Advertisement
Guest User

Untitled

a guest
Mar 30th, 2017
63
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.61 KB | None | 0 0
  1. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  2. listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
  3. 10:49:34.009039 ARP, Request who-has 10.254.254.3 tell 10.254.254.1, length 46
  4. 10:49:34.009068 ARP, Reply 10.254.254.3 is-at 42:a2:e3:bf:1d:5b (oui Unknown), length 28
  5. 10:49:34.013643 IP 10.130.8.100.59784 > 10.254.254.3.ssh: Flags [S], seq 4029736816, win 29200, options [mss 1460,sackOK,TS val 2435775 ecr 0,nop,wscale 7], length 0
  6. 10:49:34.016657 IP 10.130.8.100.59784 > 10.254.254.3.ssh: Flags [.], ack 2002732034, win 229, options [nop,nop,TS val 2435782 ecr 21380808], length 0
  7. 10:49:34.016789 IP 10.130.8.100.59784 > 10.254.254.3.ssh: Flags [P.], seq 0:41, ack 1, win 229, options [nop,nop,TS val 2435782 ecr 21380808], length 41
  8. 10:49:34.023774 IP 10.130.8.100.59784 > 10.254.254.3.ssh: Flags [.], ack 40, win 229, options [nop,nop,TS val 2435784 ecr 21380810], length 0
  9. 10:49:34.104134 IP 10.130.8.100.59784 > 10.254.254.3.ssh: Flags [.], ack 992, win 251, options [nop,nop,TS val 2435795 ecr 21380810], length 0
  10. 10:49:34.254448 IP 10.130.8.100.59784 > 10.254.254.3.ssh: Flags [P.], seq 1377:1425, ack 992, win 251, options [nop,nop,TS val 2435840 ecr 21380810], length 48
  11. 10:49:34.943334 IP 10.254.254.1.54409 > 255.255.255.255.5678: UDP, length 111
  12. 10:49:34.943570 CDPv1, ttl: 120s, Device-ID 'MikroTik', length 86
  13. 10:49:48.167662 IP 10.130.8.100.59784 > 10.254.254.3.ssh: Flags [F.], seq 1425, ack 992, win 251, options [nop,nop,TS val 2439310 ecr 21380868], length 0
  14. 10:49:56.111719 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 1, length 64
  15. 10:49:57.115775 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 2, length 64
  16. 10:49:58.107513 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 3, length 64
  17. 10:49:59.133735 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 4, length 64
  18. 10:50:00.115289 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 5, length 64
  19. 10:50:01.131742 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 6, length 64
  20. 10:50:02.111271 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 7, length 64
  21. 10:50:03.152302 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 8, length 64
  22. 10:50:04.111990 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 9, length 64
  23. 10:50:05.160220 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 10, length 64
  24. 10:50:06.166514 IP 10.130.8.100 > 10.254.254.3: ICMP echo request, id 30012, seq 11, length 64
  25. ^C
  26. 22 packets captured
  27. 22 packets received by filter
  28. 0 packets dropped by kernel
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement