Advertisement
Guest User

packet capture

a guest
Apr 25th, 2024
13
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 45.95 KB | None | 0 0
  1. 15:48:35.078645 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [S], seq 4054332456, win 65535, options [mss 1396,nop,wscale 6,nop,nop,TS val 825243849 ecr 0,sackOK,eol], length 0
  2. 15:48:35.079256 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [S.], seq 1370870157, ack 4054332457, win 23880, options [mss 1460,nop,nop,sackOK,nop,wscale 9], length 0
  3. 15:48:35.085313 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 1, win 4096, length 0
  4. 15:48:35.086042 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 1:516, ack 1, win 4096, length 515: HTTP: GET / HTTP/1.1
  5. 15:48:35.087110 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], ack 516, win 49, length 0
  6. 15:48:35.095057 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 1:1397, ack 516, win 49, length 1396: HTTP: HTTP/1.1 200 OK
  7. 15:48:35.095142 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 1397:2793, ack 516, win 49, length 1396: HTTP
  8. 15:48:35.095207 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 2793:4189, ack 516, win 49, length 1396: HTTP
  9. 15:48:35.095285 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 4189:5585, ack 516, win 49, length 1396: HTTP
  10. 15:48:35.095373 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 5585:6981, ack 516, win 49, length 1396: HTTP
  11. 15:48:35.095442 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 6981:7568, ack 516, win 49, length 587: HTTP
  12. 15:48:35.101808 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 7568, win 4096, length 0
  13. 15:48:35.236299 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 516:1017, ack 7568, win 4096, length 501: HTTP: GET /web/jquery/alerts/jquery.alerts.js?v=1714060114 HTTP/1.1
  14. 15:48:35.242313 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 7568:8964, ack 1017, win 51, length 1396: HTTP: HTTP/1.1 200 OK
  15. 15:48:35.242404 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 8964:10360, ack 1017, win 51, length 1396: HTTP
  16. 15:48:35.242461 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 10360:10868, ack 1017, win 51, length 508: HTTP
  17. 15:48:35.249437 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 10868, win 4096, length 0
  18. 15:48:35.279781 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [S], seq 3634512711, win 65535, options [mss 1396,nop,wscale 6,nop,nop,TS val 3586816905 ecr 0,sackOK,eol], length 0
  19. 15:48:35.280575 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [S.], seq 1725497667, ack 3634512712, win 23880, options [mss 1460,nop,nop,sackOK,nop,wscale 9], length 0
  20. 15:48:35.284042 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [S], seq 3879711378, win 65535, options [mss 1396,nop,wscale 6,nop,nop,TS val 4285884359 ecr 0,sackOK,eol], length 0
  21. 15:48:35.284462 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [S.], seq 2719344987, ack 3879711379, win 23880, options [mss 1460,nop,nop,sackOK,nop,wscale 9], length 0
  22. 15:48:35.285944 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 1, win 4096, length 0
  23. 15:48:35.286228 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [P.], seq 1:515, ack 1, win 4096, length 514: HTTP: GET /web/jquery/jqueryFileTree/js/jqueryFileTree.js?id=1714060114 HTTP/1.1
  24. 15:48:35.286897 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], ack 515, win 49, length 0
  25. 15:48:35.290827 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [.], ack 1, win 4096, length 0
  26. 15:48:35.290827 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [P.], seq 1:532, ack 1, win 4096, length 531: HTTP: GET /web/jquery/jqueryFileTree/css/jqueryFileTree.css?id=1714060114 HTTP/1.1
  27. 15:48:35.291508 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], ack 532, win 49, length 0
  28. 15:48:35.291959 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 1:1397, ack 515, win 49, length 1396: HTTP: HTTP/1.1 200 OK
  29. 15:48:35.292023 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 1397:2793, ack 515, win 49, length 1396: HTTP
  30. 15:48:35.292109 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 2793:4189, ack 515, win 49, length 1396: HTTP
  31. 15:48:35.292192 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [P.], seq 4189:5430, ack 515, win 49, length 1241: HTTP
  32. 15:48:35.295846 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [P.], seq 1:1388, ack 532, win 49, length 1387: HTTP: HTTP/1.1 200 OK
  33. 15:48:35.299441 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 5430, win 4096, length 0
  34. 15:48:35.300784 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [.], ack 1388, win 4074, length 0
  35. 15:48:35.328748 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 1017:1517, ack 10868, win 4096, length 500: HTTP: GET /web/css/dialog.css?v=1714060114 HTTP/1.1
  36. 15:48:35.331330 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [P.], seq 515:1014, ack 5430, win 4096, length 499: HTTP: GET /web/css/style.css?v=1714060114 HTTP/1.1
  37. 15:48:35.334434 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 10868:12264, ack 1517, win 53, length 1396: HTTP: HTTP/1.1 200 OK
  38. 15:48:35.334503 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 12264:12600, ack 1517, win 53, length 336: HTTP
  39. 15:48:35.339595 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 5430:6826, ack 1014, win 51, length 1396: HTTP: HTTP/1.1 200 OK
  40. 15:48:35.339684 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 6826:8222, ack 1014, win 51, length 1396: HTTP
  41. 15:48:35.339746 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 8222:9618, ack 1014, win 51, length 1396: HTTP
  42. 15:48:35.339825 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 9618:11014, ack 1014, win 51, length 1396: HTTP
  43. 15:48:35.339899 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 11014:12410, ack 1014, win 51, length 1396: HTTP
  44. 15:48:35.339971 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 12410:13806, ack 1014, win 51, length 1396: HTTP
  45. 15:48:35.340138 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 13806:15202, ack 1014, win 51, length 1396: HTTP
  46. 15:48:35.340288 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 15202:16598, ack 1014, win 51, length 1396: HTTP
  47. 15:48:35.340341 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [P.], seq 16598:17411, ack 1014, win 51, length 813: HTTP
  48. 15:48:35.340396 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 12600, win 4068, length 0
  49. 15:48:35.344242 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 1517:2023, ack 12600, win 4096, length 506: HTTP: GET /web/css/access_icon.css?id=1714060114 HTTP/1.1
  50. 15:48:35.347404 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 17411, win 4096, length 0
  51. 15:48:35.350405 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [P.], seq 1014:1517, ack 17411, win 4096, length 503: HTTP: GET /web/css/migration.css?v=1714060114 HTTP/1.1
  52. 15:48:35.350811 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 12600:13996, ack 2023, win 56, length 1396: HTTP: HTTP/1.1 200 OK
  53. 15:48:35.350952 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 13996:15392, ack 2023, win 56, length 1396: HTTP
  54. 15:48:35.351038 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 15392:16788, ack 2023, win 56, length 1396: HTTP
  55. 15:48:35.351115 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 16788:17688, ack 2023, win 56, length 900: HTTP
  56. 15:48:35.355345 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 17411:18807, ack 1517, win 53, length 1396: HTTP: HTTP/1.1 200 OK
  57. 15:48:35.355434 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [P.], seq 18807:19849, ack 1517, win 53, length 1042: HTTP
  58. 15:48:35.359110 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 17688, win 4096, length 0
  59. 15:48:35.362617 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [P.], seq 1517:2005, ack 19849, win 4096, length 488: HTTP: GET /web/function/diag.js?id=1714060114 HTTP/1.1
  60. 15:48:35.362617 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 2023:2513, ack 17688, win 4096, length 490: HTTP: GET /web/function/define.js?id=1714060114 HTTP/1.1
  61. 15:48:35.362618 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 19849, win 4057, length 0
  62. 15:48:35.364796 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [P.], seq 532:1024, ack 1388, win 4096, length 492: HTTP: GET /web/function/function.js?id=1714060114 HTTP/1.1
  63. 15:48:35.367438 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [P.], seq 19849:20551, ack 2005, win 56, length 702: HTTP: HTTP/1.1 200 OK
  64. 15:48:35.368959 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 17688:19084, ack 2513, win 58, length 1396: HTTP: HTTP/1.1 200 OK
  65. 15:48:35.369024 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 19084:19173, ack 2513, win 58, length 89: HTTP
  66. 15:48:35.373735 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 20551, win 4085, length 0
  67. 15:48:35.374534 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 1388:2784, ack 1024, win 51, length 1396: HTTP: HTTP/1.1 200 OK
  68. 15:48:35.374588 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 2784:4180, ack 1024, win 51, length 1396: HTTP
  69. 15:48:35.374677 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 4180:5576, ack 1024, win 51, length 1396: HTTP
  70. 15:48:35.374751 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 5576:6972, ack 1024, win 51, length 1396: HTTP
  71. 15:48:35.374836 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 6972:8368, ack 1024, win 51, length 1396: HTTP
  72. 15:48:35.374908 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 8368:9764, ack 1024, win 51, length 1396: HTTP
  73. 15:48:35.375152 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 9764:11160, ack 1024, win 51, length 1396: HTTP
  74. 15:48:35.375234 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 11160:12556, ack 1024, win 51, length 1396: HTTP
  75. 15:48:35.375251 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 2513:3006, ack 19173, win 4096, length 493: HTTP: GET /web/function/raid_diag.js?id=1714060114 HTTP/1.1
  76. 15:48:35.375251 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 19173, win 4072, length 0
  77. 15:48:35.375340 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 12556:13952, ack 1024, win 51, length 1396: HTTP
  78. 15:48:35.375523 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 13952:15348, ack 1024, win 51, length 1396: HTTP
  79. 15:48:35.379379 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [P.], seq 2005:2497, ack 20551, win 4096, length 492: HTTP: GET /web/function/homeDiag.js?id=1714060114 HTTP/1.1
  80. 15:48:35.381471 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [.], ack 15348, win 4096, length 0
  81. 15:48:35.381907 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [P.], seq 15348:16297, ack 1024, win 51, length 949: HTTP
  82. 15:48:35.382111 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 19173:20569, ack 3006, win 60, length 1396: HTTP: HTTP/1.1 200 OK
  83. 15:48:35.382172 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 20569:21965, ack 3006, win 60, length 1396: HTTP
  84. 15:48:35.382335 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 21965:23361, ack 3006, win 60, length 1396: HTTP
  85. 15:48:35.382402 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 23361:24757, ack 3006, win 60, length 1396: HTTP
  86. 15:48:35.382518 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 24757:26153, ack 3006, win 60, length 1396: HTTP
  87. 15:48:35.382589 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 26153:27549, ack 3006, win 60, length 1396: HTTP
  88. 15:48:35.382723 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 27549:28718, ack 3006, win 60, length 1169: HTTP
  89. 15:48:35.385069 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 20551:21947, ack 2497, win 58, length 1396: HTTP: HTTP/1.1 200 OK
  90. 15:48:35.385153 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 21947:23343, ack 2497, win 58, length 1396: HTTP
  91. 15:48:35.385206 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 23343:24739, ack 2497, win 58, length 1396: HTTP
  92. 15:48:35.385269 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 24739:26135, ack 2497, win 58, length 1396: HTTP
  93. 15:48:35.385321 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [P.], seq 26135:26650, ack 2497, win 58, length 515: HTTP
  94. 15:48:35.390193 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 28718, win 4096, length 0
  95. 15:48:35.390192 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [.], ack 16297, win 4081, length 0
  96. 15:48:35.390193 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [P.], seq 1024:1512, ack 16297, win 4096, length 488: HTTP: GET /web/function/home.js?id=1714060114 HTTP/1.1
  97. 15:48:35.390193 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 3006:3498, ack 28718, win 4096, length 492: HTTP: GET /web/function/sub_menu.js?id=1714060114 HTTP/1.1
  98. 15:48:35.395125 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 28718:30114, ack 3498, win 62, length 1396: HTTP: HTTP/1.1 200 OK
  99. 15:48:35.395208 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 30114:30314, ack 3498, win 62, length 200: HTTP
  100. 15:48:35.395418 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 16297:17693, ack 1512, win 53, length 1396: HTTP: HTTP/1.1 200 OK
  101. 15:48:35.395463 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 17693:19089, ack 1512, win 53, length 1396: HTTP
  102. 15:48:35.395648 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [P.], seq 19089:19624, ack 1512, win 53, length 535: HTTP
  103. 15:48:35.395998 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 26650, win 4096, length 0
  104. 15:48:35.395998 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [P.], seq 2497:2989, ack 26650, win 4096, length 492: HTTP: GET /web/function/home_usb.js?id=1714060114 HTTP/1.1
  105. 15:48:35.400821 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 26650:28046, ack 2989, win 60, length 1396: HTTP: HTTP/1.1 200 OK
  106. 15:48:35.400932 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 28046:29442, ack 2989, win 60, length 1396: HTTP
  107. 15:48:35.401006 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [P.], seq 29442:30257, ack 2989, win 60, length 815: HTTP
  108. 15:48:35.401057 IP 192.168.0.201.57250 > 10.0.1.232.80: Flags [S], seq 3345749775, win 65535, options [mss 1396,nop,wscale 6,nop,nop,TS val 1961059137 ecr 0,sackOK,eol], length 0
  109. 15:48:35.401331 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [S.], seq 1966433217, ack 3345749776, win 23880, options [mss 1460,nop,nop,sackOK,nop,wscale 9], length 0
  110. 15:48:35.403244 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 30314, win 4071, length 0
  111. 15:48:35.403353 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [.], ack 19624, win 4096, length 0
  112. 15:48:35.403413 IP 192.168.0.201.57251 > 10.0.1.232.80: Flags [S], seq 547097797, win 65535, options [mss 1396,nop,wscale 6,nop,nop,TS val 3235438830 ecr 0,sackOK,eol], length 0
  113. 15:48:35.403658 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [S.], seq 1279478475, ack 547097798, win 23880, options [mss 1460,nop,nop,sackOK,nop,wscale 9], length 0
  114. 15:48:35.409791 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 3498:3984, ack 30314, win 4096, length 486: HTTP: GET /web/function/fw.js?id=1714060114 HTTP/1.1
  115. 15:48:35.409791 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [P.], seq 1512:2001, ack 19624, win 4096, length 489: HTTP: GET /web/function/input.js?id=1714060114 HTTP/1.1
  116. 15:48:35.409848 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [S], seq 3477593581, win 65535, options [mss 1396,nop,wscale 6,nop,nop,TS val 1367024154 ecr 0,sackOK,eol], length 0
  117. 15:48:35.410330 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [S.], seq 1786265470, ack 3477593582, win 23880, options [mss 1460,nop,nop,sackOK,nop,wscale 9], length 0
  118. 15:48:35.411077 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 30257, win 4096, length 0
  119. 15:48:35.411298 IP 192.168.0.201.57250 > 10.0.1.232.80: Flags [.], ack 1, win 4096, length 0
  120. 15:48:35.411908 IP 192.168.0.201.57250 > 10.0.1.232.80: Flags [P.], seq 1:489, ack 1, win 4096, length 488: HTTP: GET /web/function/init.js?id=1714060114 HTTP/1.1
  121. 15:48:35.411933 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [P.], seq 2989:3486, ack 30257, win 4096, length 497: HTTP: GET /web/function/device_active.js?id=1714060114 HTTP/1.1
  122. 15:48:35.412463 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], ack 489, win 49, length 0
  123. 15:48:35.413528 IP 192.168.0.201.57251 > 10.0.1.232.80: Flags [.], ack 1, win 4096, length 0
  124. 15:48:35.413529 IP 192.168.0.201.57251 > 10.0.1.232.80: Flags [P.], seq 1:491, ack 1, win 4096, length 490: HTTP: GET /web/function/button.js?id=1714060114 HTTP/1.1
  125. 15:48:35.413887 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [.], ack 491, win 49, length 0
  126. 15:48:35.415574 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 19624:21020, ack 2001, win 56, length 1396: HTTP: HTTP/1.1 200 OK
  127. 15:48:35.415636 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [.], ack 1, win 4096, length 0
  128. 15:48:35.415636 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [P.], seq 1:496, ack 1, win 4096, length 495: HTTP: GET /web/function/raid_define.js?id=1714060114 HTTP/1.1
  129. 15:48:35.415678 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [P.], seq 21020:21302, ack 2001, win 56, length 282: HTTP
  130. 15:48:35.416171 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [.], ack 496, win 49, length 0
  131. 15:48:35.420049 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [P.], seq 1:1066, ack 491, win 49, length 1065: HTTP: HTTP/1.1 200 OK
  132. 15:48:35.420816 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [.], seq 1:1397, ack 496, win 49, length 1396: HTTP: HTTP/1.1 200 OK
  133. 15:48:35.420965 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [P.], seq 1397:2026, ack 496, win 49, length 629: HTTP
  134. 15:48:35.421517 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 30314:31710, ack 3984, win 64, length 1396: HTTP: HTTP/1.1 200 OK
  135. 15:48:35.421669 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 31710:33106, ack 3984, win 64, length 1396: HTTP
  136. 15:48:35.421769 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 33106:34502, ack 3984, win 64, length 1396: HTTP
  137. 15:48:35.421845 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 30257:31653, ack 3486, win 62, length 1396: HTTP: HTTP/1.1 200 OK
  138. 15:48:35.421852 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 34502:35414, ack 3984, win 64, length 912: HTTP
  139. 15:48:35.421922 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 31653:33049, ack 3486, win 62, length 1396: HTTP
  140. 15:48:35.421991 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 33049:34445, ack 3486, win 62, length 1396: HTTP
  141. 15:48:35.422091 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 34445:35841, ack 3486, win 62, length 1396: HTTP
  142. 15:48:35.422107 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], seq 1:1397, ack 489, win 49, length 1396: HTTP: HTTP/1.1 200 OK
  143. 15:48:35.422154 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], seq 1397:2793, ack 489, win 49, length 1396: HTTP
  144. 15:48:35.422167 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [P.], seq 35841:36603, ack 3486, win 62, length 762: HTTP
  145. 15:48:35.422259 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], seq 2793:4189, ack 489, win 49, length 1396: HTTP
  146. 15:48:35.422334 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [P.], seq 4189:4879, ack 489, win 49, length 690: HTTP
  147. 15:48:35.433302 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [P.], seq 21020:21302, ack 2001, win 56, length 282: HTTP
  148. 15:48:35.435646 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [P.], seq 1397:2026, ack 496, win 49, length 629: HTTP
  149. 15:48:35.439616 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 34502:35414, ack 3984, win 64, length 912: HTTP
  150. 15:48:35.440331 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [P.], seq 35841:36603, ack 3486, win 62, length 762: HTTP
  151. 15:48:35.445651 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [P.], seq 4189:4879, ack 489, win 49, length 690: HTTP
  152. 15:48:35.569781 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [P.], seq 1:496, ack 1, win 4096, length 495: HTTP: GET /web/function/raid_define.js?id=1714060114 HTTP/1.1
  153. 15:48:35.569783 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 3498:3984, ack 30314, win 4096, length 486: HTTP: GET /web/function/fw.js?id=1714060114 HTTP/1.1
  154. 15:48:35.569784 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [P.], seq 2989:3486, ack 30257, win 4096, length 497: HTTP: GET /web/function/device_active.js?id=1714060114 HTTP/1.1
  155. 15:48:35.569784 IP 192.168.0.201.57251 > 10.0.1.232.80: Flags [P.], seq 1:491, ack 1, win 4096, length 490: HTTP: GET /web/function/button.js?id=1714060114 HTTP/1.1
  156. 15:48:35.569784 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [P.], seq 1512:2001, ack 19624, win 4096, length 489: HTTP: GET /web/function/input.js?id=1714060114 HTTP/1.1
  157. 15:48:35.570371 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [.], ack 496, win 49, options [nop,nop,sack 1 {1:496}], length 0
  158. 15:48:35.570391 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], ack 3984, win 64, options [nop,nop,sack 1 {3498:3984}], length 0
  159. 15:48:35.570455 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], ack 3486, win 62, options [nop,nop,sack 1 {2989:3486}], length 0
  160. 15:48:35.570460 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], ack 2001, win 56, options [nop,nop,sack 1 {1512:2001}], length 0
  161. 15:48:35.570477 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [.], ack 491, win 49, options [nop,nop,sack 1 {1:491}], length 0
  162. 15:48:35.572921 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 35414, win 4096, length 0
  163. 15:48:35.572921 IP 192.168.0.201.57251 > 10.0.1.232.80: Flags [.], ack 1066, win 4079, length 0
  164. 15:48:35.572935 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [.], ack 2026, win 4064, length 0
  165. 15:48:35.572941 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 36603, win 4096, length 0
  166. 15:48:35.572959 IP 192.168.0.201.57250 > 10.0.1.232.80: Flags [.], ack 4879, win 4096, length 0
  167. 15:48:35.572964 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [.], ack 21302, win 4069, options [nop,nop,sack 1 {21020:21302}], length 0
  168. 15:48:35.572985 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [P.], seq 496:996, ack 2026, win 4096, length 500: HTTP: GET /web/function/web_idle_timeout.js?id=1714060114 HTTP/1.1
  169. 15:48:35.572985 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [.], ack 2026, win 4096, options [nop,nop,sack 1 {1397:2026}], length 0
  170. 15:48:35.573008 IP 192.168.0.201.57250 > 10.0.1.232.80: Flags [P.], seq 489:978, ack 4879, win 4096, length 489: HTTP: GET /web/function/quota.js?id=1714060114 HTTP/1.1
  171. 15:48:35.573008 IP 192.168.0.201.57251 > 10.0.1.232.80: Flags [P.], seq 491:979, ack 1066, win 4096, length 488: HTTP: GET /web/function/eula.js?id=1714060114 HTTP/1.1
  172. 15:48:35.573011 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [P.], seq 3486:3975, ack 36603, win 4096, length 489: HTTP: GET /web/function/users.js?id=1714060114 HTTP/1.1
  173. 15:48:35.573012 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [P.], seq 2001:2489, ack 21302, win 4096, length 488: HTTP: GET /web/restSDK/cloud.js?id=1714060114 HTTP/1.1
  174. 15:48:35.573056 IP 192.168.0.201.57250 > 10.0.1.232.80: Flags [.], ack 4879, win 4096, options [nop,nop,sack 1 {4189:4879}], length 0
  175. 15:48:35.573059 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 36603, win 4096, options [nop,nop,sack 1 {35841:36603}], length 0
  176. 15:48:35.573459 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [.], ack 996, win 51, length 0
  177. 15:48:35.573466 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], ack 3975, win 64, length 0
  178. 15:48:35.573507 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [.], ack 979, win 51, length 0
  179. 15:48:35.573535 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], ack 2489, win 58, length 0
  180. 15:48:35.573566 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], ack 3975, win 64, length 0
  181. 15:48:35.576237 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 3984:4476, ack 35414, win 4096, length 492: HTTP: GET /web/function/language.js?id=1714060114 HTTP/1.1
  182. 15:48:35.576237 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 35414, win 4096, options [nop,nop,sack 1 {34502:35414}], length 0
  183. 15:48:35.576565 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], ack 4476, win 66, length 0
  184. 15:48:35.579592 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [.], seq 2026:3422, ack 996, win 51, length 1396: HTTP: HTTP/1.1 200 OK
  185. 15:48:35.579703 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [P.], seq 3422:4543, ack 996, win 51, length 1121: HTTP
  186. 15:48:35.580460 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 21302:22698, ack 2489, win 58, length 1396: HTTP: HTTP/1.1 200 OK
  187. 15:48:35.580625 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 22698:24094, ack 2489, win 58, length 1396: HTTP
  188. 15:48:35.580757 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 24094:25490, ack 2489, win 58, length 1396: HTTP
  189. 15:48:35.580824 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 25490:26886, ack 2489, win 58, length 1396: HTTP
  190. 15:48:35.580935 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 26886:28282, ack 2489, win 58, length 1396: HTTP
  191. 15:48:35.581132 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 28282:29678, ack 2489, win 58, length 1396: HTTP
  192. 15:48:35.581229 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [P.], seq 29678:30940, ack 2489, win 58, length 1262: HTTP
  193. 15:48:35.582065 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], seq 4879:6275, ack 978, win 51, length 1396: HTTP: HTTP/1.1 200 OK
  194. 15:48:35.582221 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], seq 6275:7671, ack 978, win 51, length 1396: HTTP
  195. 15:48:35.582410 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [P.], seq 7671:8292, ack 978, win 51, length 621: HTTP
  196. 15:48:35.583926 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [.], seq 1066:2462, ack 979, win 51, length 1396: HTTP: HTTP/1.1 200 OK
  197. 15:48:35.583994 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [.], seq 2462:3858, ack 979, win 51, length 1396: HTTP
  198. 15:48:35.584070 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [.], seq 3858:5254, ack 979, win 51, length 1396: HTTP
  199. 15:48:35.584078 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 35414:36586, ack 4476, win 66, length 1172: HTTP: HTTP/1.1 200 OK
  200. 15:48:35.584239 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [.], seq 5254:6650, ack 979, win 51, length 1396: HTTP
  201. 15:48:35.584392 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [P.], seq 6650:6725, ack 979, win 51, length 75: HTTP
  202. 15:48:35.585845 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 36603:37999, ack 3975, win 64, length 1396: HTTP: HTTP/1.1 200 OK
  203. 15:48:35.585969 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 37999:39395, ack 3975, win 64, length 1396: HTTP
  204. 15:48:35.586027 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 39395:40791, ack 3975, win 64, length 1396: HTTP
  205. 15:48:35.586089 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 40791:42187, ack 3975, win 64, length 1396: HTTP
  206. 15:48:35.586171 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 42187:43583, ack 3975, win 64, length 1396: HTTP
  207. 15:48:35.586376 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 43583:44979, ack 3975, win 64, length 1396: HTTP
  208. 15:48:35.586568 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 44979:46375, ack 3975, win 64, length 1396: HTTP
  209. 15:48:35.586660 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 46375:47771, ack 3975, win 64, length 1396: HTTP
  210. 15:48:35.586775 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 47771:49167, ack 3975, win 64, length 1396: HTTP
  211. 15:48:35.586932 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], seq 49167:50563, ack 3975, win 64, length 1396: HTTP
  212. 15:48:35.587014 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [P.], seq 50563:51784, ack 3975, win 64, length 1221: HTTP
  213. 15:48:35.591066 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [.], ack 4543, win 4056, length 0
  214. 15:48:35.591095 IP 192.168.0.201.57250 > 10.0.1.232.80: Flags [P.], seq 978:1465, ack 8292, win 4096, length 487: HTTP: GET /web/function/sms.js?id=1714060114 HTTP/1.1
  215. 15:48:35.591107 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [.], ack 30940, win 4096, length 0
  216. 15:48:35.591107 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [P.], seq 2489:2985, ack 30940, win 4096, length 496: HTTP: GET /web/function/notification.js?id=1714060114 HTTP/1.1
  217. 15:48:35.591142 IP 192.168.0.201.57250 > 10.0.1.232.80: Flags [.], ack 8292, win 4096, length 0
  218. 15:48:35.591223 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [P.], seq 996:1486, ack 4543, win 4096, length 490: HTTP: GET /web/function/system.js?id=1714060114 HTTP/1.1
  219. 15:48:35.593619 IP 192.168.0.201.57251 > 10.0.1.232.80: Flags [.], ack 6725, win 4096, length 0
  220. 15:48:35.593671 IP 192.168.0.201.57251 > 10.0.1.232.80: Flags [P.], seq 979:1473, ack 6725, win 4096, length 494: HTTP: GET /web/function/reg_device.js?id=1714060114 HTTP/1.1
  221. 15:48:35.593671 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 4476:4958, ack 36586, win 4096, length 482: HTTP: GET /web/ota/ota.js?id=1714060114 HTTP/1.1
  222. 15:48:35.593671 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 36586, win 4077, length 0
  223. 15:48:35.594011 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 46375, win 4096, length 0
  224. 15:48:35.595517 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 51784, win 4096, length 0
  225. 15:48:35.596488 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], seq 30940:32336, ack 2985, win 60, length 1396: HTTP: HTTP/1.1 200 OK
  226. 15:48:35.596654 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [P.], seq 32336:33355, ack 2985, win 60, length 1019: HTTP
  227. 15:48:35.598073 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [.], seq 4543:5939, ack 1486, win 53, length 1396: HTTP: HTTP/1.1 200 OK
  228. 15:48:35.598232 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [.], seq 5939:7335, ack 1486, win 53, length 1396: HTTP
  229. 15:48:35.598301 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [P.], seq 7335:7573, ack 1486, win 53, length 238: HTTP
  230. 15:48:35.598831 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [P.], seq 6725:7378, ack 1473, win 53, length 653: HTTP: HTTP/1.1 200 OK
  231. 15:48:35.599510 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 36586:37223, ack 4958, win 68, length 637: HTTP: HTTP/1.1 200 OK
  232. 15:48:35.601497 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], seq 8292:9688, ack 1465, win 53, length 1396: HTTP: HTTP/1.1 200 OK
  233. 15:48:35.601572 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], seq 9688:11084, ack 1465, win 53, length 1396: HTTP
  234. 15:48:35.601649 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], seq 11084:12480, ack 1465, win 53, length 1396: HTTP
  235. 15:48:35.601847 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], seq 12480:13876, ack 1465, win 53, length 1396: HTTP
  236. 15:48:35.602018 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [P.], seq 13876:14560, ack 1465, win 53, length 684: HTTP
  237. 15:48:35.603356 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [.], ack 33355, win 4058, length 0
  238. 15:48:35.607142 IP 192.168.0.201.57251 > 10.0.1.232.80: Flags [.], ack 7378, win 4085, length 0
  239. 15:48:35.607227 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 37223, win 4086, length 0
  240. 15:48:35.607236 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [.], ack 7573, win 4096, length 0
  241. 15:48:35.608851 IP 192.168.0.201.57250 > 10.0.1.232.80: Flags [.], ack 14560, win 4096, length 0
  242. 15:48:35.641622 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 4958:5512, ack 37223, win 4096, length 554: HTTP: GET /xml/english.xml?_=1714060115085 HTTP/1.1
  243. 15:48:35.666996 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 37223:38619, ack 5512, win 70, length 1396: HTTP: HTTP/1.1 200 OK
  244. 15:48:35.667058 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 38619:40015, ack 5512, win 70, length 1396: HTTP
  245. 15:48:35.667159 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 40015:41411, ack 5512, win 70, length 1396: HTTP
  246. 15:48:35.667205 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 41411:42807, ack 5512, win 70, length 1396: HTTP
  247. 15:48:35.667490 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 42807:44203, ack 5512, win 70, length 1396: HTTP
  248. 15:48:35.667550 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 44203:45599, ack 5512, win 70, length 1396: HTTP
  249. 15:48:35.667669 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 45599:46995, ack 5512, win 70, length 1396: HTTP
  250. 15:48:35.668094 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 46995:48391, ack 5512, win 70, length 1396: HTTP
  251. 15:48:35.668168 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 48391:49787, ack 5512, win 70, length 1396: HTTP
  252. 15:48:35.668243 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 49787:51183, ack 5512, win 70, length 1396: HTTP
  253. 15:48:35.668324 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 51183:52579, ack 5512, win 70, length 1396: HTTP
  254. 15:48:35.668363 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 52579:53975, ack 5512, win 70, length 1396: HTTP
  255. 15:48:35.668423 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 53975:55371, ack 5512, win 70, length 1396: HTTP
  256. 15:48:35.674896 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 42807, win 4096, length 0
  257. 15:48:35.674896 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 55371, win 4096, length 0
  258. 15:48:35.675288 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 55371:56767, ack 5512, win 70, length 1396: HTTP
  259. 15:48:35.675406 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 56767:58163, ack 5512, win 70, length 1396: HTTP
  260. 15:48:35.675659 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 58163:59559, ack 5512, win 70, length 1396: HTTP
  261. 15:48:35.675699 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 59559:60955, ack 5512, win 70, length 1396: HTTP
  262. 15:48:35.675841 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 60955:62351, ack 5512, win 70, length 1396: HTTP
  263. 15:48:35.675985 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 62351:63747, ack 5512, win 70, length 1396: HTTP
  264. 15:48:35.676164 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 63747:65143, ack 5512, win 70, length 1396: HTTP
  265. 15:48:35.676229 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 65143:66539, ack 5512, win 70, length 1396: HTTP
  266. 15:48:35.676357 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 66539:67935, ack 5512, win 70, length 1396: HTTP
  267. 15:48:35.676521 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 67935:69331, ack 5512, win 70, length 1396: HTTP
  268. 15:48:35.676714 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 69331:70727, ack 5512, win 70, length 1396: HTTP
  269. 15:48:35.676767 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 70727:72123, ack 5512, win 70, length 1396: HTTP
  270. 15:48:35.676889 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 72123:73519, ack 5512, win 70, length 1396: HTTP
  271. 15:48:35.682501 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 73519, win 4096, length 0
  272. 15:48:35.682965 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 73519:74915, ack 5512, win 70, length 1396: HTTP
  273. 15:48:35.683017 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 74915:76311, ack 5512, win 70, length 1396: HTTP
  274. 15:48:35.683215 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 76311:77707, ack 5512, win 70, length 1396: HTTP
  275. 15:48:35.683260 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 77707:79103, ack 5512, win 70, length 1396: HTTP
  276. 15:48:35.683576 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 79103:80499, ack 5512, win 70, length 1396: HTTP
  277. 15:48:35.683622 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 80499:81895, ack 5512, win 70, length 1396: HTTP
  278. 15:48:35.683906 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 81895:83291, ack 5512, win 70, length 1396: HTTP
  279. 15:48:35.683948 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 83291:84687, ack 5512, win 70, length 1396: HTTP
  280. 15:48:35.684091 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 84687:86083, ack 5512, win 70, length 1396: HTTP
  281. 15:48:35.684138 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 86083:87479, ack 5512, win 70, length 1396: HTTP
  282. 15:48:35.684269 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 87479:88875, ack 5512, win 70, length 1396: HTTP
  283. 15:48:35.684315 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 88875:90271, ack 5512, win 70, length 1396: HTTP
  284. 15:48:35.684632 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 90271:91667, ack 5512, win 70, length 1396: HTTP
  285. 15:48:35.684679 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 91667:93063, ack 5512, win 70, length 1396: HTTP
  286. 15:48:35.690452 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 93063, win 4096, length 0
  287. 15:48:35.690934 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 93063:94459, ack 5512, win 70, length 1396: HTTP
  288. 15:48:35.690988 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 94459:95855, ack 5512, win 70, length 1396: HTTP
  289. 15:48:35.691102 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 95855:97251, ack 5512, win 70, length 1396: HTTP
  290. 15:48:35.691154 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 97251:98647, ack 5512, win 70, length 1396: HTTP
  291. 15:48:35.691471 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 98647:100043, ack 5512, win 70, length 1396: HTTP
  292. 15:48:35.691520 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 100043:101439, ack 5512, win 70, length 1396: HTTP
  293. 15:48:35.691653 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 101439:101649, ack 5512, win 70, length 210: HTTP
  294. 15:48:35.697653 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 101649, win 4096, length 0
  295. 15:48:35.715186 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 5512:6063, ack 101649, win 4096, length 551: HTTP: GET /xml/lang.xml?_=1714060115086 HTTP/1.1
  296. 15:48:35.740591 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 101649:103045, ack 6063, win 72, length 1396: HTTP: HTTP/1.1 200 OK
  297. 15:48:35.740647 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 103045:104441, ack 6063, win 72, length 1396: HTTP
  298. 15:48:35.740729 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 104441:105837, ack 6063, win 72, length 1396: HTTP
  299. 15:48:35.740790 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 105837:107233, ack 6063, win 72, length 1396: HTTP
  300. 15:48:35.740853 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 107233:108629, ack 6063, win 72, length 1396: HTTP
  301. 15:48:35.740999 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 108629:110025, ack 6063, win 72, length 1396: HTTP
  302. 15:48:35.741225 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 110025:111421, ack 6063, win 72, length 1396: HTTP
  303. 15:48:35.741378 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 111421:112817, ack 6063, win 72, length 1396: HTTP
  304. 15:48:35.741441 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 112817:114213, ack 6063, win 72, length 1396: HTTP
  305. 15:48:35.741517 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 114213:115609, ack 6063, win 72, length 1396: HTTP
  306. 15:48:35.741973 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 115609:117005, ack 6063, win 72, length 1396: HTTP
  307. 15:48:35.742028 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 117005:118401, ack 6063, win 72, length 1396: HTTP
  308. 15:48:35.742091 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 118401:119797, ack 6063, win 72, length 1396: HTTP
  309. 15:48:35.742153 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 119797:121193, ack 6063, win 72, length 1396: HTTP
  310. 15:48:35.742253 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 121193:122589, ack 6063, win 72, length 1396: HTTP
  311. 15:48:35.747662 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 117005, win 3856, length 0
  312. 15:48:35.748486 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 122589:123985, ack 6063, win 72, length 1396: HTTP
  313. 15:48:35.748543 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 123985:125381, ack 6063, win 72, length 1396: HTTP
  314. 15:48:35.748614 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 125381:126777, ack 6063, win 72, length 1396: HTTP
  315. 15:48:35.748672 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 126777:128173, ack 6063, win 72, length 1396: HTTP
  316. 15:48:35.748711 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 128173:129569, ack 6063, win 72, length 1396: HTTP
  317. 15:48:35.748793 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 129569:130965, ack 6063, win 72, length 1396: HTTP
  318. 15:48:35.749154 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 122589, win 4096, length 0
  319. 15:48:35.749330 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 130965:132361, ack 6063, win 72, length 1396: HTTP
  320. 15:48:35.749390 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 132361:133757, ack 6063, win 72, length 1396: HTTP
  321. 15:48:35.749437 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 133757:135153, ack 6063, win 72, length 1396: HTTP
  322. 15:48:35.749482 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 135153:136549, ack 6063, win 72, length 1396: HTTP
  323. 15:48:35.749613 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 136549:137945, ack 6063, win 72, length 1396: HTTP
  324. 15:48:35.749775 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 137945:139341, ack 6063, win 72, length 1396: HTTP
  325. 15:48:35.749951 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 139341:140737, ack 6063, win 72, length 1396: HTTP
  326. 15:48:35.750000 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 140737:142133, ack 6063, win 72, length 1396: HTTP
  327. 15:48:35.750136 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 142133:143529, ack 6063, win 72, length 1396: HTTP
  328. 15:48:35.756141 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 143529, win 4096, length 0
  329. 15:48:35.756537 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 143529:144925, ack 6063, win 72, length 1396: HTTP
  330. 15:48:35.756706 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 144925:146321, ack 6063, win 72, length 1396: HTTP
  331. 15:48:35.756763 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 146321:147717, ack 6063, win 72, length 1396: HTTP
  332. 15:48:35.756984 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 147717:149113, ack 6063, win 72, length 1396: HTTP
  333. 15:48:35.757129 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 149113:150509, ack 6063, win 72, length 1396: HTTP
  334. 15:48:35.757179 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 150509:151905, ack 6063, win 72, length 1396: HTTP
  335. 15:48:35.757300 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 151905:153301, ack 6063, win 72, length 1396: HTTP
  336. 15:48:35.757343 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 153301:154697, ack 6063, win 72, length 1396: HTTP
  337. 15:48:35.757668 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 154697:156093, ack 6063, win 72, length 1396: HTTP
  338. 15:48:35.757710 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 156093:157489, ack 6063, win 72, length 1396: HTTP
  339. 15:48:35.758035 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 157489:158885, ack 6063, win 72, length 1396: HTTP
  340. 15:48:35.758079 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 158885:160281, ack 6063, win 72, length 1396: HTTP
  341. 15:48:35.758221 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 160281:161677, ack 6063, win 72, length 1396: HTTP
  342. 15:48:35.758411 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 161677:163073, ack 6063, win 72, length 1396: HTTP
  343. 15:48:35.758596 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 163073:164469, ack 6063, win 72, length 1396: HTTP
  344. 15:48:35.758639 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [.], seq 164469:165865, ack 6063, win 72, length 1396: HTTP
  345. 15:48:35.766802 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 165865, win 4096, length 0
  346. 15:48:35.767200 IP 10.0.1.232.80 > 192.168.0.201.57247: Flags [P.], seq 165865:166075, ack 6063, win 72, length 210: HTTP
  347. 15:48:35.774527 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [.], ack 166075, win 4096, length 0
  348. 15:48:35.837685 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  349. 15:48:36.090835 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  350. 15:48:36.240581 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  351. 15:48:36.617430 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  352. 15:48:36.988445 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  353. 15:48:37.664104 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  354. 15:48:38.762557 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  355. 15:48:40.311074 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  356. 15:48:43.202701 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  357. 15:48:46.090599 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  358. 15:48:48.982396 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  359. 15:48:50.596994 IP 10.0.1.232.80 > 192.168.0.201.57248: Flags [.], ack 3975, win 64, length 0
  360. 15:48:50.605133 IP 192.168.0.201.57248 > 10.0.1.232.80: Flags [.], ack 51784, win 4096, length 0
  361. 15:48:50.605233 IP 10.0.1.232.80 > 192.168.0.201.57249: Flags [.], ack 2985, win 60, length 0
  362. 15:48:50.610307 IP 192.168.0.201.57249 > 10.0.1.232.80: Flags [.], ack 33355, win 4096, length 0
  363. 15:48:50.813242 IP 10.0.1.232.80 > 192.168.0.201.57251: Flags [.], ack 1473, win 53, length 0
  364. 15:48:50.813280 IP 10.0.1.232.80 > 192.168.0.201.57250: Flags [.], ack 1465, win 53, length 0
  365. 15:48:50.813291 IP 10.0.1.232.80 > 192.168.0.201.57252: Flags [.], ack 1486, win 53, length 0
  366. 15:48:50.818401 IP 192.168.0.201.57252 > 10.0.1.232.80: Flags [.], ack 7573, win 4096, length 0
  367. 15:48:50.818402 IP 192.168.0.201.57250 > 10.0.1.232.80: Flags [.], ack 14560, win 4096, length 0
  368. 15:48:50.818402 IP 192.168.0.201.57251 > 10.0.1.232.80: Flags [.], ack 7378, win 4096, length 0
  369. 15:48:51.873253 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  370. 15:48:54.767366 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  371. 15:48:57.659421 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [P.], seq 6063:6651, ack 166075, win 4096, length 588: HTTP: PUT /nas/v1/auth HTTP/1.1
  372. 15:49:00.552531 IP 192.168.0.201.57247 > 10.0.1.232.80: Flags [R.], seq 6651, ack 166075, win 4096, length 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement