Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- sudo tcpdump 'port 22 and not host 192.168.0.100' -vv
- tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
- 12:49:33.001444 IP (tos 0x0, ttl 121, id 10776, offset 0, flags [DF], proto TCP (6), length 52)
- [Internet IP].12866 > 192.168.0.101.ssh: Flags [S], cksum 0x17d8 (correct), seq 1508368095, win 64512, options [mss 1460,nop,wscale 0,nop,nop,sackOK], length 0
- 12:49:36.005592 IP (tos 0x0, ttl 121, id 10778, offset 0, flags [DF], proto TCP (6), length 52)
- [Internet IP].12866 > 192.168.0.101.ssh: Flags [S], cksum 0x17d8 (correct), seq 1508368095, win 64512, options [mss 1460,nop,wscale 0,nop,nop,sackOK], length 0
- 12:49:42.033031 IP (tos 0x0, ttl 121, id 10781, offset 0, flags [DF], proto TCP (6), length 48)
- [Internet IP].12866 > 192.168.0.101.ssh: Flags [S], cksum 0x2bdf (correct), seq 1508368095, win 64512, options [mss 1460,nop,nop,sackOK], length 0
- ^C
- 3 packets captured
- 3 packets received by filter
- 0 packets dropped by kernel
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement