\n
\t\t\t\r\n
\r\n
\t
\r\n
\t\t
\r\n
\t\t\t
\r\n
\t\t\t\t\r\n
\t\t\t
\r\n
\t\t
\r\n
\t
\r\n
\r\n
\r\n
\t
\r\n
\t\t
\r\n
\t\t\t
\r\n
\t\t\t\t\r\n
\t\t\t
\r\n
\t\t
\r\n
\t
\r\n
\r\n
\r\n
\r\n
\t\t
\r\n
\t\t\t
\r\n
\t\t\t\t\r\n
\t\t\t
\r\n
\t\t
\r\n
\t
\r\n
\r\n
\r\n
\r\n
\r\n
\r\n
\r\n
\r\n
\n
\t\t\t
\n
\t\t\t\t\n
\t\t\t\t\n
\t\t\t\t
\n
\t\t\t\t\n
\n
\t\t\t\t\t\n
\t\t\t\t\t\n
\t\t\t\t\n
\t\t\t\t\t\n
\t\t\t\t\t
\r\n
\r\n
\t\t\t\t\t\tRA\304\214UN ZA FIKSNE USLUGE BR. 5019102951
\r\n

\r\n
\r\n
\r\n
\r\n
\t\t\t\t\tOdustali ste od pla\304\207anja. Pla\304\207anje nije izvr\305\241eno.\r\n
\t\t\t\t
\r\n
\r\n
\t\t\t\t\tDo\305\241lo je do pogre\305\241ke prilikom zavr\305\241etka pla\304\207anja.\r\n
\t\t\t\t
\r\n
\r\n
\t\t\t\t\tMolimo odaberite ra\304\215une koje \305\276elite platiti\r\n
\t\t\t\t
\r\n
\r\n
\r\n
\r\n
| \r\n
Razdoblje | \302\240\r\n
\t\t\t\t\t\tDatum dospije\304\207a | \r\n
Iznos | \r\n
Preostalo za platiti | \r\n
[truncated] Status pla\304\207anja Preuzimanja | \r\n
\r\n
\r\n
\r\n
\r\n
| \r\n
10/2016 | \r\n
16.11.2016. | \r\n
369,49 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
291,25 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Djelomi\304\215no podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
09/2016 | \r\n
17.10.2016. | \r\n
449,23 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
08/2016 | \r\n
16.9.2016. | \r\n
417,32 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
07/2016 | \r\n
16.8.2016. | \r\n
394,90 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
06/2016 | \r\n
18.7.2016. | \r\n
405,38 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
05/2016 | \r\n
16.6.2016. | \r\n
365,59 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
04/2016 | \r\n
16.5.2016. | \r\n
345,37 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
03/2016 | \r\n
15.4.2016. | \r\n
329,72 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
02/2016 | \r\n
15.3.2016. | \r\n
340,82 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
01/2016 | \r\n
15.2.2016. | \r\n
351,05 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
12/2015 | \r\n
15.1.2016. | \r\n
356,21 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t \302\240 | \r\n
11/2015 | \r\n
15.12.2015. | \r\n
416,35 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
0,00 kn\r\n
\t\t\t\t\t\t\t\t\t | \r\n
Podmiren | \r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n
\t\t\t\t\t\t\t\t\t\t\t\t\t \r\n
\t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n
\r\n
\t\t\t\t\t\t\t\t\t\t\t | \r\n
\r\n
\r\n
\r\n
\r\n
UKUPNO ZA PLATITI:
\r\n
\r\n
\r\n
\r\n
\r\n
\n
\t\t\t\t
\t\n
\n
\t\t\t\t
\n
\t\t\t\t\t
PLA\304\206ANJE KREDITNIM ILI DEBITNIM KARTICAMA
\r\n
\r\n
\t\t\tOdabrali ste pogre\305\241nu karticu, molimo poku\305\241ajte ponovo.\r\n
\t\t
\r\n
\r\n
\t\t\tDo\305\241lo je do promjene naknade/iznosa ukupnog ra\304\215una.
\r\n
\t\t\tMolimo provjerite i nastavite sa pla\304\207anjem.\r\n
\t\t
\r\n
Odaberite karticu kojom \304\207ete izvr\305\241iti pla\304\207anje:
\r\n
\r\n
\r\n
\r\n
\r\n
\r\n
Ra\304\215un | \r\n
Datum dospije\304\207a | \r\n
Iznos | \r\n
\302\240 | \r\n
\r\n
\r\n
\r\n
\r\n
10/2016 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
16.11.2016. | \r\n
291,25 kn kn | \r\n
| \r\n
\r\n
\r\n
09/2016 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
17.10.2016. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
08/2016 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
16.9.2016. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
07/2016 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
16.8.2016. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
06/2016 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
18.7.2016. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
05/2016 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
16.6.2016. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
04/2016 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
16.5.2016. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
03/2016 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
15.4.2016. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
02/2016 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
15.3.2016. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
01/2016 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
15.2.2016. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
12/2015 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
15.1.2016. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
11/2015 \r\n
\t\t\t\t\t\t\t\tNaknada | \r\n
15.12.2015. | \r\n
0,00 kn kn | \r\n
| \r\n
\r\n
\r\n
UKUPNO ZA PLATITI: | \r\n
| \r\n
| \r\n
\r\n
\r\n
\r\n
\r\n
Powered by Svi ra\304\215uni
\n
\t\t\t\t
\n
\t\t\t\t\t\n
\t\t\t\t
\n
\t\t\t\t\t
\r\n
\t\r\n
\t
Uspje\305\241no ste aktivirali e-ra\304\215un!
\r\n
\t\r\n
[truncated]\t
Od sada \304\207e vam HT ra\304\215uni, umjesto po\305\241tom na va\305\241u adresu, stizati na Moj Telekom Portal. O primitku novog ra\304\215una obavijestit \304\207emo vas na e-mail adresu
\n
\t\t\t\t
\n
\t\t\t\t\t\n
\t\t\t\t
\n
\t\t\t\t\t\n
\t\t\t\t
\n
\t\t\t\t\t\n
\t\t\t\t
\n
\t\t\t\t\t
Pla\304\207anje ra\304\215una \342\200\223 nedostaju podaci
\r\n
\r\n
\r\n
\r\n
\t
Odre\304\221eni podaci nedostaju za uspje\305\241an zavr\305\241etak pla\304\207anja ra\304\215una. Molimo provjerite i unesite podatke koji nedostaju za nastavak pla\304\207anja.
\r\n
\r\n
\t
\r\n
\r\n
\n
\t\t\t\t
\n
\t\t\t\t\t\n
\t\t\t\t\t\n
\t\t\t\t\n
\t\t\t\t\n
\t\t\t
\n
\t\t\t
\r\n
\t\r\n
\t\r\n
\r\n
\t\r\n
\t\r\n
\t\r\n
\r\n
\t
\r\n
\r\n
\t\r\n
\r\n
\r\n
\t\r\n
\t
\r\n
\t\r\n
\t\r\n
\t\r\n
\n
\t\t\r\n
\r\n
\r\n
\r\n
\r\n
\r\n
\r\n
\n
\t
\t\n
\r\n
\r\n
\r\n
\t\r\n
\n
\n
\n
\n
\t\r\n
\r\n
\n
\t
\r\n
\t
\r\n
\t\t
\r\n
\t\t\t
\r\n
\t\t\t
\r\n
\t\t
\r\n
\t
\r\n
\t\r\n
\t
\r\n
\t\t\r\n
\t\t
\r\n
\t\t
AKTIVACIJA E-RA\304\214UNA
\r\n
[truncated]\t\t
Za pla\304\207anje ra\304\215una putem Moj Telekom Portala trebate aktivirati uslugu e-ra\304\215un. Tako \304\207ete svoje ra\304\215une, umjesto po\305\241tom na ku\304\207nu adresu, primati u elektroni\304\215kom obli
\t\t
\r\n
\t\t\t- Besplatno za sve HT korisnike
\r\n
\t\t\t- E-ra\304\215uni uvijek sti\305\276u na vrijeme i ne mogu im pristupiti neovla\305\241tene osobe
\r\n
\t\t\t- Dobivate SMS ili e-mail obavijest o dostavi novog e-ra\304\215una
\r\n
\t\t\t- Uvid u detaljni ispis poziva i va\305\241eg internetskog prometa
\r\n
\t\t\t- Arhiva pla\304\207enih ra\304\215una za prethodnih 12 mjeseci
\r\n
\t\t\t- \305\240tedite papir i poma\305\276ete o\304\215uvati prirodu
\r\n
\t\t
Svoje e-ra\304\215une \304\207ete primati na Moj Telekom Portalu. Obavijest o pristiglom ra\304\215unu poslat \304\207emo na sljede\304\207u e-mail adresu:
\r\n
\t\t\r\n
\t\t
\t\r\n
\t\t\r\n
\t\t
Na\304\215in dostave ra\304\215una uvijek mo\305\276ete promijeniti u postavkama va\305\241eg korisni\304\215kog profila.
\r\n
\t\t\r\n
\t\t
Ne \305\276elim e-ra\304\215un\r\n
\t\t\r\n
\t\t
\r\n
\t\t\r\n
\t
\t\n
\t
\r\n
\t\r\n
\t
Na \305\276alost, do\305\241lo je do gre\305\241ke i aktivacija e-ra\304\215una nije uspjela. Molimo Vas probajte ponovno kasnije.
\r\n
\t\r\n
\t
\r\n
\t\r\n
\t\n
\n
\r\n
\r\n
\r\n
\r\n
\r\n
\r\n
Frame 518: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:29:58.070153956 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724198.070153956 seconds
[Time delta from previous captured frame: 0.000038834 seconds]
[Time delta from previous displayed frame: 0.000038834 seconds]
[Time since reference or first frame: 23.272585103 seconds]
Frame Number: 518
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd354 (54100)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d92 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 35221, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 7880 (relative sequence number)
Acknowledgment number: 35221 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 517]
[The RTT to ACK the segment was: 0.000038834 seconds]
[iRTT: 0.003305578 seconds]
Frame 627: 1469 bytes on wire (11752 bits), 1469 bytes captured (11752 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:29:59.303562869 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724199.303562869 seconds
[Time delta from previous captured frame: 0.000050828 seconds]
[Time delta from previous displayed frame: 1.233408913 seconds]
[Time since reference or first frame: 24.505994016 seconds]
Frame Number: 627
Frame Length: 1469 bytes (11752 bits)
Capture Length: 1469 bytes (11752 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1453
Identification: 0xd355 (54101)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x480c [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 35221, Len: 1413
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 1413]
Sequence number: 7880 (relative sequence number)
[Next sequence number: 9293 (relative sequence number)]
Acknowledgment number: 35221 (relative ack number)
Header Length: 20 bytes
Flags: 0x018 (PSH, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 1... = Push: Set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······AP···]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1f89 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1413]
[Bytes sent since last PSH flag: 1413]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 1408
Encrypted Application Data: 1249deb9e6b04b549d14378a7d30585b10577763627b185f...
Hypertext Transfer Protocol
POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n
[Expert Info (Chat/Sequence): POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n]
[POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n]
[Severity level: Chat]
[Group: Sequence]
Request Method: POST
Request URI: /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages
Request Version: HTTP/1.1
Host: moj.hrvatskitelekom.hr\r\n
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n
Accept: application/json, text/javascript, */*; q=0.01\r\n
Accept-Language: en-US,en;q=0.5\r\n
Accept-Encoding: gzip, deflate\r\n
Content-Type: application/json; charset=utf-8\r\n
X-AjaxRequest: true\r\n
X-Requested-With: XMLHttpRequest\r\n
Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n
Content-Length: 2\r\n
[Content length: 2]
[truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085
Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8
Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc
Cookie pair: CurrentServiceId=12018216
Cookie pair: visited=1
Cookie pair: _ceg.s=ogzmhy
Cookie pair: _ceg.u=ogzmhy
Cookie pair: 62370768-VID=172480676440713
Cookie pair: 62370768-SKEY=5756825085274454102
Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE
Cookie pair: CookieNotification=yes
Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I
Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA==
Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo=
Connection: keep-alive\r\n
\r\n
[Full request URI: https://moj.hrvatskitelekom.hr/App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages]
[HTTP request 7/7]
[Prev request in frame: 488]
File Data: 2 bytes
JavaScript Object Notation: application/json
Object
Frame 628: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:29:59.307025553 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724199.307025553 seconds
[Time delta from previous captured frame: 0.003462684 seconds]
[Time delta from previous displayed frame: 0.003462684 seconds]
[Time since reference or first frame: 24.509456700 seconds]
Frame Number: 628
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: 993434ae
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x6f9c (28572)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x754a [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35221, Ack: 9293, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 35221 (relative sequence number)
Acknowledgment number: 9293 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x278e [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 627]
[The RTT to ACK the segment was: 0.003462684 seconds]
[iRTT: 0.003305578 seconds]
VSS-Monitoring ethernet trailer, Source Port: 40423
Src Port: 40423
Frame 629: 397 bytes on wire (3176 bits), 397 bytes captured (3176 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:29:59.325039412 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724199.325039412 seconds
[Time delta from previous captured frame: 0.018013859 seconds]
[Time delta from previous displayed frame: 0.018013859 seconds]
[Time since reference or first frame: 24.527470559 seconds]
Frame Number: 629
Frame Length: 397 bytes (3176 bits)
Capture Length: 397 bytes (3176 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 381
Identification: 0x6f9d (28573)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x73f4 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35221, Ack: 9293, Len: 341
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 341]
Sequence number: 35221 (relative sequence number)
[Next sequence number: 35562 (relative sequence number)]
Acknowledgment number: 9293 (relative ack number)
Header Length: 20 bytes
Flags: 0x018 (PSH, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 1... = Push: Set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······AP···]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1300 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 341]
[Bytes sent since last PSH flag: 341]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 336
Encrypted Application Data: a15e6918dd0e1356e43574481e3c7d8327b820ea14717559...
Hypertext Transfer Protocol
HTTP/1.1 200 OK\r\n
[Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n]
[HTTP/1.1 200 OK\r\n]
[Severity level: Chat]
[Group: Sequence]
Request Version: HTTP/1.1
Status Code: 200
Response Phrase: OK
Cache-Control: private, max-age=0\r\n
Content-Type: application/json; charset=utf-8\r\n
Server: Microsoft-IIS/8.5\r\n
X-RequestId: 13607d00-bbb8-4d0c-87b5-0e39146b8cf0\r\n
X-AspNet-Version: 4.0.30319\r\n
X-Powered-By: ASP.NET\r\n
Date: Mon, 21 Nov 2016 10:30:13 GMT\r\n
Content-Length: 8\r\n
[Content length: 8]
\r\n
[HTTP response 7/7]
[Time since request: 0.021476543 seconds]
[Prev request in frame: 488]
[Prev response in frame: 517]
[Request in frame: 627]
File Data: 8 bytes
JavaScript Object Notation: application/json
Object
Member Key: d
Array
Key: d
Frame 630: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:29:59.325103632 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724199.325103632 seconds
[Time delta from previous captured frame: 0.000064220 seconds]
[Time delta from previous displayed frame: 0.000064220 seconds]
[Time since reference or first frame: 24.527534779 seconds]
Frame Number: 630
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd357 (54103)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d8f [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 9293, Ack: 35562, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 9293 (relative sequence number)
Acknowledgment number: 35562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 629]
[The RTT to ACK the segment was: 0.000064220 seconds]
[iRTT: 0.003305578 seconds]
Frame 869: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:09.369604934 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724209.369604934 seconds
[Time delta from previous captured frame: 0.111978467 seconds]
[Time delta from previous displayed frame: 10.044501302 seconds]
[Time since reference or first frame: 34.572036081 seconds]
Frame Number: 869
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd358 (54104)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d8e [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 9292, Ack: 35562, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 9292 (relative sequence number)
Acknowledgment number: 35562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): TCP keep-alive segment]
[TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
Frame 870: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:09.372292267 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724209.372292267 seconds
[Time delta from previous captured frame: 0.002687333 seconds]
[Time delta from previous displayed frame: 0.002687333 seconds]
[Time since reference or first frame: 34.574723414 seconds]
Frame Number: 870
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: 39334383
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x6fa1 (28577)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x7545 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35562, Ack: 9293, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 35562 (relative sequence number)
Acknowledgment number: 9293 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x2639 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): ACK to a TCP keep-alive segment]
[ACK to a TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
VSS-Monitoring ethernet trailer, Source Port: 32639
Src Port: 32639
Frame 885: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:11.838115129 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724211.838115129 seconds
[Time delta from previous captured frame: 1.298059611 seconds]
[Time delta from previous displayed frame: 2.465822862 seconds]
[Time since reference or first frame: 37.040546276 seconds]
Frame Number: 885
Frame Length: 1325 bytes (10600 bits)
Capture Length: 1325 bytes (10600 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1309
Identification: 0xd359 (54105)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4898 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 9293, Ack: 35562, Len: 1269
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 1269]
Sequence number: 9293 (relative sequence number)
[Next sequence number: 10562 (relative sequence number)]
Acknowledgment number: 35562 (relative ack number)
Header Length: 20 bytes
Flags: 0x018 (PSH, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 1... = Push: Set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······AP···]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1ef9 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1269]
[Bytes sent since last PSH flag: 1269]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 1264
Encrypted Application Data: 756ebf596c39fc2f84b0f1e0112995f8f0298631925f6ab8...
Hypertext Transfer Protocol
GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf HTTP/1.1\r\n
[Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf HTTP/1.1\r\n]
[GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf HTTP/1.1\r\n]
[Severity level: Chat]
[Group: Sequence]
Request Method: GET
Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf
Request URI Path: /racuni/pregled-racuna-pdf
Request URI Query: serviceid=12018216&metaid=418703738&filename=418703738.pdf
Request URI Query Parameter: serviceid=12018216
Request URI Query Parameter: metaid=418703738
Request URI Query Parameter: filename=418703738.pdf
Request Version: HTTP/1.1
Host: moj.hrvatskitelekom.hr\r\n
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n
Accept-Language: en-US,en;q=0.5\r\n
Accept-Encoding: gzip, deflate\r\n
Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n
[truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085
Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8
Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc
Cookie pair: CurrentServiceId=12018216
Cookie pair: visited=1
Cookie pair: _ceg.s=ogzmhy
Cookie pair: _ceg.u=ogzmhy
Cookie pair: 62370768-VID=172480676440713
Cookie pair: 62370768-SKEY=5756825085274454102
Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE
Cookie pair: CookieNotification=yes
Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I
Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA==
Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo=
Connection: keep-alive\r\n
\r\n
[Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf]
[HTTP request 8/8]
[Prev request in frame: 627]
Frame 886: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:11.901656340 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724211.901656340 seconds
[Time delta from previous captured frame: 0.063541211 seconds]
[Time delta from previous displayed frame: 0.063541211 seconds]
[Time since reference or first frame: 37.104087487 seconds]
Frame Number: 886
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: e73d9efc
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x6fa2 (28578)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x7544 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35562, Ack: 10562, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 35562 (relative sequence number)
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x2639 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 885]
[The RTT to ACK the segment was: 0.063541211 seconds]
[iRTT: 0.003305578 seconds]
VSS-Monitoring ethernet trailer, Source Port: 45980
Src Port: 45980
Frame 887: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.273147864 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.273147864 seconds
[Time delta from previous captured frame: 0.371491524 seconds]
[Time delta from previous displayed frame: 0.371491524 seconds]
[Time since reference or first frame: 37.475579011 seconds]
Frame Number: 887
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fa3 (28579)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fdf [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35562, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 35562 (relative sequence number)
[Next sequence number: 36942 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x36fa [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 1380]
TCP segment data (1380 bytes)
Secure Sockets Layer
Frame 888: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.273220123 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.273220123 seconds
[Time delta from previous captured frame: 0.000072259 seconds]
[Time delta from previous displayed frame: 0.000072259 seconds]
[Time since reference or first frame: 37.475651270 seconds]
Frame Number: 888
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd35a (54106)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d8c [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 36942, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 36942 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 887]
[The RTT to ACK the segment was: 0.000072259 seconds]
[iRTT: 0.003305578 seconds]
Frame 889: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.273304294 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.273304294 seconds
[Time delta from previous captured frame: 0.000084171 seconds]
[Time delta from previous displayed frame: 0.000084171 seconds]
[Time since reference or first frame: 37.475735441 seconds]
Frame Number: 889
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fa4 (28580)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fde [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 36942, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 36942 (relative sequence number)
[Next sequence number: 38322 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x9987 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 2760]
TCP segment data (1380 bytes)
Frame 890: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.273333170 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.273333170 seconds
[Time delta from previous captured frame: 0.000028876 seconds]
[Time delta from previous displayed frame: 0.000028876 seconds]
[Time since reference or first frame: 37.475764317 seconds]
Frame Number: 890
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd35b (54107)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d8b [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 38322, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 38322 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 889]
[The RTT to ACK the segment was: 0.000028876 seconds]
[iRTT: 0.003305578 seconds]
Frame 891: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.273364391 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.273364391 seconds
[Time delta from previous captured frame: 0.000031221 seconds]
[Time delta from previous displayed frame: 0.000031221 seconds]
[Time since reference or first frame: 37.475795538 seconds]
Frame Number: 891
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fa5 (28581)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fdd [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 38322, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 38322 (relative sequence number)
[Next sequence number: 39702 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x8550 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 4140]
TCP segment data (1380 bytes)
Frame 892: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.273382943 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.273382943 seconds
[Time delta from previous captured frame: 0.000018552 seconds]
[Time delta from previous displayed frame: 0.000018552 seconds]
[Time since reference or first frame: 37.475814090 seconds]
Frame Number: 892
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd35c (54108)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d8a [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 39702, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 39702 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 891]
[The RTT to ACK the segment was: 0.000018552 seconds]
[iRTT: 0.003305578 seconds]
Frame 893: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.273395924 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.273395924 seconds
[Time delta from previous captured frame: 0.000012981 seconds]
[Time delta from previous displayed frame: 0.000012981 seconds]
[Time since reference or first frame: 37.475827071 seconds]
Frame Number: 893
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fa6 (28582)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fdc [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 39702, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 39702 (relative sequence number)
[Next sequence number: 41082 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x0b88 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 5520]
TCP segment data (1380 bytes)
Frame 894: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.273412063 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.273412063 seconds
[Time delta from previous captured frame: 0.000016139 seconds]
[Time delta from previous displayed frame: 0.000016139 seconds]
[Time since reference or first frame: 37.475843210 seconds]
Frame Number: 894
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd35d (54109)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d89 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 41082, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 41082 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 893]
[The RTT to ACK the segment was: 0.000016139 seconds]
[iRTT: 0.003305578 seconds]
Frame 895: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.273597893 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.273597893 seconds
[Time delta from previous captured frame: 0.000185830 seconds]
[Time delta from previous displayed frame: 0.000185830 seconds]
[Time since reference or first frame: 37.476029040 seconds]
Frame Number: 895
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fa7 (28583)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fdb [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 41082, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 41082 (relative sequence number)
[Next sequence number: 42462 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xd626 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 6900]
TCP segment data (1380 bytes)
Frame 896: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.273618317 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.273618317 seconds
[Time delta from previous captured frame: 0.000020424 seconds]
[Time delta from previous displayed frame: 0.000020424 seconds]
[Time since reference or first frame: 37.476049464 seconds]
Frame Number: 896
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd35e (54110)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d88 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 42462, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 42462 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 895]
[The RTT to ACK the segment was: 0.000020424 seconds]
[iRTT: 0.003305578 seconds]
Frame 897: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.274673995 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.274673995 seconds
[Time delta from previous captured frame: 0.001055678 seconds]
[Time delta from previous displayed frame: 0.001055678 seconds]
[Time since reference or first frame: 37.477105142 seconds]
Frame Number: 897
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fa8 (28584)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fda [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 42462, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 42462 (relative sequence number)
[Next sequence number: 43842 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xb810 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 8280]
TCP segment data (1380 bytes)
Frame 898: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.274708967 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.274708967 seconds
[Time delta from previous captured frame: 0.000034972 seconds]
[Time delta from previous displayed frame: 0.000034972 seconds]
[Time since reference or first frame: 37.477140114 seconds]
Frame Number: 898
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd35f (54111)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d87 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 43842, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 43842 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 897]
[The RTT to ACK the segment was: 0.000034972 seconds]
[iRTT: 0.003305578 seconds]
Frame 899: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.274805431 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.274805431 seconds
[Time delta from previous captured frame: 0.000096464 seconds]
[Time delta from previous displayed frame: 0.000096464 seconds]
[Time since reference or first frame: 37.477236578 seconds]
Frame Number: 899
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fa9 (28585)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fd9 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 43842, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 43842 (relative sequence number)
[Next sequence number: 45222 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1f9b [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 9660]
TCP segment data (1380 bytes)
Frame 900: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.274824017 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.274824017 seconds
[Time delta from previous captured frame: 0.000018586 seconds]
[Time delta from previous displayed frame: 0.000018586 seconds]
[Time since reference or first frame: 37.477255164 seconds]
Frame Number: 900
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd360 (54112)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d86 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 45222, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 45222 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 899]
[The RTT to ACK the segment was: 0.000018586 seconds]
[iRTT: 0.003305578 seconds]
Frame 901: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.274839691 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.274839691 seconds
[Time delta from previous captured frame: 0.000015674 seconds]
[Time delta from previous displayed frame: 0.000015674 seconds]
[Time since reference or first frame: 37.477270838 seconds]
Frame Number: 901
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6faa (28586)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fd8 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 45222, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 45222 (relative sequence number)
[Next sequence number: 46602 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x62bb [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 11040]
TCP segment data (1380 bytes)
Frame 902: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.274856304 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.274856304 seconds
[Time delta from previous captured frame: 0.000016613 seconds]
[Time delta from previous displayed frame: 0.000016613 seconds]
[Time since reference or first frame: 37.477287451 seconds]
Frame Number: 902
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd361 (54113)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d85 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 46602, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 46602 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 901]
[The RTT to ACK the segment was: 0.000016613 seconds]
[iRTT: 0.003305578 seconds]
Frame 903: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275038858 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275038858 seconds
[Time delta from previous captured frame: 0.000182554 seconds]
[Time delta from previous displayed frame: 0.000182554 seconds]
[Time since reference or first frame: 37.477470005 seconds]
Frame Number: 903
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fab (28587)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fd7 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 46602, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 46602 (relative sequence number)
[Next sequence number: 47982 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xf253 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 12420]
TCP segment data (1380 bytes)
Frame 904: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275057736 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275057736 seconds
[Time delta from previous captured frame: 0.000018878 seconds]
[Time delta from previous displayed frame: 0.000018878 seconds]
[Time since reference or first frame: 37.477488883 seconds]
Frame Number: 904
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd362 (54114)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d84 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 47982, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 47982 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 903]
[The RTT to ACK the segment was: 0.000018878 seconds]
[iRTT: 0.003305578 seconds]
Frame 905: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275076429 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275076429 seconds
[Time delta from previous captured frame: 0.000018693 seconds]
[Time delta from previous displayed frame: 0.000018693 seconds]
[Time since reference or first frame: 37.477507576 seconds]
Frame Number: 905
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fac (28588)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fd6 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 47982, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 47982 (relative sequence number)
[Next sequence number: 49362 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a15 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 13800]
TCP segment data (1380 bytes)
Frame 906: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275094371 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275094371 seconds
[Time delta from previous captured frame: 0.000017942 seconds]
[Time delta from previous displayed frame: 0.000017942 seconds]
[Time since reference or first frame: 37.477525518 seconds]
Frame Number: 906
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd363 (54115)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d83 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 49362, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 49362 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 905]
[The RTT to ACK the segment was: 0.000017942 seconds]
[iRTT: 0.003305578 seconds]
Frame 907: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275282844 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275282844 seconds
[Time delta from previous captured frame: 0.000188473 seconds]
[Time delta from previous displayed frame: 0.000188473 seconds]
[Time since reference or first frame: 37.477713991 seconds]
Frame Number: 907
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fad (28589)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fd5 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 49362, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 49362 (relative sequence number)
[Next sequence number: 50742 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x2137 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 15180]
TCP segment data (1380 bytes)
Frame 908: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275301936 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275301936 seconds
[Time delta from previous captured frame: 0.000019092 seconds]
[Time delta from previous displayed frame: 0.000019092 seconds]
[Time since reference or first frame: 37.477733083 seconds]
Frame Number: 908
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd364 (54116)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d82 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 50742, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 50742 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 907]
[The RTT to ACK the segment was: 0.000019092 seconds]
[iRTT: 0.003305578 seconds]
Frame 909: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275317114 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275317114 seconds
[Time delta from previous captured frame: 0.000015178 seconds]
[Time delta from previous displayed frame: 0.000015178 seconds]
[Time since reference or first frame: 37.477748261 seconds]
Frame Number: 909
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fae (28590)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fd4 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 50742, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 50742 (relative sequence number)
[Next sequence number: 52122 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x498d [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 16560]
TCP segment data (1257 bytes)
TCP segment data (123 bytes)
[12 Reassembled TCP Segments (16437 bytes): #887(1380), #889(1380), #891(1380), #893(1380), #895(1380), #897(1380), #899(1380), #901(1380), #903(1380), #905(1380), #907(1380), #909(1257)]
[Frame: 887, payload: 0-1379 (1380 bytes)]
[Frame: 889, payload: 1380-2759 (1380 bytes)]
[Frame: 891, payload: 2760-4139 (1380 bytes)]
[Frame: 893, payload: 4140-5519 (1380 bytes)]
[Frame: 895, payload: 5520-6899 (1380 bytes)]
[Frame: 897, payload: 6900-8279 (1380 bytes)]
[Frame: 899, payload: 8280-9659 (1380 bytes)]
[Frame: 901, payload: 9660-11039 (1380 bytes)]
[Frame: 903, payload: 11040-12419 (1380 bytes)]
[Frame: 905, payload: 12420-13799 (1380 bytes)]
[Frame: 907, payload: 13800-15179 (1380 bytes)]
[Frame: 909, payload: 15180-16436 (1257 bytes)]
[Segment count: 12]
[Reassembled TCP length: 16437]
[Reassembled TCP Data: 170303403014557c934686ee7242142494d27291c51a7b10...]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 16432
Encrypted Application Data: 14557c934686ee7242142494d27291c51a7b10e25ae837d3...
SSL segment data (16384 bytes)
Secure Sockets Layer
Frame 910: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275336529 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275336529 seconds
[Time delta from previous captured frame: 0.000019415 seconds]
[Time delta from previous displayed frame: 0.000019415 seconds]
[Time since reference or first frame: 37.477767676 seconds]
Frame Number: 910
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd365 (54117)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d81 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 52122, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 52122 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 909]
[The RTT to ACK the segment was: 0.000019415 seconds]
[iRTT: 0.003305578 seconds]
Frame 911: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275504652 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275504652 seconds
[Time delta from previous captured frame: 0.000168123 seconds]
[Time delta from previous displayed frame: 0.000168123 seconds]
[Time since reference or first frame: 37.477935799 seconds]
Frame Number: 911
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6faf (28591)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fd3 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 52122, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 52122 (relative sequence number)
[Next sequence number: 53502 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xd1dd [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 17940]
TCP segment data (1380 bytes)
Frame 912: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275522920 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275522920 seconds
[Time delta from previous captured frame: 0.000018268 seconds]
[Time delta from previous displayed frame: 0.000018268 seconds]
[Time since reference or first frame: 37.477954067 seconds]
Frame Number: 912
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd366 (54118)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d80 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 53502, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 53502 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 911]
[The RTT to ACK the segment was: 0.000018268 seconds]
[iRTT: 0.003305578 seconds]
Frame 913: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275541636 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275541636 seconds
[Time delta from previous captured frame: 0.000018716 seconds]
[Time delta from previous displayed frame: 0.000018716 seconds]
[Time since reference or first frame: 37.477972783 seconds]
Frame Number: 913
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fb0 (28592)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fd2 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 53502, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 53502 (relative sequence number)
[Next sequence number: 54882 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x7495 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 19320]
TCP segment data (1380 bytes)
Frame 914: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275557964 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275557964 seconds
[Time delta from previous captured frame: 0.000016328 seconds]
[Time delta from previous displayed frame: 0.000016328 seconds]
[Time since reference or first frame: 37.477989111 seconds]
Frame Number: 914
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd367 (54119)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d7f [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 54882, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 54882 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 913]
[The RTT to ACK the segment was: 0.000016328 seconds]
[iRTT: 0.003305578 seconds]
Frame 915: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275737155 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275737155 seconds
[Time delta from previous captured frame: 0.000179191 seconds]
[Time delta from previous displayed frame: 0.000179191 seconds]
[Time since reference or first frame: 37.478168302 seconds]
Frame Number: 915
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fb1 (28593)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fd1 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 54882, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 54882 (relative sequence number)
[Next sequence number: 56262 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x621d [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 20700]
TCP segment data (1380 bytes)
Frame 916: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275756070 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275756070 seconds
[Time delta from previous captured frame: 0.000018915 seconds]
[Time delta from previous displayed frame: 0.000018915 seconds]
[Time since reference or first frame: 37.478187217 seconds]
Frame Number: 916
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd368 (54120)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d7e [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 56262, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 56262 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 915]
[The RTT to ACK the segment was: 0.000018915 seconds]
[iRTT: 0.003305578 seconds]
Frame 917: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275769682 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275769682 seconds
[Time delta from previous captured frame: 0.000013612 seconds]
[Time delta from previous displayed frame: 0.000013612 seconds]
[Time since reference or first frame: 37.478200829 seconds]
Frame Number: 917
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fb2 (28594)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fd0 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 56262, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 56262 (relative sequence number)
[Next sequence number: 57642 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xd8c6 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 22080]
TCP segment data (1380 bytes)
Frame 918: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275784729 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275784729 seconds
[Time delta from previous captured frame: 0.000015047 seconds]
[Time delta from previous displayed frame: 0.000015047 seconds]
[Time since reference or first frame: 37.478215876 seconds]
Frame Number: 918
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd369 (54121)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d7d [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 57642, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 57642 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 917]
[The RTT to ACK the segment was: 0.000015047 seconds]
[iRTT: 0.003305578 seconds]
Frame 919: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275971140 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275971140 seconds
[Time delta from previous captured frame: 0.000186411 seconds]
[Time delta from previous displayed frame: 0.000186411 seconds]
[Time since reference or first frame: 37.478402287 seconds]
Frame Number: 919
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fb3 (28595)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fcf [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 57642, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 57642 (relative sequence number)
[Next sequence number: 59022 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xb902 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 23460]
TCP segment data (1380 bytes)
Frame 920: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.275994185 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.275994185 seconds
[Time delta from previous captured frame: 0.000023045 seconds]
[Time delta from previous displayed frame: 0.000023045 seconds]
[Time since reference or first frame: 37.478425332 seconds]
Frame Number: 920
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fb4 (28596)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fce [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 59022, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 59022 (relative sequence number)
[Next sequence number: 60402 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x4921 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 24840]
TCP segment data (1380 bytes)
Frame 921: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276010551 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276010551 seconds
[Time delta from previous captured frame: 0.000016366 seconds]
[Time delta from previous displayed frame: 0.000016366 seconds]
[Time since reference or first frame: 37.478441698 seconds]
Frame Number: 921
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd36a (54122)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d7c [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 60402, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 60402 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 920]
[The RTT to ACK the segment was: 0.000016366 seconds]
[iRTT: 0.003305578 seconds]
Frame 922: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276205562 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276205562 seconds
[Time delta from previous captured frame: 0.000195011 seconds]
[Time delta from previous displayed frame: 0.000195011 seconds]
[Time since reference or first frame: 37.478636709 seconds]
Frame Number: 922
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fb5 (28597)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fcd [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 60402, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 60402 (relative sequence number)
[Next sequence number: 61782 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x0a79 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 26220]
TCP segment data (1380 bytes)
Frame 923: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276231579 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276231579 seconds
[Time delta from previous captured frame: 0.000026017 seconds]
[Time delta from previous displayed frame: 0.000026017 seconds]
[Time since reference or first frame: 37.478662726 seconds]
Frame Number: 923
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fb6 (28598)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fcc [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 61782, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 61782 (relative sequence number)
[Next sequence number: 63162 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x74f0 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 27600]
TCP segment data (1380 bytes)
Frame 924: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276248734 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276248734 seconds
[Time delta from previous captured frame: 0.000017155 seconds]
[Time delta from previous displayed frame: 0.000017155 seconds]
[Time since reference or first frame: 37.478679881 seconds]
Frame Number: 924
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd36b (54123)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d7b [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 63162, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 63162 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 923]
[The RTT to ACK the segment was: 0.000017155 seconds]
[iRTT: 0.003305578 seconds]
Frame 925: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276438772 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276438772 seconds
[Time delta from previous captured frame: 0.000190038 seconds]
[Time delta from previous displayed frame: 0.000190038 seconds]
[Time since reference or first frame: 37.478869919 seconds]
Frame Number: 925
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fb7 (28599)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fcb [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 63162, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 63162 (relative sequence number)
[Next sequence number: 64542 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x6b9c [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 28980]
TCP segment data (1380 bytes)
Frame 926: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276462555 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276462555 seconds
[Time delta from previous captured frame: 0.000023783 seconds]
[Time delta from previous displayed frame: 0.000023783 seconds]
[Time since reference or first frame: 37.478893702 seconds]
Frame Number: 926
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fb8 (28600)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fca [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 64542, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 64542 (relative sequence number)
[Next sequence number: 65922 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xc1f8 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 30360]
TCP segment data (1380 bytes)
Frame 927: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276478322 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276478322 seconds
[Time delta from previous captured frame: 0.000015767 seconds]
[Time delta from previous displayed frame: 0.000015767 seconds]
[Time since reference or first frame: 37.478909469 seconds]
Frame Number: 927
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd36c (54124)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d7a [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 65922, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 65922 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 926]
[The RTT to ACK the segment was: 0.000015767 seconds]
[iRTT: 0.003305578 seconds]
Frame 928: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276671555 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276671555 seconds
[Time delta from previous captured frame: 0.000193233 seconds]
[Time delta from previous displayed frame: 0.000193233 seconds]
[Time since reference or first frame: 37.479102702 seconds]
Frame Number: 928
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fb9 (28601)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fc9 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 65922, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 65922 (relative sequence number)
[Next sequence number: 67302 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x65c5 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 31740]
TCP segment data (1380 bytes)
Frame 929: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276697261 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276697261 seconds
[Time delta from previous captured frame: 0.000025706 seconds]
[Time delta from previous displayed frame: 0.000025706 seconds]
[Time since reference or first frame: 37.479128408 seconds]
Frame Number: 929
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:ssl]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fba (28602)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fc8 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 67302, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 67302 (relative sequence number)
[Next sequence number: 68682 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x2b02 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 33120]
TCP segment data (1134 bytes)
TCP segment data (246 bytes)
[13 Reassembled TCP Segments (16437 bytes): #909(123), #911(1380), #913(1380), #915(1380), #917(1380), #919(1380), #920(1380), #922(1380), #923(1380), #925(1380), #926(1380), #928(1380), #929(1134)]
[Frame: 909, payload: 0-122 (123 bytes)]
[Frame: 911, payload: 123-1502 (1380 bytes)]
[Frame: 913, payload: 1503-2882 (1380 bytes)]
[Frame: 915, payload: 2883-4262 (1380 bytes)]
[Frame: 917, payload: 4263-5642 (1380 bytes)]
[Frame: 919, payload: 5643-7022 (1380 bytes)]
[Frame: 920, payload: 7023-8402 (1380 bytes)]
[Frame: 922, payload: 8403-9782 (1380 bytes)]
[Frame: 923, payload: 9783-11162 (1380 bytes)]
[Frame: 925, payload: 11163-12542 (1380 bytes)]
[Frame: 926, payload: 12543-13922 (1380 bytes)]
[Frame: 928, payload: 13923-15302 (1380 bytes)]
[Frame: 929, payload: 15303-16436 (1134 bytes)]
[Segment count: 13]
[Reassembled TCP length: 16437]
[Reassembled TCP Data: 170303403069241bf220aa029a12a8b3257d45de84f2b7b5...]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 16432
Encrypted Application Data: 69241bf220aa029a12a8b3257d45de84f2b7b5e67ae8ca4d...
SSL segment data (16384 bytes)
Secure Sockets Layer
Frame 930: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276713960 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276713960 seconds
[Time delta from previous captured frame: 0.000016699 seconds]
[Time delta from previous displayed frame: 0.000016699 seconds]
[Time since reference or first frame: 37.479145107 seconds]
Frame Number: 930
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd36d (54125)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d79 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 68682, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 68682 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 929]
[The RTT to ACK the segment was: 0.000016699 seconds]
[iRTT: 0.003305578 seconds]
Frame 931: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276904277 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276904277 seconds
[Time delta from previous captured frame: 0.000190317 seconds]
[Time delta from previous displayed frame: 0.000190317 seconds]
[Time since reference or first frame: 37.479335424 seconds]
Frame Number: 931
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fbb (28603)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fc7 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 68682, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 68682 (relative sequence number)
[Next sequence number: 70062 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x15d8 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 34500]
TCP segment data (1380 bytes)
Frame 932: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276926774 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276926774 seconds
[Time delta from previous captured frame: 0.000022497 seconds]
[Time delta from previous displayed frame: 0.000022497 seconds]
[Time since reference or first frame: 37.479357921 seconds]
Frame Number: 932
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fbc (28604)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fc6 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 70062, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 70062 (relative sequence number)
[Next sequence number: 71442 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xddda [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 35880]
TCP segment data (1380 bytes)
Frame 933: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.276943166 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.276943166 seconds
[Time delta from previous captured frame: 0.000016392 seconds]
[Time delta from previous displayed frame: 0.000016392 seconds]
[Time since reference or first frame: 37.479374313 seconds]
Frame Number: 933
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd36e (54126)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d78 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 71442, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 71442 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 932]
[The RTT to ACK the segment was: 0.000016392 seconds]
[iRTT: 0.003305578 seconds]
Frame 934: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.277137938 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.277137938 seconds
[Time delta from previous captured frame: 0.000194772 seconds]
[Time delta from previous displayed frame: 0.000194772 seconds]
[Time since reference or first frame: 37.479569085 seconds]
Frame Number: 934
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fbd (28605)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fc5 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 71442, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 71442 (relative sequence number)
[Next sequence number: 72822 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x680c [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 37260]
TCP segment data (1380 bytes)
Frame 935: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.277171198 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.277171198 seconds
[Time delta from previous captured frame: 0.000033260 seconds]
[Time delta from previous displayed frame: 0.000033260 seconds]
[Time since reference or first frame: 37.479602345 seconds]
Frame Number: 935
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fbe (28606)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fc4 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 72822, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 72822 (relative sequence number)
[Next sequence number: 74202 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x6978 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 38640]
TCP segment data (1380 bytes)
Frame 936: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.277192791 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.277192791 seconds
[Time delta from previous captured frame: 0.000021593 seconds]
[Time delta from previous displayed frame: 0.000021593 seconds]
[Time since reference or first frame: 37.479623938 seconds]
Frame Number: 936
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd36f (54127)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d77 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 74202, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 74202 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 935]
[The RTT to ACK the segment was: 0.000021593 seconds]
[iRTT: 0.003305578 seconds]
Frame 937: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.277372220 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.277372220 seconds
[Time delta from previous captured frame: 0.000179429 seconds]
[Time delta from previous displayed frame: 0.000179429 seconds]
[Time since reference or first frame: 37.479803367 seconds]
Frame Number: 937
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fbf (28607)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fc3 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 74202, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 74202 (relative sequence number)
[Next sequence number: 75582 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x20c0 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 40020]
TCP segment data (1380 bytes)
Frame 938: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.278269066 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.278269066 seconds
[Time delta from previous captured frame: 0.000896846 seconds]
[Time delta from previous displayed frame: 0.000896846 seconds]
[Time since reference or first frame: 37.480700213 seconds]
Frame Number: 938
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fc0 (28608)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fc2 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 75582, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 75582 (relative sequence number)
[Next sequence number: 76962 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x9a06 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 41400]
TCP segment data (1380 bytes)
Frame 939: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.278302192 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.278302192 seconds
[Time delta from previous captured frame: 0.000033126 seconds]
[Time delta from previous displayed frame: 0.000033126 seconds]
[Time since reference or first frame: 37.480733339 seconds]
Frame Number: 939
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd370 (54128)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d76 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 76962, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 76962 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 938]
[The RTT to ACK the segment was: 0.000033126 seconds]
[iRTT: 0.003305578 seconds]
Frame 940: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.278358645 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.278358645 seconds
[Time delta from previous captured frame: 0.000056453 seconds]
[Time delta from previous displayed frame: 0.000056453 seconds]
[Time since reference or first frame: 37.480789792 seconds]
Frame Number: 940
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fc1 (28609)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fc1 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 76962, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 76962 (relative sequence number)
[Next sequence number: 78342 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xfb02 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 42780]
TCP segment data (1380 bytes)
Frame 941: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.278490195 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.278490195 seconds
[Time delta from previous captured frame: 0.000131550 seconds]
[Time delta from previous displayed frame: 0.000131550 seconds]
[Time since reference or first frame: 37.480921342 seconds]
Frame Number: 941
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fc2 (28610)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fc0 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 78342, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 78342 (relative sequence number)
[Next sequence number: 79722 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xea01 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 44160]
TCP segment data (1380 bytes)
Frame 942: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.278508197 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.278508197 seconds
[Time delta from previous captured frame: 0.000018002 seconds]
[Time delta from previous displayed frame: 0.000018002 seconds]
[Time since reference or first frame: 37.480939344 seconds]
Frame Number: 942
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd371 (54129)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d75 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 79722, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 79722 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 941]
[The RTT to ACK the segment was: 0.000018002 seconds]
[iRTT: 0.003305578 seconds]
Frame 943: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.278526633 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.278526633 seconds
[Time delta from previous captured frame: 0.000018436 seconds]
[Time delta from previous displayed frame: 0.000018436 seconds]
[Time since reference or first frame: 37.480957780 seconds]
Frame Number: 943
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fc3 (28611)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fbf [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 79722, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 79722 (relative sequence number)
[Next sequence number: 81102 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xc892 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 45540]
TCP segment data (1380 bytes)
Frame 944: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.279730869 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.279730869 seconds
[Time delta from previous captured frame: 0.001204236 seconds]
[Time delta from previous displayed frame: 0.001204236 seconds]
[Time since reference or first frame: 37.482162016 seconds]
Frame Number: 944
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fc4 (28612)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fbe [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 81102, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 81102 (relative sequence number)
[Next sequence number: 82482 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x8028 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 46920]
TCP segment data (1380 bytes)
Frame 945: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.279763233 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.279763233 seconds
[Time delta from previous captured frame: 0.000032364 seconds]
[Time delta from previous displayed frame: 0.000032364 seconds]
[Time since reference or first frame: 37.482194380 seconds]
Frame Number: 945
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd372 (54130)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d74 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 82482, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 82482 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 944]
[The RTT to ACK the segment was: 0.000032364 seconds]
[iRTT: 0.003305578 seconds]
Frame 946: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.279790407 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.279790407 seconds
[Time delta from previous captured frame: 0.000027174 seconds]
[Time delta from previous displayed frame: 0.000027174 seconds]
[Time since reference or first frame: 37.482221554 seconds]
Frame Number: 946
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fc5 (28613)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fbd [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 82482, Ack: 10562, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 82482 (relative sequence number)
[Next sequence number: 83862 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xd0b8 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 48300]
TCP segment data (1380 bytes)
Frame 947: 731 bytes on wire (5848 bits), 731 bytes captured (5848 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.279810679 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.279810679 seconds
[Time delta from previous captured frame: 0.000020272 seconds]
[Time delta from previous displayed frame: 0.000020272 seconds]
[Time since reference or first frame: 37.482241826 seconds]
Frame Number: 947
Frame Length: 731 bytes (5848 bits)
Capture Length: 731 bytes (5848 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http:media]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 715
Identification: 0x6fc6 (28614)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x727d [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 83862, Ack: 10562, Len: 675
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 675]
Sequence number: 83862 (relative sequence number)
[Next sequence number: 84537 (relative sequence number)]
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x018 (PSH, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 1... = Push: Set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······AP···]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x89c3 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2055]
[Bytes sent since last PSH flag: 48975]
TCP segment data (675 bytes)
[13 Reassembled TCP Segments (16101 bytes): #929(246), #931(1380), #932(1380), #934(1380), #935(1380), #937(1380), #938(1380), #940(1380), #941(1380), #943(1380), #944(1380), #946(1380), #947(675)]
[Frame: 929, payload: 0-245 (246 bytes)]
[Frame: 931, payload: 246-1625 (1380 bytes)]
[Frame: 932, payload: 1626-3005 (1380 bytes)]
[Frame: 934, payload: 3006-4385 (1380 bytes)]
[Frame: 935, payload: 4386-5765 (1380 bytes)]
[Frame: 937, payload: 5766-7145 (1380 bytes)]
[Frame: 938, payload: 7146-8525 (1380 bytes)]
[Frame: 940, payload: 8526-9905 (1380 bytes)]
[Frame: 941, payload: 9906-11285 (1380 bytes)]
[Frame: 943, payload: 11286-12665 (1380 bytes)]
[Frame: 944, payload: 12666-14045 (1380 bytes)]
[Frame: 946, payload: 14046-15425 (1380 bytes)]
[Frame: 947, payload: 15426-16100 (675 bytes)]
[Segment count: 13]
[Reassembled TCP length: 16101]
[Reassembled TCP Data: 1703033ee045c15dd5081d88d3cc41252f42a1e04e40e7db...]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 16096
Encrypted Application Data: 45c15dd5081d88d3cc41252f42a1e04e40e7dbabeee1fc16...
SSL segment data (16054 bytes)
[3 Reassembled SSL segments (48822 bytes): #909(16384), #929(16384), #947(16054)]
[Frame: 909, payload: 0-16383 (16384 bytes)]
[Frame: 929, payload: 16384-32767 (16384 bytes)]
[Frame: 947, payload: 32768-48821 (16054 bytes)]
[Segment count: 3]
[Reassembled PDU length: 48822]
[Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...]
Hypertext Transfer Protocol
HTTP/1.1 200 OK\r\n
[Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n]
[HTTP/1.1 200 OK\r\n]
[Severity level: Chat]
[Group: Sequence]
Request Version: HTTP/1.1
Status Code: 200
Response Phrase: OK
Cache-Control: private\r\n
Content-Type: application/pdf\r\n
Server: Microsoft-IIS/8.5\r\n
X-RequestId: bf608971-bdaa-4a1e-b538-272f446f0f2d\r\n
Content-Disposition: attachment; filename="418703738.pdf"\r\n
X-AspNet-Version: 4.0.30319\r\n
X-Powered-By: ASP.NET\r\n
Date: Mon, 21 Nov 2016 10:30:26 GMT\r\n
Content-Length: 48499\r\n
[Content length: 48499]
\r\n
[HTTP response 8/8]
[Time since request: 0.441695550 seconds]
[Prev request in frame: 627]
[Prev response in frame: 629]
[Request in frame: 885]
File Data: 48499 bytes
Media Type
Media type: application/pdf (48499 bytes)
Frame 948: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:12.279826527 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724212.279826527 seconds
[Time delta from previous captured frame: 0.000015848 seconds]
[Time delta from previous displayed frame: 0.000015848 seconds]
[Time since reference or first frame: 37.482257674 seconds]
Frame Number: 948
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd373 (54131)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d73 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 84537, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10562 (relative sequence number)
Acknowledgment number: 84537 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 947]
[The RTT to ACK the segment was: 0.000015848 seconds]
[iRTT: 0.003305578 seconds]
Frame 975: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:22.297628804 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724222.297628804 seconds
[Time delta from previous captured frame: 0.207420895 seconds]
[Time delta from previous displayed frame: 10.017802277 seconds]
[Time since reference or first frame: 47.500059951 seconds]
Frame Number: 975
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd374 (54132)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d72 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10561, Ack: 84537, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10561 (relative sequence number)
Acknowledgment number: 84537 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): TCP keep-alive segment]
[TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
Frame 976: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:22.300302930 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724222.300302930 seconds
[Time delta from previous captured frame: 0.002674126 seconds]
[Time delta from previous displayed frame: 0.002674126 seconds]
[Time since reference or first frame: 47.502734077 seconds]
Frame Number: 976
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: ef34d8c7
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x6fca (28618)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x751c [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 10562, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 84537 (relative sequence number)
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x66e9 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): ACK to a TCP keep-alive segment]
[ACK to a TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
VSS-Monitoring ethernet trailer, Source Port: 167
Src Port: 167
Frame 1020: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:32.601580209 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724232.601580209 seconds
[Time delta from previous captured frame: 0.188020291 seconds]
[Time delta from previous displayed frame: 10.301277279 seconds]
[Time since reference or first frame: 57.804011356 seconds]
Frame Number: 1020
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd375 (54133)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d71 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10561, Ack: 84537, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10561 (relative sequence number)
Acknowledgment number: 84537 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): TCP keep-alive segment]
[TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
Frame 1021: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:32.604565936 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724232.604565936 seconds
[Time delta from previous captured frame: 0.002985727 seconds]
[Time delta from previous displayed frame: 0.002985727 seconds]
[Time since reference or first frame: 57.806997083 seconds]
Frame Number: 1021
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: 03fa416b
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x6fcb (28619)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x751b [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 10562, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 84537 (relative sequence number)
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x66e9 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): ACK to a TCP keep-alive segment]
[ACK to a TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
VSS-Monitoring ethernet trailer, Source Port: 8241
Src Port: 8241
Frame 1043: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:42.841633834 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724242.841633834 seconds
[Time delta from previous captured frame: 0.827989146 seconds]
[Time delta from previous displayed frame: 10.237067898 seconds]
[Time since reference or first frame: 68.044064981 seconds]
Frame Number: 1043
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd376 (54134)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d70 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10561, Ack: 84537, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 10561 (relative sequence number)
Acknowledgment number: 84537 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): TCP keep-alive segment]
[TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
Frame 1044: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:42.844588589 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724242.844588589 seconds
[Time delta from previous captured frame: 0.002954755 seconds]
[Time delta from previous displayed frame: 0.002954755 seconds]
[Time since reference or first frame: 68.047019736 seconds]
Frame Number: 1044
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: d4fc00cd
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x6fcc (28620)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x751a [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 10562, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 84537 (relative sequence number)
Acknowledgment number: 10562 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x66e9 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): ACK to a TCP keep-alive segment]
[ACK to a TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
VSS-Monitoring ethernet trailer, Source Port: 17966
Src Port: 17966
Frame 1073: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.474256372 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.474256372 seconds
[Time delta from previous captured frame: 0.654638443 seconds]
[Time delta from previous displayed frame: 8.629667783 seconds]
[Time since reference or first frame: 76.676687519 seconds]
Frame Number: 1073
Frame Length: 1325 bytes (10600 bits)
Capture Length: 1325 bytes (10600 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1309
Identification: 0xd377 (54135)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x487a [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 84537, Len: 1269
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 1269]
Sequence number: 10562 (relative sequence number)
[Next sequence number: 11831 (relative sequence number)]
Acknowledgment number: 84537 (relative ack number)
Header Length: 20 bytes
Flags: 0x018 (PSH, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 1... = Push: Set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······AP···]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1ef9 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1269]
[Bytes sent since last PSH flag: 1269]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 1264
Encrypted Application Data: d8ee3489432e319933ad92a02442fe08698b65f920c0a828...
Hypertext Transfer Protocol
GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf HTTP/1.1\r\n
[Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf HTTP/1.1\r\n]
[GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf HTTP/1.1\r\n]
[Severity level: Chat]
[Group: Sequence]
Request Method: GET
Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf
Request URI Path: /racuni/pregled-racuna-pdf
Request URI Query: serviceid=12018216&metaid=424888813&filename=424888813.pdf
Request URI Query Parameter: serviceid=12018216
Request URI Query Parameter: metaid=424888813
Request URI Query Parameter: filename=424888813.pdf
Request Version: HTTP/1.1
Host: moj.hrvatskitelekom.hr\r\n
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n
Accept-Language: en-US,en;q=0.5\r\n
Accept-Encoding: gzip, deflate\r\n
Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n
[truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085
Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8
Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc
Cookie pair: CurrentServiceId=12018216
Cookie pair: visited=1
Cookie pair: _ceg.s=ogzmhy
Cookie pair: _ceg.u=ogzmhy
Cookie pair: 62370768-VID=172480676440713
Cookie pair: 62370768-SKEY=5756825085274454102
Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE
Cookie pair: CookieNotification=yes
Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I
Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA==
Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo=
Connection: keep-alive\r\n
\r\n
[Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf]
[HTTP request 9/9]
[Prev request in frame: 885]
Frame 1074: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.528297844 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.528297844 seconds
[Time delta from previous captured frame: 0.054041472 seconds]
[Time delta from previous displayed frame: 0.054041472 seconds]
[Time since reference or first frame: 76.730728991 seconds]
Frame Number: 1074
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: 2325ae5a
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x6fdd (28637)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x7509 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 11831, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 84537 (relative sequence number)
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x5cff [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1073]
[The RTT to ACK the segment was: 0.054041472 seconds]
[iRTT: 0.003305578 seconds]
VSS-Monitoring ethernet trailer, Source Port: 63780
Src Port: 63780
Frame 1075: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.795401933 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.795401933 seconds
[Time delta from previous captured frame: 0.267104089 seconds]
[Time delta from previous displayed frame: 0.267104089 seconds]
[Time since reference or first frame: 76.997833080 seconds]
Frame Number: 1075
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fde (28638)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fa4 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 84537 (relative sequence number)
[Next sequence number: 85917 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1e34 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 1380]
TCP segment data (1380 bytes)
Secure Sockets Layer
Frame 1076: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.795476707 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.795476707 seconds
[Time delta from previous captured frame: 0.000074774 seconds]
[Time delta from previous displayed frame: 0.000074774 seconds]
[Time since reference or first frame: 76.997907854 seconds]
Frame Number: 1076
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd378 (54136)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d6e [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 85917, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 85917 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1075]
[The RTT to ACK the segment was: 0.000074774 seconds]
[iRTT: 0.003305578 seconds]
Frame 1077: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.795606976 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.795606976 seconds
[Time delta from previous captured frame: 0.000130269 seconds]
[Time delta from previous displayed frame: 0.000130269 seconds]
[Time since reference or first frame: 76.998038123 seconds]
Frame Number: 1077
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fdf (28639)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fa3 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 85917, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 85917 (relative sequence number)
[Next sequence number: 87297 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xaa15 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 2760]
TCP segment data (1380 bytes)
Frame 1078: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.795628550 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.795628550 seconds
[Time delta from previous captured frame: 0.000021574 seconds]
[Time delta from previous displayed frame: 0.000021574 seconds]
[Time since reference or first frame: 76.998059697 seconds]
Frame Number: 1078
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd379 (54137)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d6d [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 87297, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 87297 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1077]
[The RTT to ACK the segment was: 0.000021574 seconds]
[iRTT: 0.003305578 seconds]
Frame 1079: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.795860217 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.795860217 seconds
[Time delta from previous captured frame: 0.000231667 seconds]
[Time delta from previous displayed frame: 0.000231667 seconds]
[Time since reference or first frame: 76.998291364 seconds]
Frame Number: 1079
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fe0 (28640)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fa2 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 87297, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 87297 (relative sequence number)
[Next sequence number: 88677 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x017f [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 4140]
TCP segment data (1380 bytes)
Frame 1080: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.795881876 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.795881876 seconds
[Time delta from previous captured frame: 0.000021659 seconds]
[Time delta from previous displayed frame: 0.000021659 seconds]
[Time since reference or first frame: 76.998313023 seconds]
Frame Number: 1080
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd37a (54138)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d6c [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 88677, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 88677 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1079]
[The RTT to ACK the segment was: 0.000021659 seconds]
[iRTT: 0.003305578 seconds]
Frame 1081: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.795900605 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.795900605 seconds
[Time delta from previous captured frame: 0.000018729 seconds]
[Time delta from previous displayed frame: 0.000018729 seconds]
[Time since reference or first frame: 76.998331752 seconds]
Frame Number: 1081
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fe1 (28641)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fa1 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 88677, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 88677 (relative sequence number)
[Next sequence number: 90057 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xfbaa [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 5520]
TCP segment data (1380 bytes)
Frame 1082: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.795921817 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.795921817 seconds
[Time delta from previous captured frame: 0.000021212 seconds]
[Time delta from previous displayed frame: 0.000021212 seconds]
[Time since reference or first frame: 76.998352964 seconds]
Frame Number: 1082
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd37b (54139)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d6b [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 90057, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 90057 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1081]
[The RTT to ACK the segment was: 0.000021212 seconds]
[iRTT: 0.003305578 seconds]
Frame 1083: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796119255 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796119255 seconds
[Time delta from previous captured frame: 0.000197438 seconds]
[Time delta from previous displayed frame: 0.000197438 seconds]
[Time since reference or first frame: 76.998550402 seconds]
Frame Number: 1083
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fe2 (28642)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6fa0 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 90057, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 90057 (relative sequence number)
[Next sequence number: 91437 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xdbc3 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 6900]
TCP segment data (1380 bytes)
Frame 1084: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796138206 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796138206 seconds
[Time delta from previous captured frame: 0.000018951 seconds]
[Time delta from previous displayed frame: 0.000018951 seconds]
[Time since reference or first frame: 76.998569353 seconds]
Frame Number: 1084
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd37c (54140)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d6a [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 91437, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 91437 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1083]
[The RTT to ACK the segment was: 0.000018951 seconds]
[iRTT: 0.003305578 seconds]
Frame 1085: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796155170 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796155170 seconds
[Time delta from previous captured frame: 0.000016964 seconds]
[Time delta from previous displayed frame: 0.000016964 seconds]
[Time since reference or first frame: 76.998586317 seconds]
Frame Number: 1085
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fe3 (28643)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f9f [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 91437, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 91437 (relative sequence number)
[Next sequence number: 92817 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xebe0 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 8280]
TCP segment data (1380 bytes)
Frame 1086: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796172963 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796172963 seconds
[Time delta from previous captured frame: 0.000017793 seconds]
[Time delta from previous displayed frame: 0.000017793 seconds]
[Time since reference or first frame: 76.998604110 seconds]
Frame Number: 1086
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd37d (54141)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d69 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 92817, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 92817 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1085]
[The RTT to ACK the segment was: 0.000017793 seconds]
[iRTT: 0.003305578 seconds]
Frame 1087: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796325738 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796325738 seconds
[Time delta from previous captured frame: 0.000152775 seconds]
[Time delta from previous displayed frame: 0.000152775 seconds]
[Time since reference or first frame: 76.998756885 seconds]
Frame Number: 1087
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fe4 (28644)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f9e [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 92817, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 92817 (relative sequence number)
[Next sequence number: 94197 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x73fb [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 9660]
TCP segment data (1380 bytes)
Frame 1088: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796343874 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796343874 seconds
[Time delta from previous captured frame: 0.000018136 seconds]
[Time delta from previous displayed frame: 0.000018136 seconds]
[Time since reference or first frame: 76.998775021 seconds]
Frame Number: 1088
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd37e (54142)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d68 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 94197, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 94197 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1087]
[The RTT to ACK the segment was: 0.000018136 seconds]
[iRTT: 0.003305578 seconds]
Frame 1089: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796359750 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796359750 seconds
[Time delta from previous captured frame: 0.000015876 seconds]
[Time delta from previous displayed frame: 0.000015876 seconds]
[Time since reference or first frame: 76.998790897 seconds]
Frame Number: 1089
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fe5 (28645)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f9d [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 94197, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 94197 (relative sequence number)
[Next sequence number: 95577 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x01fa [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 11040]
TCP segment data (1380 bytes)
Frame 1090: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796382162 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796382162 seconds
[Time delta from previous captured frame: 0.000022412 seconds]
[Time delta from previous displayed frame: 0.000022412 seconds]
[Time since reference or first frame: 76.998813309 seconds]
Frame Number: 1090
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd37f (54143)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d67 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 95577, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 95577 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1089]
[The RTT to ACK the segment was: 0.000022412 seconds]
[iRTT: 0.003305578 seconds]
Frame 1091: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796558970 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796558970 seconds
[Time delta from previous captured frame: 0.000176808 seconds]
[Time delta from previous displayed frame: 0.000176808 seconds]
[Time since reference or first frame: 76.998990117 seconds]
Frame Number: 1091
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fe6 (28646)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f9c [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 95577, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 95577 (relative sequence number)
[Next sequence number: 96957 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xde0c [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 12420]
TCP segment data (1380 bytes)
Frame 1092: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796578822 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796578822 seconds
[Time delta from previous captured frame: 0.000019852 seconds]
[Time delta from previous displayed frame: 0.000019852 seconds]
[Time since reference or first frame: 76.999009969 seconds]
Frame Number: 1092
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd380 (54144)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d66 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 96957, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 96957 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1091]
[The RTT to ACK the segment was: 0.000019852 seconds]
[iRTT: 0.003305578 seconds]
Frame 1093: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796594133 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796594133 seconds
[Time delta from previous captured frame: 0.000015311 seconds]
[Time delta from previous displayed frame: 0.000015311 seconds]
[Time since reference or first frame: 76.999025280 seconds]
Frame Number: 1093
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fe7 (28647)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f9b [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 96957, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 96957 (relative sequence number)
[Next sequence number: 98337 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xd828 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 13800]
TCP segment data (1380 bytes)
Frame 1094: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796610437 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796610437 seconds
[Time delta from previous captured frame: 0.000016304 seconds]
[Time delta from previous displayed frame: 0.000016304 seconds]
[Time since reference or first frame: 76.999041584 seconds]
Frame Number: 1094
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd381 (54145)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d65 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 98337, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 98337 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1093]
[The RTT to ACK the segment was: 0.000016304 seconds]
[iRTT: 0.003305578 seconds]
Frame 1095: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796791504 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796791504 seconds
[Time delta from previous captured frame: 0.000181067 seconds]
[Time delta from previous displayed frame: 0.000181067 seconds]
[Time since reference or first frame: 76.999222651 seconds]
Frame Number: 1095
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fe8 (28648)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f9a [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 98337, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 98337 (relative sequence number)
[Next sequence number: 99717 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x72d6 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 15180]
TCP segment data (1380 bytes)
Frame 1096: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796809665 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796809665 seconds
[Time delta from previous captured frame: 0.000018161 seconds]
[Time delta from previous displayed frame: 0.000018161 seconds]
[Time since reference or first frame: 76.999240812 seconds]
Frame Number: 1096
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd382 (54146)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d64 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 99717, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 99717 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1095]
[The RTT to ACK the segment was: 0.000018161 seconds]
[iRTT: 0.003305578 seconds]
Frame 1097: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796825214 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796825214 seconds
[Time delta from previous captured frame: 0.000015549 seconds]
[Time delta from previous displayed frame: 0.000015549 seconds]
[Time since reference or first frame: 76.999256361 seconds]
Frame Number: 1097
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fe9 (28649)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f99 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 99717, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 99717 (relative sequence number)
[Next sequence number: 101097 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x9664 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 16560]
TCP segment data (1257 bytes)
TCP segment data (123 bytes)
[12 Reassembled TCP Segments (16437 bytes): #1075(1380), #1077(1380), #1079(1380), #1081(1380), #1083(1380), #1085(1380), #1087(1380), #1089(1380), #1091(1380), #1093(1380), #1095(1380), #1097(1257)]
[Frame: 1075, payload: 0-1379 (1380 bytes)]
[Frame: 1077, payload: 1380-2759 (1380 bytes)]
[Frame: 1079, payload: 2760-4139 (1380 bytes)]
[Frame: 1081, payload: 4140-5519 (1380 bytes)]
[Frame: 1083, payload: 5520-6899 (1380 bytes)]
[Frame: 1085, payload: 6900-8279 (1380 bytes)]
[Frame: 1087, payload: 8280-9659 (1380 bytes)]
[Frame: 1089, payload: 9660-11039 (1380 bytes)]
[Frame: 1091, payload: 11040-12419 (1380 bytes)]
[Frame: 1093, payload: 12420-13799 (1380 bytes)]
[Frame: 1095, payload: 13800-15179 (1380 bytes)]
[Frame: 1097, payload: 15180-16436 (1257 bytes)]
[Segment count: 12]
[Reassembled TCP length: 16437]
[Reassembled TCP Data: 17030340309fc39c4545203b859de5347d032ba13da1735d...]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 16432
Encrypted Application Data: 9fc39c4545203b859de5347d032ba13da1735d2b4e6a83dd...
SSL segment data (16384 bytes)
Secure Sockets Layer
Frame 1098: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.796841966 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.796841966 seconds
[Time delta from previous captured frame: 0.000016752 seconds]
[Time delta from previous displayed frame: 0.000016752 seconds]
[Time since reference or first frame: 76.999273113 seconds]
Frame Number: 1098
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd383 (54147)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d63 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 101097, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 101097 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1097]
[The RTT to ACK the segment was: 0.000016752 seconds]
[iRTT: 0.003305578 seconds]
Frame 1099: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797024246 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797024246 seconds
[Time delta from previous captured frame: 0.000182280 seconds]
[Time delta from previous displayed frame: 0.000182280 seconds]
[Time since reference or first frame: 76.999455393 seconds]
Frame Number: 1099
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fea (28650)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f98 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 101097, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 101097 (relative sequence number)
[Next sequence number: 102477 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x4ba9 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 17940]
TCP segment data (1380 bytes)
Frame 1100: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797042621 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797042621 seconds
[Time delta from previous captured frame: 0.000018375 seconds]
[Time delta from previous displayed frame: 0.000018375 seconds]
[Time since reference or first frame: 76.999473768 seconds]
Frame Number: 1100
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd384 (54148)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d62 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 102477, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 102477 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1099]
[The RTT to ACK the segment was: 0.000018375 seconds]
[iRTT: 0.003305578 seconds]
Frame 1101: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797055180 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797055180 seconds
[Time delta from previous captured frame: 0.000012559 seconds]
[Time delta from previous displayed frame: 0.000012559 seconds]
[Time since reference or first frame: 76.999486327 seconds]
Frame Number: 1101
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6feb (28651)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f97 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 102477, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 102477 (relative sequence number)
[Next sequence number: 103857 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xdaf6 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 19320]
TCP segment data (1380 bytes)
Frame 1102: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797071899 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797071899 seconds
[Time delta from previous captured frame: 0.000016719 seconds]
[Time delta from previous displayed frame: 0.000016719 seconds]
[Time since reference or first frame: 76.999503046 seconds]
Frame Number: 1102
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd385 (54149)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d61 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 103857, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 103857 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1101]
[The RTT to ACK the segment was: 0.000016719 seconds]
[iRTT: 0.003305578 seconds]
Frame 1103: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797295717 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797295717 seconds
[Time delta from previous captured frame: 0.000223818 seconds]
[Time delta from previous displayed frame: 0.000223818 seconds]
[Time since reference or first frame: 76.999726864 seconds]
Frame Number: 1103
Frame Length: 2816 bytes (22528 bits)
Capture Length: 2816 bytes (22528 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 2800
Identification: 0x6fec (28652)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6a32 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 103857, Ack: 11831, Len: 2760
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 2760]
Sequence number: 103857 (relative sequence number)
[Next sequence number: 106617 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x24cc [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 22080]
TCP segment data (2760 bytes)
Frame 1104: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797415274 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797415274 seconds
[Time delta from previous captured frame: 0.000119557 seconds]
[Time delta from previous displayed frame: 0.000119557 seconds]
[Time since reference or first frame: 76.999846421 seconds]
Frame Number: 1104
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd386 (54150)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d60 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 106617, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 106617 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1103]
[The RTT to ACK the segment was: 0.000119557 seconds]
[iRTT: 0.003305578 seconds]
Frame 1105: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797495359 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797495359 seconds
[Time delta from previous captured frame: 0.000080085 seconds]
[Time delta from previous displayed frame: 0.000080085 seconds]
[Time since reference or first frame: 76.999926506 seconds]
Frame Number: 1105
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fee (28654)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f94 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 106617, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 106617 (relative sequence number)
[Next sequence number: 107997 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xc8ad [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 23460]
TCP segment data (1380 bytes)
Frame 1106: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797520067 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797520067 seconds
[Time delta from previous captured frame: 0.000024708 seconds]
[Time delta from previous displayed frame: 0.000024708 seconds]
[Time since reference or first frame: 76.999951214 seconds]
Frame Number: 1106
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd387 (54151)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d5f [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 107997, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 107997 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1105]
[The RTT to ACK the segment was: 0.000024708 seconds]
[iRTT: 0.003305578 seconds]
Frame 1107: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797545618 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797545618 seconds
[Time delta from previous captured frame: 0.000025551 seconds]
[Time delta from previous displayed frame: 0.000025551 seconds]
[Time since reference or first frame: 76.999976765 seconds]
Frame Number: 1107
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6fef (28655)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f93 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 107997, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 107997 (relative sequence number)
[Next sequence number: 109377 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x79f4 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 24840]
TCP segment data (1380 bytes)
Frame 1108: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797563357 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797563357 seconds
[Time delta from previous captured frame: 0.000017739 seconds]
[Time delta from previous displayed frame: 0.000017739 seconds]
[Time since reference or first frame: 76.999994504 seconds]
Frame Number: 1108
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd388 (54152)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d5e [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 109377, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 109377 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1107]
[The RTT to ACK the segment was: 0.000017739 seconds]
[iRTT: 0.003305578 seconds]
Frame 1109: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797737298 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797737298 seconds
[Time delta from previous captured frame: 0.000173941 seconds]
[Time delta from previous displayed frame: 0.000173941 seconds]
[Time since reference or first frame: 77.000168445 seconds]
Frame Number: 1109
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ff0 (28656)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f92 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 109377, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 109377 (relative sequence number)
[Next sequence number: 110757 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x8c79 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 26220]
TCP segment data (1380 bytes)
Frame 1110: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797756075 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797756075 seconds
[Time delta from previous captured frame: 0.000018777 seconds]
[Time delta from previous displayed frame: 0.000018777 seconds]
[Time since reference or first frame: 77.000187222 seconds]
Frame Number: 1110
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd389 (54153)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d5d [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 110757, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 110757 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1109]
[The RTT to ACK the segment was: 0.000018777 seconds]
[iRTT: 0.003305578 seconds]
Frame 1111: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797771511 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797771511 seconds
[Time delta from previous captured frame: 0.000015436 seconds]
[Time delta from previous displayed frame: 0.000015436 seconds]
[Time since reference or first frame: 77.000202658 seconds]
Frame Number: 1111
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ff1 (28657)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f91 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 110757, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 110757 (relative sequence number)
[Next sequence number: 112137 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x23f2 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 27600]
TCP segment data (1380 bytes)
Frame 1112: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797788111 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797788111 seconds
[Time delta from previous captured frame: 0.000016600 seconds]
[Time delta from previous displayed frame: 0.000016600 seconds]
[Time since reference or first frame: 77.000219258 seconds]
Frame Number: 1112
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd38a (54154)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d5c [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 112137, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 112137 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1111]
[The RTT to ACK the segment was: 0.000016600 seconds]
[iRTT: 0.003305578 seconds]
Frame 1113: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797957438 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797957438 seconds
[Time delta from previous captured frame: 0.000169327 seconds]
[Time delta from previous displayed frame: 0.000169327 seconds]
[Time since reference or first frame: 77.000388585 seconds]
Frame Number: 1113
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ff2 (28658)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f90 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 112137, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 112137 (relative sequence number)
[Next sequence number: 113517 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x9e7a [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 28980]
TCP segment data (1380 bytes)
Frame 1114: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797974586 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797974586 seconds
[Time delta from previous captured frame: 0.000017148 seconds]
[Time delta from previous displayed frame: 0.000017148 seconds]
[Time since reference or first frame: 77.000405733 seconds]
Frame Number: 1114
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd38b (54155)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d5b [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 113517, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 113517 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1113]
[The RTT to ACK the segment was: 0.000017148 seconds]
[iRTT: 0.003305578 seconds]
Frame 1115: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.797990072 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.797990072 seconds
[Time delta from previous captured frame: 0.000015486 seconds]
[Time delta from previous displayed frame: 0.000015486 seconds]
[Time since reference or first frame: 77.000421219 seconds]
Frame Number: 1115
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ff3 (28659)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f8f [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 113517, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 113517 (relative sequence number)
[Next sequence number: 114897 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xff06 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 30360]
TCP segment data (1380 bytes)
Frame 1116: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798005270 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798005270 seconds
[Time delta from previous captured frame: 0.000015198 seconds]
[Time delta from previous displayed frame: 0.000015198 seconds]
[Time since reference or first frame: 77.000436417 seconds]
Frame Number: 1116
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd38c (54156)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d5a [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 114897, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 114897 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1115]
[The RTT to ACK the segment was: 0.000015198 seconds]
[iRTT: 0.003305578 seconds]
Frame 1117: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798190808 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798190808 seconds
[Time delta from previous captured frame: 0.000185538 seconds]
[Time delta from previous displayed frame: 0.000185538 seconds]
[Time since reference or first frame: 77.000621955 seconds]
Frame Number: 1117
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ff4 (28660)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f8e [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 114897, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 114897 (relative sequence number)
[Next sequence number: 116277 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x0639 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 31740]
TCP segment data (1380 bytes)
Frame 1118: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798208870 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798208870 seconds
[Time delta from previous captured frame: 0.000018062 seconds]
[Time delta from previous displayed frame: 0.000018062 seconds]
[Time since reference or first frame: 77.000640017 seconds]
Frame Number: 1118
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd38d (54157)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d59 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 116277, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 116277 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1117]
[The RTT to ACK the segment was: 0.000018062 seconds]
[iRTT: 0.003305578 seconds]
Frame 1119: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798223662 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798223662 seconds
[Time delta from previous captured frame: 0.000014792 seconds]
[Time delta from previous displayed frame: 0.000014792 seconds]
[Time since reference or first frame: 77.000654809 seconds]
Frame Number: 1119
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:ssl]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ff5 (28661)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f8d [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 116277, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 116277 (relative sequence number)
[Next sequence number: 117657 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x089d [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 33120]
TCP segment data (1134 bytes)
TCP segment data (246 bytes)
[12 Reassembled TCP Segments (16437 bytes): #1097(123), #1099(1380), #1101(1380), #1103(2760), #1105(1380), #1107(1380), #1109(1380), #1111(1380), #1113(1380), #1115(1380), #1117(1380), #1119(1134)]
[Frame: 1097, payload: 0-122 (123 bytes)]
[Frame: 1099, payload: 123-1502 (1380 bytes)]
[Frame: 1101, payload: 1503-2882 (1380 bytes)]
[Frame: 1103, payload: 2883-5642 (2760 bytes)]
[Frame: 1105, payload: 5643-7022 (1380 bytes)]
[Frame: 1107, payload: 7023-8402 (1380 bytes)]
[Frame: 1109, payload: 8403-9782 (1380 bytes)]
[Frame: 1111, payload: 9783-11162 (1380 bytes)]
[Frame: 1113, payload: 11163-12542 (1380 bytes)]
[Frame: 1115, payload: 12543-13922 (1380 bytes)]
[Frame: 1117, payload: 13923-15302 (1380 bytes)]
[Frame: 1119, payload: 15303-16436 (1134 bytes)]
[Segment count: 12]
[Reassembled TCP length: 16437]
[Reassembled TCP Data: 1703034030a18aced9ba8f1d387d083af5aca53d4261a88d...]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 16432
Encrypted Application Data: a18aced9ba8f1d387d083af5aca53d4261a88d5d77dc519c...
SSL segment data (16384 bytes)
Secure Sockets Layer
Frame 1120: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798261836 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798261836 seconds
[Time delta from previous captured frame: 0.000038174 seconds]
[Time delta from previous displayed frame: 0.000038174 seconds]
[Time since reference or first frame: 77.000692983 seconds]
Frame Number: 1120
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd38e (54158)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d58 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 117657, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 117657 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1119]
[The RTT to ACK the segment was: 0.000038174 seconds]
[iRTT: 0.003305578 seconds]
Frame 1121: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798426570 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798426570 seconds
[Time delta from previous captured frame: 0.000164734 seconds]
[Time delta from previous displayed frame: 0.000164734 seconds]
[Time since reference or first frame: 77.000857717 seconds]
Frame Number: 1121
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ff6 (28662)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f8c [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 117657, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 117657 (relative sequence number)
[Next sequence number: 119037 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xc572 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 34500]
TCP segment data (1380 bytes)
Frame 1122: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798446025 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798446025 seconds
[Time delta from previous captured frame: 0.000019455 seconds]
[Time delta from previous displayed frame: 0.000019455 seconds]
[Time since reference or first frame: 77.000877172 seconds]
Frame Number: 1122
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd38f (54159)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d57 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 119037, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 119037 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1121]
[The RTT to ACK the segment was: 0.000019455 seconds]
[iRTT: 0.003305578 seconds]
Frame 1123: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798457889 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798457889 seconds
[Time delta from previous captured frame: 0.000011864 seconds]
[Time delta from previous displayed frame: 0.000011864 seconds]
[Time since reference or first frame: 77.000889036 seconds]
Frame Number: 1123
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ff7 (28663)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f8b [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 119037, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 119037 (relative sequence number)
[Next sequence number: 120417 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xe6cb [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 35880]
TCP segment data (1380 bytes)
Frame 1124: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798473534 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798473534 seconds
[Time delta from previous captured frame: 0.000015645 seconds]
[Time delta from previous displayed frame: 0.000015645 seconds]
[Time since reference or first frame: 77.000904681 seconds]
Frame Number: 1124
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd390 (54160)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d56 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 120417, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 120417 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1123]
[The RTT to ACK the segment was: 0.000015645 seconds]
[iRTT: 0.003305578 seconds]
Frame 1125: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798659822 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798659822 seconds
[Time delta from previous captured frame: 0.000186288 seconds]
[Time delta from previous displayed frame: 0.000186288 seconds]
[Time since reference or first frame: 77.001090969 seconds]
Frame Number: 1125
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ff8 (28664)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f8a [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 120417, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 120417 (relative sequence number)
[Next sequence number: 121797 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xdeb4 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 37260]
TCP segment data (1380 bytes)
Frame 1126: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798679159 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798679159 seconds
[Time delta from previous captured frame: 0.000019337 seconds]
[Time delta from previous displayed frame: 0.000019337 seconds]
[Time since reference or first frame: 77.001110306 seconds]
Frame Number: 1126
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd391 (54161)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d55 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 121797, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 121797 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1125]
[The RTT to ACK the segment was: 0.000019337 seconds]
[iRTT: 0.003305578 seconds]
Frame 1127: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798843496 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798843496 seconds
[Time delta from previous captured frame: 0.000164337 seconds]
[Time delta from previous displayed frame: 0.000164337 seconds]
[Time since reference or first frame: 77.001274643 seconds]
Frame Number: 1127
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ff9 (28665)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f89 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 121797, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 121797 (relative sequence number)
[Next sequence number: 123177 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x80a8 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 38640]
TCP segment data (1380 bytes)
Frame 1128: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798860828 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798860828 seconds
[Time delta from previous captured frame: 0.000017332 seconds]
[Time delta from previous displayed frame: 0.000017332 seconds]
[Time since reference or first frame: 77.001291975 seconds]
Frame Number: 1128
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd392 (54162)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d54 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 123177, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 123177 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1127]
[The RTT to ACK the segment was: 0.000017332 seconds]
[iRTT: 0.003305578 seconds]
Frame 1129: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798877043 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798877043 seconds
[Time delta from previous captured frame: 0.000016215 seconds]
[Time delta from previous displayed frame: 0.000016215 seconds]
[Time since reference or first frame: 77.001308190 seconds]
Frame Number: 1129
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ffa (28666)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f88 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 123177, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 123177 (relative sequence number)
[Next sequence number: 124557 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xfe44 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 40020]
TCP segment data (1380 bytes)
Frame 1130: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.798894141 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.798894141 seconds
[Time delta from previous captured frame: 0.000017098 seconds]
[Time delta from previous displayed frame: 0.000017098 seconds]
[Time since reference or first frame: 77.001325288 seconds]
Frame Number: 1130
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd393 (54163)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d53 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 124557, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 124557 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1129]
[The RTT to ACK the segment was: 0.000017098 seconds]
[iRTT: 0.003305578 seconds]
Frame 1131: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.799076480 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.799076480 seconds
[Time delta from previous captured frame: 0.000182339 seconds]
[Time delta from previous displayed frame: 0.000182339 seconds]
[Time since reference or first frame: 77.001507627 seconds]
Frame Number: 1131
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ffb (28667)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f87 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 124557, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 124557 (relative sequence number)
[Next sequence number: 125937 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x0f66 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 41400]
TCP segment data (1380 bytes)
Frame 1132: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.799094131 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.799094131 seconds
[Time delta from previous captured frame: 0.000017651 seconds]
[Time delta from previous displayed frame: 0.000017651 seconds]
[Time since reference or first frame: 77.001525278 seconds]
Frame Number: 1132
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd394 (54164)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d52 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 125937, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 125937 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1131]
[The RTT to ACK the segment was: 0.000017651 seconds]
[iRTT: 0.003305578 seconds]
Frame 1133: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.799108683 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.799108683 seconds
[Time delta from previous captured frame: 0.000014552 seconds]
[Time delta from previous displayed frame: 0.000014552 seconds]
[Time since reference or first frame: 77.001539830 seconds]
Frame Number: 1133
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x6ffc (28668)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x6f86 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 125937, Ack: 11831, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 125937 (relative sequence number)
[Next sequence number: 127317 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x3484 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 42780]
TCP segment data (1380 bytes)
Frame 1134: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.799123904 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.799123904 seconds
[Time delta from previous captured frame: 0.000015221 seconds]
[Time delta from previous displayed frame: 0.000015221 seconds]
[Time since reference or first frame: 77.001555051 seconds]
Frame Number: 1134
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd395 (54165)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d51 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 127317, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 127317 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1133]
[The RTT to ACK the segment was: 0.000015221 seconds]
[iRTT: 0.003305578 seconds]
Frame 1135: 1115 bytes on wire (8920 bits), 1115 bytes captured (8920 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.799281231 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.799281231 seconds
[Time delta from previous captured frame: 0.000157327 seconds]
[Time delta from previous displayed frame: 0.000157327 seconds]
[Time since reference or first frame: 77.001712378 seconds]
Frame Number: 1135
Frame Length: 1115 bytes (8920 bits)
Capture Length: 1115 bytes (8920 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http:media]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1099
Identification: 0x6ffd (28669)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x70c6 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 127317, Ack: 11831, Len: 1059
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1059]
Sequence number: 127317 (relative sequence number)
[Next sequence number: 128376 (relative sequence number)]
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x018 (PSH, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 1... = Push: Set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······AP···]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xf75d [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1059]
[Bytes sent since last PSH flag: 43839]
TCP segment data (1059 bytes)
[9 Reassembled TCP Segments (10965 bytes): #1119(246), #1121(1380), #1123(1380), #1125(1380), #1127(1380), #1129(1380), #1131(1380), #1133(1380), #1135(1059)]
[Frame: 1119, payload: 0-245 (246 bytes)]
[Frame: 1121, payload: 246-1625 (1380 bytes)]
[Frame: 1123, payload: 1626-3005 (1380 bytes)]
[Frame: 1125, payload: 3006-4385 (1380 bytes)]
[Frame: 1127, payload: 4386-5765 (1380 bytes)]
[Frame: 1129, payload: 5766-7145 (1380 bytes)]
[Frame: 1131, payload: 7146-8525 (1380 bytes)]
[Frame: 1133, payload: 8526-9905 (1380 bytes)]
[Frame: 1135, payload: 9906-10964 (1059 bytes)]
[Segment count: 9]
[Reassembled TCP length: 10965]
[Reassembled TCP Data: 1703032ad075e40b4579457524cae5dc22efa7faeb827eb7...]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 10960
Encrypted Application Data: 75e40b4579457524cae5dc22efa7faeb827eb749dcf126d2...
SSL segment data (10913 bytes)
[3 Reassembled SSL segments (43681 bytes): #1097(16384), #1119(16384), #1135(10913)]
[Frame: 1097, payload: 0-16383 (16384 bytes)]
[Frame: 1119, payload: 16384-32767 (16384 bytes)]
[Frame: 1135, payload: 32768-43680 (10913 bytes)]
[Segment count: 3]
[Reassembled PDU length: 43681]
[Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...]
Hypertext Transfer Protocol
HTTP/1.1 200 OK\r\n
[Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n]
[HTTP/1.1 200 OK\r\n]
[Severity level: Chat]
[Group: Sequence]
Request Version: HTTP/1.1
Status Code: 200
Response Phrase: OK
Cache-Control: private\r\n
Content-Type: application/pdf\r\n
Server: Microsoft-IIS/8.5\r\n
X-RequestId: f952686a-3930-41c0-afcb-438f579bc8eb\r\n
Content-Disposition: attachment; filename="424888813.pdf"\r\n
X-AspNet-Version: 4.0.30319\r\n
X-Powered-By: ASP.NET\r\n
Date: Mon, 21 Nov 2016 10:31:06 GMT\r\n
Content-Length: 43358\r\n
[Content length: 43358]
\r\n
[HTTP response 9/9]
[Time since request: 0.325024859 seconds]
[Prev request in frame: 885]
[Prev response in frame: 947]
[Request in frame: 1073]
File Data: 43358 bytes
Media Type
Media type: application/pdf (43358 bytes)
Frame 1136: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:30:51.799298304 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724251.799298304 seconds
[Time delta from previous captured frame: 0.000017073 seconds]
[Time delta from previous displayed frame: 0.000017073 seconds]
[Time since reference or first frame: 77.001729451 seconds]
Frame Number: 1136
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd396 (54166)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d50 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 128376, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11831 (relative sequence number)
Acknowledgment number: 128376 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1135]
[The RTT to ACK the segment was: 0.000017073 seconds]
[iRTT: 0.003305578 seconds]
Frame 1180: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:02.297672802 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724262.297672802 seconds
[Time delta from previous captured frame: 0.171309183 seconds]
[Time delta from previous displayed frame: 10.498374498 seconds]
[Time since reference or first frame: 87.500103949 seconds]
Frame Number: 1180
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd397 (54167)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d4f [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11830, Ack: 128376, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11830 (relative sequence number)
Acknowledgment number: 128376 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): TCP keep-alive segment]
[TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
Frame 1181: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:02.300563451 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724262.300563451 seconds
[Time delta from previous captured frame: 0.002890649 seconds]
[Time delta from previous displayed frame: 0.002890649 seconds]
[Time since reference or first frame: 87.502994598 seconds]
Frame Number: 1181
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: 15dfee11
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x71ed (29165)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0x72f9 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 11831, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 128376 (relative sequence number)
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xb1bf [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): ACK to a TCP keep-alive segment]
[ACK to a TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
VSS-Monitoring ethernet trailer, Source Port: 63243
Src Port: 63243
Frame 1202: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:12.537643566 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724272.537643566 seconds
[Time delta from previous captured frame: 0.611686018 seconds]
[Time delta from previous displayed frame: 10.237080115 seconds]
[Time since reference or first frame: 97.740074713 seconds]
Frame Number: 1202
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd398 (54168)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d4e [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11830, Ack: 128376, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 11830 (relative sequence number)
Acknowledgment number: 128376 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): TCP keep-alive segment]
[TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
Frame 1203: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:12.540331065 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724272.540331065 seconds
[Time delta from previous captured frame: 0.002687499 seconds]
[Time delta from previous displayed frame: 0.002687499 seconds]
[Time since reference or first frame: 97.742762212 seconds]
Frame Number: 1203
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: f0246e88
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x03e1 (993)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xe105 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 11831, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 128376 (relative sequence number)
Acknowledgment number: 11831 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xb1bf [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): ACK to a TCP keep-alive segment]
[ACK to a TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
VSS-Monitoring ethernet trailer, Source Port: 55395
Src Port: 55395
Frame 1223: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:17.957213066 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724277.957213066 seconds
[Time delta from previous captured frame: 0.000280947 seconds]
[Time delta from previous displayed frame: 5.416882001 seconds]
[Time since reference or first frame: 103.159644213 seconds]
Frame Number: 1223
Frame Length: 1325 bytes (10600 bits)
Capture Length: 1325 bytes (10600 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1309
Identification: 0xd399 (54169)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4858 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 128376, Len: 1269
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 1269]
Sequence number: 11831 (relative sequence number)
[Next sequence number: 13100 (relative sequence number)]
Acknowledgment number: 128376 (relative ack number)
Header Length: 20 bytes
Flags: 0x018 (PSH, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 1... = Push: Set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······AP···]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1ef9 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1269]
[Bytes sent since last PSH flag: 1269]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 1264
Encrypted Application Data: 1de03765c5bc93dfc7e28d4e1ce4323f692db0504dd09fd2...
Hypertext Transfer Protocol
GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf HTTP/1.1\r\n
[Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf HTTP/1.1\r\n]
[GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf HTTP/1.1\r\n]
[Severity level: Chat]
[Group: Sequence]
Request Method: GET
Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf
Request URI Path: /racuni/pregled-racuna-pdf
Request URI Query: serviceid=12018216&metaid=431372012&filename=431372012.pdf
Request URI Query Parameter: serviceid=12018216
Request URI Query Parameter: metaid=431372012
Request URI Query Parameter: filename=431372012.pdf
Request Version: HTTP/1.1
Host: moj.hrvatskitelekom.hr\r\n
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n
Accept-Language: en-US,en;q=0.5\r\n
Accept-Encoding: gzip, deflate\r\n
Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n
[truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085
Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8
Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc
Cookie pair: CurrentServiceId=12018216
Cookie pair: visited=1
Cookie pair: _ceg.s=ogzmhy
Cookie pair: _ceg.u=ogzmhy
Cookie pair: 62370768-VID=172480676440713
Cookie pair: 62370768-SKEY=5756825085274454102
Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE
Cookie pair: CookieNotification=yes
Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I
Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA==
Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo=
Connection: keep-alive\r\n
\r\n
[Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf]
[HTTP request 10/10]
[Prev request in frame: 1073]
Frame 1226: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.018995769 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.018995769 seconds
[Time delta from previous captured frame: 0.032120897 seconds]
[Time delta from previous displayed frame: 0.061782703 seconds]
[Time since reference or first frame: 103.221426916 seconds]
Frame Number: 1226
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: 9d0aae13
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x1761 (5985)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xcd85 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 13100, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 128376 (relative sequence number)
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xb1bf [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1223]
[The RTT to ACK the segment was: 0.061782703 seconds]
[iRTT: 0.003305578 seconds]
VSS-Monitoring ethernet trailer, Source Port: 33769
Src Port: 33769
Frame 1229: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.357946505 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.357946505 seconds
[Time delta from previous captured frame: 0.116225971 seconds]
[Time delta from previous displayed frame: 0.338950736 seconds]
[Time since reference or first frame: 103.560377652 seconds]
Frame Number: 1229
Frame Length: 2816 bytes (22528 bits)
Capture Length: 2816 bytes (22528 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 2800
Identification: 0x1767 (5991)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc2b7 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 13100, Len: 2760
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 2760]
Sequence number: 128376 (relative sequence number)
[Next sequence number: 131136 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x24cc [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 2760]
TCP segment data (2760 bytes)
Secure Sockets Layer
Frame 1230: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358118225 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358118225 seconds
[Time delta from previous captured frame: 0.000171720 seconds]
[Time delta from previous displayed frame: 0.000171720 seconds]
[Time since reference or first frame: 103.560549372 seconds]
Frame Number: 1230
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd39a (54170)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d4c [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 131136, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 131136 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1229]
[The RTT to ACK the segment was: 0.000171720 seconds]
[iRTT: 0.003305578 seconds]
Frame 1231: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358303779 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358303779 seconds
[Time delta from previous captured frame: 0.000185554 seconds]
[Time delta from previous displayed frame: 0.000185554 seconds]
[Time since reference or first frame: 103.560734926 seconds]
Frame Number: 1231
Frame Length: 2816 bytes (22528 bits)
Capture Length: 2816 bytes (22528 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 2800
Identification: 0x1769 (5993)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc2b5 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 131136, Ack: 13100, Len: 2760
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 2760]
Sequence number: 131136 (relative sequence number)
[Next sequence number: 133896 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x24cc [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2760]
[Bytes sent since last PSH flag: 5520]
TCP segment data (2760 bytes)
Frame 1232: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358376562 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358376562 seconds
[Time delta from previous captured frame: 0.000072783 seconds]
[Time delta from previous displayed frame: 0.000072783 seconds]
[Time since reference or first frame: 103.560807709 seconds]
Frame Number: 1232
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x176b (5995)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc817 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 133896, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 133896 (relative sequence number)
[Next sequence number: 135276 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xc653 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 4140]
[Bytes sent since last PSH flag: 6900]
TCP segment data (1380 bytes)
Frame 1233: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358415527 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358415527 seconds
[Time delta from previous captured frame: 0.000038965 seconds]
[Time delta from previous displayed frame: 0.000038965 seconds]
[Time since reference or first frame: 103.560846674 seconds]
Frame Number: 1233
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x176c (5996)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc816 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 135276, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 135276 (relative sequence number)
[Next sequence number: 136656 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x717f [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 5520]
[Bytes sent since last PSH flag: 8280]
TCP segment data (1380 bytes)
Frame 1234: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358452577 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358452577 seconds
[Time delta from previous captured frame: 0.000037050 seconds]
[Time delta from previous displayed frame: 0.000037050 seconds]
[Time since reference or first frame: 103.560883724 seconds]
Frame Number: 1234
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd39b (54171)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d4b [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 133896, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 133896 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1231]
[The RTT to ACK the segment was: 0.000148798 seconds]
[iRTT: 0.003305578 seconds]
Frame 1235: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358478392 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358478392 seconds
[Time delta from previous captured frame: 0.000025815 seconds]
[Time delta from previous displayed frame: 0.000025815 seconds]
[Time since reference or first frame: 103.560909539 seconds]
Frame Number: 1235
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd39c (54172)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d4a [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 135276, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 135276 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1232]
[The RTT to ACK the segment was: 0.000101830 seconds]
[iRTT: 0.003305578 seconds]
Frame 1236: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358499028 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358499028 seconds
[Time delta from previous captured frame: 0.000020636 seconds]
[Time delta from previous displayed frame: 0.000020636 seconds]
[Time since reference or first frame: 103.560930175 seconds]
Frame Number: 1236
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd39d (54173)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d49 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 136656, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 136656 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1233]
[The RTT to ACK the segment was: 0.000083501 seconds]
[iRTT: 0.003305578 seconds]
Frame 1237: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358632941 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358632941 seconds
[Time delta from previous captured frame: 0.000133913 seconds]
[Time delta from previous displayed frame: 0.000133913 seconds]
[Time since reference or first frame: 103.561064088 seconds]
Frame Number: 1237
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x176d (5997)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc815 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 136656, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 136656 (relative sequence number)
[Next sequence number: 138036 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x27e8 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 9660]
TCP segment data (1380 bytes)
Frame 1238: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358681401 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358681401 seconds
[Time delta from previous captured frame: 0.000048460 seconds]
[Time delta from previous displayed frame: 0.000048460 seconds]
[Time since reference or first frame: 103.561112548 seconds]
Frame Number: 1238
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd39e (54174)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d48 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 138036, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 138036 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1237]
[The RTT to ACK the segment was: 0.000048460 seconds]
[iRTT: 0.003305578 seconds]
Frame 1239: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358705064 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358705064 seconds
[Time delta from previous captured frame: 0.000023663 seconds]
[Time delta from previous displayed frame: 0.000023663 seconds]
[Time since reference or first frame: 103.561136211 seconds]
Frame Number: 1239
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x176e (5998)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc814 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 138036, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 138036 (relative sequence number)
[Next sequence number: 139416 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x73be [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 11040]
TCP segment data (1380 bytes)
Frame 1240: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358766554 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358766554 seconds
[Time delta from previous captured frame: 0.000061490 seconds]
[Time delta from previous displayed frame: 0.000061490 seconds]
[Time since reference or first frame: 103.561197701 seconds]
Frame Number: 1240
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd39f (54175)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d47 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 139416, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 139416 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1239]
[The RTT to ACK the segment was: 0.000061490 seconds]
[iRTT: 0.003305578 seconds]
Frame 1241: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358871028 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358871028 seconds
[Time delta from previous captured frame: 0.000104474 seconds]
[Time delta from previous displayed frame: 0.000104474 seconds]
[Time since reference or first frame: 103.561302175 seconds]
Frame Number: 1241
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x176f (5999)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc813 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 139416, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 139416 (relative sequence number)
[Next sequence number: 140796 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xb98f [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 12420]
TCP segment data (1380 bytes)
Frame 1242: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358919180 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358919180 seconds
[Time delta from previous captured frame: 0.000048152 seconds]
[Time delta from previous displayed frame: 0.000048152 seconds]
[Time since reference or first frame: 103.561350327 seconds]
Frame Number: 1242
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3a0 (54176)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d46 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 140796, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 140796 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1241]
[The RTT to ACK the segment was: 0.000048152 seconds]
[iRTT: 0.003305578 seconds]
Frame 1243: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358947529 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358947529 seconds
[Time delta from previous captured frame: 0.000028349 seconds]
[Time delta from previous displayed frame: 0.000028349 seconds]
[Time since reference or first frame: 103.561378676 seconds]
Frame Number: 1243
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1770 (6000)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc812 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 140796, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 140796 (relative sequence number)
[Next sequence number: 142176 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x666f [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 13800]
TCP segment data (1380 bytes)
Frame 1244: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.358989051 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.358989051 seconds
[Time delta from previous captured frame: 0.000041522 seconds]
[Time delta from previous displayed frame: 0.000041522 seconds]
[Time since reference or first frame: 103.561420198 seconds]
Frame Number: 1244
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3a1 (54177)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d45 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 142176, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 142176 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1243]
[The RTT to ACK the segment was: 0.000041522 seconds]
[iRTT: 0.003305578 seconds]
Frame 1245: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359101219 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359101219 seconds
[Time delta from previous captured frame: 0.000112168 seconds]
[Time delta from previous displayed frame: 0.000112168 seconds]
[Time since reference or first frame: 103.561532366 seconds]
Frame Number: 1245
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1771 (6001)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc811 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 142176, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 142176 (relative sequence number)
[Next sequence number: 143556 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xfd4c [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 15180]
TCP segment data (1380 bytes)
Frame 1246: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359146935 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359146935 seconds
[Time delta from previous captured frame: 0.000045716 seconds]
[Time delta from previous displayed frame: 0.000045716 seconds]
[Time since reference or first frame: 103.561578082 seconds]
Frame Number: 1246
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3a2 (54178)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d44 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 143556, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 143556 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1245]
[The RTT to ACK the segment was: 0.000045716 seconds]
[iRTT: 0.003305578 seconds]
Frame 1247: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359168912 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359168912 seconds
[Time delta from previous captured frame: 0.000021977 seconds]
[Time delta from previous displayed frame: 0.000021977 seconds]
[Time since reference or first frame: 103.561600059 seconds]
Frame Number: 1247
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1772 (6002)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc810 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 143556, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 143556 (relative sequence number)
[Next sequence number: 144936 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xef26 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 16560]
TCP segment data (1257 bytes)
TCP segment data (123 bytes)
[10 Reassembled TCP Segments (16437 bytes): #1229(2760), #1231(2760), #1232(1380), #1233(1380), #1237(1380), #1239(1380), #1241(1380), #1243(1380), #1245(1380), #1247(1257)]
[Frame: 1229, payload: 0-2759 (2760 bytes)]
[Frame: 1231, payload: 2760-5519 (2760 bytes)]
[Frame: 1232, payload: 5520-6899 (1380 bytes)]
[Frame: 1233, payload: 6900-8279 (1380 bytes)]
[Frame: 1237, payload: 8280-9659 (1380 bytes)]
[Frame: 1239, payload: 9660-11039 (1380 bytes)]
[Frame: 1241, payload: 11040-12419 (1380 bytes)]
[Frame: 1243, payload: 12420-13799 (1380 bytes)]
[Frame: 1245, payload: 13800-15179 (1380 bytes)]
[Frame: 1247, payload: 15180-16436 (1257 bytes)]
[Segment count: 10]
[Reassembled TCP length: 16437]
[Reassembled TCP Data: 1703034030297e6a7edbc823c45e3a18b19f70eb4ac5e9f1...]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 16432
Encrypted Application Data: 297e6a7edbc823c45e3a18b19f70eb4ac5e9f17c98fd687e...
SSL segment data (16384 bytes)
Secure Sockets Layer
Frame 1248: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359209307 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359209307 seconds
[Time delta from previous captured frame: 0.000040395 seconds]
[Time delta from previous displayed frame: 0.000040395 seconds]
[Time since reference or first frame: 103.561640454 seconds]
Frame Number: 1248
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3a3 (54179)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d43 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 144936, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 144936 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1247]
[The RTT to ACK the segment was: 0.000040395 seconds]
[iRTT: 0.003305578 seconds]
Frame 1249: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359335068 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359335068 seconds
[Time delta from previous captured frame: 0.000125761 seconds]
[Time delta from previous displayed frame: 0.000125761 seconds]
[Time since reference or first frame: 103.561766215 seconds]
Frame Number: 1249
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1773 (6003)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc80f [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 144936, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 144936 (relative sequence number)
[Next sequence number: 146316 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xc92e [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 17940]
TCP segment data (1380 bytes)
Frame 1250: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359379526 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359379526 seconds
[Time delta from previous captured frame: 0.000044458 seconds]
[Time delta from previous displayed frame: 0.000044458 seconds]
[Time since reference or first frame: 103.561810673 seconds]
Frame Number: 1250
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3a4 (54180)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d42 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 146316, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 146316 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1249]
[The RTT to ACK the segment was: 0.000044458 seconds]
[iRTT: 0.003305578 seconds]
Frame 1251: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359522449 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359522449 seconds
[Time delta from previous captured frame: 0.000142923 seconds]
[Time delta from previous displayed frame: 0.000142923 seconds]
[Time since reference or first frame: 103.561953596 seconds]
Frame Number: 1251
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1774 (6004)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc80e [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 146316, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 146316 (relative sequence number)
[Next sequence number: 147696 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x06d5 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 19320]
TCP segment data (1380 bytes)
Frame 1252: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359581317 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359581317 seconds
[Time delta from previous captured frame: 0.000058868 seconds]
[Time delta from previous displayed frame: 0.000058868 seconds]
[Time since reference or first frame: 103.562012464 seconds]
Frame Number: 1252
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3a5 (54181)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d41 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 147696, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 147696 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1251]
[The RTT to ACK the segment was: 0.000058868 seconds]
[iRTT: 0.003305578 seconds]
Frame 1253: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359604601 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359604601 seconds
[Time delta from previous captured frame: 0.000023284 seconds]
[Time delta from previous displayed frame: 0.000023284 seconds]
[Time since reference or first frame: 103.562035748 seconds]
Frame Number: 1253
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1775 (6005)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc80d [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 147696, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 147696 (relative sequence number)
[Next sequence number: 149076 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x5979 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 20700]
TCP segment data (1380 bytes)
Frame 1254: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359642051 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359642051 seconds
[Time delta from previous captured frame: 0.000037450 seconds]
[Time delta from previous displayed frame: 0.000037450 seconds]
[Time since reference or first frame: 103.562073198 seconds]
Frame Number: 1254
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3a6 (54182)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d40 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 149076, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 149076 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1253]
[The RTT to ACK the segment was: 0.000037450 seconds]
[iRTT: 0.003305578 seconds]
Frame 1255: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359754254 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359754254 seconds
[Time delta from previous captured frame: 0.000112203 seconds]
[Time delta from previous displayed frame: 0.000112203 seconds]
[Time since reference or first frame: 103.562185401 seconds]
Frame Number: 1255
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1776 (6006)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc80c [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 149076, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 149076 (relative sequence number)
[Next sequence number: 150456 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xe3c1 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 22080]
TCP segment data (1380 bytes)
Frame 1256: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359793184 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359793184 seconds
[Time delta from previous captured frame: 0.000038930 seconds]
[Time delta from previous displayed frame: 0.000038930 seconds]
[Time since reference or first frame: 103.562224331 seconds]
Frame Number: 1256
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3a7 (54183)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d3f [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 150456, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 150456 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1255]
[The RTT to ACK the segment was: 0.000038930 seconds]
[iRTT: 0.003305578 seconds]
Frame 1257: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359838241 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359838241 seconds
[Time delta from previous captured frame: 0.000045057 seconds]
[Time delta from previous displayed frame: 0.000045057 seconds]
[Time since reference or first frame: 103.562269388 seconds]
Frame Number: 1257
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1777 (6007)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc80b [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 150456, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 150456 (relative sequence number)
[Next sequence number: 151836 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xcddd [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 23460]
TCP segment data (1380 bytes)
Frame 1258: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359881949 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359881949 seconds
[Time delta from previous captured frame: 0.000043708 seconds]
[Time delta from previous displayed frame: 0.000043708 seconds]
[Time since reference or first frame: 103.562313096 seconds]
Frame Number: 1258
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3a8 (54184)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d3e [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 151836, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 151836 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1257]
[The RTT to ACK the segment was: 0.000043708 seconds]
[iRTT: 0.003305578 seconds]
Frame 1259: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.359990309 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.359990309 seconds
[Time delta from previous captured frame: 0.000108360 seconds]
[Time delta from previous displayed frame: 0.000108360 seconds]
[Time since reference or first frame: 103.562421456 seconds]
Frame Number: 1259
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1778 (6008)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc80a [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 151836, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 151836 (relative sequence number)
[Next sequence number: 153216 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x5658 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 24840]
TCP segment data (1380 bytes)
Frame 1260: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360029759 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360029759 seconds
[Time delta from previous captured frame: 0.000039450 seconds]
[Time delta from previous displayed frame: 0.000039450 seconds]
[Time since reference or first frame: 103.562460906 seconds]
Frame Number: 1260
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3a9 (54185)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d3d [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 153216, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 153216 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1259]
[The RTT to ACK the segment was: 0.000039450 seconds]
[iRTT: 0.003305578 seconds]
Frame 1261: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360051302 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360051302 seconds
[Time delta from previous captured frame: 0.000021543 seconds]
[Time delta from previous displayed frame: 0.000021543 seconds]
[Time since reference or first frame: 103.562482449 seconds]
Frame Number: 1261
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1779 (6009)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc809 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 153216, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 153216 (relative sequence number)
[Next sequence number: 154596 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xccb8 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 26220]
TCP segment data (1380 bytes)
Frame 1262: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360091357 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360091357 seconds
[Time delta from previous captured frame: 0.000040055 seconds]
[Time delta from previous displayed frame: 0.000040055 seconds]
[Time since reference or first frame: 103.562522504 seconds]
Frame Number: 1262
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3aa (54186)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d3c [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 154596, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 154596 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1261]
[The RTT to ACK the segment was: 0.000040055 seconds]
[iRTT: 0.003305578 seconds]
Frame 1263: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360221434 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360221434 seconds
[Time delta from previous captured frame: 0.000130077 seconds]
[Time delta from previous displayed frame: 0.000130077 seconds]
[Time since reference or first frame: 103.562652581 seconds]
Frame Number: 1263
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x177a (6010)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc808 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 154596, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 154596 (relative sequence number)
[Next sequence number: 155976 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x98ed [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 27600]
TCP segment data (1380 bytes)
Frame 1264: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360259969 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360259969 seconds
[Time delta from previous captured frame: 0.000038535 seconds]
[Time delta from previous displayed frame: 0.000038535 seconds]
[Time since reference or first frame: 103.562691116 seconds]
Frame Number: 1264
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3ab (54187)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d3b [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 155976, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 155976 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1263]
[The RTT to ACK the segment was: 0.000038535 seconds]
[iRTT: 0.003305578 seconds]
Frame 1265: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360280665 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360280665 seconds
[Time delta from previous captured frame: 0.000020696 seconds]
[Time delta from previous displayed frame: 0.000020696 seconds]
[Time since reference or first frame: 103.562711812 seconds]
Frame Number: 1265
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x177b (6011)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc807 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 155976, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 155976 (relative sequence number)
[Next sequence number: 157356 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xecd1 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 28980]
TCP segment data (1380 bytes)
Frame 1266: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360321613 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360321613 seconds
[Time delta from previous captured frame: 0.000040948 seconds]
[Time delta from previous displayed frame: 0.000040948 seconds]
[Time since reference or first frame: 103.562752760 seconds]
Frame Number: 1266
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3ac (54188)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d3a [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 157356, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 157356 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1265]
[The RTT to ACK the segment was: 0.000040948 seconds]
[iRTT: 0.003305578 seconds]
Frame 1267: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360454444 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360454444 seconds
[Time delta from previous captured frame: 0.000132831 seconds]
[Time delta from previous displayed frame: 0.000132831 seconds]
[Time since reference or first frame: 103.562885591 seconds]
Frame Number: 1267
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x177c (6012)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc806 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 157356, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 157356 (relative sequence number)
[Next sequence number: 158736 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xc23e [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 30360]
TCP segment data (1380 bytes)
Frame 1268: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360492845 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360492845 seconds
[Time delta from previous captured frame: 0.000038401 seconds]
[Time delta from previous displayed frame: 0.000038401 seconds]
[Time since reference or first frame: 103.562923992 seconds]
Frame Number: 1268
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3ad (54189)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d39 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 158736, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 158736 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1267]
[The RTT to ACK the segment was: 0.000038401 seconds]
[iRTT: 0.003305578 seconds]
Frame 1269: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360513840 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360513840 seconds
[Time delta from previous captured frame: 0.000020995 seconds]
[Time delta from previous displayed frame: 0.000020995 seconds]
[Time since reference or first frame: 103.562944987 seconds]
Frame Number: 1269
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x177d (6013)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc805 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 158736, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 158736 (relative sequence number)
[Next sequence number: 160116 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x088a [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 31740]
TCP segment data (1380 bytes)
Frame 1270: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360573950 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360573950 seconds
[Time delta from previous captured frame: 0.000060110 seconds]
[Time delta from previous displayed frame: 0.000060110 seconds]
[Time since reference or first frame: 103.563005097 seconds]
Frame Number: 1270
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3ae (54190)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d38 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 160116, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 160116 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1269]
[The RTT to ACK the segment was: 0.000060110 seconds]
[iRTT: 0.003305578 seconds]
Frame 1271: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360625180 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360625180 seconds
[Time delta from previous captured frame: 0.000051230 seconds]
[Time delta from previous displayed frame: 0.000051230 seconds]
[Time since reference or first frame: 103.563056327 seconds]
Frame Number: 1271
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:ssl]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x177e (6014)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc804 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 160116, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 160116 (relative sequence number)
[Next sequence number: 161496 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xaf00 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 33120]
TCP segment data (1134 bytes)
TCP segment data (246 bytes)
[13 Reassembled TCP Segments (16437 bytes): #1247(123), #1249(1380), #1251(1380), #1253(1380), #1255(1380), #1257(1380), #1259(1380), #1261(1380), #1263(1380), #1265(1380), #1267(1380), #1269(1380), #1271(1134)]
[Frame: 1247, payload: 0-122 (123 bytes)]
[Frame: 1249, payload: 123-1502 (1380 bytes)]
[Frame: 1251, payload: 1503-2882 (1380 bytes)]
[Frame: 1253, payload: 2883-4262 (1380 bytes)]
[Frame: 1255, payload: 4263-5642 (1380 bytes)]
[Frame: 1257, payload: 5643-7022 (1380 bytes)]
[Frame: 1259, payload: 7023-8402 (1380 bytes)]
[Frame: 1261, payload: 8403-9782 (1380 bytes)]
[Frame: 1263, payload: 9783-11162 (1380 bytes)]
[Frame: 1265, payload: 11163-12542 (1380 bytes)]
[Frame: 1267, payload: 12543-13922 (1380 bytes)]
[Frame: 1269, payload: 13923-15302 (1380 bytes)]
[Frame: 1271, payload: 15303-16436 (1134 bytes)]
[Segment count: 13]
[Reassembled TCP length: 16437]
[Reassembled TCP Data: 1703034030add682fee4293188f3d84adcc0f8190a0e1f55...]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 16432
Encrypted Application Data: add682fee4293188f3d84adcc0f8190a0e1f55eedad6189c...
SSL segment data (16384 bytes)
Secure Sockets Layer
Frame 1272: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360663646 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360663646 seconds
[Time delta from previous captured frame: 0.000038466 seconds]
[Time delta from previous displayed frame: 0.000038466 seconds]
[Time since reference or first frame: 103.563094793 seconds]
Frame Number: 1272
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3af (54191)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d37 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 161496, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 161496 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1271]
[The RTT to ACK the segment was: 0.000038466 seconds]
[iRTT: 0.003305578 seconds]
Frame 1273: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360805699 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360805699 seconds
[Time delta from previous captured frame: 0.000142053 seconds]
[Time delta from previous displayed frame: 0.000142053 seconds]
[Time since reference or first frame: 103.563236846 seconds]
Frame Number: 1273
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x177f (6015)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc803 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 161496, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 161496 (relative sequence number)
[Next sequence number: 162876 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xe813 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 34500]
TCP segment data (1380 bytes)
Frame 1274: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360845997 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360845997 seconds
[Time delta from previous captured frame: 0.000040298 seconds]
[Time delta from previous displayed frame: 0.000040298 seconds]
[Time since reference or first frame: 103.563277144 seconds]
Frame Number: 1274
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3b0 (54192)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d36 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 162876, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 162876 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1273]
[The RTT to ACK the segment was: 0.000040298 seconds]
[iRTT: 0.003305578 seconds]
Frame 1275: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360867369 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360867369 seconds
[Time delta from previous captured frame: 0.000021372 seconds]
[Time delta from previous displayed frame: 0.000021372 seconds]
[Time since reference or first frame: 103.563298516 seconds]
Frame Number: 1275
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1780 (6016)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc802 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 162876, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 162876 (relative sequence number)
[Next sequence number: 164256 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x940b [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 35880]
TCP segment data (1380 bytes)
Frame 1276: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.360907698 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.360907698 seconds
[Time delta from previous captured frame: 0.000040329 seconds]
[Time delta from previous displayed frame: 0.000040329 seconds]
[Time since reference or first frame: 103.563338845 seconds]
Frame Number: 1276
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3b1 (54193)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d35 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 164256, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 164256 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1275]
[The RTT to ACK the segment was: 0.000040329 seconds]
[iRTT: 0.003305578 seconds]
Frame 1277: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361037731 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361037731 seconds
[Time delta from previous captured frame: 0.000130033 seconds]
[Time delta from previous displayed frame: 0.000130033 seconds]
[Time since reference or first frame: 103.563468878 seconds]
Frame Number: 1277
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1781 (6017)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc801 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 164256, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 164256 (relative sequence number)
[Next sequence number: 165636 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xc7a7 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 37260]
TCP segment data (1380 bytes)
Frame 1278: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361080384 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361080384 seconds
[Time delta from previous captured frame: 0.000042653 seconds]
[Time delta from previous displayed frame: 0.000042653 seconds]
[Time since reference or first frame: 103.563511531 seconds]
Frame Number: 1278
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3b2 (54194)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d34 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 165636, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 165636 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1277]
[The RTT to ACK the segment was: 0.000042653 seconds]
[iRTT: 0.003305578 seconds]
Frame 1279: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361101975 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361101975 seconds
[Time delta from previous captured frame: 0.000021591 seconds]
[Time delta from previous displayed frame: 0.000021591 seconds]
[Time since reference or first frame: 103.563533122 seconds]
Frame Number: 1279
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1782 (6018)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc800 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 165636, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 165636 (relative sequence number)
[Next sequence number: 167016 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1518 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 38640]
TCP segment data (1380 bytes)
Frame 1280: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361142049 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361142049 seconds
[Time delta from previous captured frame: 0.000040074 seconds]
[Time delta from previous displayed frame: 0.000040074 seconds]
[Time since reference or first frame: 103.563573196 seconds]
Frame Number: 1280
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3b3 (54195)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d33 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 167016, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 167016 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1279]
[The RTT to ACK the segment was: 0.000040074 seconds]
[iRTT: 0.003305578 seconds]
Frame 1281: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361272537 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361272537 seconds
[Time delta from previous captured frame: 0.000130488 seconds]
[Time delta from previous displayed frame: 0.000130488 seconds]
[Time since reference or first frame: 103.563703684 seconds]
Frame Number: 1281
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1783 (6019)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc7ff [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 167016, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 167016 (relative sequence number)
[Next sequence number: 168396 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xdada [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 40020]
TCP segment data (1380 bytes)
Frame 1282: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361314548 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361314548 seconds
[Time delta from previous captured frame: 0.000042011 seconds]
[Time delta from previous displayed frame: 0.000042011 seconds]
[Time since reference or first frame: 103.563745695 seconds]
Frame Number: 1282
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3b4 (54196)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d32 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 168396, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 168396 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1281]
[The RTT to ACK the segment was: 0.000042011 seconds]
[iRTT: 0.003305578 seconds]
Frame 1283: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361335258 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361335258 seconds
[Time delta from previous captured frame: 0.000020710 seconds]
[Time delta from previous displayed frame: 0.000020710 seconds]
[Time since reference or first frame: 103.563766405 seconds]
Frame Number: 1283
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1784 (6020)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc7fe [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 168396, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 168396 (relative sequence number)
[Next sequence number: 169776 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xdf24 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 41400]
TCP segment data (1380 bytes)
Frame 1284: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361374741 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361374741 seconds
[Time delta from previous captured frame: 0.000039483 seconds]
[Time delta from previous displayed frame: 0.000039483 seconds]
[Time since reference or first frame: 103.563805888 seconds]
Frame Number: 1284
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3b5 (54197)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d31 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 169776, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 169776 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1283]
[The RTT to ACK the segment was: 0.000039483 seconds]
[iRTT: 0.003305578 seconds]
Frame 1285: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361504019 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361504019 seconds
[Time delta from previous captured frame: 0.000129278 seconds]
[Time delta from previous displayed frame: 0.000129278 seconds]
[Time since reference or first frame: 103.563935166 seconds]
Frame Number: 1285
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1785 (6021)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc7fd [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 169776, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 169776 (relative sequence number)
[Next sequence number: 171156 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x167b [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 42780]
TCP segment data (1380 bytes)
Frame 1286: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361572157 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361572157 seconds
[Time delta from previous captured frame: 0.000068138 seconds]
[Time delta from previous displayed frame: 0.000068138 seconds]
[Time since reference or first frame: 103.564003304 seconds]
Frame Number: 1286
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3b6 (54198)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d30 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 171156, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 171156 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1285]
[The RTT to ACK the segment was: 0.000068138 seconds]
[iRTT: 0.003305578 seconds]
Frame 1287: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361594618 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361594618 seconds
[Time delta from previous captured frame: 0.000022461 seconds]
[Time delta from previous displayed frame: 0.000022461 seconds]
[Time since reference or first frame: 103.564025765 seconds]
Frame Number: 1287
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1786 (6022)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc7fc [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 171156, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 171156 (relative sequence number)
[Next sequence number: 172536 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x88ce [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 44160]
TCP segment data (1380 bytes)
Frame 1288: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361636037 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361636037 seconds
[Time delta from previous captured frame: 0.000041419 seconds]
[Time delta from previous displayed frame: 0.000041419 seconds]
[Time since reference or first frame: 103.564067184 seconds]
Frame Number: 1288
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3b7 (54199)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d2f [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 172536, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 172536 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1287]
[The RTT to ACK the segment was: 0.000041419 seconds]
[iRTT: 0.003305578 seconds]
Frame 1289: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361737904 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361737904 seconds
[Time delta from previous captured frame: 0.000101867 seconds]
[Time delta from previous displayed frame: 0.000101867 seconds]
[Time since reference or first frame: 103.564169051 seconds]
Frame Number: 1289
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1787 (6023)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc7fb [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 172536, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 172536 (relative sequence number)
[Next sequence number: 173916 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x03e6 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 45540]
TCP segment data (1380 bytes)
Frame 1290: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361778931 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361778931 seconds
[Time delta from previous captured frame: 0.000041027 seconds]
[Time delta from previous displayed frame: 0.000041027 seconds]
[Time since reference or first frame: 103.564210078 seconds]
Frame Number: 1290
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3b8 (54200)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d2e [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 173916, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 173916 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1289]
[The RTT to ACK the segment was: 0.000041027 seconds]
[iRTT: 0.003305578 seconds]
Frame 1291: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361845526 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361845526 seconds
[Time delta from previous captured frame: 0.000066595 seconds]
[Time delta from previous displayed frame: 0.000066595 seconds]
[Time since reference or first frame: 103.564276673 seconds]
Frame Number: 1291
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x1788 (6024)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc7fa [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 173916, Ack: 13100, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 173916 (relative sequence number)
[Next sequence number: 175296 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1d7f [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 46920]
TCP segment data (1380 bytes)
Frame 1292: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361917629 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361917629 seconds
[Time delta from previous captured frame: 0.000072103 seconds]
[Time delta from previous displayed frame: 0.000072103 seconds]
[Time since reference or first frame: 103.564348776 seconds]
Frame Number: 1292
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3b9 (54201)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d2d [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 175296, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 175296 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1291]
[The RTT to ACK the segment was: 0.000072103 seconds]
[iRTT: 0.003305578 seconds]
Frame 1293: 2207 bytes on wire (17656 bits), 2207 bytes captured (17656 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.361973608 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.361973608 seconds
[Time delta from previous captured frame: 0.000055979 seconds]
[Time delta from previous displayed frame: 0.000055979 seconds]
[Time since reference or first frame: 103.564404755 seconds]
Frame Number: 1293
Frame Length: 2207 bytes (17656 bits)
Capture Length: 2207 bytes (17656 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http:media]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 2191
Identification: 0x1789 (6025)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xc4f6 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 175296, Ack: 13100, Len: 2151
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 2151]
Sequence number: 175296 (relative sequence number)
[Next sequence number: 177447 (relative sequence number)]
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x018 (PSH, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 1... = Push: Set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······AP···]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x226b [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 2151]
[Bytes sent since last PSH flag: 49071]
TCP segment data (2151 bytes)
[12 Reassembled TCP Segments (16197 bytes): #1271(246), #1273(1380), #1275(1380), #1277(1380), #1279(1380), #1281(1380), #1283(1380), #1285(1380), #1287(1380), #1289(1380), #1291(1380), #1293(2151)]
[Frame: 1271, payload: 0-245 (246 bytes)]
[Frame: 1273, payload: 246-1625 (1380 bytes)]
[Frame: 1275, payload: 1626-3005 (1380 bytes)]
[Frame: 1277, payload: 3006-4385 (1380 bytes)]
[Frame: 1279, payload: 4386-5765 (1380 bytes)]
[Frame: 1281, payload: 5766-7145 (1380 bytes)]
[Frame: 1283, payload: 7146-8525 (1380 bytes)]
[Frame: 1285, payload: 8526-9905 (1380 bytes)]
[Frame: 1287, payload: 9906-11285 (1380 bytes)]
[Frame: 1289, payload: 11286-12665 (1380 bytes)]
[Frame: 1291, payload: 12666-14045 (1380 bytes)]
[Frame: 1293, payload: 14046-16196 (2151 bytes)]
[Segment count: 12]
[Reassembled TCP length: 16197]
[Reassembled TCP Data: 1703033f4021b2022279ba0f518472eb936f474c8b2d22db...]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 16192
Encrypted Application Data: 21b2022279ba0f518472eb936f474c8b2d22db61d05aca31...
SSL segment data (16140 bytes)
[3 Reassembled SSL segments (48908 bytes): #1247(16384), #1271(16384), #1293(16140)]
[Frame: 1247, payload: 0-16383 (16384 bytes)]
[Frame: 1271, payload: 16384-32767 (16384 bytes)]
[Frame: 1293, payload: 32768-48907 (16140 bytes)]
[Segment count: 3]
[Reassembled PDU length: 48908]
[Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...]
Hypertext Transfer Protocol
HTTP/1.1 200 OK\r\n
[Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n]
[HTTP/1.1 200 OK\r\n]
[Severity level: Chat]
[Group: Sequence]
Request Version: HTTP/1.1
Status Code: 200
Response Phrase: OK
Cache-Control: private\r\n
Content-Type: application/pdf\r\n
Server: Microsoft-IIS/8.5\r\n
X-RequestId: 91bf3b3d-07c6-412e-a6f0-300e6a3a2702\r\n
Content-Disposition: attachment; filename="431372012.pdf"\r\n
X-AspNet-Version: 4.0.30319\r\n
X-Powered-By: ASP.NET\r\n
Date: Mon, 21 Nov 2016 10:31:32 GMT\r\n
Content-Length: 48585\r\n
[Content length: 48585]
\r\n
[HTTP response 10/10]
[Time since request: 0.404760542 seconds]
[Prev request in frame: 1073]
[Prev response in frame: 1135]
[Request in frame: 1223]
File Data: 48585 bytes
Media Type
Media type: application/pdf (48585 bytes)
Frame 1294: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:18.362019309 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724278.362019309 seconds
[Time delta from previous captured frame: 0.000045701 seconds]
[Time delta from previous displayed frame: 0.000045701 seconds]
[Time since reference or first frame: 103.564450456 seconds]
Frame Number: 1294
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3ba (54202)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d2c [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 177447, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13100 (relative sequence number)
Acknowledgment number: 177447 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1293]
[The RTT to ACK the segment was: 0.000045701 seconds]
[iRTT: 0.003305578 seconds]
Frame 1319: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:28.409632426 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724288.409632426 seconds
[Time delta from previous captured frame: 0.017567978 seconds]
[Time delta from previous displayed frame: 10.047613117 seconds]
[Time since reference or first frame: 113.612063573 seconds]
Frame Number: 1319
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3bb (54203)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d2b [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13099, Ack: 177447, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13099 (relative sequence number)
Acknowledgment number: 177447 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): TCP keep-alive segment]
[TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
Frame 1320: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:28.412355101 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724288.412355101 seconds
[Time delta from previous captured frame: 0.002722675 seconds]
[Time delta from previous displayed frame: 0.002722675 seconds]
[Time since reference or first frame: 113.614786248 seconds]
Frame Number: 1320
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: fb47cbf5
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x3068 (12392)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xb47e [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 13100, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 177447 (relative sequence number)
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xf20f [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): ACK to a TCP keep-alive segment]
[ACK to a TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
VSS-Monitoring ethernet trailer, Source Port: 64193
Src Port: 64193
Frame 1354: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:38.649640447 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724298.649640447 seconds
[Time delta from previous captured frame: 0.468298115 seconds]
[Time delta from previous displayed frame: 10.237285346 seconds]
[Time since reference or first frame: 123.852071594 seconds]
Frame Number: 1354
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3bc (54204)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d2a [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13099, Ack: 177447, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 13099 (relative sequence number)
Acknowledgment number: 177447 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): TCP keep-alive segment]
[TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
Frame 1355: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:38.652724908 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724298.652724908 seconds
[Time delta from previous captured frame: 0.003084461 seconds]
[Time delta from previous displayed frame: 0.003084461 seconds]
[Time since reference or first frame: 123.855156055 seconds]
Frame Number: 1355
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: 5576ce1d
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x3077 (12407)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xb46f [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 13100, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 177447 (relative sequence number)
Acknowledgment number: 13100 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 63591
[Calculated window size: 63591]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xf20f [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[TCP Analysis Flags]
[Expert Info (Note/Sequence): ACK to a TCP keep-alive segment]
[ACK to a TCP keep-alive segment]
[Severity level: Note]
[Group: Sequence]
VSS-Monitoring ethernet trailer, Source Port: 22493
Src Port: 22493
Frame 1358: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:40.217500075 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724300.217500075 seconds
[Time delta from previous captured frame: 0.236751841 seconds]
[Time delta from previous displayed frame: 1.564775167 seconds]
[Time since reference or first frame: 125.419931222 seconds]
Frame Number: 1358
Frame Length: 1325 bytes (10600 bits)
Capture Length: 1325 bytes (10600 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl:http]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1309
Identification: 0xd3bd (54205)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4834 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 177447, Len: 1269
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 1269]
Sequence number: 13100 (relative sequence number)
[Next sequence number: 14369 (relative sequence number)]
Acknowledgment number: 177447 (relative ack number)
Header Length: 20 bytes
Flags: 0x018 (PSH, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 1... = Push: Set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······AP···]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1ef9 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1269]
[Bytes sent since last PSH flag: 1269]
Secure Sockets Layer
TLSv1.2 Record Layer: Application Data Protocol: http-over-tls
Content Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 1264
Encrypted Application Data: f1d1eb837385f8e09eb785d2a5446264602af9695d26248c...
Hypertext Transfer Protocol
GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf HTTP/1.1\r\n
[Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf HTTP/1.1\r\n]
[GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf HTTP/1.1\r\n]
[Severity level: Chat]
[Group: Sequence]
Request Method: GET
Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf
Request URI Path: /racuni/pregled-racuna-pdf
Request URI Query: serviceid=12018216&metaid=435518423&filename=435518423.pdf
Request URI Query Parameter: serviceid=12018216
Request URI Query Parameter: metaid=435518423
Request URI Query Parameter: filename=435518423.pdf
Request Version: HTTP/1.1
Host: moj.hrvatskitelekom.hr\r\n
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n
Accept-Language: en-US,en;q=0.5\r\n
Accept-Encoding: gzip, deflate\r\n
Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n
[truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085
Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8
Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc
Cookie pair: CurrentServiceId=12018216
Cookie pair: visited=1
Cookie pair: _ceg.s=ogzmhy
Cookie pair: _ceg.u=ogzmhy
Cookie pair: 62370768-VID=172480676440713
Cookie pair: 62370768-SKEY=5756825085274454102
Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE
Cookie pair: CookieNotification=yes
Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I
Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA==
Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo=
Connection: keep-alive\r\n
\r\n
[Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf]
[HTTP request 11/11]
[Prev request in frame: 1223]
Frame 1359: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:40.269378822 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724300.269378822 seconds
[Time delta from previous captured frame: 0.051878747 seconds]
[Time delta from previous displayed frame: 0.051878747 seconds]
[Time since reference or first frame: 125.471809969 seconds]
Frame Number: 1359
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Padding: a034ae88
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0x3078 (12408)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xb46e [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 14369, Len: 0
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 177447 (relative sequence number)
Acknowledgment number: 14369 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0xe825 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1358]
[The RTT to ACK the segment was: 0.051878747 seconds]
[iRTT: 0.003305578 seconds]
VSS-Monitoring ethernet trailer, Source Port: 157
Src Port: 157
Frame 1364: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:40.548307411 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724300.548307411 seconds
[Time delta from previous captured frame: 0.198776111 seconds]
[Time delta from previous displayed frame: 0.278928589 seconds]
[Time since reference or first frame: 125.750738558 seconds]
Frame Number: 1364
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp:ssl]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x307a (12410)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xaf08 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 14369, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 177447 (relative sequence number)
[Next sequence number: 178827 (relative sequence number)]
Acknowledgment number: 14369 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x59b2 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 1380]
TCP segment data (1380 bytes)
Secure Sockets Layer
Frame 1365: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:40.548378690 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724300.548378690 seconds
[Time delta from previous captured frame: 0.000071279 seconds]
[Time delta from previous displayed frame: 0.000071279 seconds]
[Time since reference or first frame: 125.750809837 seconds]
Frame Number: 1365
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3be (54206)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d28 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 178827, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 14369 (relative sequence number)
Acknowledgment number: 178827 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1364]
[The RTT to ACK the segment was: 0.000071279 seconds]
[iRTT: 0.003305578 seconds]
Frame 1366: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:40.548397692 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724300.548397692 seconds
[Time delta from previous captured frame: 0.000019002 seconds]
[Time delta from previous displayed frame: 0.000019002 seconds]
[Time since reference or first frame: 125.750828839 seconds]
Frame Number: 1366
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x307b (12411)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xaf07 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 178827, Ack: 14369, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 178827 (relative sequence number)
[Next sequence number: 180207 (relative sequence number)]
Acknowledgment number: 14369 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x7626 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 2760]
TCP segment data (1380 bytes)
Frame 1367: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:40.548418583 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724300.548418583 seconds
[Time delta from previous captured frame: 0.000020891 seconds]
[Time delta from previous displayed frame: 0.000020891 seconds]
[Time since reference or first frame: 125.750849730 seconds]
Frame Number: 1367
Frame Length: 56 bytes (448 bits)
Capture Length: 56 bytes (448 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Sent by us (4)
Link-layer address type: 1
Link-layer address length: 6
Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 40
Identification: 0xd3bf (54207)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x4d27 [validation disabled]
[Header checksum status: Unverified]
Source: 192.168.1.2
Destination: 195.29.149.33
Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 180207, Len: 0
Source Port: 56456 (56456)
Destination Port: https (443)
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 14369 (relative sequence number)
Acknowledgment number: 180207 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 65535
[Calculated window size: 65535]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x1a04 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1366]
[The RTT to ACK the segment was: 0.000020891 seconds]
[iRTT: 0.003305578 seconds]
Frame 1368: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:40.548533294 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724300.548533294 seconds
[Time delta from previous captured frame: 0.000114711 seconds]
[Time delta from previous displayed frame: 0.000114711 seconds]
[Time since reference or first frame: 125.750964441 seconds]
Frame Number: 1368
Frame Length: 1436 bytes (11488 bits)
Capture Length: 1436 bytes (11488 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:ip:tcp]
Linux cooked capture
Packet type: Unicast to us (0)
Link-layer address type: 1
Link-layer address length: 6
Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87)
Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
0000 00.. = Differentiated Services Codepoint: Default (0)
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 1420
Identification: 0x307c (12412)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 124
Protocol: TCP (6)
Header checksum: 0xaf06 [validation disabled]
[Header checksum status: Unverified]
Source: 195.29.149.33
Destination: 192.168.1.2
Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 180207, Ack: 14369, Len: 1380
Source Port: https (443)
Destination Port: 56456 (56456)
[Stream index: 1]
[TCP Segment Len: 1380]
Sequence number: 180207 (relative sequence number)
[Next sequence number: 181587 (relative sequence number)]
Acknowledgment number: 14369 (relative ack number)
Header Length: 20 bytes
Flags: 0x010 (ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
[TCP Flags: ·······A····]
Window size value: 64860
[Calculated window size: 64860]
[Window size scaling factor: -2 (no window scaling used)]
Checksum: 0x49c3 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
[iRTT: 0.003305578 seconds]
[Bytes in flight: 1380]
[Bytes sent since last PSH flag: 4140]
TCP segment data (1380 bytes)
Frame 1369: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0
Interface id: 0 (any)
Encapsulation type: Linux cooked-mode capture (25)
Arrival Time: Nov 21, 2016 11:31:40.548555788 CET
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1479724300.548555788 seconds
[Time delta from previous captured frame: 0.000022494 seconds]
[Time delta from previo