Advertisement
Guest User

Untitled

a guest
Nov 14th, 2018
115
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.02 KB | None | 0 0
  1. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  2. listening on eth5, link-type EN10MB (Ethernet), capture size 65535 bytes
  3. 10:01:55.009018 IP 10.101.45.132.http > 10.101.45.70.64450: Flags [S.], seq 1945712651, ack 2010492718, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  4. 10:01:57.408943 ARP, Request who-has 10.101.45.70 tell 10.101.45.132, length 28
  5. 10:01:57.409137 ARP, Reply 10.101.45.70 is-at 00:50:56:bd:0f:fd, length 46
  6. 10:01:58.859519 IP 10.101.45.70.64451 > 10.101.45.132.http: Flags [S], seq 3255927096, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
  7. 10:01:58.859560 IP 10.101.45.132.http > 10.101.45.70.64451: Flags [S.], seq 2109045926, ack 3255927097, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  8. 10:02:00.409010 IP 10.101.45.132.http > 10.101.45.70.64451: Flags [S.], seq 2109045926, ack 3255927097, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  9. 10:02:02.409956 IP 10.101.45.132.http > 10.101.45.70.64451: Flags [S.], seq 2109045926, ack 3255927097, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  10. 10:02:06.410004 IP 10.101.45.132.http > 10.101.45.70.64451: Flags [S.], seq 2109045926, ack 3255927097, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  11. 10:02:11.210988 IP 10.101.45.132.http > 10.101.45.70.64450: Flags [S.], seq 1945712651, ack 2010492718, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  12. 10:02:14.410985 IP 10.101.45.132.http > 10.101.45.70.64451: Flags [S.], seq 2109045926, ack 3255927097, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  13. 10:02:17.845121 IP 10.101.45.70.64454 > 10.101.45.132.http: Flags [S], seq 3915509202, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
  14. 10:02:17.845151 IP 10.101.45.132.http > 10.101.45.70.64454: Flags [S.], seq 2387814406, ack 3915509203, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  15. 10:02:19.210989 IP 10.101.45.132.http > 10.101.45.70.64454: Flags [S.], seq 2387814406, ack 3915509203, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  16. 10:02:21.211960 IP 10.101.45.132.http > 10.101.45.70.64454: Flags [S.], seq 2387814406, ack 3915509203, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  17. 10:02:25.213010 IP 10.101.45.132.http > 10.101.45.70.64454: Flags [S.], seq 2387814406, ack 3915509203, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  18. 10:02:30.613000 IP 10.101.45.132.http > 10.101.45.70.64451: Flags [S.], seq 2109045926, ack 3255927097, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  19. 10:02:33.412991 IP 10.101.45.132.http > 10.101.45.70.64454: Flags [S.], seq 2387814406, ack 3915509203, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  20. 10:02:35.612956 ARP, Request who-has 10.101.45.70 tell 10.101.45.132, length 28
  21. 10:02:35.613189 ARP, Reply 10.101.45.70 is-at 00:50:56:bd:0f:fd, length 46
  22. 10:02:36.848131 IP 10.101.45.70.64457 > 10.101.45.132.http: Flags [S], seq 2978433972, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
  23. 10:02:36.848176 IP 10.101.45.132.http > 10.101.45.70.64457: Flags [S.], seq 2837067246, ack 2978433973, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  24. 10:02:38.212997 IP 10.101.45.132.http > 10.101.45.70.64457: Flags [S.], seq 2837067246, ack 2978433973, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  25. 10:02:40.212965 IP 10.101.45.132.http > 10.101.45.70.64457: Flags [S.], seq 2837067246, ack 2978433973, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  26. 10:02:44.214020 IP 10.101.45.132.http > 10.101.45.70.64457: Flags [S.], seq 2837067246, ack 2978433973, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  27. 10:02:49.414005 IP 10.101.45.132.http > 10.101.45.70.64454: Flags [S.], seq 2387814406, ack 3915509203, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  28. 10:02:52.214016 IP 10.101.45.132.http > 10.101.45.70.64457: Flags [S.], seq 2837067246, ack 2978433973, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  29. 10:02:55.830512 IP 10.101.45.70.64462 > 10.101.45.132.http: Flags [S], seq 889905964, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
  30. 10:02:55.830534 IP 10.101.45.132.http > 10.101.45.70.64462: Flags [S.], seq 393575472, ack 889905965, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  31. 10:02:57.413993 IP 10.101.45.132.http > 10.101.45.70.64462: Flags [S.], seq 393575472, ack 889905965, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  32. 10:02:59.413969 IP 10.101.45.132.http > 10.101.45.70.64462: Flags [S.], seq 393575472, ack 889905965, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  33. 10:03:03.413968 IP 10.101.45.132.http > 10.101.45.70.64462: Flags [S.], seq 393575472, ack 889905965, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
  34. ^C75640 packets captured
  35. 94633 packets received by filter
  36. 18974 packets dropped by kernel
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement