP qwestmodem.domain.actdsltmp.domain > 192.168.1.5.40811: 3374- 1/0/0 PTR talk.google.com. (74)
  152. 14:12:12.017137 IP 192.168.1.5.48889 > qwestmodem.domain.actdsltmp.domain: 63835+ PTR? 3.49.34.193.in-addr.arpa. (42)
  153. 14:12:12.195604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 12045:12113, ack 348, win 142, length 68
  154. 14:12:12.441696 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 12113, win 16085, length 0
  155. 14:12:12.488831 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 56:70, ack 29, win 17116, length 14
  156. 14:12:12.672833 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 70, win 65087, length 0
  157. 14:12:12.695592 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 12113:12181, ack 348, win 142, length 68
  158. 14:12:12.941368 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 12181, win 16068, length 0
  159. 14:12:13.084519 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  160. 14:12:13.118024 IP 64.55460 > 192.168.1.5.ssh: Flags [P.], seq 37:73, ack 196, win 16220, length 36
  161. 14:12:13.118059 IP 192.168.1.5.ssh > 64.55460: Flags [.], ack 73, win 259, length 0
  162. 14:12:13.199586 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 12181:12249, ack 348, win 142, length 68
  163. 14:12:13.445448 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 12249, win 16425, length 0
  164. 14:12:13.699611 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 12249:12317, ack 348, win 142, length 68
  165. 14:12:13.951738 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 12317, win 16408, length 0
  166. 14:12:13.990924 IP 64.53872 > 192.168.1.5.ssh: Flags [P.], seq 348:384, ack 12317, win 16408, length 36
  167. 14:12:13.990943 IP 192.168.1.5.ssh > 64.53872: Flags [.], ack 384, win 142, length 0
  168. 14:12:14.074970 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 84
  169. 14:12:14.199599 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 12317:12385, ack 384, win 142, length 68
  170. 14:12:14.451346 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 12385, win 16391, length 0
  171. 14:12:14.476244 IP 208.111.171.82.27017 > 192.168.1.3.57594: UDP, length 36
  172. 14:12:14.623091 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  173. 14:12:17.084482 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  174. 14:12:17.115175 IP qwestmodem.domain.actdsltmp.domain > 192.168.1.5.48889: 63835 ServFail- 0/0/0 (42)
  175. 14:12:17.115237 IP 192.168.1.5 > qwestmodem.domain.actdsltmp: ICMP 192.168.1.5 udp port 48889 unreachable, length 78
  176. 14:12:17.203609 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 12725:12793, ack 384, win 142, length 68
  177. 14:12:17.449802 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 12793, win 16289, length 0
  178. 14:12:17.703601 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 12793:12861, ack 384, win 142, length 68
  179. 14:12:17.949182 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 12861, win 16272, length 0
  180. 14:12:18.203604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 12861:12929, ack 384, win 142, length 68
  181. 14:12:18.449599 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 12929, win 16255, length 0
  182. 14:12:18.623552 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  183. 14:12:18.703602 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 12929:12997, ack 384, win 142, length 68
  184. 14:12:18.949999 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 12997, win 16238, length 0
  185. 14:12:19.084463 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  186. 14:12:19.203606 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 12997:13065, ack 384, win 142, length 68
  187. 14:12:19.454819 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13065, win 16221, length 0
  188. 14:12:19.532187 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [P.], seq 29:43, ack 70, win 65087, length 14
  189. 14:12:19.532532 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 70:84, ack 43, win 17102, length 14
  190. 14:12:19.707602 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13065:13133, ack 384, win 142, length 68
  191. 14:12:19.782039 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 84, win 65073, length 0
  192. 14:12:19.954453 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13133, win 16204, length 0
  193. 14:12:20.207604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13133:13201, ack 384, win 142, length 68
  194. 14:12:20.454056 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13201, win 16187, length 0
  195. 14:12:20.707632 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13201:13269, ack 384, win 142, length 68
  196. 14:12:20.953261 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13269, win 16170, length 0
  197. 14:12:21.084475 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  198. 14:12:21.207604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13269:13337, ack 384, win 142, length 68
  199. 14:12:21.453685 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13337, win 16153, length 0
  200. 14:12:21.623496 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  201. 14:12:21.707613 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13337:13405, ack 384, win 142, length 68
  202. 14:12:21.953106 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13405, win 16136, length 0
  203. 14:12:22.207607 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13405:13473, ack 384, win 142, length 68
  204. 14:12:22.454220 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13473, win 16119, length 0
  205. 14:12:22.504388 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 84:98, ack 43, win 17102, length 14
  206. 14:12:22.625954 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 98, win 65059, length 0
  207. 14:12:22.707600 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13473:13541, ack 384, win 142, length 68
  208. 14:12:22.952885 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13541, win 16102, length 0
  209. 14:12:23.084454 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  210. 14:12:23.091452 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 84
  211. 14:12:23.211613 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13541:13609, ack 384, win 142, length 68
  212. 14:12:23.456959 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13609, win 16085, length 0
  213. 14:12:23.711599 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13609:13677, ack 384, win 142, length 68
  214. 14:12:23.958537 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13677, win 16068, length 0
  215. 14:12:24.211618 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13677:13745, ack 384, win 142, length 68
  216. 14:12:24.460196 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13745, win 16425, length 0
  217. 14:12:24.623644 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  218. 14:12:24.711613 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13745:13813, ack 384, win 142, length 68
  219. 14:12:24.957371 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13813, win 16408, length 0
  220. 14:12:25.084470 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  221. 14:12:25.211620 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13813:13881, ack 384, win 142, length 68
  222. 14:12:25.465137 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13881, win 16391, length 0
  223. 14:12:25.711602 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13881:13949, ack 384, win 142, length 68
  224. 14:12:25.873216 IP6 fe80::11db:da12:6059:5cee.546 > ff02::1:2.547: dhcp6 solicit
  225. 14:12:25.873672 IP 192.168.1.5.47191 > qwestmodem.domain.actdsltmp.domain: 19948+ PTR? 2.0.0.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa. (90)
  226. 14:12:25.967283 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 13949, win 16374, length 0
  227. 14:12:26.215609 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 13949:14017, ack 384, win 142, length 68
  228. 14:12:26.461469 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14017, win 16357, length 0
  229. 14:12:26.715591 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14017:14085, ack 384, win 142, length 68
  230. 14:12:26.872635 IP6 fe80::11db:da12:6059:5cee.546 > ff02::1:2.547: dhcp6 solicit
  231. 14:12:26.961160 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14085, win 16340, length 0
  232. 14:12:27.084457 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  233. 14:12:27.215603 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14085:14153, ack 384, win 142, length 68
  234. 14:12:27.315229 IP 192.168.1.5.netbios-ssn > 192.168.1.7.4120: Flags [P.], seq 3892140126:3892140130, ack 1744135407, win 65535, length 4 NBT Session Packet: Session Keepalive
  235. 14:12:27.457227 IP 192.168.1.7.4120 > 192.168.1.5.netbios-ssn: Flags [.], ack 4, win 64230, length 0
  236. 14:12:27.461266 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14153, win 16323, length 0
  237. 14:12:27.715603 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14153:14221, ack 384, win 142, length 68
  238. 14:12:27.970536 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14221, win 16306, length 0
  239. 14:12:28.215612 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14221:14289, ack 384, win 142, length 68
  240. 14:12:28.470247 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14289, win 16289, length 0
  241. 14:12:28.624101 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  242. 14:12:28.715594 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14289:14357, ack 384, win 142, length 68
  243. 14:12:28.872770 IP6 fe80::11db:da12:6059:5cee.546 > ff02::1:2.547: dhcp6 solicit
  244. 14:12:28.970138 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14357, win 16272, length 0
  245. 14:12:29.084437 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  246. 14:12:29.219607 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14357:14425, ack 384, win 142, length 68
  247. 14:12:29.482098 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14425, win 16255, length 0
  248. 14:12:29.719591 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14425:14493, ack 384, win 142, length 68
  249. 14:12:29.989125 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14493, win 16238, length 0
  250. 14:12:30.219606 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14493:14561, ack 384, win 142, length 68
  251. 14:12:30.227063 IP qwestmodem.domain.actdsltmp.domain > 192.168.1.5.47191: 19948 ServFail- 0/0/0 (90)
  252. 14:12:30.227271 IP 192.168.1.5.55349 > resolver.qwest.net.domain: 19948+ PTR? 2.0.0.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa. (90)
  253. 14:12:30.254269 IP resolver.qwest.net.domain > 192.168.1.5.55349: 19948 NXDomain 0/1/0 (160)
  254. 14:12:30.255231 IP 192.168.1.5.54784 > qwestmodem.domain.actdsltmp.domain: 6557+ PTR? 25.3.171.205.in-addr.arpa. (43)
  255. 14:12:30.314882 IP qwestmodem.domain.actdsltmp.domain > 192.168.1.5.54784: 6557- 1/0/0 PTR resolver.qwest.net. (75)
  256. 14:12:30.479631 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14561, win 16221, length 0
  257. 14:12:30.547492 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [P.], seq 43:57, ack 98, win 65059, length 14
  258. 14:12:30.547851 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 98:112, ack 57, win 17088, length 14
  259. 14:12:30.719616 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14561:14629, ack 384, win 142, length 68
  260. 14:12:30.719666 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 112, win 65045, length 0
  261. 14:12:30.966005 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14629, win 16204, length 0
  262. 14:12:31.084453 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  263. 14:12:31.219614 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14629:14697, ack 384, win 142, length 68
  264. 14:12:31.471113 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14697, win 16187, length 0
  265. 14:12:31.624022 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  266. 14:12:31.719604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14697:14765, ack 384, win 142, length 68
  267. 14:12:31.987037 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14765, win 16170, length 0
  268. 14:12:32.107966 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 84
  269. 14:12:32.219605 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14765:14833, ack 384, win 142, length 68
  270. 14:12:32.466704 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14833, win 16153, length 0
  271. 14:12:32.518944 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 112:126, ack 57, win 17088, length 14
  272. 14:12:32.688706 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 126, win 65031, length 0
  273. 14:12:32.723598 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14833:14901, ack 384, win 142, length 68
  274. 14:12:32.872989 IP6 fe80::11db:da12:6059:5cee.546 > ff02::1:2.547: dhcp6 solicit
  275. 14:12:32.976692 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14901, win 16136, length 0
  276. 14:12:33.084442 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  277. 14:12:33.223604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14901:14969, ack 384, win 142, length 68
  278. 14:12:33.472931 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 14969, win 16119, length 0
  279. 14:12:33.723595 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 14969:15037, ack 384, win 142, length 68
  280. 14:12:33.968863 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15037, win 16102, length 0
  281. 14:12:34.223605 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15037:15105, ack 384, win 142, length 68
  282. 14:12:34.478800 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15105, win 16085, length 0
  283. 14:12:34.624203 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  284. 14:12:34.723605 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15105:15173, ack 384, win 142, length 68
  285. 14:12:34.980208 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15173, win 16068, length 0
  286. 14:12:35.084472 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  287. 14:12:35.223617 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15173:15241, ack 384, win 142, length 68
  288. 14:12:35.470288 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15241, win 16425, length 0
  289. 14:12:35.727600 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15241:15309, ack 384, win 142, length 68
  290. 14:12:35.986175 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15309, win 16408, length 0
  291. 14:12:36.227610 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15309:15377, ack 384, win 142, length 68
  292. 14:12:36.473764 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15377, win 16391, length 0
  293. 14:12:36.727598 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15377:15445, ack 384, win 142, length 68
  294. 14:12:36.736037 ARP, Request who-has qwestmodem.domain.actdsltmp (00:24:7b:2f:4e:ae (oui Unknown)) tell 192.168.1.3, length 46
  295. 14:12:36.736283 ARP, Reply qwestmodem.domain.actdsltmp is-at 00:24:7b:2f:4e:ae (oui Unknown), length 46
  296. 14:12:36.973437 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15445, win 16374, length 0
  297. 14:12:37.084460 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  298. 14:12:37.227612 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15445:15513, ack 384, win 142, length 68
  299. 14:12:37.473811 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15513, win 16357, length 0
  300. 14:12:37.727625 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15513:15581, ack 384, win 142, length 68
  301. 14:12:37.973964 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15581, win 16340, length 0
  302. 14:12:38.227601 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15581:15649, ack 384, win 142, length 68
  303. 14:12:38.473578 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15649, win 16323, length 0
  304. 14:12:38.624670 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  305. 14:12:38.727600 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15649:15717, ack 384, win 142, length 68
  306. 14:12:38.973990 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15717, win 16306, length 0
  307. 14:12:39.084447 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  308. 14:12:39.231606 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15717:15785, ack 384, win 142, length 68
  309. 14:12:39.476870 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15785, win 16289, length 0
  310. 14:12:39.731604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15785:15853, ack 384, win 142, length 68
  311. 14:12:39.980681 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15853, win 16272, length 0
  312. 14:12:40.231605 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15853:15921, ack 384, win 142, length 68
  313. 14:12:40.478084 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15921, win 16255, length 0
  314. 14:12:40.731603 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15921:15989, ack 384, win 142, length 68
  315. 14:12:40.873493 IP6 fe80::11db:da12:6059:5cee.546 > ff02::1:2.547: dhcp6 solicit
  316. 14:12:40.978507 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 15989, win 16238, length 0
  317. 14:12:41.084444 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  318. 14:12:41.125458 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 84
  319. 14:12:41.231607 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 15989:16057, ack 384, win 142, length 68
  320. 14:12:41.477177 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16057, win 16221, length 0
  321. 14:12:41.520811 IP 208.111.171.82.27017 > 192.168.1.3.57594: UDP, length 36
  322. 14:12:41.563455 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [P.], seq 57:71, ack 126, win 65031, length 14
  323. 14:12:41.563800 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 126:140, ack 71, win 17074, length 14
  324. 14:12:41.624579 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  325. 14:12:41.731604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16057:16125, ack 384, win 142, length 68
  326. 14:12:41.766965 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 140, win 65017, length 0
  327. 14:12:41.978587 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16125, win 16204, length 0
  328. 14:12:42.235603 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16125:16193, ack 384, win 142, length 68
  329. 14:12:42.481422 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16193, win 16187, length 0
  330. 14:12:42.518492 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 140:154, ack 71, win 17074, length 14
  331. 14:12:42.735598 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16193:16261, ack 384, win 142, length 68
  332. 14:12:42.751466 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 154, win 65003, length 0
  333. 14:12:42.982542 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16261, win 16170, length 0
  334. 14:12:43.084446 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  335. 14:12:43.132575 IP 64.55460 > 192.168.1.5.ssh: Flags [P.], seq 73:109, ack 196, win 16220, length 36
  336. 14:12:43.132627 IP 192.168.1.5.ssh > 64.55460: Flags [.], ack 109, win 259, length 0
  337. 14:12:43.235599 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16261:16329, ack 384, win 142, length 68
  338. 14:12:43.481679 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16329, win 16153, length 0
  339. 14:12:43.735598 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16329:16397, ack 384, win 142, length 68
  340. 14:12:43.982095 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16397, win 16136, length 0
  341. 14:12:44.005762 IP 64.53872 > 192.168.1.5.ssh: Flags [P.], seq 384:420, ack 16397, win 16136, length 36
  342. 14:12:44.005791 IP 192.168.1.5.ssh > 64.53872: Flags [.], ack 420, win 142, length 0
  343. 14:12:44.235609 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16397:16465, ack 420, win 142, length 68
  344. 14:12:44.482703 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16465, win 16119, length 0
  345. 14:12:44.624755 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  346. 14:12:44.735638 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16465:16533, ack 420, win 142, length 68
  347. 14:12:44.982382 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16533, win 16102, length 0
  348. 14:12:45.084460 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  349. 14:12:45.235613 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16533:16601, ack 420, win 142, length 68
  350. 14:12:45.481813 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16601, win 16085, length 0
  351. 14:12:45.739598 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16601:16669, ack 420, win 142, length 68
  352. 14:12:45.985370 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16669, win 16068, length 0
  353. 14:12:46.239606 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16669:16737, ack 420, win 142, length 68
  354. 14:12:46.485291 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16737, win 16425, length 0
  355. 14:12:46.514333 ARP, Request who-has 192.168.1.3 tell qwestmodem.domain.actdsltmp, length 46
  356. 14:12:46.514476 ARP, Reply 192.168.1.3 is-at 00:15:58:a7:23:d9 (oui Unknown), length 46
  357. 14:12:46.739606 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16737:16805, ack 420, win 142, length 68
  358. 14:12:46.988156 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16805, win 16408, length 0
  359. 14:12:47.084463 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  360. 14:12:47.239609 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16805:16873, ack 420, win 142, length 68
  361. 14:12:47.487521 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16873, win 16391, length 0
  362. 14:12:47.739601 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16873:16941, ack 420, win 142, length 68
  363. 14:12:47.987664 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 16941, win 16374, length 0
  364. 14:12:48.239603 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 16941:17009, ack 420, win 142, length 68
  365. 14:12:48.485117 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17009, win 16357, length 0
  366. 14:12:48.625194 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  367. 14:12:48.743602 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17009:17077, ack 420, win 142, length 68
  368. 14:12:48.998353 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17077, win 16340, length 0
  369. 14:12:49.084442 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  370. 14:12:49.243613 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17077:17145, ack 420, win 142, length 68
  371. 14:12:49.499926 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17145, win 16323, length 0
  372. 14:12:49.743599 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17145:17213, ack 420, win 142, length 68
  373. 14:12:49.999585 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17213, win 16306, length 0
  374. 14:12:50.140959 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 84
  375. 14:12:50.243604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17213:17281, ack 420, win 142, length 68
  376. 14:12:50.499478 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17281, win 16289, length 0
  377. 14:12:50.743600 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17281:17349, ack 420, win 142, length 68
  378. 14:12:50.988610 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17349, win 16272, length 0
  379. 14:12:51.084498 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  380. 14:12:51.243602 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17349:17417, ack 420, win 142, length 68
  381. 14:12:51.490917 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17417, win 16255, length 0
  382. 14:12:51.625136 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  383. 14:12:51.743627 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17417:17485, ack 420, win 142, length 68
  384. 14:12:51.895845 IP qwestmodem.domain.actdsltmp.62513 > 239.255.255.250.1900: UDP, length 279
  385. 14:12:51.896231 IP 192.168.1.5.45850 > qwestmodem.domain.actdsltmp.domain: 13667+ PTR? 250.255.255.239.in-addr.arpa. (46)
  386. 14:12:51.925539 IP qwestmodem.domain.actdsltmp.62513 > 239.255.255.250.1900: UDP, length 270
  387. 14:12:51.965416 IP qwestmodem.domain.actdsltmp.62513 > 239.255.255.250.1900: UDP, length 334
  388. 14:12:51.988819 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17485, win 16238, length 0
  389. 14:12:52.135479 IP qwestmodem.domain.actdsltmp.62513 > 239.255.255.250.1900: UDP, length 344
  390. 14:12:52.247614 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17485:17553, ack 420, win 142, length 68
  391. 14:12:52.492909 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17553, win 16221, length 0
  392. 14:12:52.534031 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 154:168, ack 71, win 17074, length 14
  393. 14:12:52.563657 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [P.], seq 71:85, ack 154, win 65003, length 14
  394. 14:12:52.565107 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 168:182, ack 85, win 17060, length 14
  395. 14:12:52.622496 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 182, win 64975, length 0
  396. 14:12:52.747595 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17553:17621, ack 420, win 142, length 68
  397. 14:12:52.982097 IP 208.111.171.82.27017 > 192.168.1.3.57594: UDP, length 100
  398. 14:12:52.994034 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17621, win 16204, length 0
  399. 14:12:53.084450 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  400. 14:12:53.181119 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 100
  401. 14:12:53.247603 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17621:17689, ack 420, win 142, length 68
  402. 14:12:53.331687 IP 208.111.171.82.27017 > 192.168.1.3.57594: UDP, length 100
  403. 14:12:53.461677 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 84
  404. 14:12:53.493175 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17689, win 16187, length 0
  405. 14:12:53.747591 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17689:17757, ack 420, win 142, length 68
  406. 14:12:53.868438 IP 208.111.171.82.27017 > 192.168.1.3.57594: UDP, length 36
  407. 14:12:53.992858 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17757, win 16170, length 0
