1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
| [root@hadoop /root]$ tcpdump -nn -i eno16777736 port 80 or arp tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eno16777736, link-type EN10MB (Ethernet), capture size 262144 bytes 02:07:29.260601 ARP, Request who-has 192.168.125.2 tell 192.168.125.128, length 28 02:07:29.260938 ARP, Reply 192.168.125.2 is-at 00:50:56:f5:5f:6a, length 46 02:07:29.273875 IP 192.168.125.128.47372 > 123.125.114.144.80: Flags [S], seq 3601189424, win 29200, options [mss 1460,sackOK,TS val 10253305 ecr 0,nop,wscale 7], length 0 02:07:29.312217 IP 123.125.114.144.80 > 192.168.125.128.47372: Flags [S.], seq 764753765, ack 3601189425, win 64240, options [mss 1460], length 0 02:07:29.312244 IP 192.168.125.128.47372 > 123.125.114.144.80: Flags [.], ack 1, win 29200, length 0 02:07:29.312510 IP 192.168.125.128.47372 > 123.125.114.144.80: Flags [P.], seq 1:79, ack 1, win 29200, length 78: HTTP: GET / HTTP/1.1 02:07:29.312779 IP 123.125.114.144.80 > 192.168.125.128.47372: Flags [.], ack 79, win 64240, length 0 02:07:29.356759 IP 123.125.114.144.80 > 192.168.125.128.47372: Flags [P.], seq 1:474, ack 79, win 64240, length 473: HTTP: HTTP/1.1 302 Found 02:07:29.356778 IP 192.168.125.128.47372 > 123.125.114.144.80: Flags [.], ack 474, win 30016, length 0 02:07:29.357065 IP 192.168.125.128.47372 > 123.125.114.144.80: Flags [F.], seq 79, ack 474, win 30016, length 0 02:07:29.357339 IP 123.125.114.144.80 > 192.168.125.128.47372: Flags [.], ack 80, win 64239, length 0 02:07:29.398222 IP 123.125.114.144.80 > 192.168.125.128.47372: Flags [FP.], seq 474, ack 80, win 64239, length 0 02:07:29.398245 IP 192.168.125.128.47372 > 123.125.114.144.80: Flags [.], ack 475, win 30016, length 0
13 packets captured 13 packets received by filter 0 packets dropped by kernel [root@hadoop /root]$
|