Guest User

tcpdump server

a guest
Dec 2nd, 2014
225
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.39 KB | None | 0 0
  1. > sudo tcpdump -i tun0 | grep '10.88.73.11' | grep -v zabbix
  2. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  3. listening on tun0, link-type RAW (Raw IP), capture size 65535 bytes
  4.  
  5. 19:57:16.807203 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [S], seq 1677939975, win 14600, options [mss 1460,sackOK,TS val 11305528 ecr 0,nop,wscale 7], length 0
  6. 19:57:16.919094 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [S.], seq 2896252059, ack 1677939976, win 28960, options [mss 1368,sackOK,TS val 358070 ecr 11305528,nop,wscale 7], length 0
  7. 19:57:16.919133 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11305556 ecr 358070], length 0
  8. 19:57:17.057697 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 7865, seq 0, length 76
  9. 19:57:17.059078 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 358104 ecr 11305556], length 41
  10. 19:57:17.059115 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11305591 ecr 358104], length 0
  11. 19:57:17.059232 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1:40, ack 42, win 115, options [nop,nop,TS val 11305591 ecr 358104], length 39
  12. 19:57:17.199303 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 7865, seq 0, length 76
  13. 19:57:17.199407 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 40, win 227, options [nop,nop,TS val 358132 ecr 11305591], length 0
  14. 19:57:17.199443 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 40:1312, ack 42, win 115, options [nop,nop,TS val 11305626 ecr 358132], length 1272
  15. 19:57:17.320894 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], seq 42:1398, ack 40, win 227, options [nop,nop,TS val 358133 ecr 11305591], length 1356
  16. 19:57:17.358705 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 1398, win 137, options [nop,nop,TS val 11305666 ecr 358133], length 0
  17. 19:57:17.380995 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 1398:1690, ack 40, win 227, options [nop,nop,TS val 358133 ecr 11305591], length 292
  18. 19:57:17.381020 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 1690, win 158, options [nop,nop,TS val 11305671 ecr 358133], length 0
  19. 19:57:17.411134 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1312, win 249, options [nop,nop,TS val 358187 ecr 11305626], length 0
  20. 19:57:17.411172 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1312:1392, ack 1690, win 158, options [nop,nop,TS val 11305679 ecr 358187], length 80
  21. 19:57:17.547213 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1392, win 249, options [nop,nop,TS val 358230 ecr 11305679], length 0
  22. 19:57:17.608234 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 1690:2002, ack 1392, win 249, options [nop,nop,TS val 358232 ecr 11305679], length 312
  23. 19:57:17.611017 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1392:1408, ack 2002, win 180, options [nop,nop,TS val 11305729 ecr 358232], length 16
  24. 19:57:17.749547 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1408, win 249, options [nop,nop,TS val 358280 ecr 11305729], length 0
  25. 19:57:17.749595 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1408:1456, ack 2002, win 180, options [nop,nop,TS val 11305763 ecr 358280], length 48
  26. 19:57:17.857234 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1456, win 249, options [nop,nop,TS val 358305 ecr 11305763], length 0
  27. 19:57:17.877305 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2002:2050, ack 1456, win 249, options [nop,nop,TS val 358305 ecr 11305763], length 48
  28. 19:57:17.877460 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1456:1520, ack 2050, win 180, options [nop,nop,TS val 11305795 ecr 358305], length 64
  29. 19:57:18.028296 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1520, win 249, options [nop,nop,TS val 358347 ecr 11305795], length 0
  30. 19:57:18.057848 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 7865, seq 3, length 76
  31. 19:57:18.117252 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2050:2114, ack 1520, win 249, options [nop,nop,TS val 358370 ecr 11305795], length 64
  32. 19:57:18.154703 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 2114, win 180, options [nop,nop,TS val 11305865 ecr 358370], length 0
  33. 19:57:18.177264 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 7865, seq 3, length 76
  34. 19:57:19.058054 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 7865, seq 6, length 76
  35. 19:57:19.201787 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 7865, seq 6, length 76
  36.  
  37. 19:57:29.982482 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1520:1664, ack 2114, win 180, options [nop,nop,TS val 11308821 ecr 358370], length 144
  38. 19:57:30.118522 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1664, win 269, options [nop,nop,TS val 361362 ecr 11308821], length 0
  39. 19:57:30.138600 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2114:2146, ack 1664, win 269, options [nop,nop,TS val 361370 ecr 11308821], length 32
  40. 19:57:30.138668 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 2146, win 180, options [nop,nop,TS val 11308860 ecr 361370], length 0
  41. 19:57:30.139106 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1664:1792, ack 2146, win 180, options [nop,nop,TS val 11308861 ecr 361370], length 128
  42. 19:57:30.318616 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1792, win 289, options [nop,nop,TS val 361422 ecr 11308861], length 0
  43. 19:57:31.498846 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2146:2194, ack 1792, win 289, options [nop,nop,TS val 361716 ecr 11308861], length 48
  44. 19:57:31.499083 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1792:1920, ack 2194, win 180, options [nop,nop,TS val 11309201 ecr 361716], length 128
  45. 19:57:31.608749 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1920, win 309, options [nop,nop,TS val 361742 ecr 11309201], length 0
  46. 19:57:31.638695 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2194:2274, ack 1920, win 309, options [nop,nop,TS val 361743 ecr 11309201], length 80
  47. 19:57:31.658795 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2274:2322, ack 1920, win 309, options [nop,nop,TS val 361745 ecr 11309201], length 48
  48. 19:57:31.659039 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 2322, win 180, options [nop,nop,TS val 11309241 ecr 361743], length 0
  49. 19:57:31.659444 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1920:1984, ack 2322, win 180, options [nop,nop,TS val 11309241 ecr 361743], length 64
  50. 19:57:31.798985 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2322:2370, ack 1984, win 309, options [nop,nop,TS val 361782 ecr 11309241], length 48
  51. 19:57:31.799565 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11309276 ecr 361782], length 1356
  52. 19:57:31.799584 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 3340:3872, ack 2370, win 180, options [nop,nop,TS val 11309276 ecr 361782], length 532
  53. 19:57:31.908716 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1984, win 329, options [nop,nop,TS val 361817 ecr 11309241,nop,nop,sack 1 {3340:3872}], length 0
  54. 19:57:31.942699 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11309312 ecr 361817], length 1356
  55. 19:57:32.302676 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11309402 ecr 361817], length 1356
  56. 19:57:33.022710 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11309582 ecr 361817], length 1356
  57. 19:57:34.466749 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11309943 ecr 361817], length 1356
  58. 19:57:37.350695 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11310664 ecr 361817], length 1356
  59. 19:57:41.588644 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [S], seq 1137486339, win 14600, options [mss 1460,sackOK,TS val 11311723 ecr 0,nop,wscale 7], length 0
  60. 19:57:41.728116 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [S.], seq 330373944, ack 1137486340, win 28960, options [mss 1368,sackOK,TS val 364265 ecr 11311723,nop,wscale 7], length 0
  61. 19:57:41.728147 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11311758 ecr 364265], length 0
  62. 19:57:41.858112 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 364305 ecr 11311758], length 41
  63. 19:57:41.858261 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11311790 ecr 364305], length 0
  64. 19:57:41.858323 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11311790 ecr 364305], length 22
  65. 19:57:41.858351 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [F.], seq 23, ack 42, win 115, options [nop,nop,TS val 11311790 ecr 364305], length 0
  66. 19:57:41.978048 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [.], ack 1, win 227, options [nop,nop,TS val 364335 ecr 11311790,nop,nop,sack 1 {23:24}], length 0
  67. 19:57:42.014722 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11311830 ecr 364335], length 22
  68. 19:57:42.231762 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [.], ack 24, win 227, options [nop,nop,TS val 364370 ecr 11311830], length 0
  69. 19:57:42.330916 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [.], seq 42:1398, ack 24, win 227, options [nop,nop,TS val 364370 ecr 11311830], length 1356
  70. 19:57:42.330957 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [R], seq 1137486363, win 0, length 0
  71. 19:57:42.385973 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [P.], seq 1398:1690, ack 24, win 227, options [nop,nop,TS val 364370 ecr 11311830], length 292
  72. 19:57:42.385994 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [R], seq 1137486363, win 0, length 0
  73. 19:57:42.402055 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [F.], seq 1690, ack 24, win 227, options [nop,nop,TS val 364371 ecr 11311830], length 0
  74. 19:57:42.402084 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [R], seq 1137486363, win 0, length 0
  75. 19:57:43.126698 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11312108 ecr 361817], length 1356
  76. 19:57:54.660313 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11314992 ecr 361817], length 1356
  77. 19:58:16.906259 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8017, seq 0, length 76
  78. 19:58:17.057702 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8017, seq 0, length 76
  79. 19:58:17.764294 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11320768 ecr 361817], length 1356
  80. 19:58:17.906747 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8017, seq 2, length 76
  81. 19:58:18.017589 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8017, seq 2, length 76
  82. 19:58:18.906947 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8017, seq 4, length 76
  83. 19:58:19.026329 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8017, seq 4, length 76
  84. 19:58:42.116827 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [S], seq 2580940499, win 14600, options [mss 1460,sackOK,TS val 11326856 ecr 0,nop,wscale 7], length 0
  85. 19:58:42.278516 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [S.], seq 3317188142, ack 2580940500, win 28960, options [mss 1368,sackOK,TS val 379397 ecr 11326856,nop,wscale 7], length 0
  86. 19:58:42.278570 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11326896 ecr 379397], length 0
  87. 19:58:42.478588 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 379444 ecr 11326896], length 41
  88. 19:58:42.478676 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11326946 ecr 379444], length 0
  89. 19:58:42.478774 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11326946 ecr 379444], length 22
  90. 19:58:42.478834 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [F.], seq 23, ack 42, win 115, options [nop,nop,TS val 11326946 ecr 379444], length 0
  91. 19:58:42.721559 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [.], ack 23, win 227, options [nop,nop,TS val 379495 ecr 11326946], length 0
  92. 19:58:42.811200 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [.], seq 42:1398, ack 23, win 227, options [nop,nop,TS val 379495 ecr 11326946], length 1356
  93. 19:58:42.811257 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [R], seq 2580940522, win 0, length 0
  94. 19:58:42.850950 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [F.], seq 1690, ack 24, win 227, options [nop,nop,TS val 379500 ecr 11326946], length 0
  95. 19:58:42.850988 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [R], seq 2580940523, win 0, length 0
  96. 19:58:42.851106 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [P.], seq 1398:1690, ack 23, win 227, options [nop,nop,TS val 379495 ecr 11326946], length 292
  97. 19:58:42.851128 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [R], seq 2580940522, win 0, length 0
  98. 19:59:03.969750 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11332320 ecr 361817], length 1356
  99. 19:59:16.827261 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8161, seq 0, length 76
  100. 19:59:16.935965 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8161, seq 0, length 76
  101. 19:59:17.827934 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8161, seq 2, length 76
  102. 19:59:17.966212 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8161, seq 2, length 76
  103. 19:59:18.828867 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8161, seq 4, length 76
  104. 19:59:18.936142 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8161, seq 4, length 76
  105. 19:59:43.215429 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [S], seq 1167981626, win 14600, options [mss 1460,sackOK,TS val 11342131 ecr 0,nop,wscale 7], length 0
  106. 19:59:43.328368 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [S.], seq 1320344358, ack 1167981627, win 28960, options [mss 1368,sackOK,TS val 394673 ecr 11342131,nop,wscale 7], length 0
  107. 19:59:43.328398 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11342159 ecr 394673], length 0
  108. 19:59:43.477746 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 394708 ecr 11342159], length 41
  109. 19:59:43.477862 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11342197 ecr 394708], length 0
  110. 19:59:43.477915 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11342197 ecr 394708], length 22
  111. 19:59:43.477937 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [F.], seq 23, ack 42, win 115, options [nop,nop,TS val 11342197 ecr 394708], length 0
  112. 19:59:43.576944 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [.], ack 23, win 227, options [nop,nop,TS val 394735 ecr 11342197], length 0
  113. 19:59:43.727241 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [.], seq 42:1398, ack 23, win 227, options [nop,nop,TS val 394736 ecr 11342197], length 1356
  114. 19:59:43.727274 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [R], seq 1167981649, win 0, length 0
  115. 19:59:43.757711 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [P.], seq 1398:1690, ack 23, win 227, options [nop,nop,TS val 394736 ecr 11342197], length 292
  116. 19:59:43.757744 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [R], seq 1167981649, win 0, length 0
  117. 19:59:43.806878 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [F.], seq 1690, ack 24, win 227, options [nop,nop,TS val 394739 ecr 11342197], length 0
  118. 19:59:43.806915 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [R], seq 1167981650, win 0, length 0
  119. 20:00:01.418589 IP 10.88.73.11 > 10.88.73.1: ICMP echo request, id 6204, seq 1, length 64
  120. 20:00:01.418632 IP 10.88.73.1 > 10.88.73.11: ICMP echo reply, id 6204, seq 1, length 64
  121. 20:00:15.708999 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8297, seq 1, length 76
  122. 20:00:15.847019 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8297, seq 1, length 76
  123. 20:00:16.709654 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8297, seq 3, length 76
  124. 20:00:16.847605 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8297, seq 3, length 76
  125. 20:00:17.710633 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8297, seq 5, length 76
  126. 20:00:17.857348 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8297, seq 5, length 76
  127. 20:00:36.258198 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], seq 1984:3340, ack 2370, win 180, options [nop,nop,TS val 11355392 ecr 361817], length 1356
  128. 20:00:42.308692 IP 10.88.73.1.35877 > 10.88.73.11.ssh: Flags [S], seq 1963225145, win 14600, options [mss 1460,sackOK,TS val 11356904 ecr 0,nop,wscale 7], length 0
  129. 20:00:42.452470 IP 10.88.73.11.ssh > 10.88.73.1.35877: Flags [S.], seq 4202542255, ack 1963225146, win 28960, options [mss 1368,sackOK,TS val 409447 ecr 11356904,nop,wscale 7], length 0
  130. 20:00:42.452506 IP 10.88.73.1.35877 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11356940 ecr 409447], length 0
  131. 20:00:42.658237 IP 10.88.73.11.ssh > 10.88.73.1.35877: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 409493 ecr 11356940], length 41
  132. 20:00:42.658347 IP 10.88.73.1.35877 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11356992 ecr 409493], length 0
  133. 20:00:42.658426 IP 10.88.73.1.35877 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11356992 ecr 409493], length 22
  134. 20:00:42.658463 IP 10.88.73.1.35877 > 10.88.73.11.ssh: Flags [F.], seq 23, ack 42, win 115, options [nop,nop,TS val 11356992 ecr 409493], length 0
  135. 20:00:42.778164 IP 10.88.73.11.ssh > 10.88.73.1.35877: Flags [.], ack 23, win 227, options [nop,nop,TS val 409531 ecr 11356992], length 0
  136. 20:00:42.858348 IP 10.88.73.11.ssh > 10.88.73.1.35877: Flags [.], seq 42:1398, ack 23, win 227, options [nop,nop,TS val 409531 ecr 11356992], length 1356
  137. 20:00:42.858379 IP 10.88.73.1.35877 > 10.88.73.11.ssh: Flags [R], seq 1963225168, win 0, length 0
  138. 20:00:42.896598 IP 10.88.73.11.ssh > 10.88.73.1.35877: Flags [P.], seq 1398:1690, ack 23, win 227, options [nop,nop,TS val 409531 ecr 11356992], length 292
  139. 20:00:42.896640 IP 10.88.73.1.35877 > 10.88.73.11.ssh: Flags [R], seq 1963225168, win 0, length 0
  140. 20:00:42.908169 IP 10.88.73.11.ssh > 10.88.73.1.35877: Flags [F.], seq 1690, ack 24, win 227, options [nop,nop,TS val 409534 ecr 11356992], length 0
  141. 20:00:42.908206 IP 10.88.73.1.35877 > 10.88.73.11.ssh: Flags [R], seq 1963225169, win 0, length 0
  142. ^C30928 packets captured
  143. 30928 packets received by filter
  144. 0 packets dropped by kernel
Add Comment
Please, Sign In to add comment