  408. 14:12:54.247604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17757:17825, ack 420, win 142, length 68
  409. 14:12:54.494296 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17825, win 16153, length 0
  410. 14:12:54.625305 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  411. 14:12:54.747615 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17825:17893, ack 420, win 142, length 68
  412. 14:12:54.993397 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 17893, win 16136, length 0
  413. 14:12:55.084494 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  414. 14:12:55.251616 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 17893:17961, ack 420, win 142, length 68
  415. 14:12:56.497318 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18097, win 16085, length 0
  416. 14:12:56.751618 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18097:18165, ack 420, win 142, length 68
  417. 14:12:56.874433 IP6 fe80::11db:da12:6059:5cee.546 > ff02::1:2.547: dhcp6 solicit
  418. 14:12:56.997461 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18165, win 16068, length 0
  419. 14:12:57.084449 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  420. 14:12:57.251607 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18165:18233, ack 420, win 142, length 68
  421. 14:12:57.497111 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18233, win 16425, length 0
  422. 14:12:57.751602 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18233:18301, ack 420, win 142, length 68
  423. 14:12:57.998697 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18301, win 16408, length 0
  424. 14:12:58.251602 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18301:18369, ack 420, win 142, length 68
  425. 14:12:58.497149 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18369, win 16391, length 0
  426. 14:12:58.625748 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  427. 14:12:58.755611 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18369:18437, ack 420, win 142, length 68
  428. 14:12:58.885337 IP qwestmodem.domain.actdsltmp.62513 > 239.255.255.250.1900: UDP, length 270
  429. 14:12:59.001455 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18437, win 16374, length 0
  430. 14:12:59.084448 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  431. 14:12:59.085577 IP qwestmodem.domain.actdsltmp.62513 > 239.255.255.250.1900: UDP, length 279
  432. 14:12:59.165181 IP qwestmodem.domain.actdsltmp.62513 > 239.255.255.250.1900: UDP, length 334
  433. 14:12:59.235451 IP qwestmodem.domain.actdsltmp.62513 > 239.255.255.250.1900: UDP, length 344
  434. 14:12:59.255610 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18437:18505, ack 420, win 142, length 68
  435. 14:12:59.501124 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18505, win 16357, length 0
  436. 14:12:59.755602 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18505:18573, ack 420, win 142, length 68
  437. 14:13:00.002490 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18573, win 16340, length 0
  438. 14:13:00.255600 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18573:18641, ack 420, win 142, length 68
  439. 14:13:00.501652 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18641, win 16323, length 0
  440. 14:13:00.755610 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18641:18709, ack 420, win 142, length 68
  441. 14:13:01.016093 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18709, win 16306, length 0
  442. 14:13:01.084436 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  443. 14:13:01.255612 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18709:18777, ack 420, win 142, length 68
  444. 14:13:01.501697 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18777, win 16289, length 0
  445. 14:13:01.625693 IP6 fe80::11db:da12:6059:5cee.53436 > ff02::c.1900: UDP, length 146
  446. 14:13:01.755603 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18777:18845, ack 420, win 142, length 68
  447. 14:13:02.002128 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18845, win 16272, length 0
  448. 14:13:02.259610 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18845:18913, ack 420, win 142, length 68
  449. 14:13:02.491609 IP 192.168.1.3.57594 > 208.111.171.82.27017: UDP, length 84
  450. 14:13:02.506621 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18913, win 16255, length 0
  451. 14:13:02.534598 IP 192.168.1.3.56975 > pv5.planetventrilo.com.4291: Flags [P.], seq 182:196, ack 85, win 17060, length 14
  452. 14:13:02.759604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18913:18981, ack 420, win 142, length 68
  453. 14:13:02.766816 IP pv5.planetventrilo.com.4291 > 192.168.1.3.56975: Flags [.], ack 196, win 64961, length 0
  454. 14:13:03.005351 IP 64.53872 > 192.168.1.5.ssh: Flags [.], ack 18981, win 16238, length 0
  455. 14:13:03.084461 STP 802.1d, Config, Flags [none], bridge-id 8000.00:24:7b:2f:4e:ae.8001, length 43
  456. 14:13:03.259604 IP 192.168.1.5.ssh > 64.53872: Flags [P.], seq 18981:19049, ack 420, win 142, length 68
  457. 14:13:03.275618 IP 64.55460 > 192.168.1.5.ssh: Flags [P.], seq 109:161, ack 196, win 16220, length 52
  458. 14:13:03.275662 IP 192.168.1.5.ssh > 64.55460: Flags [.], ack 161, win 259, length 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement