Created
February 24, 2019 14:14
-
-
Save icy/5affda45139b4a0ae5e0d56b7fdc2177 to your computer and use it in GitHub Desktop.
tcpdump-ping-with-use-vc-via-public-dns.sh
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
21:13:43.089366 IP 192.168.5.11.50528 > 1.1.1.1.53: Flags [S], seq 1515427657, win 64240, options [mss 1460,sackOK,TS val 796457230 ecr 0,nop,wscale 7], length 0 | |
21:13:43.117419 IP 1.1.1.1.53 > 192.168.5.11.50528: Flags [S.], seq 1559539413, ack 1515427658, win 29200, options [mss 1412,nop,nop,sackOK,nop,wscale 10], length 0 | |
21:13:43.117534 IP 192.168.5.11.50528 > 1.1.1.1.53: Flags [.], ack 1, win 502, length 0 | |
21:13:43.117623 IP 192.168.5.11.50528 > 1.1.1.1.53: Flags [P.], seq 1:59, ack 1, win 502, length 5827063+ A? gmail.com. (56) | |
21:13:43.144576 IP 1.1.1.1.53 > 192.168.5.11.50528: Flags [.], ack 59, win 29, length 0 | |
21:13:43.145759 IP 1.1.1.1.53 > 192.168.5.11.50528: Flags [P.], seq 1:46, ack 59, win 29, length 4527063 1/0/0 A 172.217.22.5 (43) | |
21:13:43.145954 IP 192.168.5.11.50528 > 1.1.1.1.53: Flags [.], ack 46, win 502, length 0 | |
21:13:43.146066 IP 1.1.1.1.53 > 192.168.5.11.50528: Flags [P.], seq 46:103, ack 59, win 29, length 5746787 1/0/0 AAAA 2a00:1450:4001:821::2005 (55) | |
21:13:43.146088 IP 192.168.5.11.50528 > 1.1.1.1.53: Flags [.], ack 103, win 502, length 0 | |
21:13:43.146286 IP 192.168.5.11.50528 > 1.1.1.1.53: Flags [F.], seq 59, ack 103, win 502, length 0 | |
21:13:43.166480 IP 192.168.5.11.50530 > 1.1.1.1.53: Flags [S], seq 3983119413, win 64240, options [mss 1460,sackOK,TS val 796457307 ecr 0,nop,wscale 7], length 0 | |
21:13:43.174128 IP 1.1.1.1.53 > 192.168.5.11.50528: Flags [F.], seq 103, ack 60, win 29, length 0 | |
21:13:43.174308 IP 192.168.5.11.50528 > 1.1.1.1.53: Flags [.], ack 104, win 502, length 0 | |
21:13:43.188284 IP 1.1.1.1.53 > 192.168.5.11.50530: Flags [S.], seq 832706502, ack 3983119414, win 29200, options [mss 1412,nop,nop,sackOK,nop,wscale 10], length 0 | |
21:13:43.188611 IP 192.168.5.11.50530 > 1.1.1.1.53: Flags [.], ack 1, win 502, length 0 | |
21:13:43.188729 IP 192.168.5.11.50530 > 1.1.1.1.53: Flags [P.], seq 1:46, ack 1, win 502, length 4553740+ PTR? 5.22.217.172.in-addr.arpa. (43) | |
21:13:43.210485 IP 1.1.1.1.53 > 192.168.5.11.50530: Flags [.], ack 46, win 29, length 0 | |
21:13:43.210759 IP 1.1.1.1.53 > 192.168.5.11.50530: Flags [P.], seq 1:84, ack 46, win 29, length 8353740 1/0/0 PTR fra16s14-in-f5.1e100.net. (81) | |
21:13:43.210785 IP 192.168.5.11.50530 > 1.1.1.1.53: Flags [.], ack 84, win 502, length 0 | |
21:13:43.210830 IP 192.168.5.11.50530 > 1.1.1.1.53: Flags [F.], seq 46, ack 84, win 502, length 0 | |
21:13:43.232734 IP 1.1.1.1.53 > 192.168.5.11.50530: Flags [F.], seq 84, ack 47, win 29, length 0 | |
21:13:43.232791 IP 192.168.5.11.50530 > 1.1.1.1.53: Flags [.], ack 85, win 502, length 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment