Advertisement
Guest User

Untitled

a guest
Apr 3rd, 2017
166
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.97 KB | None | 0 0
  1. sudo tcpdump 'port 22 and not host 192.168.0.100' -vv
  2.  
  3. tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
  4. 12:49:33.001444 IP (tos 0x0, ttl 121, id 10776, offset 0, flags [DF], proto TCP (6), length 52)
  5. [Internet IP].12866 > 192.168.0.101.ssh: Flags [S], cksum 0x17d8 (correct), seq 1508368095, win 64512, options [mss 1460,nop,wscale 0,nop,nop,sackOK], length 0
  6. 12:49:36.005592 IP (tos 0x0, ttl 121, id 10778, offset 0, flags [DF], proto TCP (6), length 52)
  7. [Internet IP].12866 > 192.168.0.101.ssh: Flags [S], cksum 0x17d8 (correct), seq 1508368095, win 64512, options [mss 1460,nop,wscale 0,nop,nop,sackOK], length 0
  8. 12:49:42.033031 IP (tos 0x0, ttl 121, id 10781, offset 0, flags [DF], proto TCP (6), length 48)
  9. [Internet IP].12866 > 192.168.0.101.ssh: Flags [S], cksum 0x2bdf (correct), seq 1508368095, win 64512, options [mss 1460,nop,nop,sackOK], length 0
  10. ^C
  11. 3 packets captured
  12. 3 packets received by filter
  13. 0 packets dropped by kernel
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement