Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- > sudo tcpdump -i tun0 | grep -v zabbix | grep -v '10.88.73.15'
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on tun0, link-type RAW (Raw IP), capture size 65535 bytes
- 19:57:17.193492 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [S], seq 1677939975, win 14600, options [mss 1368,sackOK,TS val 11305528 ecr 0,nop,wscale 7], length 0
- 19:57:17.193568 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [S.], seq 2896252059, ack 1677939976, win 28960, options [mss 1460,sackOK,TS val 358070 ecr 11305528,nop,wscale 7], length 0
- 19:57:17.303503 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11305556 ecr 358070], length 0
- 19:57:17.333095 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 358104 ecr 11305556], length 41
- 19:57:17.433669 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 7865, seq 0, length 76
- 19:57:17.433730 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 7865, seq 0, length 76
- 19:57:17.433791 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11305591 ecr 358104], length 0
- 19:57:17.443601 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1:40, ack 42, win 115, options [nop,nop,TS val 11305591 ecr 358104], length 39
- 19:57:17.443702 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 40, win 227, options [nop,nop,TS val 358132 ecr 11305591], length 0
- 19:57:17.445804 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], seq 42:1398, ack 40, win 227, options [nop,nop,TS val 358133 ecr 11305591], length 1356
- 19:57:17.445857 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 1398:1690, ack 40, win 227, options [nop,nop,TS val 358133 ecr 11305591], length 292
- 19:57:17.624192 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 40:1312, ack 42, win 115, options [nop,nop,TS val 11305626 ecr 358132], length 1272
- 19:57:17.661431 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1312, win 249, options [nop,nop,TS val 358187 ecr 11305626], length 0
- 19:57:17.753597 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 1398, win 137, options [nop,nop,TS val 11305666 ecr 358133], length 0
- 19:57:17.813589 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 1690, win 158, options [nop,nop,TS val 11305671 ecr 358133], length 0
- 19:57:17.833923 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1312:1392, ack 1690, win 158, options [nop,nop,TS val 11305679 ecr 358187], length 80
- 19:57:17.834070 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1392, win 249, options [nop,nop,TS val 358230 ecr 11305679], length 0
- 19:57:17.843135 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 1690:2002, ack 1392, win 249, options [nop,nop,TS val 358232 ecr 11305679], length 312
- 19:57:17.993593 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1392:1408, ack 2002, win 180, options [nop,nop,TS val 11305729 ecr 358232], length 16
- 19:57:18.033450 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1408, win 249, options [nop,nop,TS val 358280 ecr 11305729], length 0
- 19:57:18.133760 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1408:1456, ack 2002, win 180, options [nop,nop,TS val 11305763 ecr 358280], length 48
- 19:57:18.133844 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1456, win 249, options [nop,nop,TS val 358305 ecr 11305763], length 0
- 19:57:18.134392 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2002:2050, ack 1456, win 249, options [nop,nop,TS val 358305 ecr 11305763], length 48
- 19:57:18.263481 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1456:1520, ack 2050, win 180, options [nop,nop,TS val 11305795 ecr 358305], length 64
- 19:57:18.301431 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1520, win 249, options [nop,nop,TS val 358347 ecr 11305795], length 0
- 19:57:18.394432 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2050:2114, ack 1520, win 249, options [nop,nop,TS val 358370 ecr 11305795], length 64
- 19:57:18.443688 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 7865, seq 3, length 76
- 19:57:18.443774 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 7865, seq 3, length 76
- 19:57:18.533603 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 2114, win 180, options [nop,nop,TS val 11305865 ecr 358370], length 0
- 19:57:19.453533 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 7865, seq 6, length 76
- 19:57:19.453591 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 7865, seq 6, length 76
- 19:57:30.363840 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1520:1664, ack 2114, win 180, options [nop,nop,TS val 11308821 ecr 358370], length 144
- 19:57:30.363920 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1664, win 269, options [nop,nop,TS val 361362 ecr 11308821], length 0
- 19:57:30.395085 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2114:2146, ack 1664, win 269, options [nop,nop,TS val 361370 ecr 11308821], length 32
- 19:57:30.524247 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 2146, win 180, options [nop,nop,TS val 11308860 ecr 361370], length 0
- 19:57:30.563934 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1664:1792, ack 2146, win 180, options [nop,nop,TS val 11308861 ecr 361370], length 128
- 19:57:30.601440 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1792, win 289, options [nop,nop,TS val 361422 ecr 11308861], length 0
- 19:57:31.778331 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2146:2194, ack 1792, win 289, options [nop,nop,TS val 361716 ecr 11308861], length 48
- 19:57:31.883832 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1792:1920, ack 2194, win 180, options [nop,nop,TS val 11309201 ecr 361716], length 128
- 19:57:31.883899 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1920, win 309, options [nop,nop,TS val 361742 ecr 11309201], length 0
- 19:57:31.885824 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2194:2274, ack 1920, win 309, options [nop,nop,TS val 361743 ecr 11309201], length 80
- 19:57:31.896586 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2274:2322, ack 1920, win 309, options [nop,nop,TS val 361745 ecr 11309201], length 48
- 19:57:32.033993 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 2322, win 180, options [nop,nop,TS val 11309241 ecr 361743], length 0
- 19:57:32.043683 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1920:1984, ack 2322, win 180, options [nop,nop,TS val 11309241 ecr 361743], length 64
- 19:57:32.044056 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2322:2370, ack 1984, win 309, options [nop,nop,TS val 361782 ecr 11309241], length 48
- 19:57:32.183765 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 3340:3872, ack 2370, win 180, options [nop,nop,TS val 11309276 ecr 361782], length 532
- 19:57:32.183816 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1984, win 329, options [nop,nop,TS val 361817 ecr 11309241,nop,nop,sack 1 {3340:3872}], length 0
- 19:57:41.973925 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [S], seq 1137486339, win 14600, options [mss 1368,sackOK,TS val 11311723 ecr 0,nop,wscale 7], length 0
- 19:57:41.973987 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [S.], seq 330373944, ack 1137486340, win 28960, options [mss 1460,sackOK,TS val 364265 ecr 11311723,nop,wscale 7], length 0
- 19:57:42.114183 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11311758 ecr 364265], length 0
- 19:57:42.136336 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 364305 ecr 11311758], length 41
- 19:57:42.254073 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11311790 ecr 364305], length 0
- 19:57:42.254162 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [F.], seq 23, ack 42, win 115, options [nop,nop,TS val 11311790 ecr 364305], length 0
- 19:57:42.254200 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [.], ack 1, win 227, options [nop,nop,TS val 364335 ecr 11311790,nop,nop,sack 1 {23:24}], length 0
- 19:57:42.394202 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11311830 ecr 364335], length 22
- 19:57:42.394372 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [.], ack 24, win 227, options [nop,nop,TS val 364370 ecr 11311830], length 0
- 19:57:42.396929 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [.], seq 42:1398, ack 24, win 227, options [nop,nop,TS val 364370 ecr 11311830], length 1356
- 19:57:42.397013 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [P.], seq 1398:1690, ack 24, win 227, options [nop,nop,TS val 364370 ecr 11311830], length 292
- 19:57:42.400141 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [F.], seq 1690, ack 24, win 227, options [nop,nop,TS val 364371 ecr 11311830], length 0
- 19:57:42.724553 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [R], seq 1137486363, win 0, length 0
- 19:57:42.773922 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [R], seq 1137486363, win 0, length 0
- 19:57:42.804070 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [R], seq 1137486363, win 0, length 0
- 19:58:17.294773 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8017, seq 0, length 76
- 19:58:17.294841 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8017, seq 0, length 76
- 19:58:18.294820 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8017, seq 2, length 76
- 19:58:18.294880 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8017, seq 2, length 76
- 19:58:19.294859 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8017, seq 4, length 76
- 19:58:19.294920 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8017, seq 4, length 76
- 19:58:42.505106 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [S], seq 2580940499, win 14600, options [mss 1368,sackOK,TS val 11326856 ecr 0,nop,wscale 7], length 0
- 19:58:42.505167 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [S.], seq 3317188142, ack 2580940500, win 28960, options [mss 1460,sackOK,TS val 379397 ecr 11326856,nop,wscale 7], length 0
- 19:58:42.665195 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11326896 ecr 379397], length 0
- 19:58:42.690247 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 379444 ecr 11326896], length 41
- 19:58:42.865198 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11326946 ecr 379444], length 0
- 19:58:42.895195 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11326946 ecr 379444], length 22
- 19:58:42.895329 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [.], ack 23, win 227, options [nop,nop,TS val 379495 ecr 11326946], length 0
- 19:58:42.896760 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [.], seq 42:1398, ack 23, win 227, options [nop,nop,TS val 379495 ecr 11326946], length 1356
- 19:58:42.896797 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [P.], seq 1398:1690, ack 23, win 227, options [nop,nop,TS val 379495 ecr 11326946], length 292
- 19:58:42.915196 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [F.], seq 23, ack 42, win 115, options [nop,nop,TS val 11326946 ecr 379444], length 0
- 19:58:42.916830 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [F.], seq 1690, ack 24, win 227, options [nop,nop,TS val 379500 ecr 11326946], length 0
- 19:58:42.993444 IP 10.88.73.11.58663 > 10.88.73.1.ssh: Flags [.], seq 1231858076:1231859432, ack 2044259488, win 275, options [nop,nop,TS val 379520 ecr 11204895], length 1356
- 19:58:43.265305 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [R], seq 2580940522, win 0, length 0
- 19:58:43.285113 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [R], seq 2580940523, win 0, length 0
- 19:58:43.295052 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [R], seq 2580940522, win 0, length 0
- 19:59:17.216196 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8161, seq 0, length 76
- 19:59:17.216284 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8161, seq 0, length 76
- 19:59:18.216281 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8161, seq 2, length 76
- 19:59:18.216381 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8161, seq 2, length 76
- 19:59:19.216124 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8161, seq 4, length 76
- 19:59:19.216199 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8161, seq 4, length 76
- 19:59:43.606519 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [S], seq 1167981626, win 14600, options [mss 1368,sackOK,TS val 11342131 ecr 0,nop,wscale 7], length 0
- 19:59:43.606581 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [S.], seq 1320344358, ack 1167981627, win 28960, options [mss 1460,sackOK,TS val 394673 ecr 11342131,nop,wscale 7], length 0
- 19:59:43.716787 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11342159 ecr 394673], length 0
- 19:59:43.746118 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 394708 ecr 11342159], length 41
- 19:59:43.856766 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11342197 ecr 394708], length 0
- 19:59:43.856810 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11342197 ecr 394708], length 22
- 19:59:43.856850 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [.], ack 23, win 227, options [nop,nop,TS val 394735 ecr 11342197], length 0
- 19:59:43.858656 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [.], seq 42:1398, ack 23, win 227, options [nop,nop,TS val 394736 ecr 11342197], length 1356
- ^C3428 packets captured
- 3440 packets received by filter
- 0 packets dropped by kernel
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement