Advertisement
Guest User

tcpdump client

a guest
Dec 2nd, 2014
135
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.34 KB | None | 0 0
  1. > sudo tcpdump -i tun0 | grep -v zabbix | grep -v '10.88.73.15'
  2. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  3. listening on tun0, link-type RAW (Raw IP), capture size 65535 bytes
  4.  
  5. 19:57:17.193492 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [S], seq 1677939975, win 14600, options [mss 1368,sackOK,TS val 11305528 ecr 0,nop,wscale 7], length 0
  6. 19:57:17.193568 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [S.], seq 2896252059, ack 1677939976, win 28960, options [mss 1460,sackOK,TS val 358070 ecr 11305528,nop,wscale 7], length 0
  7. 19:57:17.303503 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11305556 ecr 358070], length 0
  8. 19:57:17.333095 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 358104 ecr 11305556], length 41
  9. 19:57:17.433669 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 7865, seq 0, length 76
  10. 19:57:17.433730 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 7865, seq 0, length 76
  11. 19:57:17.433791 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11305591 ecr 358104], length 0
  12. 19:57:17.443601 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1:40, ack 42, win 115, options [nop,nop,TS val 11305591 ecr 358104], length 39
  13. 19:57:17.443702 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 40, win 227, options [nop,nop,TS val 358132 ecr 11305591], length 0
  14. 19:57:17.445804 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], seq 42:1398, ack 40, win 227, options [nop,nop,TS val 358133 ecr 11305591], length 1356
  15. 19:57:17.445857 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 1398:1690, ack 40, win 227, options [nop,nop,TS val 358133 ecr 11305591], length 292
  16. 19:57:17.624192 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 40:1312, ack 42, win 115, options [nop,nop,TS val 11305626 ecr 358132], length 1272
  17. 19:57:17.661431 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1312, win 249, options [nop,nop,TS val 358187 ecr 11305626], length 0
  18. 19:57:17.753597 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 1398, win 137, options [nop,nop,TS val 11305666 ecr 358133], length 0
  19. 19:57:17.813589 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 1690, win 158, options [nop,nop,TS val 11305671 ecr 358133], length 0
  20. 19:57:17.833923 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1312:1392, ack 1690, win 158, options [nop,nop,TS val 11305679 ecr 358187], length 80
  21. 19:57:17.834070 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1392, win 249, options [nop,nop,TS val 358230 ecr 11305679], length 0
  22. 19:57:17.843135 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 1690:2002, ack 1392, win 249, options [nop,nop,TS val 358232 ecr 11305679], length 312
  23. 19:57:17.993593 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1392:1408, ack 2002, win 180, options [nop,nop,TS val 11305729 ecr 358232], length 16
  24. 19:57:18.033450 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1408, win 249, options [nop,nop,TS val 358280 ecr 11305729], length 0
  25.  
  26. 19:57:18.133760 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1408:1456, ack 2002, win 180, options [nop,nop,TS val 11305763 ecr 358280], length 48
  27. 19:57:18.133844 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1456, win 249, options [nop,nop,TS val 358305 ecr 11305763], length 0
  28. 19:57:18.134392 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2002:2050, ack 1456, win 249, options [nop,nop,TS val 358305 ecr 11305763], length 48
  29. 19:57:18.263481 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1456:1520, ack 2050, win 180, options [nop,nop,TS val 11305795 ecr 358305], length 64
  30. 19:57:18.301431 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1520, win 249, options [nop,nop,TS val 358347 ecr 11305795], length 0
  31. 19:57:18.394432 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2050:2114, ack 1520, win 249, options [nop,nop,TS val 358370 ecr 11305795], length 64
  32. 19:57:18.443688 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 7865, seq 3, length 76
  33. 19:57:18.443774 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 7865, seq 3, length 76
  34. 19:57:18.533603 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 2114, win 180, options [nop,nop,TS val 11305865 ecr 358370], length 0
  35. 19:57:19.453533 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 7865, seq 6, length 76
  36. 19:57:19.453591 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 7865, seq 6, length 76
  37. 19:57:30.363840 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1520:1664, ack 2114, win 180, options [nop,nop,TS val 11308821 ecr 358370], length 144
  38. 19:57:30.363920 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1664, win 269, options [nop,nop,TS val 361362 ecr 11308821], length 0
  39. 19:57:30.395085 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2114:2146, ack 1664, win 269, options [nop,nop,TS val 361370 ecr 11308821], length 32
  40. 19:57:30.524247 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 2146, win 180, options [nop,nop,TS val 11308860 ecr 361370], length 0
  41. 19:57:30.563934 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1664:1792, ack 2146, win 180, options [nop,nop,TS val 11308861 ecr 361370], length 128
  42. 19:57:30.601440 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1792, win 289, options [nop,nop,TS val 361422 ecr 11308861], length 0
  43. 19:57:31.778331 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2146:2194, ack 1792, win 289, options [nop,nop,TS val 361716 ecr 11308861], length 48
  44. 19:57:31.883832 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1792:1920, ack 2194, win 180, options [nop,nop,TS val 11309201 ecr 361716], length 128
  45. 19:57:31.883899 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1920, win 309, options [nop,nop,TS val 361742 ecr 11309201], length 0
  46. 19:57:31.885824 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2194:2274, ack 1920, win 309, options [nop,nop,TS val 361743 ecr 11309201], length 80
  47. 19:57:31.896586 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2274:2322, ack 1920, win 309, options [nop,nop,TS val 361745 ecr 11309201], length 48
  48. 19:57:32.033993 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [.], ack 2322, win 180, options [nop,nop,TS val 11309241 ecr 361743], length 0
  49. 19:57:32.043683 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 1920:1984, ack 2322, win 180, options [nop,nop,TS val 11309241 ecr 361743], length 64
  50. 19:57:32.044056 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [P.], seq 2322:2370, ack 1984, win 309, options [nop,nop,TS val 361782 ecr 11309241], length 48
  51. 19:57:32.183765 IP 10.88.73.1.34065 > 10.88.73.11.ssh: Flags [P.], seq 3340:3872, ack 2370, win 180, options [nop,nop,TS val 11309276 ecr 361782], length 532
  52. 19:57:32.183816 IP 10.88.73.11.ssh > 10.88.73.1.34065: Flags [.], ack 1984, win 329, options [nop,nop,TS val 361817 ecr 11309241,nop,nop,sack 1 {3340:3872}], length 0
  53. 19:57:41.973925 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [S], seq 1137486339, win 14600, options [mss 1368,sackOK,TS val 11311723 ecr 0,nop,wscale 7], length 0
  54. 19:57:41.973987 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [S.], seq 330373944, ack 1137486340, win 28960, options [mss 1460,sackOK,TS val 364265 ecr 11311723,nop,wscale 7], length 0
  55. 19:57:42.114183 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11311758 ecr 364265], length 0
  56. 19:57:42.136336 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 364305 ecr 11311758], length 41
  57. 19:57:42.254073 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11311790 ecr 364305], length 0
  58. 19:57:42.254162 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [F.], seq 23, ack 42, win 115, options [nop,nop,TS val 11311790 ecr 364305], length 0
  59. 19:57:42.254200 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [.], ack 1, win 227, options [nop,nop,TS val 364335 ecr 11311790,nop,nop,sack 1 {23:24}], length 0
  60. 19:57:42.394202 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11311830 ecr 364335], length 22
  61. 19:57:42.394372 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [.], ack 24, win 227, options [nop,nop,TS val 364370 ecr 11311830], length 0
  62. 19:57:42.396929 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [.], seq 42:1398, ack 24, win 227, options [nop,nop,TS val 364370 ecr 11311830], length 1356
  63. 19:57:42.397013 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [P.], seq 1398:1690, ack 24, win 227, options [nop,nop,TS val 364370 ecr 11311830], length 292
  64. 19:57:42.400141 IP 10.88.73.11.ssh > 10.88.73.1.34278: Flags [F.], seq 1690, ack 24, win 227, options [nop,nop,TS val 364371 ecr 11311830], length 0
  65. 19:57:42.724553 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [R], seq 1137486363, win 0, length 0
  66. 19:57:42.773922 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [R], seq 1137486363, win 0, length 0
  67. 19:57:42.804070 IP 10.88.73.1.34278 > 10.88.73.11.ssh: Flags [R], seq 1137486363, win 0, length 0
  68. 19:58:17.294773 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8017, seq 0, length 76
  69. 19:58:17.294841 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8017, seq 0, length 76
  70. 19:58:18.294820 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8017, seq 2, length 76
  71. 19:58:18.294880 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8017, seq 2, length 76
  72. 19:58:19.294859 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8017, seq 4, length 76
  73. 19:58:19.294920 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8017, seq 4, length 76
  74. 19:58:42.505106 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [S], seq 2580940499, win 14600, options [mss 1368,sackOK,TS val 11326856 ecr 0,nop,wscale 7], length 0
  75. 19:58:42.505167 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [S.], seq 3317188142, ack 2580940500, win 28960, options [mss 1460,sackOK,TS val 379397 ecr 11326856,nop,wscale 7], length 0
  76. 19:58:42.665195 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11326896 ecr 379397], length 0
  77. 19:58:42.690247 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 379444 ecr 11326896], length 41
  78. 19:58:42.865198 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11326946 ecr 379444], length 0
  79. 19:58:42.895195 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11326946 ecr 379444], length 22
  80. 19:58:42.895329 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [.], ack 23, win 227, options [nop,nop,TS val 379495 ecr 11326946], length 0
  81. 19:58:42.896760 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [.], seq 42:1398, ack 23, win 227, options [nop,nop,TS val 379495 ecr 11326946], length 1356
  82. 19:58:42.896797 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [P.], seq 1398:1690, ack 23, win 227, options [nop,nop,TS val 379495 ecr 11326946], length 292
  83. 19:58:42.915196 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [F.], seq 23, ack 42, win 115, options [nop,nop,TS val 11326946 ecr 379444], length 0
  84. 19:58:42.916830 IP 10.88.73.11.ssh > 10.88.73.1.34819: Flags [F.], seq 1690, ack 24, win 227, options [nop,nop,TS val 379500 ecr 11326946], length 0
  85. 19:58:42.993444 IP 10.88.73.11.58663 > 10.88.73.1.ssh: Flags [.], seq 1231858076:1231859432, ack 2044259488, win 275, options [nop,nop,TS val 379520 ecr 11204895], length 1356
  86. 19:58:43.265305 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [R], seq 2580940522, win 0, length 0
  87. 19:58:43.285113 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [R], seq 2580940523, win 0, length 0
  88. 19:58:43.295052 IP 10.88.73.1.34819 > 10.88.73.11.ssh: Flags [R], seq 2580940522, win 0, length 0
  89. 19:59:17.216196 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8161, seq 0, length 76
  90. 19:59:17.216284 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8161, seq 0, length 76
  91. 19:59:18.216281 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8161, seq 2, length 76
  92. 19:59:18.216381 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8161, seq 2, length 76
  93. 19:59:19.216124 IP 10.88.73.1 > 10.88.73.11: ICMP echo request, id 8161, seq 4, length 76
  94. 19:59:19.216199 IP 10.88.73.11 > 10.88.73.1: ICMP echo reply, id 8161, seq 4, length 76
  95. 19:59:43.606519 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [S], seq 1167981626, win 14600, options [mss 1368,sackOK,TS val 11342131 ecr 0,nop,wscale 7], length 0
  96. 19:59:43.606581 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [S.], seq 1320344358, ack 1167981627, win 28960, options [mss 1460,sackOK,TS val 394673 ecr 11342131,nop,wscale 7], length 0
  97. 19:59:43.716787 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [.], ack 1, win 115, options [nop,nop,TS val 11342159 ecr 394673], length 0
  98. 19:59:43.746118 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [P.], seq 1:42, ack 1, win 227, options [nop,nop,TS val 394708 ecr 11342159], length 41
  99. 19:59:43.856766 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [.], ack 42, win 115, options [nop,nop,TS val 11342197 ecr 394708], length 0
  100. 19:59:43.856810 IP 10.88.73.1.35351 > 10.88.73.11.ssh: Flags [P.], seq 1:23, ack 42, win 115, options [nop,nop,TS val 11342197 ecr 394708], length 22
  101. 19:59:43.856850 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [.], ack 23, win 227, options [nop,nop,TS val 394735 ecr 11342197], length 0
  102. 19:59:43.858656 IP 10.88.73.11.ssh > 10.88.73.1.35351: Flags [.], seq 42:1398, ack 23, win 227, options [nop,nop,TS val 394736 ecr 11342197], length 1356
  103. ^C3428 packets captured
  104. 3440 packets received by filter
  105. 0 packets dropped by kernel
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement