Frame 68: 76 bytes on wire (608 bits), 76 bytes captured (608 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.232208115 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.232208115 seconds [Time delta from previous captured frame: 0.020328278 seconds] [Time delta from previous displayed frame: 0.000000000 seconds] [Time since reference or first frame: 11.434639262 seconds] Frame Number: 68 Frame Length: 76 bytes (608 bits) Capture Length: 76 bytes (608 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 60 Identification: 0xd332 (54066) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4da0 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 0, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 0 (relative sequence number) Acknowledgment number: 0 Header Length: 40 bytes Flags: 0x002 (SYN) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...0 .... = Acknowledgment: Not set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..1. = Syn: Set [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 443] [Connection establish request (SYN): server port 443] [Severity level: Chat] [Group: Sequence] .... .... ...0 = Fin: Not set [TCP Flags: ··········S·] Window size value: 29200 [Calculated window size: 29200] Checksum: 0x1a18 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 Options: (20 bytes), Maximum segment size, SACK permitted, Timestamps, No-Operation (NOP), Window scale Maximum segment size: 1460 bytes Kind: Maximum Segment Size (2) Length: 4 MSS Value: 1460 TCP SACK Permitted Option: True Kind: SACK Permitted (4) Length: 2 Timestamps: TSval 335923422, TSecr 0 Kind: Time Stamp Option (8) Length: 10 Timestamp value: 335923422 Timestamp echo reply: 0 No-Operation (NOP) Type: 1 0... .... = Copy on fragmentation: No .00. .... = Class: Control (0) ...0 0001 = Number: No-Operation (NOP) (1) Window scale: 7 (multiply by 128) Kind: Window Scale (3) Length: 3 Shift count: 7 [Multiplier: 128] Frame 69: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.235436206 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.235436206 seconds [Time delta from previous captured frame: 0.003228091 seconds] [Time delta from previous displayed frame: 0.003228091 seconds] [Time since reference or first frame: 11.437867353 seconds] Frame Number: 69 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 44 Identification: 0x6e86 (28294) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x765c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 0, Ack: 1, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 0 (relative sequence number) Acknowledgment number: 1 (relative ack number) Header Length: 24 bytes Flags: 0x012 (SYN, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..1. = Syn: Set [Expert Info (Chat/Sequence): Connection establish acknowledge (SYN+ACK): server port 443] [Connection establish acknowledge (SYN+ACK): server port 443] [Severity level: Chat] [Group: Sequence] .... .... ...0 = Fin: Not set [TCP Flags: ·······A··S·] Window size value: 8192 [Calculated window size: 8192] Checksum: 0x9b5e [unverified] [Checksum Status: Unverified] Urgent pointer: 0 Options: (4 bytes), Maximum segment size Maximum segment size: 1380 bytes Kind: Maximum Segment Size (2) Length: 4 MSS Value: 1380 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 68] [The RTT to ACK the segment was: 0.003228091 seconds] VSS-Monitoring ethernet trailer, Source Port: 59834 Src Port: 59834 Frame 70: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.235513693 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.235513693 seconds [Time delta from previous captured frame: 0.000077487 seconds] [Time delta from previous displayed frame: 0.000077487 seconds] [Time since reference or first frame: 11.437944840 seconds] Frame Number: 70 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd333 (54067) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4db3 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1, Ack: 1, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1 (relative sequence number) Acknowledgment number: 1 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 29200 [Calculated window size: 29200] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 69] [The RTT to ACK the segment was: 0.000077487 seconds] [iRTT: 0.003305578 seconds] Frame 71: 278 bytes on wire (2224 bits), 278 bytes captured (2224 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.235741071 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.235741071 seconds [Time delta from previous captured frame: 0.000227378 seconds] [Time delta from previous displayed frame: 0.000227378 seconds] [Time since reference or first frame: 11.438172218 seconds] Frame Number: 71 Frame Length: 278 bytes (2224 bits) Capture Length: 278 bytes (2224 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 262 Identification: 0xd334 (54068) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cd4 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1, Ack: 1, Len: 222 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 222] Sequence number: 1 (relative sequence number) [Next sequence number: 223 (relative sequence number)] Acknowledgment number: 1 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 29200 [Calculated window size: 29200] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1ae2 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 222] [Bytes sent since last PSH flag: 222] Secure Sockets Layer SSL Record Layer: Handshake Protocol: Client Hello Content Type: Handshake (22) Version: TLS 1.0 (0x0301) Length: 217 Handshake Protocol: Client Hello Handshake Type: Client Hello (1) Length: 213 Version: TLS 1.2 (0x0303) Random GMT Unix Time: Mar 26, 2001 23:53:33.000000000 CEST Random Bytes: 1cb55dacbc7a1d01b951d0afa723cf96deb340250b2a6f9a... Session ID Length: 32 Session ID: ef4000008d2b250df63370d0ffd4feaec1d82f98c6a00ac2... Cipher Suites Length: 22 Cipher Suites (11 suites) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033) Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039) Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f) Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035) Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a) Compression Methods Length: 1 Compression Methods (1 method) Compression Method: null (0) Extensions Length: 118 Extension: server_name Type: server_name (0x0000) Length: 27 Server Name Indication extension Server Name list length: 25 Server Name Type: host_name (0) Server Name length: 22 Server Name: moj.hrvatskitelekom.hr Extension: renegotiation_info Type: renegotiation_info (0xff01) Length: 1 Renegotiation Info extension Renegotiation info extension length: 0 Extension: elliptic_curves Type: elliptic_curves (0x000a) Length: 8 Elliptic Curves Length: 6 Elliptic curves (3 curves) Elliptic curve: secp256r1 (0x0017) Elliptic curve: secp384r1 (0x0018) Elliptic curve: secp521r1 (0x0019) Extension: ec_point_formats Type: ec_point_formats (0x000b) Length: 2 EC point formats Length: 1 Elliptic curves point formats (1) EC point format: uncompressed (0) Extension: SessionTicket TLS Type: SessionTicket TLS (0x0023) Length: 0 Data (0 bytes) Extension: Application Layer Protocol Negotiation Type: Application Layer Protocol Negotiation (0x0010) Length: 11 ALPN Extension Length: 9 ALPN Protocol ALPN string length: 8 ALPN Next Protocol: http/1.1 Extension: status_request Type: status_request (0x0005) Length: 5 Certificate Status Type: OCSP (1) Responder ID list Length: 0 Request Extensions Length: 0 Extension: signature_algorithms Type: signature_algorithms (0x000d) Length: 32 Signature Hash Algorithms Length: 30 Signature Hash Algorithms (15 algorithms) Signature Hash Algorithm: 0x0403 Signature Hash Algorithm Hash: SHA256 (4) Signature Hash Algorithm Signature: ECDSA (3) Signature Hash Algorithm: 0x0503 Signature Hash Algorithm Hash: SHA384 (5) Signature Hash Algorithm Signature: ECDSA (3) Signature Hash Algorithm: 0x0603 Signature Hash Algorithm Hash: SHA512 (6) Signature Hash Algorithm Signature: ECDSA (3) Signature Hash Algorithm: 0x0203 Signature Hash Algorithm Hash: SHA1 (2) Signature Hash Algorithm Signature: ECDSA (3) Signature Hash Algorithm: 0x0804 Signature Hash Algorithm Hash: Unknown (8) Signature Hash Algorithm Signature: Unknown (4) Signature Hash Algorithm: 0x0805 Signature Hash Algorithm Hash: Unknown (8) Signature Hash Algorithm Signature: Unknown (5) Signature Hash Algorithm: 0x0806 Signature Hash Algorithm Hash: Unknown (8) Signature Hash Algorithm Signature: Unknown (6) Signature Hash Algorithm: 0x0401 Signature Hash Algorithm Hash: SHA256 (4) Signature Hash Algorithm Signature: RSA (1) Signature Hash Algorithm: 0x0501 Signature Hash Algorithm Hash: SHA384 (5) Signature Hash Algorithm Signature: RSA (1) Signature Hash Algorithm: 0x0601 Signature Hash Algorithm Hash: SHA512 (6) Signature Hash Algorithm Signature: RSA (1) Signature Hash Algorithm: 0x0201 Signature Hash Algorithm Hash: SHA1 (2) Signature Hash Algorithm Signature: RSA (1) Signature Hash Algorithm: 0x0402 Signature Hash Algorithm Hash: SHA256 (4) Signature Hash Algorithm Signature: DSA (2) Signature Hash Algorithm: 0x0502 Signature Hash Algorithm Hash: SHA384 (5) Signature Hash Algorithm Signature: DSA (2) Signature Hash Algorithm: 0x0602 Signature Hash Algorithm Hash: SHA512 (6) Signature Hash Algorithm Signature: DSA (2) Signature Hash Algorithm: 0x0202 Signature Hash Algorithm Hash: SHA1 (2) Signature Hash Algorithm Signature: DSA (2) Frame 72: 217 bytes on wire (1736 bits), 217 bytes captured (1736 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.239404913 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.239404913 seconds [Time delta from previous captured frame: 0.003663842 seconds] [Time delta from previous displayed frame: 0.003663842 seconds] [Time since reference or first frame: 11.441836060 seconds] Frame Number: 72 Frame Length: 217 bytes (1736 bits) Capture Length: 217 bytes (1736 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 201 Identification: 0x6e87 (28295) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x75be [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 1, Ack: 223, Len: 161 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 161] Sequence number: 1 (relative sequence number) [Next sequence number: 162 (relative sequence number)] Acknowledgment number: 223 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf8ab [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 71] [The RTT to ACK the segment was: 0.003663842 seconds] [iRTT: 0.003305578 seconds] [Bytes in flight: 161] [Bytes sent since last PSH flag: 161] Secure Sockets Layer TLSv1.2 Record Layer: Handshake Protocol: Server Hello Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 81 Handshake Protocol: Server Hello Handshake Type: Server Hello (2) Length: 77 Version: TLS 1.2 (0x0303) Random GMT Unix Time: Nov 21, 2016 11:30:01.000000000 CET Random Bytes: c00e52a749f504485e5e3543addc2a5769037dc1775bf988... Session ID Length: 32 Session ID: ef4000008d2b250df63370d0ffd4feaec1d82f98c6a00ac2... Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) Compression Method: null (0) Extensions Length: 5 Extension: renegotiation_info Type: renegotiation_info (0xff01) Length: 1 Renegotiation Info extension Renegotiation info extension length: 0 TLSv1.2 Record Layer: Change Cipher Spec Protocol: Change Cipher Spec Content Type: Change Cipher Spec (20) Version: TLS 1.2 (0x0303) Length: 1 Change Cipher Spec Message [Expert Info (Note/Sequence): This session reuses previously negotiated keys (Session resumption)] [This session reuses previously negotiated keys (Session resumption)] [Severity level: Note] [Group: Sequence] TLSv1.2 Record Layer: Handshake Protocol: Finished Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 64 Handshake Protocol: Finished Handshake Type: Finished (20) Length: 12 Verify Data Frame 73: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.239448070 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.239448070 seconds [Time delta from previous captured frame: 0.000043157 seconds] [Time delta from previous displayed frame: 0.000043157 seconds] [Time since reference or first frame: 11.441879217 seconds] Frame Number: 73 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd335 (54069) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4db1 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 223, Ack: 162, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 223 (relative sequence number) Acknowledgment number: 162 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 30016 [Calculated window size: 30016] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 72] [The RTT to ACK the segment was: 0.000043157 seconds] [iRTT: 0.003305578 seconds] Frame 74: 131 bytes on wire (1048 bits), 131 bytes captured (1048 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.239807321 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.239807321 seconds [Time delta from previous captured frame: 0.000359251 seconds] [Time delta from previous displayed frame: 0.000359251 seconds] [Time since reference or first frame: 11.442238468 seconds] Frame Number: 74 Frame Length: 131 bytes (1048 bits) Capture Length: 131 bytes (1048 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 115 Identification: 0xd336 (54070) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d65 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 223, Ack: 162, Len: 75 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 75] Sequence number: 223 (relative sequence number) [Next sequence number: 298 (relative sequence number)] Acknowledgment number: 162 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 30016 [Calculated window size: 30016] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a4f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 75] [Bytes sent since last PSH flag: 75] Secure Sockets Layer TLSv1.2 Record Layer: Change Cipher Spec Protocol: Change Cipher Spec Content Type: Change Cipher Spec (20) Version: TLS 1.2 (0x0303) Length: 1 Change Cipher Spec Message TLSv1.2 Record Layer: Handshake Protocol: Finished Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 64 Handshake Protocol: Finished Handshake Type: Finished (20) Length: 12 Verify Data Frame 75: 1181 bytes on wire (9448 bits), 1181 bytes captured (9448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.240483464 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.240483464 seconds [Time delta from previous captured frame: 0.000676143 seconds] [Time delta from previous displayed frame: 0.000676143 seconds] [Time since reference or first frame: 11.442914611 seconds] Frame Number: 75 Frame Length: 1181 bytes (9448 bits) Capture Length: 1181 bytes (9448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1165 Identification: 0xd337 (54071) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x494a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 298, Ack: 162, Len: 1125 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1125] Sequence number: 298 (relative sequence number) [Next sequence number: 1423 (relative sequence number)] Acknowledgment number: 162 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 30016 [Calculated window size: 30016] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1e69 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1200] [Bytes sent since last PSH flag: 1125] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1120 Encrypted Application Data: a98773884d21c3385a96c8713084bfe319ea873efc151a28... Hypertext Transfer Protocol GET / HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET / HTTP/1.1\r\n] [GET / HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: / Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmbv; _ceg.u=ogzmbv; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmbv Cookie pair: _ceg.u=ogzmbv Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/] [HTTP request 1/1] Frame 76: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.243436307 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.243436307 seconds [Time delta from previous captured frame: 0.002952843 seconds] [Time delta from previous displayed frame: 0.002952843 seconds] [Time since reference or first frame: 11.445867454 seconds] Frame Number: 76 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 1dd72672 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6e88 (28296) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x765e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 162, Ack: 1423, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 162 (relative sequence number) Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd3ef [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 75] [The RTT to ACK the segment was: 0.002952843 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 43690 Src Port: 43690 Frame 78: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.289985769 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.289985769 seconds [Time delta from previous captured frame: 0.472785382 seconds] [Time delta from previous displayed frame: 1.046549462 seconds] [Time since reference or first frame: 12.492416916 seconds] Frame Number: 78 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x6ee4 (28388) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6b3a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 162, Ack: 1423, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 162 (relative sequence number) [Next sequence number: 2922 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 2760] TCP segment data (2760 bytes) Secure Sockets Layer Frame 79: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.290107273 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.290107273 seconds [Time delta from previous captured frame: 0.000121504 seconds] [Time delta from previous displayed frame: 0.000121504 seconds] [Time since reference or first frame: 12.492538420 seconds] Frame Number: 79 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd338 (54072) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4dae [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 2922, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1423 (relative sequence number) Acknowledgment number: 2922 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 34500 [Calculated window size: 34500] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 78] [The RTT to ACK the segment was: 0.000121504 seconds] [iRTT: 0.003305578 seconds] Frame 80: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.290798946 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.290798946 seconds [Time delta from previous captured frame: 0.000691673 seconds] [Time delta from previous displayed frame: 0.000691673 seconds] [Time since reference or first frame: 12.493230093 seconds] Frame Number: 80 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ee6 (28390) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x709c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 2922, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 2922 (relative sequence number) [Next sequence number: 4302 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x4028 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 4140] TCP segment data (1380 bytes) Frame 81: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.290872470 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.290872470 seconds [Time delta from previous captured frame: 0.000073524 seconds] [Time delta from previous displayed frame: 0.000073524 seconds] [Time since reference or first frame: 12.493303617 seconds] Frame Number: 81 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ee7 (28391) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x709b [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 4302, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 4302 (relative sequence number) [Next sequence number: 5682 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9d74 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 5520] TCP segment data (1380 bytes) Frame 82: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.290924108 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.290924108 seconds [Time delta from previous captured frame: 0.000051638 seconds] [Time delta from previous displayed frame: 0.000051638 seconds] [Time since reference or first frame: 12.493355255 seconds] Frame Number: 82 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd339 (54073) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4dad [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 5682, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1423 (relative sequence number) Acknowledgment number: 5682 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 41400 [Calculated window size: 41400] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 81] [The RTT to ACK the segment was: 0.000051638 seconds] [iRTT: 0.003305578 seconds] Frame 83: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293524311 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293524311 seconds [Time delta from previous captured frame: 0.002600203 seconds] [Time delta from previous displayed frame: 0.002600203 seconds] [Time since reference or first frame: 12.495955458 seconds] Frame Number: 83 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ee8 (28392) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x709a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 5682, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 5682 (relative sequence number) [Next sequence number: 7062 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xddaa [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 84: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293653251 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293653251 seconds [Time delta from previous captured frame: 0.000128940 seconds] [Time delta from previous displayed frame: 0.000128940 seconds] [Time since reference or first frame: 12.496084398 seconds] Frame Number: 84 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ee9 (28393) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7099 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 7062, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 7062 (relative sequence number) [Next sequence number: 8442 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5921 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 85: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293676636 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293676636 seconds [Time delta from previous captured frame: 0.000023385 seconds] [Time delta from previous displayed frame: 0.000023385 seconds] [Time since reference or first frame: 12.496107783 seconds] Frame Number: 85 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd33a (54074) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4dac [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 8442, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1423 (relative sequence number) Acknowledgment number: 8442 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 46920 [Calculated window size: 46920] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 84] [The RTT to ACK the segment was: 0.000023385 seconds] [iRTT: 0.003305578 seconds] Frame 86: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293746108 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293746108 seconds [Time delta from previous captured frame: 0.000069472 seconds] [Time delta from previous displayed frame: 0.000069472 seconds] [Time since reference or first frame: 12.496177255 seconds] Frame Number: 86 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6eea (28394) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7098 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 8442, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 8442 (relative sequence number) [Next sequence number: 9822 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc8e8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 87: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293771181 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293771181 seconds [Time delta from previous captured frame: 0.000025073 seconds] [Time delta from previous displayed frame: 0.000025073 seconds] [Time since reference or first frame: 12.496202328 seconds] Frame Number: 87 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6eeb (28395) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7097 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 9822, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 9822 (relative sequence number) [Next sequence number: 11202 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xbc86 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 88: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293787572 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293787572 seconds [Time delta from previous captured frame: 0.000016391 seconds] [Time delta from previous displayed frame: 0.000016391 seconds] [Time since reference or first frame: 12.496218719 seconds] Frame Number: 88 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd33b (54075) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4dab [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 11202, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1423 (relative sequence number) Acknowledgment number: 11202 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 52440 [Calculated window size: 52440] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 87] [The RTT to ACK the segment was: 0.000016391 seconds] [iRTT: 0.003305578 seconds] Frame 89: 2237 bytes on wire (17896 bits), 2237 bytes captured (17896 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293978474 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293978474 seconds [Time delta from previous captured frame: 0.000190902 seconds] [Time delta from previous displayed frame: 0.000190902 seconds] [Time since reference or first frame: 12.496409621 seconds] Frame Number: 89 Frame Length: 2237 bytes (17896 bits) Capture Length: 2237 bytes (17896 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2221 Identification: 0x6eec (28396) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6d75 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 11202, Ack: 1423, Len: 2181 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2181] Sequence number: 11202 (relative sequence number) [Next sequence number: 13383 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2289 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2181] [Bytes sent since last PSH flag: 13221] TCP segment data (2181 bytes) [8 Reassembled TCP Segments (13221 bytes): #78(2760), #80(1380), #81(1380), #83(1380), #84(1380), #86(1380), #87(1380), #89(2181)] [Frame: 78, payload: 0-2759 (2760 bytes)] [Frame: 80, payload: 2760-4139 (1380 bytes)] [Frame: 81, payload: 4140-5519 (1380 bytes)] [Frame: 83, payload: 5520-6899 (1380 bytes)] [Frame: 84, payload: 6900-8279 (1380 bytes)] [Frame: 86, payload: 8280-9659 (1380 bytes)] [Frame: 87, payload: 9660-11039 (1380 bytes)] [Frame: 89, payload: 11040-13220 (2181 bytes)] [Segment count: 8] [Reassembled TCP length: 13221] [Reassembled TCP Data: 17030333a0e757ad26f1d17fccaa0a9bd1c94c06e5e05050...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 13216 Encrypted Application Data: e757ad26f1d17fccaa0a9bd1c94c06e5e050501c66cc92b9... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 6ddd971b-77a1-4618-9089-045b55a88ca1\r\n Set-Cookie: CurrentServiceId=0; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:01 GMT\r\n Content-Length: 12808\r\n [Content length: 12808] \r\n [HTTP response 1/1] [Time since request: 1.053495010 seconds] [Request in frame: 75] Content-encoded entity body (gzip): 12808 bytes -> 32333 bytes File Data: 32333 bytes Line-based text data: text/html \r\n \r\n \r\n \tMoj Telekom Portal | Hrvatski Telekom\r\n \r\n \t\t\r\n \t\t\r\n \t\r\n \r\n \r\n \r\n [truncated] \r\n \r\n \t\r\n \r\n \r\n \r\n \r\n \r\n \t\r\n \r\n \r\n \r\n \r\n \r\n \t\r\n \t\r\n \t\r\n \t\r\n \t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \t\t\r\n \r\n \t\r\n \t\r\n \t\r\n \t\t\r\n \r\n \r\n
\r\n
\r\n \r\n \r\n [truncated]\r\n //\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n [truncated]\r\n \r\n [truncated]\r\n \r\n \t\r\n \t\r\n \r\n \r\n
\r\n
\r\n

\r\n \r\n \r\n \r\n [truncated] \r\n \r\n \r\n
\r\n
\r\n \r\n \r\n \r\n \r\n
\r\n \r\n
\r\n
\r\n

Novo na MojT portalu

\r\n
\r\n

Od sada mo\305\276ete platiti HT ra\304\215une kreditnim i debitnim karticama direktno preko MojT portala.

\r\n

\r\n Nove uvjete kori\305\241tenja MojT portala mo\305\276ete pro\304\215itati ovdje\r\n

\r\n
\r\n
\r\n
\r\n \r\n U redu\r\n \r\n \r\n
\r\n
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \t
\r\n \t\t\r\n \t\t
\r\n \t\t\t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \t\t\t
\r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\r\n \r\n
\r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\t\t\t
\r\n \t\t\t\t\t\r\n \t\t\t\t\t\t\r\n \t\r\n \t\r\n \t\r\n \t\t\t\t\t\t\t\t\t\t\t\t\r\n \t\t\t\t\t \r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n \t\t\t\t\t\r\n \t
\r\n

Moji paketi

\r\n
    \r\n \r\n
\r\n \r\n \t\t\r\n \t\t\t\t\r\n \r\n \t
\r\n \t\r\n \t\r\n \t
\r\n \t\t\t\t
\r\n \t\t\t\t\t
\r\n \t\t

Moje fiksne usluge

\r\n \t\t
    \r\n \t\t\t\r\n \t\t\t\r\n \t\t
\t\t\t\r\n \t\t
    \t\t\t\t\r\n \r\n \r\n \t\t\t\t\t\t\r\n \t\t\t\t\t\t\r\n \t\t\t\t\t\t\r\n \r\n \t\t\t\r\n
  • \r\n
  • \r\n \t\t\t\r\n
\r\n \t
\r\n \t\t\t\t
\r\n \t\t\t
\r\n \r\n \t\t\t\t\t\t\r\n \r\n \t\t\t\t\t\t\r\n \r\n \r\n \r\n \t
\302\240
\t\t\t\t\t\t\r\n \t\t\t\t\t\t\r\n \t\t\t\t
\r\n \t\t\t\t\r\n \t\t\t\t\r\n \r\n \t\t\t\t\r\n \t\t\t\t\r\n \r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\t\t
\r\n \t\t\t
\r\n \t\r\n \t\r\n \r\n \t\r\n \t\r\n
\r\n

JOŠ BOLJA I BR\305\275A! ISPROBAJTE MOJ TELEKOM HR APLIKACIJU

\r\n
\r\n
\r\n [truncated]\r\n \r\n \r\n \r\n \r\n
\r\n
\r\n
\r\n \t\r\n \r\n \t\r\n \r\n \t\r\n \r\n \r\n \t\r\n \t\r\n \t\r\n \t\r\n \t\r\n
\r\n \t\t\r\n \t\t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \t
\t\r\n \r\n
\r\n \r\n \t\r\n
\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n Frame 90: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293999116 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293999116 seconds [Time delta from previous captured frame: 0.000020642 seconds] [Time delta from previous displayed frame: 0.000020642 seconds] [Time since reference or first frame: 12.496430263 seconds] Frame Number: 90 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd33c (54076) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4daa [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 13383, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1423 (relative sequence number) Acknowledgment number: 13383 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 56580 [Calculated window size: 56580] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 89] [The RTT to ACK the segment was: 0.000020642 seconds] [iRTT: 0.003305578 seconds] Frame 122: 1213 bytes on wire (9704 bits), 1213 bytes captured (9704 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.521697402 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.521697402 seconds [Time delta from previous captured frame: 0.020401327 seconds] [Time delta from previous displayed frame: 0.227698286 seconds] [Time since reference or first frame: 12.724128549 seconds] Frame Number: 122 Frame Length: 1213 bytes (9704 bits) Capture Length: 1213 bytes (9704 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1197 Identification: 0xd33d (54077) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4924 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 13383, Len: 1157 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1157] Sequence number: 1423 (relative sequence number) [Next sequence number: 2580 (relative sequence number)] Acknowledgment number: 13383 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 56580 [Calculated window size: 56580] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1e89 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1157] [Bytes sent since last PSH flag: 1157] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1152 Encrypted Application Data: 884c2e6bf23b8f824cf8f0daf02a45fe2457805f00fdbfcd... Hypertext Transfer Protocol GET /notice-mobile HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /notice-mobile HTTP/1.1\r\n] [GET /notice-mobile HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /notice-mobile Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html, */*; q=0.01\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n X-Requested-With: XMLHttpRequest\r\n Referer: https://moj.hrvatskitelekom.hr/\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmbv; _ceg.u=ogzmbv; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmbv Cookie pair: _ceg.u=ogzmbv Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/notice-mobile] [HTTP request 2/2] [Prev request in frame: 75] Frame 143: 701 bytes on wire (5608 bits), 701 bytes captured (5608 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.580858055 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.580858055 seconds [Time delta from previous captured frame: 0.000566194 seconds] [Time delta from previous displayed frame: 0.059160653 seconds] [Time since reference or first frame: 12.783289202 seconds] Frame Number: 143 Frame Length: 701 bytes (5608 bits) Capture Length: 701 bytes (5608 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 685 Identification: 0x6ef2 (28402) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x736f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 13383, Ack: 2580, Len: 645 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 645] Sequence number: 13383 (relative sequence number) [Next sequence number: 14028 (relative sequence number)] Acknowledgment number: 2580 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5c87 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 122] [The RTT to ACK the segment was: 0.059160653 seconds] [iRTT: 0.003305578 seconds] [Bytes in flight: 645] [Bytes sent since last PSH flag: 645] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 640 Encrypted Application Data: 3ee2186a4a5e9e96ae629014df36f64f53e157f71af9f411... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 281a3490-9e45-4ea9-afe1-65ea803852f6\r\n Set-Cookie: CurrentServiceId=0; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:02 GMT\r\n Content-Length: 221\r\n [Content length: 221] \r\n [HTTP response 2/2] [Time since request: 0.059160653 seconds] [Prev request in frame: 75] [Prev response in frame: 89] [Request in frame: 122] Content-encoded entity body (gzip): 221 bytes -> 197 bytes File Data: 197 bytes Line-based text data: text/html
\r\n
\r\n
\r\n
\r\n

Moje mobilne usluge, nema podataka

\r\n
\r\n
\r\n
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n Frame 150: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.621614607 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.621614607 seconds [Time delta from previous captured frame: 0.001426831 seconds] [Time delta from previous displayed frame: 0.040756552 seconds] [Time since reference or first frame: 12.824045754 seconds] Frame Number: 150 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd33e (54078) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4da8 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 2580, Ack: 14028, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 2580 (relative sequence number) Acknowledgment number: 14028 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 59340 [Calculated window size: 59340] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 143] [The RTT to ACK the segment was: 0.040756552 seconds] [iRTT: 0.003305578 seconds] Frame 159: 1469 bytes on wire (11752 bits), 1469 bytes captured (11752 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.639492460 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.639492460 seconds [Time delta from previous captured frame: 0.000348764 seconds] [Time delta from previous displayed frame: 0.017877853 seconds] [Time since reference or first frame: 12.841923607 seconds] Frame Number: 159 Frame Length: 1469 bytes (11752 bits) Capture Length: 1469 bytes (11752 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1453 Identification: 0xd33f (54079) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4822 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 2580, Ack: 14028, Len: 1413 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1413] Sequence number: 2580 (relative sequence number) [Next sequence number: 3993 (relative sequence number)] Acknowledgment number: 14028 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 59340 [Calculated window size: 59340] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f89 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1413] [Bytes sent since last PSH flag: 1413] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1408 Encrypted Application Data: 93f85284ac1685f54399883d6496725dd123e0ccef5f4bd1... Hypertext Transfer Protocol POST /App_Modules__SnT.THTCms.CSC.Modules.Package__SnT.THTCms.CSC.Modules.Profile.MojTProfileService.asmx/HasPendingMagentaApplications HTTP/1.1\r\n [Expert Info (Chat/Sequence): POST /App_Modules__SnT.THTCms.CSC.Modules.Package__SnT.THTCms.CSC.Modules.Profile.MojTProfileService.asmx/HasPendingMagentaApplications HTTP/1.1\r\n] [POST /App_Modules__SnT.THTCms.CSC.Modules.Package__SnT.THTCms.CSC.Modules.Profile.MojTProfileService.asmx/HasPendingMagentaApplications HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: POST Request URI: /App_Modules__SnT.THTCms.CSC.Modules.Package__SnT.THTCms.CSC.Modules.Profile.MojTProfileService.asmx/HasPendingMagentaApplications Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: application/json, text/javascript, */*; q=0.01\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Content-Type: application/json; charset=utf-8\r\n X-AjaxRequest: true\r\n X-Requested-With: XMLHttpRequest\r\n Referer: https://moj.hrvatskitelekom.hr/\r\n Content-Length: 24\r\n [Content length: 24] [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmbv; _ceg.u=ogzmbv; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmbv Cookie pair: _ceg.u=ogzmbv Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/App_Modules__SnT.THTCms.CSC.Modules.Package__SnT.THTCms.CSC.Modules.Profile.MojTProfileService.asmx/HasPendingMagentaApplications] [HTTP request 3/3] [Prev request in frame: 122] File Data: 24 bytes JavaScript Object Notation: application/json Object Member Key: backendServiceType Number value: 2 Key: backendServiceType Frame 160: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.642886656 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.642886656 seconds [Time delta from previous captured frame: 0.003394196 seconds] [Time delta from previous displayed frame: 0.003394196 seconds] [Time since reference or first frame: 12.845317803 seconds] Frame Number: 160 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 10c481cd Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6ef5 (28405) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x75f1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 14028, Ack: 3993, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14028 (relative sequence number) Acknowledgment number: 3993 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x8f0b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 159] [The RTT to ACK the segment was: 0.003394196 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 24713 Src Port: 24713 Frame 165: 557 bytes on wire (4456 bits), 557 bytes captured (4456 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.655556146 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.655556146 seconds [Time delta from previous captured frame: 0.002590126 seconds] [Time delta from previous displayed frame: 0.012669490 seconds] [Time since reference or first frame: 12.857987293 seconds] Frame Number: 165 Frame Length: 557 bytes (4456 bits) Capture Length: 557 bytes (4456 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 541 Identification: 0x6ef6 (28406) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x73fb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 14028, Ack: 3993, Len: 501 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 501] Sequence number: 14028 (relative sequence number) [Next sequence number: 14529 (relative sequence number)] Acknowledgment number: 3993 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1839 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 501] [Bytes sent since last PSH flag: 501] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 496 Encrypted Application Data: 9866a709fc4185c8aa57a835dc4af29c2a45ed67237a8aec... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private, max-age=0\r\n Content-Type: application/json; charset=utf-8\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 053ee133-fb94-4354-a2d5-1fb7d06bbf40\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:02 GMT\r\n Content-Length: 170\r\n [Content length: 170] \r\n [HTTP response 3/3] [Time since request: 0.016063686 seconds] [Prev request in frame: 122] [Prev response in frame: 143] [Request in frame: 159] File Data: 170 bytes JavaScript Object Notation: application/json Object Member Key: d Object Member Key: __type String value: SnT.THTCms.MW.Common.MagentaOne.MagentaApplicationCheckResult Key: __type Member Key: IsProfileVerificationCompleted True value Key: IsProfileVerificationCompleted Member Key: HasPendingApplications False value Key: HasPendingApplications Member Key: ApplicationId Null value Key: ApplicationId Key: d Frame 166: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.655591518 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.655591518 seconds [Time delta from previous captured frame: 0.000035372 seconds] [Time delta from previous displayed frame: 0.000035372 seconds] [Time since reference or first frame: 12.858022665 seconds] Frame Number: 166 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd341 (54081) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4da5 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 3993, Ack: 14529, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 3993 (relative sequence number) Acknowledgment number: 14529 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 62100 [Calculated window size: 62100] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 165] [The RTT to ACK the segment was: 0.000035372 seconds] [iRTT: 0.003305578 seconds] Frame 174: 1389 bytes on wire (11112 bits), 1389 bytes captured (11112 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.662720236 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.662720236 seconds [Time delta from previous captured frame: 0.001069036 seconds] [Time delta from previous displayed frame: 0.007128718 seconds] [Time since reference or first frame: 12.865151383 seconds] Frame Number: 174 Frame Length: 1389 bytes (11112 bits) Capture Length: 1389 bytes (11112 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1373 Identification: 0xd342 (54082) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x486f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 3993, Ack: 14529, Len: 1333 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1333] Sequence number: 3993 (relative sequence number) [Next sequence number: 5326 (relative sequence number)] Acknowledgment number: 14529 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 62100 [Calculated window size: 62100] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f39 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1333] [Bytes sent since last PSH flag: 1333] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1328 Encrypted Application Data: 2c18c4ba0e1f7afbbf0f0f14c817b3b02081116da1422fa2... Hypertext Transfer Protocol GET /moredatamaxpackgage/?serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /moredatamaxpackgage/?serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 HTTP/1.1\r\n] [GET /moredatamaxpackgage/?serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /moredatamaxpackgage/?serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 Request URI Path: /moredatamaxpackgage/ Request URI Query: serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 Request URI Query Parameter: serviceType=Halo Request URI Query Parameter: ajaxrequest=true Request URI Query Parameter: maxPackageId=47657083 Request URI Query Parameter: maxpackagetype=Max2,Max3 Request URI Query Parameter: ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n X-AjaxRequest: true\r\n Referer: https://moj.hrvatskitelekom.hr/\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmbv; _ceg.u=ogzmbv; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmbv Cookie pair: _ceg.u=ogzmbv Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/moredatamaxpackgage/?serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96] [HTTP request 4/4] [Prev request in frame: 159] Frame 201: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.728710149 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.728710149 seconds [Time delta from previous captured frame: 0.005565809 seconds] [Time delta from previous displayed frame: 0.065989913 seconds] [Time since reference or first frame: 12.931141296 seconds] Frame Number: 201 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 83a864e9 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6ef7 (28407) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x75ef [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 14529, Ack: 5326, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14529 (relative sequence number) Acknowledgment number: 5326 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63527 [Calculated window size: 63527] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x8d16 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 174] [The RTT to ACK the segment was: 0.065989913 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 3 Src Port: 3 Frame 284: 909 bytes on wire (7272 bits), 909 bytes captured (7272 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.019418251 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.019418251 seconds [Time delta from previous captured frame: 0.000844154 seconds] [Time delta from previous displayed frame: 0.290708102 seconds] [Time since reference or first frame: 13.221849398 seconds] Frame Number: 284 Frame Length: 909 bytes (7272 bits) Capture Length: 909 bytes (7272 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 893 Identification: 0x6f13 (28435) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x727e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 14529, Ack: 5326, Len: 853 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 853] Sequence number: 14529 (relative sequence number) [Next sequence number: 15382 (relative sequence number)] Acknowledgment number: 5326 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63527 [Calculated window size: 63527] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe62a [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 853] [Bytes sent since last PSH flag: 853] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 848 Encrypted Application Data: 68ec2191bcfdb03f51e6c419e04c6d43d887cd4ba861587f... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: fe08534a-8ef6-424c-9d15-ec30a9cc3ac7\r\n Set-Cookie: CurrentServiceId=0; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:02 GMT\r\n Content-Length: 433\r\n [Content length: 433] \r\n [HTTP response 4/4] [Time since request: 0.356698015 seconds] [Prev request in frame: 159] [Prev response in frame: 165] [Request in frame: 174] Content-encoded entity body (gzip): 433 bytes -> 546 bytes File Data: 546 bytes Line-based text data: text/html \r\n \r\n \r\n \r\n
\r\n
Ultra MAX3 M
\r\n \t\t\t\t\t\tTelefonski broj\342\200\24201 6602633
\r\n \t\t\t\t\t\t\tInternet korisni\304\215ko ime\342\200\242rovismi1

\r\n \t\t\t\t\t\t\tMAXtv korisni\304\215ki ra\304\215un\342\200\24226082837
\r\n \t\t\t\t\t\r\n \t\t\t\t\t\tPreostalo je \r\n \t\t\t\t\t\t1094\r\n \t\t\t\t\t\tbesplatnih minuta\t\r\n \t\t\t\t\t\t
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n Frame 300: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.059598853 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.059598853 seconds [Time delta from previous captured frame: 0.003124931 seconds] [Time delta from previous displayed frame: 0.040180602 seconds] [Time since reference or first frame: 13.262030000 seconds] Frame Number: 300 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd343 (54083) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4da3 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 5326, Ack: 15382, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 5326 (relative sequence number) Acknowledgment number: 15382 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 284] [The RTT to ACK the segment was: 0.040180602 seconds] [iRTT: 0.003305578 seconds] Frame 406: 1437 bytes on wire (11496 bits), 1437 bytes captured (11496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.528735916 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.528735916 seconds [Time delta from previous captured frame: 0.000019430 seconds] [Time delta from previous displayed frame: 0.469137063 seconds] [Time since reference or first frame: 13.731167063 seconds] Frame Number: 406 Frame Length: 1437 bytes (11496 bits) Capture Length: 1437 bytes (11496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1421 Identification: 0xd344 (54084) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x483d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 5326, Ack: 15382, Len: 1381 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1381] Sequence number: 5326 (relative sequence number) [Next sequence number: 6707 (relative sequence number)] Acknowledgment number: 15382 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f69 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1381] [Bytes sent since last PSH flag: 1381] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1376 Encrypted Application Data: b5b64e98370cc23a60567b1a0ea413e911a0c5cbc3f3fa4e... Hypertext Transfer Protocol POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n [Expert Info (Chat/Sequence): POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n] [POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: POST Request URI: /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: application/json, text/javascript, */*; q=0.01\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Content-Type: application/json; charset=utf-8\r\n X-AjaxRequest: true\r\n X-Requested-With: XMLHttpRequest\r\n Referer: https://moj.hrvatskitelekom.hr/\r\n Content-Length: 2\r\n [Content length: 2] [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmhn; _ceg.u=ogzmhn; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhn Cookie pair: _ceg.u=ogzmhn Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages] [HTTP request 5/5] [Prev request in frame: 174] File Data: 2 bytes JavaScript Object Notation: application/json Object Frame 408: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.532234016 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.532234016 seconds [Time delta from previous captured frame: 0.001881562 seconds] [Time delta from previous displayed frame: 0.003498100 seconds] [Time since reference or first frame: 13.734665163 seconds] Frame Number: 408 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 4cbe5751 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6f58 (28504) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x758e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 15382, Ack: 6707, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15382 (relative sequence number) Acknowledgment number: 6707 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7f27 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 406] [The RTT to ACK the segment was: 0.003498100 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 35961 Src Port: 35961 Frame 413: 397 bytes on wire (3176 bits), 397 bytes captured (3176 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.554469448 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.554469448 seconds [Time delta from previous captured frame: 0.013813848 seconds] [Time delta from previous displayed frame: 0.022235432 seconds] [Time since reference or first frame: 13.756900595 seconds] Frame Number: 413 Frame Length: 397 bytes (3176 bits) Capture Length: 397 bytes (3176 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 381 Identification: 0x6f59 (28505) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7438 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 15382, Ack: 6707, Len: 341 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 341] Sequence number: 15382 (relative sequence number) [Next sequence number: 15723 (relative sequence number)] Acknowledgment number: 6707 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdc7d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 341] [Bytes sent since last PSH flag: 341] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 336 Encrypted Application Data: 17078cf350a936cb644ab81691b67d6016cea685d8ff4290... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private, max-age=0\r\n Content-Type: application/json; charset=utf-8\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: e88b4e94-94de-4451-ab84-f686ed01dd64\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:03 GMT\r\n Content-Length: 8\r\n [Content length: 8] \r\n [HTTP response 5/5] [Time since request: 0.025733532 seconds] [Prev request in frame: 174] [Prev response in frame: 284] [Request in frame: 406] File Data: 8 bytes JavaScript Object Notation: application/json Object Member Key: d Array Key: d Frame 414: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.554547537 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.554547537 seconds [Time delta from previous captured frame: 0.000078089 seconds] [Time delta from previous displayed frame: 0.000078089 seconds] [Time since reference or first frame: 13.756978684 seconds] Frame Number: 414 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd346 (54086) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4da0 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 6707, Ack: 15723, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 6707 (relative sequence number) Acknowledgment number: 15723 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 413] [The RTT to ACK the segment was: 0.000078089 seconds] [iRTT: 0.003305578 seconds] Frame 488: 1229 bytes on wire (9832 bits), 1229 bytes captured (9832 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:55.670255613 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724195.670255613 seconds [Time delta from previous captured frame: 0.151190962 seconds] [Time delta from previous displayed frame: 7.115708076 seconds] [Time since reference or first frame: 20.872686760 seconds] Frame Number: 488 Frame Length: 1229 bytes (9832 bits) Capture Length: 1229 bytes (9832 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1213 Identification: 0xd347 (54087) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x490a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 6707, Ack: 15723, Len: 1173 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1173] Sequence number: 6707 (relative sequence number) [Next sequence number: 7880 (relative sequence number)] Acknowledgment number: 15723 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1e99 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1173] [Bytes sent since last PSH flag: 1173] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1168 Encrypted Application Data: a6c22abef98757e5691dc0265b5e3fd06734cab83dff15b5... Hypertext Transfer Protocol GET /racuni?serviceid=12018216 HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni?serviceid=12018216 HTTP/1.1\r\n] [GET /racuni?serviceid=12018216 HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni?serviceid=12018216 Request URI Path: /racuni Request URI Query: serviceid=12018216 Request URI Query Parameter: serviceid=12018216 Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmhn; _ceg.u=ogzmhn; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhn Cookie pair: _ceg.u=ogzmhn Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216] [HTTP request 6/6] [Prev request in frame: 406] Frame 489: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:55.729382721 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724195.729382721 seconds [Time delta from previous captured frame: 0.059127108 seconds] [Time delta from previous displayed frame: 0.059127108 seconds] [Time since reference or first frame: 20.931813868 seconds] Frame Number: 489 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 2be8dcea Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6f8c (28556) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x755a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 15723, Ack: 7880, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15723 (relative sequence number) Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7dd2 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 488] [The RTT to ACK the segment was: 0.059127108 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 23822 Src Port: 23822 Frame 493: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.068599275 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.068599275 seconds [Time delta from previous captured frame: 0.279046434 seconds] [Time delta from previous displayed frame: 2.339216554 seconds] [Time since reference or first frame: 23.271030422 seconds] Frame Number: 493 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x6f8d (28557) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6a91 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 15723, Ack: 7880, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 15723 (relative sequence number) [Next sequence number: 18483 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 2760] TCP segment data (2760 bytes) Secure Sockets Layer Frame 494: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.068735286 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.068735286 seconds [Time delta from previous captured frame: 0.000136011 seconds] [Time delta from previous displayed frame: 0.000136011 seconds] [Time since reference or first frame: 23.271166433 seconds] Frame Number: 494 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd348 (54088) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d9e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 18483, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 18483 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 493] [The RTT to ACK the segment was: 0.000136011 seconds] [iRTT: 0.003305578 seconds] Frame 495: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.068848199 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.068848199 seconds [Time delta from previous captured frame: 0.000112913 seconds] [Time delta from previous displayed frame: 0.000112913 seconds] [Time since reference or first frame: 23.271279346 seconds] Frame Number: 495 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x6f8f (28559) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6a8f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 18483, Ack: 7880, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 18483 (relative sequence number) [Next sequence number: 21243 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 5520] TCP segment data (2760 bytes) Frame 496: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.068900629 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.068900629 seconds [Time delta from previous captured frame: 0.000052430 seconds] [Time delta from previous displayed frame: 0.000052430 seconds] [Time since reference or first frame: 23.271331776 seconds] Frame Number: 496 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd349 (54089) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d9d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 21243, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 21243 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 495] [The RTT to ACK the segment was: 0.000052430 seconds] [iRTT: 0.003305578 seconds] Frame 497: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069043267 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069043267 seconds [Time delta from previous captured frame: 0.000142638 seconds] [Time delta from previous displayed frame: 0.000142638 seconds] [Time since reference or first frame: 23.271474414 seconds] Frame Number: 497 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f91 (28561) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6ff1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 21243, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 21243 (relative sequence number) [Next sequence number: 22623 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xa86c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 498: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069090433 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069090433 seconds [Time delta from previous captured frame: 0.000047166 seconds] [Time delta from previous displayed frame: 0.000047166 seconds] [Time since reference or first frame: 23.271521580 seconds] Frame Number: 498 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34a (54090) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d9c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 22623, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 22623 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 497] [The RTT to ACK the segment was: 0.000047166 seconds] [iRTT: 0.003305578 seconds] Frame 499: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069119431 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069119431 seconds [Time delta from previous captured frame: 0.000028998 seconds] [Time delta from previous displayed frame: 0.000028998 seconds] [Time since reference or first frame: 23.271550578 seconds] Frame Number: 499 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f92 (28562) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6ff0 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 22623, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 22623 (relative sequence number) [Next sequence number: 24003 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7d5d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 500: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069161761 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069161761 seconds [Time delta from previous captured frame: 0.000042330 seconds] [Time delta from previous displayed frame: 0.000042330 seconds] [Time since reference or first frame: 23.271592908 seconds] Frame Number: 500 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34b (54091) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d9b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 24003, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 24003 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 499] [The RTT to ACK the segment was: 0.000042330 seconds] [iRTT: 0.003305578 seconds] Frame 501: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069274698 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069274698 seconds [Time delta from previous captured frame: 0.000112937 seconds] [Time delta from previous displayed frame: 0.000112937 seconds] [Time since reference or first frame: 23.271705845 seconds] Frame Number: 501 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f93 (28563) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fef [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 24003, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 24003 (relative sequence number) [Next sequence number: 25383 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc261 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 502: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069318397 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069318397 seconds [Time delta from previous captured frame: 0.000043699 seconds] [Time delta from previous displayed frame: 0.000043699 seconds] [Time since reference or first frame: 23.271749544 seconds] Frame Number: 502 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34c (54092) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d9a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 25383, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 25383 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 501] [The RTT to ACK the segment was: 0.000043699 seconds] [iRTT: 0.003305578 seconds] Frame 503: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069375310 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069375310 seconds [Time delta from previous captured frame: 0.000056913 seconds] [Time delta from previous displayed frame: 0.000056913 seconds] [Time since reference or first frame: 23.271806457 seconds] Frame Number: 503 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f94 (28564) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fee [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 25383, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 25383 (relative sequence number) [Next sequence number: 26763 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x04be [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 504: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069415131 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069415131 seconds [Time delta from previous captured frame: 0.000039821 seconds] [Time delta from previous displayed frame: 0.000039821 seconds] [Time since reference or first frame: 23.271846278 seconds] Frame Number: 504 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34d (54093) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d99 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 26763, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 26763 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 503] [The RTT to ACK the segment was: 0.000039821 seconds] [iRTT: 0.003305578 seconds] Frame 505: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069508598 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069508598 seconds [Time delta from previous captured frame: 0.000093467 seconds] [Time delta from previous displayed frame: 0.000093467 seconds] [Time since reference or first frame: 23.271939745 seconds] Frame Number: 505 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f95 (28565) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fed [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 26763, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 26763 (relative sequence number) [Next sequence number: 28143 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd246 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 12420] TCP segment data (1380 bytes) Frame 506: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069568369 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069568369 seconds [Time delta from previous captured frame: 0.000059771 seconds] [Time delta from previous displayed frame: 0.000059771 seconds] [Time since reference or first frame: 23.271999516 seconds] Frame Number: 506 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34e (54094) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d98 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 28143, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 28143 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 505] [The RTT to ACK the segment was: 0.000059771 seconds] [iRTT: 0.003305578 seconds] Frame 507: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069596985 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069596985 seconds [Time delta from previous captured frame: 0.000028616 seconds] [Time delta from previous displayed frame: 0.000028616 seconds] [Time since reference or first frame: 23.272028132 seconds] Frame Number: 507 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f96 (28566) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fec [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 28143, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 28143 (relative sequence number) [Next sequence number: 29523 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xee6c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 13800] TCP segment data (1380 bytes) Frame 508: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069638826 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069638826 seconds [Time delta from previous captured frame: 0.000041841 seconds] [Time delta from previous displayed frame: 0.000041841 seconds] [Time since reference or first frame: 23.272069973 seconds] Frame Number: 508 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34f (54095) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d97 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 29523, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 29523 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 507] [The RTT to ACK the segment was: 0.000041841 seconds] [iRTT: 0.003305578 seconds] Frame 509: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069740394 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069740394 seconds [Time delta from previous captured frame: 0.000101568 seconds] [Time delta from previous displayed frame: 0.000101568 seconds] [Time since reference or first frame: 23.272171541 seconds] Frame Number: 509 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f97 (28567) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6feb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 29523, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 29523 (relative sequence number) [Next sequence number: 30903 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xeea5 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 15180] TCP segment data (1380 bytes) Frame 510: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069785035 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069785035 seconds [Time delta from previous captured frame: 0.000044641 seconds] [Time delta from previous displayed frame: 0.000044641 seconds] [Time since reference or first frame: 23.272216182 seconds] Frame Number: 510 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd350 (54096) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d96 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 30903, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 30903 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 509] [The RTT to ACK the segment was: 0.000044641 seconds] [iRTT: 0.003305578 seconds] Frame 511: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069812417 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069812417 seconds [Time delta from previous captured frame: 0.000027382 seconds] [Time delta from previous displayed frame: 0.000027382 seconds] [Time since reference or first frame: 23.272243564 seconds] Frame Number: 511 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f98 (28568) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fea [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 30903, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 30903 (relative sequence number) [Next sequence number: 32283 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x60de [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 16560] TCP segment data (1257 bytes) TCP segment data (123 bytes) [10 Reassembled TCP Segments (16437 bytes): #493(2760), #495(2760), #497(1380), #499(1380), #501(1380), #503(1380), #505(1380), #507(1380), #509(1380), #511(1257)] [Frame: 493, payload: 0-2759 (2760 bytes)] [Frame: 495, payload: 2760-5519 (2760 bytes)] [Frame: 497, payload: 5520-6899 (1380 bytes)] [Frame: 499, payload: 6900-8279 (1380 bytes)] [Frame: 501, payload: 8280-9659 (1380 bytes)] [Frame: 503, payload: 9660-11039 (1380 bytes)] [Frame: 505, payload: 11040-12419 (1380 bytes)] [Frame: 507, payload: 12420-13799 (1380 bytes)] [Frame: 509, payload: 13800-15179 (1380 bytes)] [Frame: 511, payload: 15180-16436 (1257 bytes)] [Segment count: 10] [Reassembled TCP length: 16437] [Reassembled TCP Data: 1703034030a7feb79ac9ab19b859ccee9773a8c387ffa7c7...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: a7feb79ac9ab19b859ccee9773a8c387ffa7c799e6d0ebe8... SSL segment data (16384 bytes) Secure Sockets Layer Frame 512: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069853108 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069853108 seconds [Time delta from previous captured frame: 0.000040691 seconds] [Time delta from previous displayed frame: 0.000040691 seconds] [Time since reference or first frame: 23.272284255 seconds] Frame Number: 512 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd351 (54097) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d95 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 32283, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 32283 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 511] [The RTT to ACK the segment was: 0.000040691 seconds] [iRTT: 0.003305578 seconds] Frame 513: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069973888 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069973888 seconds [Time delta from previous captured frame: 0.000120780 seconds] [Time delta from previous displayed frame: 0.000120780 seconds] [Time since reference or first frame: 23.272405035 seconds] Frame Number: 513 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f99 (28569) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fe9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 32283, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 32283 (relative sequence number) [Next sequence number: 33663 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdc70 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 17940] TCP segment data (1380 bytes) Frame 514: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.070031707 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.070031707 seconds [Time delta from previous captured frame: 0.000057819 seconds] [Time delta from previous displayed frame: 0.000057819 seconds] [Time since reference or first frame: 23.272462854 seconds] Frame Number: 514 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd352 (54098) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d94 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 33663, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 33663 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 513] [The RTT to ACK the segment was: 0.000057819 seconds] [iRTT: 0.003305578 seconds] Frame 515: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.070054888 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.070054888 seconds [Time delta from previous captured frame: 0.000023181 seconds] [Time delta from previous displayed frame: 0.000023181 seconds] [Time since reference or first frame: 23.272486035 seconds] Frame Number: 515 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f9a (28570) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fe8 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 33663, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 33663 (relative sequence number) [Next sequence number: 35043 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc8c7 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 19320] TCP segment data (1380 bytes) Frame 516: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.070094279 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.070094279 seconds [Time delta from previous captured frame: 0.000039391 seconds] [Time delta from previous displayed frame: 0.000039391 seconds] [Time since reference or first frame: 23.272525426 seconds] Frame Number: 516 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd353 (54099) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d93 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 35043, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 35043 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 515] [The RTT to ACK the segment was: 0.000039391 seconds] [iRTT: 0.003305578 seconds] Frame 517: 234 bytes on wire (1872 bits), 234 bytes captured (1872 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.070115122 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.070115122 seconds [Time delta from previous captured frame: 0.000020843 seconds] [Time delta from previous displayed frame: 0.000020843 seconds] [Time since reference or first frame: 23.272546269 seconds] Frame Number: 517 Frame Length: 234 bytes (1872 bits) Capture Length: 234 bytes (1872 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 218 Identification: 0x6f9b (28571) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7499 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35043, Ack: 7880, Len: 178 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 178] Sequence number: 35043 (relative sequence number) [Next sequence number: 35221 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb8c1 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 178] [Bytes sent since last PSH flag: 19498] TCP segment data (178 bytes) [4 Reassembled TCP Segments (3061 bytes): #511(123), #513(1380), #515(1380), #517(178)] [Frame: 511, payload: 0-122 (123 bytes)] [Frame: 513, payload: 123-1502 (1380 bytes)] [Frame: 515, payload: 1503-2882 (1380 bytes)] [Frame: 517, payload: 2883-3060 (178 bytes)] [Segment count: 4] [Reassembled TCP length: 3061] [Reassembled TCP Data: 1703030bf0e3d4c973466c42eda1c4370f4d42744e391a6a...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 3056 Encrypted Application Data: e3d4c973466c42eda1c4370f4d42744e391a6a946b6caef2... SSL segment data (3015 bytes) [2 Reassembled SSL segments (19399 bytes): #511(16384), #517(3015)] [Frame: 511, payload: 0-16383 (16384 bytes)] [Frame: 517, payload: 16384-19398 (3015 bytes)] [Segment count: 2] [Reassembled PDU length: 19399] [Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...] Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: fe09aeee-bc0a-4f51-8920-db2b072851a4\r\n Set-Cookie: CurrentServiceId=12018216; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:12 GMT\r\n Content-Length: 19022\r\n [Content length: 19022] \r\n [HTTP response 6/6] [Time since request: 2.399859509 seconds] [Prev request in frame: 406] [Prev response in frame: 413] [Request in frame: 488] Content-encoded entity body (gzip): 19022 bytes -> 59104 bytes File Data: 59104 bytes Line-based text data: text/html \n \n \n \tHT fiksni ra\304\215un br. 5019102951 \342\200\242 Moj Telekom\n \t\r\n \r\n \r\n \r\n \r\n \r\n \n \t\r\n \r\n \r\n \r\n \r\n \r\n \t\r\n \r\n \r\n \r\n \r\n \r\n \t\r\n \t\r\n \t\n \t\n \t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \n \t\t\n \t\t\t\n \t\n \t\n \t\n \t\n \t\n \t\n \t\n \t\n \n \n
\r\n
\r\n \r\n \r\n [truncated]\r\n //\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n [truncated]\r\n \r\n [truncated]\r\n \n \t\n \t\r\n \r\n \r\n
\r\n
\r\n

\r\n \r\n \r\n \r\n [truncated] \r\n \r\n \r\n
\r\n
\r\n \r\n \r\n \r\n \r\n
\r\n \r\n
\r\n
\r\n

Novo na MojT portalu

\r\n
\r\n

Od sada mo\305\276ete platiti HT ra\304\215une kreditnim i debitnim karticama direktno preko MojT portala.

\r\n

\r\n Nove uvjete kori\305\241tenja MojT portala mo\305\276ete pro\304\215itati ovdje\r\n

\r\n
\r\n
\r\n
\r\n \r\n U redu\r\n \r\n \r\n
\r\n
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \t
\n \t\t
\n \t\t\t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \t\t\t
\n \t\t\t\t\n \t\t\t\t\n \t\t\t\t
\n \t\t\t\t\n \n \t\t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\t
\r\n

\r\n \t\t\t\t\t\tRA\304\214UN ZA FIKSNE USLUGE BR. 5019102951

\r\n
\r\n
\r\n
\r\n
\r\n

\r\n \t\t\t\t\t\t\tVa\305\241i ra\304\215uni za prethodni mjesec su u pripremi i bit \304\207e Vam dostupni na Moj Telekom Portalu od
\r\n \t\t\t\t\t\t\tHvala Vam \305\241to koristite E-ra\304\215un i poma\305\276ete nam o\304\215uvati prirodu!\r\n \t\t\t\t\t\t\t

\r\n
\r\n
\r\n
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \302\240\r\n \t\t\t\t\t\t\r\n \r\n \r\n [truncated] \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n
RazdobljeDatum
dospije\304\207a
IznosPreostalo
za platiti
Status
pla\304\207anja Preuzimanja
10/201616.11.2016.369,49 kn\r\n \t\t\t\t\t\t\t\t\t291,25 kn\r\n \t\t\t\t\t\t\t\t\tDjelomi\304\215no podmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24009/201617.10.2016.449,23 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24008/201616.9.2016.417,32 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24007/201616.8.2016.394,90 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24006/201618.7.2016.405,38 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24005/201616.6.2016.365,59 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24004/201616.5.2016.345,37 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24003/201615.4.2016.329,72 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24002/201615.3.2016.340,82 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24001/201615.2.2016.351,05 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24012/201515.1.2016.356,21 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24011/201515.12.2015.416,35 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n
\r\n
UKUPNO ZA PLATITI:
\r\n
\r\n \r\n
\r\n
\r\n

Powered by Svi ra\304\215uni

\r\n
\r\n
\r\n
\r\n
\n \t\t\t\t
\t\n \n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\n \t\t\t
\n \t\t\t
\r\n \t\r\n \t\r\n \r\n \t\r\n \t\r\n \t\r\n \r\n \t\r\n \r\n \t\r\n \r\n \r\n \t\r\n \t\r\n \t\r\n \t\r\n \t\r\n
\n \t\t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \t
\t\n \r\n
\r\n \r\n \t\r\n
\n \n \n \n \t\r\n \r\n \n \t
\r\n \t\r\n \t\t
\r\n \t\t\t
\r\n \t\t\t
\r\n \t\t
\r\n \t
\r\n \t\r\n \t\t\n \t\t\n \n \r\n \r\n \r\n \r\n \r\n \r\n Frame 518: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.070153956 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.070153956 seconds [Time delta from previous captured frame: 0.000038834 seconds] [Time delta from previous displayed frame: 0.000038834 seconds] [Time since reference or first frame: 23.272585103 seconds] Frame Number: 518 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd354 (54100) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d92 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 35221, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 35221 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 517] [The RTT to ACK the segment was: 0.000038834 seconds] [iRTT: 0.003305578 seconds] Frame 627: 1469 bytes on wire (11752 bits), 1469 bytes captured (11752 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:59.303562869 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724199.303562869 seconds [Time delta from previous captured frame: 0.000050828 seconds] [Time delta from previous displayed frame: 1.233408913 seconds] [Time since reference or first frame: 24.505994016 seconds] Frame Number: 627 Frame Length: 1469 bytes (11752 bits) Capture Length: 1469 bytes (11752 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1453 Identification: 0xd355 (54101) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x480c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 35221, Len: 1413 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1413] Sequence number: 7880 (relative sequence number) [Next sequence number: 9293 (relative sequence number)] Acknowledgment number: 35221 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f89 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1413] [Bytes sent since last PSH flag: 1413] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1408 Encrypted Application Data: 1249deb9e6b04b549d14378a7d30585b10577763627b185f... Hypertext Transfer Protocol POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n [Expert Info (Chat/Sequence): POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n] [POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: POST Request URI: /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: application/json, text/javascript, */*; q=0.01\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Content-Type: application/json; charset=utf-8\r\n X-AjaxRequest: true\r\n X-Requested-With: XMLHttpRequest\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n Content-Length: 2\r\n [Content length: 2] [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages] [HTTP request 7/7] [Prev request in frame: 488] File Data: 2 bytes JavaScript Object Notation: application/json Object Frame 628: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:59.307025553 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724199.307025553 seconds [Time delta from previous captured frame: 0.003462684 seconds] [Time delta from previous displayed frame: 0.003462684 seconds] [Time since reference or first frame: 24.509456700 seconds] Frame Number: 628 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 993434ae Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6f9c (28572) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x754a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35221, Ack: 9293, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 35221 (relative sequence number) Acknowledgment number: 9293 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x278e [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 627] [The RTT to ACK the segment was: 0.003462684 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 40423 Src Port: 40423 Frame 629: 397 bytes on wire (3176 bits), 397 bytes captured (3176 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:59.325039412 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724199.325039412 seconds [Time delta from previous captured frame: 0.018013859 seconds] [Time delta from previous displayed frame: 0.018013859 seconds] [Time since reference or first frame: 24.527470559 seconds] Frame Number: 629 Frame Length: 397 bytes (3176 bits) Capture Length: 397 bytes (3176 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 381 Identification: 0x6f9d (28573) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x73f4 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35221, Ack: 9293, Len: 341 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 341] Sequence number: 35221 (relative sequence number) [Next sequence number: 35562 (relative sequence number)] Acknowledgment number: 9293 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1300 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 341] [Bytes sent since last PSH flag: 341] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 336 Encrypted Application Data: a15e6918dd0e1356e43574481e3c7d8327b820ea14717559... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private, max-age=0\r\n Content-Type: application/json; charset=utf-8\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 13607d00-bbb8-4d0c-87b5-0e39146b8cf0\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:13 GMT\r\n Content-Length: 8\r\n [Content length: 8] \r\n [HTTP response 7/7] [Time since request: 0.021476543 seconds] [Prev request in frame: 488] [Prev response in frame: 517] [Request in frame: 627] File Data: 8 bytes JavaScript Object Notation: application/json Object Member Key: d Array Key: d Frame 630: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:59.325103632 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724199.325103632 seconds [Time delta from previous captured frame: 0.000064220 seconds] [Time delta from previous displayed frame: 0.000064220 seconds] [Time since reference or first frame: 24.527534779 seconds] Frame Number: 630 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd357 (54103) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d8f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 9293, Ack: 35562, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 9293 (relative sequence number) Acknowledgment number: 35562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 629] [The RTT to ACK the segment was: 0.000064220 seconds] [iRTT: 0.003305578 seconds] Frame 869: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:09.369604934 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724209.369604934 seconds [Time delta from previous captured frame: 0.111978467 seconds] [Time delta from previous displayed frame: 10.044501302 seconds] [Time since reference or first frame: 34.572036081 seconds] Frame Number: 869 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd358 (54104) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d8e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 9292, Ack: 35562, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 9292 (relative sequence number) Acknowledgment number: 35562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 870: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:09.372292267 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724209.372292267 seconds [Time delta from previous captured frame: 0.002687333 seconds] [Time delta from previous displayed frame: 0.002687333 seconds] [Time since reference or first frame: 34.574723414 seconds] Frame Number: 870 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 39334383 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fa1 (28577) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7545 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35562, Ack: 9293, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 35562 (relative sequence number) Acknowledgment number: 9293 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2639 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 32639 Src Port: 32639 Frame 885: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:11.838115129 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724211.838115129 seconds [Time delta from previous captured frame: 1.298059611 seconds] [Time delta from previous displayed frame: 2.465822862 seconds] [Time since reference or first frame: 37.040546276 seconds] Frame Number: 885 Frame Length: 1325 bytes (10600 bits) Capture Length: 1325 bytes (10600 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1309 Identification: 0xd359 (54105) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4898 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 9293, Ack: 35562, Len: 1269 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1269] Sequence number: 9293 (relative sequence number) [Next sequence number: 10562 (relative sequence number)] Acknowledgment number: 35562 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1ef9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1269] [Bytes sent since last PSH flag: 1269] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1264 Encrypted Application Data: 756ebf596c39fc2f84b0f1e0112995f8f0298631925f6ab8... Hypertext Transfer Protocol GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf HTTP/1.1\r\n] [GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf Request URI Path: /racuni/pregled-racuna-pdf Request URI Query: serviceid=12018216&metaid=418703738&filename=418703738.pdf Request URI Query Parameter: serviceid=12018216 Request URI Query Parameter: metaid=418703738 Request URI Query Parameter: filename=418703738.pdf Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf] [HTTP request 8/8] [Prev request in frame: 627] Frame 886: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:11.901656340 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724211.901656340 seconds [Time delta from previous captured frame: 0.063541211 seconds] [Time delta from previous displayed frame: 0.063541211 seconds] [Time since reference or first frame: 37.104087487 seconds] Frame Number: 886 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: e73d9efc Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fa2 (28578) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7544 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35562, Ack: 10562, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 35562 (relative sequence number) Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2639 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 885] [The RTT to ACK the segment was: 0.063541211 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 45980 Src Port: 45980 Frame 887: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273147864 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273147864 seconds [Time delta from previous captured frame: 0.371491524 seconds] [Time delta from previous displayed frame: 0.371491524 seconds] [Time since reference or first frame: 37.475579011 seconds] Frame Number: 887 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa3 (28579) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fdf [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35562, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 35562 (relative sequence number) [Next sequence number: 36942 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x36fa [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 1380] TCP segment data (1380 bytes) Secure Sockets Layer Frame 888: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273220123 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273220123 seconds [Time delta from previous captured frame: 0.000072259 seconds] [Time delta from previous displayed frame: 0.000072259 seconds] [Time since reference or first frame: 37.475651270 seconds] Frame Number: 888 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35a (54106) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d8c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 36942, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 36942 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 887] [The RTT to ACK the segment was: 0.000072259 seconds] [iRTT: 0.003305578 seconds] Frame 889: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273304294 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273304294 seconds [Time delta from previous captured frame: 0.000084171 seconds] [Time delta from previous displayed frame: 0.000084171 seconds] [Time since reference or first frame: 37.475735441 seconds] Frame Number: 889 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa4 (28580) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fde [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 36942, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 36942 (relative sequence number) [Next sequence number: 38322 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9987 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 2760] TCP segment data (1380 bytes) Frame 890: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273333170 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273333170 seconds [Time delta from previous captured frame: 0.000028876 seconds] [Time delta from previous displayed frame: 0.000028876 seconds] [Time since reference or first frame: 37.475764317 seconds] Frame Number: 890 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35b (54107) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d8b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 38322, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 38322 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 889] [The RTT to ACK the segment was: 0.000028876 seconds] [iRTT: 0.003305578 seconds] Frame 891: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273364391 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273364391 seconds [Time delta from previous captured frame: 0.000031221 seconds] [Time delta from previous displayed frame: 0.000031221 seconds] [Time since reference or first frame: 37.475795538 seconds] Frame Number: 891 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa5 (28581) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fdd [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 38322, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 38322 (relative sequence number) [Next sequence number: 39702 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x8550 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 4140] TCP segment data (1380 bytes) Frame 892: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273382943 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273382943 seconds [Time delta from previous captured frame: 0.000018552 seconds] [Time delta from previous displayed frame: 0.000018552 seconds] [Time since reference or first frame: 37.475814090 seconds] Frame Number: 892 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35c (54108) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d8a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 39702, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 39702 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 891] [The RTT to ACK the segment was: 0.000018552 seconds] [iRTT: 0.003305578 seconds] Frame 893: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273395924 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273395924 seconds [Time delta from previous captured frame: 0.000012981 seconds] [Time delta from previous displayed frame: 0.000012981 seconds] [Time since reference or first frame: 37.475827071 seconds] Frame Number: 893 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa6 (28582) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fdc [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 39702, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 39702 (relative sequence number) [Next sequence number: 41082 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0b88 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 5520] TCP segment data (1380 bytes) Frame 894: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273412063 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273412063 seconds [Time delta from previous captured frame: 0.000016139 seconds] [Time delta from previous displayed frame: 0.000016139 seconds] [Time since reference or first frame: 37.475843210 seconds] Frame Number: 894 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35d (54109) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d89 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 41082, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 41082 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 893] [The RTT to ACK the segment was: 0.000016139 seconds] [iRTT: 0.003305578 seconds] Frame 895: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273597893 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273597893 seconds [Time delta from previous captured frame: 0.000185830 seconds] [Time delta from previous displayed frame: 0.000185830 seconds] [Time since reference or first frame: 37.476029040 seconds] Frame Number: 895 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa7 (28583) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fdb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 41082, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 41082 (relative sequence number) [Next sequence number: 42462 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd626 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 896: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273618317 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273618317 seconds [Time delta from previous captured frame: 0.000020424 seconds] [Time delta from previous displayed frame: 0.000020424 seconds] [Time since reference or first frame: 37.476049464 seconds] Frame Number: 896 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35e (54110) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d88 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 42462, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 42462 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 895] [The RTT to ACK the segment was: 0.000020424 seconds] [iRTT: 0.003305578 seconds] Frame 897: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274673995 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274673995 seconds [Time delta from previous captured frame: 0.001055678 seconds] [Time delta from previous displayed frame: 0.001055678 seconds] [Time since reference or first frame: 37.477105142 seconds] Frame Number: 897 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa8 (28584) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fda [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 42462, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 42462 (relative sequence number) [Next sequence number: 43842 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb810 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 898: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274708967 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274708967 seconds [Time delta from previous captured frame: 0.000034972 seconds] [Time delta from previous displayed frame: 0.000034972 seconds] [Time since reference or first frame: 37.477140114 seconds] Frame Number: 898 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35f (54111) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d87 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 43842, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 43842 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 897] [The RTT to ACK the segment was: 0.000034972 seconds] [iRTT: 0.003305578 seconds] Frame 899: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274805431 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274805431 seconds [Time delta from previous captured frame: 0.000096464 seconds] [Time delta from previous displayed frame: 0.000096464 seconds] [Time since reference or first frame: 37.477236578 seconds] Frame Number: 899 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa9 (28585) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 43842, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 43842 (relative sequence number) [Next sequence number: 45222 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f9b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 900: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274824017 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274824017 seconds [Time delta from previous captured frame: 0.000018586 seconds] [Time delta from previous displayed frame: 0.000018586 seconds] [Time since reference or first frame: 37.477255164 seconds] Frame Number: 900 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd360 (54112) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d86 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 45222, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 45222 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 899] [The RTT to ACK the segment was: 0.000018586 seconds] [iRTT: 0.003305578 seconds] Frame 901: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274839691 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274839691 seconds [Time delta from previous captured frame: 0.000015674 seconds] [Time delta from previous displayed frame: 0.000015674 seconds] [Time since reference or first frame: 37.477270838 seconds] Frame Number: 901 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6faa (28586) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd8 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 45222, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 45222 (relative sequence number) [Next sequence number: 46602 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x62bb [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 902: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274856304 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274856304 seconds [Time delta from previous captured frame: 0.000016613 seconds] [Time delta from previous displayed frame: 0.000016613 seconds] [Time since reference or first frame: 37.477287451 seconds] Frame Number: 902 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd361 (54113) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d85 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 46602, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 46602 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 901] [The RTT to ACK the segment was: 0.000016613 seconds] [iRTT: 0.003305578 seconds] Frame 903: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275038858 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275038858 seconds [Time delta from previous captured frame: 0.000182554 seconds] [Time delta from previous displayed frame: 0.000182554 seconds] [Time since reference or first frame: 37.477470005 seconds] Frame Number: 903 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fab (28587) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd7 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 46602, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 46602 (relative sequence number) [Next sequence number: 47982 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf253 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 12420] TCP segment data (1380 bytes) Frame 904: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275057736 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275057736 seconds [Time delta from previous captured frame: 0.000018878 seconds] [Time delta from previous displayed frame: 0.000018878 seconds] [Time since reference or first frame: 37.477488883 seconds] Frame Number: 904 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd362 (54114) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d84 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 47982, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 47982 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 903] [The RTT to ACK the segment was: 0.000018878 seconds] [iRTT: 0.003305578 seconds] Frame 905: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275076429 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275076429 seconds [Time delta from previous captured frame: 0.000018693 seconds] [Time delta from previous displayed frame: 0.000018693 seconds] [Time since reference or first frame: 37.477507576 seconds] Frame Number: 905 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fac (28588) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 47982, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 47982 (relative sequence number) [Next sequence number: 49362 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a15 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 13800] TCP segment data (1380 bytes) Frame 906: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275094371 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275094371 seconds [Time delta from previous captured frame: 0.000017942 seconds] [Time delta from previous displayed frame: 0.000017942 seconds] [Time since reference or first frame: 37.477525518 seconds] Frame Number: 906 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd363 (54115) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d83 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 49362, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 49362 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 905] [The RTT to ACK the segment was: 0.000017942 seconds] [iRTT: 0.003305578 seconds] Frame 907: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275282844 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275282844 seconds [Time delta from previous captured frame: 0.000188473 seconds] [Time delta from previous displayed frame: 0.000188473 seconds] [Time since reference or first frame: 37.477713991 seconds] Frame Number: 907 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fad (28589) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd5 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 49362, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 49362 (relative sequence number) [Next sequence number: 50742 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2137 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 15180] TCP segment data (1380 bytes) Frame 908: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275301936 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275301936 seconds [Time delta from previous captured frame: 0.000019092 seconds] [Time delta from previous displayed frame: 0.000019092 seconds] [Time since reference or first frame: 37.477733083 seconds] Frame Number: 908 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd364 (54116) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d82 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 50742, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 50742 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 907] [The RTT to ACK the segment was: 0.000019092 seconds] [iRTT: 0.003305578 seconds] Frame 909: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275317114 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275317114 seconds [Time delta from previous captured frame: 0.000015178 seconds] [Time delta from previous displayed frame: 0.000015178 seconds] [Time since reference or first frame: 37.477748261 seconds] Frame Number: 909 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fae (28590) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd4 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 50742, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 50742 (relative sequence number) [Next sequence number: 52122 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x498d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 16560] TCP segment data (1257 bytes) TCP segment data (123 bytes) [12 Reassembled TCP Segments (16437 bytes): #887(1380), #889(1380), #891(1380), #893(1380), #895(1380), #897(1380), #899(1380), #901(1380), #903(1380), #905(1380), #907(1380), #909(1257)] [Frame: 887, payload: 0-1379 (1380 bytes)] [Frame: 889, payload: 1380-2759 (1380 bytes)] [Frame: 891, payload: 2760-4139 (1380 bytes)] [Frame: 893, payload: 4140-5519 (1380 bytes)] [Frame: 895, payload: 5520-6899 (1380 bytes)] [Frame: 897, payload: 6900-8279 (1380 bytes)] [Frame: 899, payload: 8280-9659 (1380 bytes)] [Frame: 901, payload: 9660-11039 (1380 bytes)] [Frame: 903, payload: 11040-12419 (1380 bytes)] [Frame: 905, payload: 12420-13799 (1380 bytes)] [Frame: 907, payload: 13800-15179 (1380 bytes)] [Frame: 909, payload: 15180-16436 (1257 bytes)] [Segment count: 12] [Reassembled TCP length: 16437] [Reassembled TCP Data: 170303403014557c934686ee7242142494d27291c51a7b10...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: 14557c934686ee7242142494d27291c51a7b10e25ae837d3... SSL segment data (16384 bytes) Secure Sockets Layer Frame 910: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275336529 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275336529 seconds [Time delta from previous captured frame: 0.000019415 seconds] [Time delta from previous displayed frame: 0.000019415 seconds] [Time since reference or first frame: 37.477767676 seconds] Frame Number: 910 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd365 (54117) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d81 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 52122, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 52122 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 909] [The RTT to ACK the segment was: 0.000019415 seconds] [iRTT: 0.003305578 seconds] Frame 911: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275504652 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275504652 seconds [Time delta from previous captured frame: 0.000168123 seconds] [Time delta from previous displayed frame: 0.000168123 seconds] [Time since reference or first frame: 37.477935799 seconds] Frame Number: 911 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6faf (28591) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd3 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 52122, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 52122 (relative sequence number) [Next sequence number: 53502 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd1dd [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 17940] TCP segment data (1380 bytes) Frame 912: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275522920 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275522920 seconds [Time delta from previous captured frame: 0.000018268 seconds] [Time delta from previous displayed frame: 0.000018268 seconds] [Time since reference or first frame: 37.477954067 seconds] Frame Number: 912 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd366 (54118) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d80 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 53502, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 53502 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 911] [The RTT to ACK the segment was: 0.000018268 seconds] [iRTT: 0.003305578 seconds] Frame 913: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275541636 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275541636 seconds [Time delta from previous captured frame: 0.000018716 seconds] [Time delta from previous displayed frame: 0.000018716 seconds] [Time since reference or first frame: 37.477972783 seconds] Frame Number: 913 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb0 (28592) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd2 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 53502, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 53502 (relative sequence number) [Next sequence number: 54882 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7495 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 19320] TCP segment data (1380 bytes) Frame 914: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275557964 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275557964 seconds [Time delta from previous captured frame: 0.000016328 seconds] [Time delta from previous displayed frame: 0.000016328 seconds] [Time since reference or first frame: 37.477989111 seconds] Frame Number: 914 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd367 (54119) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 54882, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 54882 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 913] [The RTT to ACK the segment was: 0.000016328 seconds] [iRTT: 0.003305578 seconds] Frame 915: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275737155 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275737155 seconds [Time delta from previous captured frame: 0.000179191 seconds] [Time delta from previous displayed frame: 0.000179191 seconds] [Time since reference or first frame: 37.478168302 seconds] Frame Number: 915 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb1 (28593) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 54882, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 54882 (relative sequence number) [Next sequence number: 56262 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x621d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 20700] TCP segment data (1380 bytes) Frame 916: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275756070 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275756070 seconds [Time delta from previous captured frame: 0.000018915 seconds] [Time delta from previous displayed frame: 0.000018915 seconds] [Time since reference or first frame: 37.478187217 seconds] Frame Number: 916 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd368 (54120) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 56262, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 56262 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 915] [The RTT to ACK the segment was: 0.000018915 seconds] [iRTT: 0.003305578 seconds] Frame 917: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275769682 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275769682 seconds [Time delta from previous captured frame: 0.000013612 seconds] [Time delta from previous displayed frame: 0.000013612 seconds] [Time since reference or first frame: 37.478200829 seconds] Frame Number: 917 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb2 (28594) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd0 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 56262, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 56262 (relative sequence number) [Next sequence number: 57642 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd8c6 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 22080] TCP segment data (1380 bytes) Frame 918: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275784729 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275784729 seconds [Time delta from previous captured frame: 0.000015047 seconds] [Time delta from previous displayed frame: 0.000015047 seconds] [Time since reference or first frame: 37.478215876 seconds] Frame Number: 918 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd369 (54121) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 57642, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 57642 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 917] [The RTT to ACK the segment was: 0.000015047 seconds] [iRTT: 0.003305578 seconds] Frame 919: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275971140 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275971140 seconds [Time delta from previous captured frame: 0.000186411 seconds] [Time delta from previous displayed frame: 0.000186411 seconds] [Time since reference or first frame: 37.478402287 seconds] Frame Number: 919 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb3 (28595) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fcf [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 57642, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 57642 (relative sequence number) [Next sequence number: 59022 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb902 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 23460] TCP segment data (1380 bytes) Frame 920: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275994185 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275994185 seconds [Time delta from previous captured frame: 0.000023045 seconds] [Time delta from previous displayed frame: 0.000023045 seconds] [Time since reference or first frame: 37.478425332 seconds] Frame Number: 920 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb4 (28596) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fce [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 59022, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 59022 (relative sequence number) [Next sequence number: 60402 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x4921 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 24840] TCP segment data (1380 bytes) Frame 921: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276010551 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276010551 seconds [Time delta from previous captured frame: 0.000016366 seconds] [Time delta from previous displayed frame: 0.000016366 seconds] [Time since reference or first frame: 37.478441698 seconds] Frame Number: 921 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36a (54122) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 60402, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 60402 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 920] [The RTT to ACK the segment was: 0.000016366 seconds] [iRTT: 0.003305578 seconds] Frame 922: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276205562 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276205562 seconds [Time delta from previous captured frame: 0.000195011 seconds] [Time delta from previous displayed frame: 0.000195011 seconds] [Time since reference or first frame: 37.478636709 seconds] Frame Number: 922 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb5 (28597) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fcd [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 60402, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 60402 (relative sequence number) [Next sequence number: 61782 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0a79 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 26220] TCP segment data (1380 bytes) Frame 923: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276231579 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276231579 seconds [Time delta from previous captured frame: 0.000026017 seconds] [Time delta from previous displayed frame: 0.000026017 seconds] [Time since reference or first frame: 37.478662726 seconds] Frame Number: 923 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb6 (28598) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fcc [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 61782, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 61782 (relative sequence number) [Next sequence number: 63162 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x74f0 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 27600] TCP segment data (1380 bytes) Frame 924: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276248734 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276248734 seconds [Time delta from previous captured frame: 0.000017155 seconds] [Time delta from previous displayed frame: 0.000017155 seconds] [Time since reference or first frame: 37.478679881 seconds] Frame Number: 924 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36b (54123) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 63162, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 63162 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 923] [The RTT to ACK the segment was: 0.000017155 seconds] [iRTT: 0.003305578 seconds] Frame 925: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276438772 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276438772 seconds [Time delta from previous captured frame: 0.000190038 seconds] [Time delta from previous displayed frame: 0.000190038 seconds] [Time since reference or first frame: 37.478869919 seconds] Frame Number: 925 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb7 (28599) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fcb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 63162, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 63162 (relative sequence number) [Next sequence number: 64542 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x6b9c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 28980] TCP segment data (1380 bytes) Frame 926: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276462555 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276462555 seconds [Time delta from previous captured frame: 0.000023783 seconds] [Time delta from previous displayed frame: 0.000023783 seconds] [Time since reference or first frame: 37.478893702 seconds] Frame Number: 926 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb8 (28600) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fca [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 64542, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 64542 (relative sequence number) [Next sequence number: 65922 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc1f8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 30360] TCP segment data (1380 bytes) Frame 927: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276478322 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276478322 seconds [Time delta from previous captured frame: 0.000015767 seconds] [Time delta from previous displayed frame: 0.000015767 seconds] [Time since reference or first frame: 37.478909469 seconds] Frame Number: 927 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36c (54124) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 65922, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 65922 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 926] [The RTT to ACK the segment was: 0.000015767 seconds] [iRTT: 0.003305578 seconds] Frame 928: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276671555 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276671555 seconds [Time delta from previous captured frame: 0.000193233 seconds] [Time delta from previous displayed frame: 0.000193233 seconds] [Time since reference or first frame: 37.479102702 seconds] Frame Number: 928 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb9 (28601) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 65922, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 65922 (relative sequence number) [Next sequence number: 67302 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x65c5 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 31740] TCP segment data (1380 bytes) Frame 929: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276697261 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276697261 seconds [Time delta from previous captured frame: 0.000025706 seconds] [Time delta from previous displayed frame: 0.000025706 seconds] [Time since reference or first frame: 37.479128408 seconds] Frame Number: 929 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fba (28602) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc8 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 67302, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 67302 (relative sequence number) [Next sequence number: 68682 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2b02 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 33120] TCP segment data (1134 bytes) TCP segment data (246 bytes) [13 Reassembled TCP Segments (16437 bytes): #909(123), #911(1380), #913(1380), #915(1380), #917(1380), #919(1380), #920(1380), #922(1380), #923(1380), #925(1380), #926(1380), #928(1380), #929(1134)] [Frame: 909, payload: 0-122 (123 bytes)] [Frame: 911, payload: 123-1502 (1380 bytes)] [Frame: 913, payload: 1503-2882 (1380 bytes)] [Frame: 915, payload: 2883-4262 (1380 bytes)] [Frame: 917, payload: 4263-5642 (1380 bytes)] [Frame: 919, payload: 5643-7022 (1380 bytes)] [Frame: 920, payload: 7023-8402 (1380 bytes)] [Frame: 922, payload: 8403-9782 (1380 bytes)] [Frame: 923, payload: 9783-11162 (1380 bytes)] [Frame: 925, payload: 11163-12542 (1380 bytes)] [Frame: 926, payload: 12543-13922 (1380 bytes)] [Frame: 928, payload: 13923-15302 (1380 bytes)] [Frame: 929, payload: 15303-16436 (1134 bytes)] [Segment count: 13] [Reassembled TCP length: 16437] [Reassembled TCP Data: 170303403069241bf220aa029a12a8b3257d45de84f2b7b5...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: 69241bf220aa029a12a8b3257d45de84f2b7b5e67ae8ca4d... SSL segment data (16384 bytes) Secure Sockets Layer Frame 930: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276713960 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276713960 seconds [Time delta from previous captured frame: 0.000016699 seconds] [Time delta from previous displayed frame: 0.000016699 seconds] [Time since reference or first frame: 37.479145107 seconds] Frame Number: 930 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36d (54125) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d79 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 68682, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 68682 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 929] [The RTT to ACK the segment was: 0.000016699 seconds] [iRTT: 0.003305578 seconds] Frame 931: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276904277 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276904277 seconds [Time delta from previous captured frame: 0.000190317 seconds] [Time delta from previous displayed frame: 0.000190317 seconds] [Time since reference or first frame: 37.479335424 seconds] Frame Number: 931 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fbb (28603) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc7 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 68682, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 68682 (relative sequence number) [Next sequence number: 70062 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x15d8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 34500] TCP segment data (1380 bytes) Frame 932: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276926774 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276926774 seconds [Time delta from previous captured frame: 0.000022497 seconds] [Time delta from previous displayed frame: 0.000022497 seconds] [Time since reference or first frame: 37.479357921 seconds] Frame Number: 932 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fbc (28604) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 70062, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 70062 (relative sequence number) [Next sequence number: 71442 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xddda [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 35880] TCP segment data (1380 bytes) Frame 933: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276943166 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276943166 seconds [Time delta from previous captured frame: 0.000016392 seconds] [Time delta from previous displayed frame: 0.000016392 seconds] [Time since reference or first frame: 37.479374313 seconds] Frame Number: 933 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36e (54126) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d78 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 71442, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 71442 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 932] [The RTT to ACK the segment was: 0.000016392 seconds] [iRTT: 0.003305578 seconds] Frame 934: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.277137938 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.277137938 seconds [Time delta from previous captured frame: 0.000194772 seconds] [Time delta from previous displayed frame: 0.000194772 seconds] [Time since reference or first frame: 37.479569085 seconds] Frame Number: 934 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fbd (28605) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc5 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 71442, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 71442 (relative sequence number) [Next sequence number: 72822 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x680c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 37260] TCP segment data (1380 bytes) Frame 935: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.277171198 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.277171198 seconds [Time delta from previous captured frame: 0.000033260 seconds] [Time delta from previous displayed frame: 0.000033260 seconds] [Time since reference or first frame: 37.479602345 seconds] Frame Number: 935 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fbe (28606) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc4 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 72822, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 72822 (relative sequence number) [Next sequence number: 74202 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x6978 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 38640] TCP segment data (1380 bytes) Frame 936: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.277192791 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.277192791 seconds [Time delta from previous captured frame: 0.000021593 seconds] [Time delta from previous displayed frame: 0.000021593 seconds] [Time since reference or first frame: 37.479623938 seconds] Frame Number: 936 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36f (54127) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d77 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 74202, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 74202 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 935] [The RTT to ACK the segment was: 0.000021593 seconds] [iRTT: 0.003305578 seconds] Frame 937: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.277372220 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.277372220 seconds [Time delta from previous captured frame: 0.000179429 seconds] [Time delta from previous displayed frame: 0.000179429 seconds] [Time since reference or first frame: 37.479803367 seconds] Frame Number: 937 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fbf (28607) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc3 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 74202, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 74202 (relative sequence number) [Next sequence number: 75582 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x20c0 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 40020] TCP segment data (1380 bytes) Frame 938: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278269066 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278269066 seconds [Time delta from previous captured frame: 0.000896846 seconds] [Time delta from previous displayed frame: 0.000896846 seconds] [Time since reference or first frame: 37.480700213 seconds] Frame Number: 938 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc0 (28608) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc2 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 75582, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 75582 (relative sequence number) [Next sequence number: 76962 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9a06 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 41400] TCP segment data (1380 bytes) Frame 939: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278302192 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278302192 seconds [Time delta from previous captured frame: 0.000033126 seconds] [Time delta from previous displayed frame: 0.000033126 seconds] [Time since reference or first frame: 37.480733339 seconds] Frame Number: 939 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd370 (54128) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d76 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 76962, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 76962 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 938] [The RTT to ACK the segment was: 0.000033126 seconds] [iRTT: 0.003305578 seconds] Frame 940: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278358645 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278358645 seconds [Time delta from previous captured frame: 0.000056453 seconds] [Time delta from previous displayed frame: 0.000056453 seconds] [Time since reference or first frame: 37.480789792 seconds] Frame Number: 940 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc1 (28609) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 76962, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 76962 (relative sequence number) [Next sequence number: 78342 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfb02 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 42780] TCP segment data (1380 bytes) Frame 941: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278490195 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278490195 seconds [Time delta from previous captured frame: 0.000131550 seconds] [Time delta from previous displayed frame: 0.000131550 seconds] [Time since reference or first frame: 37.480921342 seconds] Frame Number: 941 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc2 (28610) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc0 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 78342, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 78342 (relative sequence number) [Next sequence number: 79722 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xea01 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 44160] TCP segment data (1380 bytes) Frame 942: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278508197 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278508197 seconds [Time delta from previous captured frame: 0.000018002 seconds] [Time delta from previous displayed frame: 0.000018002 seconds] [Time since reference or first frame: 37.480939344 seconds] Frame Number: 942 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd371 (54129) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d75 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 79722, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 79722 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 941] [The RTT to ACK the segment was: 0.000018002 seconds] [iRTT: 0.003305578 seconds] Frame 943: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278526633 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278526633 seconds [Time delta from previous captured frame: 0.000018436 seconds] [Time delta from previous displayed frame: 0.000018436 seconds] [Time since reference or first frame: 37.480957780 seconds] Frame Number: 943 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc3 (28611) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fbf [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 79722, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 79722 (relative sequence number) [Next sequence number: 81102 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc892 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 45540] TCP segment data (1380 bytes) Frame 944: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.279730869 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.279730869 seconds [Time delta from previous captured frame: 0.001204236 seconds] [Time delta from previous displayed frame: 0.001204236 seconds] [Time since reference or first frame: 37.482162016 seconds] Frame Number: 944 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc4 (28612) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fbe [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 81102, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 81102 (relative sequence number) [Next sequence number: 82482 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x8028 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 46920] TCP segment data (1380 bytes) Frame 945: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.279763233 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.279763233 seconds [Time delta from previous captured frame: 0.000032364 seconds] [Time delta from previous displayed frame: 0.000032364 seconds] [Time since reference or first frame: 37.482194380 seconds] Frame Number: 945 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd372 (54130) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d74 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 82482, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 82482 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 944] [The RTT to ACK the segment was: 0.000032364 seconds] [iRTT: 0.003305578 seconds] Frame 946: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.279790407 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.279790407 seconds [Time delta from previous captured frame: 0.000027174 seconds] [Time delta from previous displayed frame: 0.000027174 seconds] [Time since reference or first frame: 37.482221554 seconds] Frame Number: 946 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc5 (28613) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fbd [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 82482, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 82482 (relative sequence number) [Next sequence number: 83862 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd0b8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 48300] TCP segment data (1380 bytes) Frame 947: 731 bytes on wire (5848 bits), 731 bytes captured (5848 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.279810679 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.279810679 seconds [Time delta from previous captured frame: 0.000020272 seconds] [Time delta from previous displayed frame: 0.000020272 seconds] [Time since reference or first frame: 37.482241826 seconds] Frame Number: 947 Frame Length: 731 bytes (5848 bits) Capture Length: 731 bytes (5848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:media] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 715 Identification: 0x6fc6 (28614) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x727d [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 83862, Ack: 10562, Len: 675 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 675] Sequence number: 83862 (relative sequence number) [Next sequence number: 84537 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x89c3 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2055] [Bytes sent since last PSH flag: 48975] TCP segment data (675 bytes) [13 Reassembled TCP Segments (16101 bytes): #929(246), #931(1380), #932(1380), #934(1380), #935(1380), #937(1380), #938(1380), #940(1380), #941(1380), #943(1380), #944(1380), #946(1380), #947(675)] [Frame: 929, payload: 0-245 (246 bytes)] [Frame: 931, payload: 246-1625 (1380 bytes)] [Frame: 932, payload: 1626-3005 (1380 bytes)] [Frame: 934, payload: 3006-4385 (1380 bytes)] [Frame: 935, payload: 4386-5765 (1380 bytes)] [Frame: 937, payload: 5766-7145 (1380 bytes)] [Frame: 938, payload: 7146-8525 (1380 bytes)] [Frame: 940, payload: 8526-9905 (1380 bytes)] [Frame: 941, payload: 9906-11285 (1380 bytes)] [Frame: 943, payload: 11286-12665 (1380 bytes)] [Frame: 944, payload: 12666-14045 (1380 bytes)] [Frame: 946, payload: 14046-15425 (1380 bytes)] [Frame: 947, payload: 15426-16100 (675 bytes)] [Segment count: 13] [Reassembled TCP length: 16101] [Reassembled TCP Data: 1703033ee045c15dd5081d88d3cc41252f42a1e04e40e7db...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16096 Encrypted Application Data: 45c15dd5081d88d3cc41252f42a1e04e40e7dbabeee1fc16... SSL segment data (16054 bytes) [3 Reassembled SSL segments (48822 bytes): #909(16384), #929(16384), #947(16054)] [Frame: 909, payload: 0-16383 (16384 bytes)] [Frame: 929, payload: 16384-32767 (16384 bytes)] [Frame: 947, payload: 32768-48821 (16054 bytes)] [Segment count: 3] [Reassembled PDU length: 48822] [Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...] Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: application/pdf\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: bf608971-bdaa-4a1e-b538-272f446f0f2d\r\n Content-Disposition: attachment; filename="418703738.pdf"\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:26 GMT\r\n Content-Length: 48499\r\n [Content length: 48499] \r\n [HTTP response 8/8] [Time since request: 0.441695550 seconds] [Prev request in frame: 627] [Prev response in frame: 629] [Request in frame: 885] File Data: 48499 bytes Media Type Media type: application/pdf (48499 bytes) Frame 948: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.279826527 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.279826527 seconds [Time delta from previous captured frame: 0.000015848 seconds] [Time delta from previous displayed frame: 0.000015848 seconds] [Time since reference or first frame: 37.482257674 seconds] Frame Number: 948 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd373 (54131) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d73 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 84537, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 84537 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 947] [The RTT to ACK the segment was: 0.000015848 seconds] [iRTT: 0.003305578 seconds] Frame 975: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:22.297628804 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724222.297628804 seconds [Time delta from previous captured frame: 0.207420895 seconds] [Time delta from previous displayed frame: 10.017802277 seconds] [Time since reference or first frame: 47.500059951 seconds] Frame Number: 975 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd374 (54132) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d72 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10561, Ack: 84537, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10561 (relative sequence number) Acknowledgment number: 84537 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 976: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:22.300302930 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724222.300302930 seconds [Time delta from previous captured frame: 0.002674126 seconds] [Time delta from previous displayed frame: 0.002674126 seconds] [Time since reference or first frame: 47.502734077 seconds] Frame Number: 976 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: ef34d8c7 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fca (28618) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x751c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 10562, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 84537 (relative sequence number) Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x66e9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 167 Src Port: 167 Frame 1020: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:32.601580209 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724232.601580209 seconds [Time delta from previous captured frame: 0.188020291 seconds] [Time delta from previous displayed frame: 10.301277279 seconds] [Time since reference or first frame: 57.804011356 seconds] Frame Number: 1020 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd375 (54133) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d71 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10561, Ack: 84537, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10561 (relative sequence number) Acknowledgment number: 84537 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1021: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:32.604565936 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724232.604565936 seconds [Time delta from previous captured frame: 0.002985727 seconds] [Time delta from previous displayed frame: 0.002985727 seconds] [Time since reference or first frame: 57.806997083 seconds] Frame Number: 1021 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 03fa416b Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fcb (28619) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x751b [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 10562, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 84537 (relative sequence number) Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x66e9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 8241 Src Port: 8241 Frame 1043: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:42.841633834 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724242.841633834 seconds [Time delta from previous captured frame: 0.827989146 seconds] [Time delta from previous displayed frame: 10.237067898 seconds] [Time since reference or first frame: 68.044064981 seconds] Frame Number: 1043 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd376 (54134) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d70 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10561, Ack: 84537, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10561 (relative sequence number) Acknowledgment number: 84537 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1044: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:42.844588589 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724242.844588589 seconds [Time delta from previous captured frame: 0.002954755 seconds] [Time delta from previous displayed frame: 0.002954755 seconds] [Time since reference or first frame: 68.047019736 seconds] Frame Number: 1044 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: d4fc00cd Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fcc (28620) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x751a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 10562, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 84537 (relative sequence number) Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x66e9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 17966 Src Port: 17966 Frame 1073: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.474256372 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.474256372 seconds [Time delta from previous captured frame: 0.654638443 seconds] [Time delta from previous displayed frame: 8.629667783 seconds] [Time since reference or first frame: 76.676687519 seconds] Frame Number: 1073 Frame Length: 1325 bytes (10600 bits) Capture Length: 1325 bytes (10600 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1309 Identification: 0xd377 (54135) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x487a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 84537, Len: 1269 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1269] Sequence number: 10562 (relative sequence number) [Next sequence number: 11831 (relative sequence number)] Acknowledgment number: 84537 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1ef9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1269] [Bytes sent since last PSH flag: 1269] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1264 Encrypted Application Data: d8ee3489432e319933ad92a02442fe08698b65f920c0a828... Hypertext Transfer Protocol GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf HTTP/1.1\r\n] [GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf Request URI Path: /racuni/pregled-racuna-pdf Request URI Query: serviceid=12018216&metaid=424888813&filename=424888813.pdf Request URI Query Parameter: serviceid=12018216 Request URI Query Parameter: metaid=424888813 Request URI Query Parameter: filename=424888813.pdf Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf] [HTTP request 9/9] [Prev request in frame: 885] Frame 1074: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.528297844 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.528297844 seconds [Time delta from previous captured frame: 0.054041472 seconds] [Time delta from previous displayed frame: 0.054041472 seconds] [Time since reference or first frame: 76.730728991 seconds] Frame Number: 1074 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 2325ae5a Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fdd (28637) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7509 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 11831, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 84537 (relative sequence number) Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5cff [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1073] [The RTT to ACK the segment was: 0.054041472 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 63780 Src Port: 63780 Frame 1075: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795401933 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795401933 seconds [Time delta from previous captured frame: 0.267104089 seconds] [Time delta from previous displayed frame: 0.267104089 seconds] [Time since reference or first frame: 76.997833080 seconds] Frame Number: 1075 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fde (28638) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fa4 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 84537 (relative sequence number) [Next sequence number: 85917 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1e34 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 1380] TCP segment data (1380 bytes) Secure Sockets Layer Frame 1076: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795476707 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795476707 seconds [Time delta from previous captured frame: 0.000074774 seconds] [Time delta from previous displayed frame: 0.000074774 seconds] [Time since reference or first frame: 76.997907854 seconds] Frame Number: 1076 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd378 (54136) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d6e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 85917, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 85917 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1075] [The RTT to ACK the segment was: 0.000074774 seconds] [iRTT: 0.003305578 seconds] Frame 1077: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795606976 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795606976 seconds [Time delta from previous captured frame: 0.000130269 seconds] [Time delta from previous displayed frame: 0.000130269 seconds] [Time since reference or first frame: 76.998038123 seconds] Frame Number: 1077 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fdf (28639) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fa3 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 85917, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 85917 (relative sequence number) [Next sequence number: 87297 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xaa15 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 2760] TCP segment data (1380 bytes) Frame 1078: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795628550 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795628550 seconds [Time delta from previous captured frame: 0.000021574 seconds] [Time delta from previous displayed frame: 0.000021574 seconds] [Time since reference or first frame: 76.998059697 seconds] Frame Number: 1078 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd379 (54137) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d6d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 87297, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 87297 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1077] [The RTT to ACK the segment was: 0.000021574 seconds] [iRTT: 0.003305578 seconds] Frame 1079: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795860217 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795860217 seconds [Time delta from previous captured frame: 0.000231667 seconds] [Time delta from previous displayed frame: 0.000231667 seconds] [Time since reference or first frame: 76.998291364 seconds] Frame Number: 1079 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe0 (28640) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fa2 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 87297, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 87297 (relative sequence number) [Next sequence number: 88677 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x017f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 4140] TCP segment data (1380 bytes) Frame 1080: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795881876 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795881876 seconds [Time delta from previous captured frame: 0.000021659 seconds] [Time delta from previous displayed frame: 0.000021659 seconds] [Time since reference or first frame: 76.998313023 seconds] Frame Number: 1080 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37a (54138) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d6c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 88677, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 88677 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1079] [The RTT to ACK the segment was: 0.000021659 seconds] [iRTT: 0.003305578 seconds] Frame 1081: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795900605 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795900605 seconds [Time delta from previous captured frame: 0.000018729 seconds] [Time delta from previous displayed frame: 0.000018729 seconds] [Time since reference or first frame: 76.998331752 seconds] Frame Number: 1081 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe1 (28641) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fa1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 88677, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 88677 (relative sequence number) [Next sequence number: 90057 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfbaa [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 5520] TCP segment data (1380 bytes) Frame 1082: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795921817 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795921817 seconds [Time delta from previous captured frame: 0.000021212 seconds] [Time delta from previous displayed frame: 0.000021212 seconds] [Time since reference or first frame: 76.998352964 seconds] Frame Number: 1082 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37b (54139) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d6b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 90057, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 90057 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1081] [The RTT to ACK the segment was: 0.000021212 seconds] [iRTT: 0.003305578 seconds] Frame 1083: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796119255 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796119255 seconds [Time delta from previous captured frame: 0.000197438 seconds] [Time delta from previous displayed frame: 0.000197438 seconds] [Time since reference or first frame: 76.998550402 seconds] Frame Number: 1083 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe2 (28642) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fa0 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 90057, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 90057 (relative sequence number) [Next sequence number: 91437 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdbc3 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 1084: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796138206 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796138206 seconds [Time delta from previous captured frame: 0.000018951 seconds] [Time delta from previous displayed frame: 0.000018951 seconds] [Time since reference or first frame: 76.998569353 seconds] Frame Number: 1084 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37c (54140) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d6a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 91437, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 91437 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1083] [The RTT to ACK the segment was: 0.000018951 seconds] [iRTT: 0.003305578 seconds] Frame 1085: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796155170 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796155170 seconds [Time delta from previous captured frame: 0.000016964 seconds] [Time delta from previous displayed frame: 0.000016964 seconds] [Time since reference or first frame: 76.998586317 seconds] Frame Number: 1085 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe3 (28643) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 91437, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 91437 (relative sequence number) [Next sequence number: 92817 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xebe0 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 1086: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796172963 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796172963 seconds [Time delta from previous captured frame: 0.000017793 seconds] [Time delta from previous displayed frame: 0.000017793 seconds] [Time since reference or first frame: 76.998604110 seconds] Frame Number: 1086 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37d (54141) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d69 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 92817, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 92817 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1085] [The RTT to ACK the segment was: 0.000017793 seconds] [iRTT: 0.003305578 seconds] Frame 1087: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796325738 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796325738 seconds [Time delta from previous captured frame: 0.000152775 seconds] [Time delta from previous displayed frame: 0.000152775 seconds] [Time since reference or first frame: 76.998756885 seconds] Frame Number: 1087 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe4 (28644) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 92817, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 92817 (relative sequence number) [Next sequence number: 94197 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x73fb [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 1088: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796343874 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796343874 seconds [Time delta from previous captured frame: 0.000018136 seconds] [Time delta from previous displayed frame: 0.000018136 seconds] [Time since reference or first frame: 76.998775021 seconds] Frame Number: 1088 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37e (54142) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d68 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 94197, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 94197 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1087] [The RTT to ACK the segment was: 0.000018136 seconds] [iRTT: 0.003305578 seconds] Frame 1089: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796359750 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796359750 seconds [Time delta from previous captured frame: 0.000015876 seconds] [Time delta from previous displayed frame: 0.000015876 seconds] [Time since reference or first frame: 76.998790897 seconds] Frame Number: 1089 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe5 (28645) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9d [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 94197, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 94197 (relative sequence number) [Next sequence number: 95577 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x01fa [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 1090: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796382162 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796382162 seconds [Time delta from previous captured frame: 0.000022412 seconds] [Time delta from previous displayed frame: 0.000022412 seconds] [Time since reference or first frame: 76.998813309 seconds] Frame Number: 1090 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37f (54143) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d67 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 95577, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 95577 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1089] [The RTT to ACK the segment was: 0.000022412 seconds] [iRTT: 0.003305578 seconds] Frame 1091: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796558970 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796558970 seconds [Time delta from previous captured frame: 0.000176808 seconds] [Time delta from previous displayed frame: 0.000176808 seconds] [Time since reference or first frame: 76.998990117 seconds] Frame Number: 1091 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe6 (28646) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 95577, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 95577 (relative sequence number) [Next sequence number: 96957 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xde0c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 12420] TCP segment data (1380 bytes) Frame 1092: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796578822 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796578822 seconds [Time delta from previous captured frame: 0.000019852 seconds] [Time delta from previous displayed frame: 0.000019852 seconds] [Time since reference or first frame: 76.999009969 seconds] Frame Number: 1092 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd380 (54144) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d66 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 96957, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 96957 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1091] [The RTT to ACK the segment was: 0.000019852 seconds] [iRTT: 0.003305578 seconds] Frame 1093: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796594133 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796594133 seconds [Time delta from previous captured frame: 0.000015311 seconds] [Time delta from previous displayed frame: 0.000015311 seconds] [Time since reference or first frame: 76.999025280 seconds] Frame Number: 1093 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe7 (28647) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9b [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 96957, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 96957 (relative sequence number) [Next sequence number: 98337 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd828 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 13800] TCP segment data (1380 bytes) Frame 1094: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796610437 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796610437 seconds [Time delta from previous captured frame: 0.000016304 seconds] [Time delta from previous displayed frame: 0.000016304 seconds] [Time since reference or first frame: 76.999041584 seconds] Frame Number: 1094 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd381 (54145) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d65 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 98337, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 98337 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1093] [The RTT to ACK the segment was: 0.000016304 seconds] [iRTT: 0.003305578 seconds] Frame 1095: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796791504 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796791504 seconds [Time delta from previous captured frame: 0.000181067 seconds] [Time delta from previous displayed frame: 0.000181067 seconds] [Time since reference or first frame: 76.999222651 seconds] Frame Number: 1095 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe8 (28648) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 98337, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 98337 (relative sequence number) [Next sequence number: 99717 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x72d6 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 15180] TCP segment data (1380 bytes) Frame 1096: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796809665 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796809665 seconds [Time delta from previous captured frame: 0.000018161 seconds] [Time delta from previous displayed frame: 0.000018161 seconds] [Time since reference or first frame: 76.999240812 seconds] Frame Number: 1096 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd382 (54146) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d64 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 99717, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 99717 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1095] [The RTT to ACK the segment was: 0.000018161 seconds] [iRTT: 0.003305578 seconds] Frame 1097: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796825214 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796825214 seconds [Time delta from previous captured frame: 0.000015549 seconds] [Time delta from previous displayed frame: 0.000015549 seconds] [Time since reference or first frame: 76.999256361 seconds] Frame Number: 1097 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe9 (28649) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f99 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 99717, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 99717 (relative sequence number) [Next sequence number: 101097 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9664 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 16560] TCP segment data (1257 bytes) TCP segment data (123 bytes) [12 Reassembled TCP Segments (16437 bytes): #1075(1380), #1077(1380), #1079(1380), #1081(1380), #1083(1380), #1085(1380), #1087(1380), #1089(1380), #1091(1380), #1093(1380), #1095(1380), #1097(1257)] [Frame: 1075, payload: 0-1379 (1380 bytes)] [Frame: 1077, payload: 1380-2759 (1380 bytes)] [Frame: 1079, payload: 2760-4139 (1380 bytes)] [Frame: 1081, payload: 4140-5519 (1380 bytes)] [Frame: 1083, payload: 5520-6899 (1380 bytes)] [Frame: 1085, payload: 6900-8279 (1380 bytes)] [Frame: 1087, payload: 8280-9659 (1380 bytes)] [Frame: 1089, payload: 9660-11039 (1380 bytes)] [Frame: 1091, payload: 11040-12419 (1380 bytes)] [Frame: 1093, payload: 12420-13799 (1380 bytes)] [Frame: 1095, payload: 13800-15179 (1380 bytes)] [Frame: 1097, payload: 15180-16436 (1257 bytes)] [Segment count: 12] [Reassembled TCP length: 16437] [Reassembled TCP Data: 17030340309fc39c4545203b859de5347d032ba13da1735d...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: 9fc39c4545203b859de5347d032ba13da1735d2b4e6a83dd... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1098: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796841966 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796841966 seconds [Time delta from previous captured frame: 0.000016752 seconds] [Time delta from previous displayed frame: 0.000016752 seconds] [Time since reference or first frame: 76.999273113 seconds] Frame Number: 1098 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd383 (54147) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d63 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 101097, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 101097 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1097] [The RTT to ACK the segment was: 0.000016752 seconds] [iRTT: 0.003305578 seconds] Frame 1099: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797024246 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797024246 seconds [Time delta from previous captured frame: 0.000182280 seconds] [Time delta from previous displayed frame: 0.000182280 seconds] [Time since reference or first frame: 76.999455393 seconds] Frame Number: 1099 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fea (28650) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f98 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 101097, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 101097 (relative sequence number) [Next sequence number: 102477 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x4ba9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 17940] TCP segment data (1380 bytes) Frame 1100: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797042621 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797042621 seconds [Time delta from previous captured frame: 0.000018375 seconds] [Time delta from previous displayed frame: 0.000018375 seconds] [Time since reference or first frame: 76.999473768 seconds] Frame Number: 1100 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd384 (54148) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d62 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 102477, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 102477 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1099] [The RTT to ACK the segment was: 0.000018375 seconds] [iRTT: 0.003305578 seconds] Frame 1101: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797055180 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797055180 seconds [Time delta from previous captured frame: 0.000012559 seconds] [Time delta from previous displayed frame: 0.000012559 seconds] [Time since reference or first frame: 76.999486327 seconds] Frame Number: 1101 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6feb (28651) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f97 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 102477, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 102477 (relative sequence number) [Next sequence number: 103857 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdaf6 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 19320] TCP segment data (1380 bytes) Frame 1102: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797071899 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797071899 seconds [Time delta from previous captured frame: 0.000016719 seconds] [Time delta from previous displayed frame: 0.000016719 seconds] [Time since reference or first frame: 76.999503046 seconds] Frame Number: 1102 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd385 (54149) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d61 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 103857, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 103857 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1101] [The RTT to ACK the segment was: 0.000016719 seconds] [iRTT: 0.003305578 seconds] Frame 1103: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797295717 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797295717 seconds [Time delta from previous captured frame: 0.000223818 seconds] [Time delta from previous displayed frame: 0.000223818 seconds] [Time since reference or first frame: 76.999726864 seconds] Frame Number: 1103 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x6fec (28652) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6a32 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 103857, Ack: 11831, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 103857 (relative sequence number) [Next sequence number: 106617 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 22080] TCP segment data (2760 bytes) Frame 1104: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797415274 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797415274 seconds [Time delta from previous captured frame: 0.000119557 seconds] [Time delta from previous displayed frame: 0.000119557 seconds] [Time since reference or first frame: 76.999846421 seconds] Frame Number: 1104 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd386 (54150) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d60 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 106617, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 106617 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1103] [The RTT to ACK the segment was: 0.000119557 seconds] [iRTT: 0.003305578 seconds] Frame 1105: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797495359 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797495359 seconds [Time delta from previous captured frame: 0.000080085 seconds] [Time delta from previous displayed frame: 0.000080085 seconds] [Time since reference or first frame: 76.999926506 seconds] Frame Number: 1105 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fee (28654) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f94 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 106617, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 106617 (relative sequence number) [Next sequence number: 107997 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc8ad [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 23460] TCP segment data (1380 bytes) Frame 1106: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797520067 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797520067 seconds [Time delta from previous captured frame: 0.000024708 seconds] [Time delta from previous displayed frame: 0.000024708 seconds] [Time since reference or first frame: 76.999951214 seconds] Frame Number: 1106 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd387 (54151) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 107997, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 107997 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1105] [The RTT to ACK the segment was: 0.000024708 seconds] [iRTT: 0.003305578 seconds] Frame 1107: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797545618 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797545618 seconds [Time delta from previous captured frame: 0.000025551 seconds] [Time delta from previous displayed frame: 0.000025551 seconds] [Time since reference or first frame: 76.999976765 seconds] Frame Number: 1107 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fef (28655) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f93 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 107997, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 107997 (relative sequence number) [Next sequence number: 109377 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x79f4 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 24840] TCP segment data (1380 bytes) Frame 1108: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797563357 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797563357 seconds [Time delta from previous captured frame: 0.000017739 seconds] [Time delta from previous displayed frame: 0.000017739 seconds] [Time since reference or first frame: 76.999994504 seconds] Frame Number: 1108 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd388 (54152) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 109377, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 109377 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1107] [The RTT to ACK the segment was: 0.000017739 seconds] [iRTT: 0.003305578 seconds] Frame 1109: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797737298 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797737298 seconds [Time delta from previous captured frame: 0.000173941 seconds] [Time delta from previous displayed frame: 0.000173941 seconds] [Time since reference or first frame: 77.000168445 seconds] Frame Number: 1109 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff0 (28656) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f92 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 109377, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 109377 (relative sequence number) [Next sequence number: 110757 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x8c79 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 26220] TCP segment data (1380 bytes) Frame 1110: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797756075 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797756075 seconds [Time delta from previous captured frame: 0.000018777 seconds] [Time delta from previous displayed frame: 0.000018777 seconds] [Time since reference or first frame: 77.000187222 seconds] Frame Number: 1110 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd389 (54153) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 110757, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 110757 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1109] [The RTT to ACK the segment was: 0.000018777 seconds] [iRTT: 0.003305578 seconds] Frame 1111: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797771511 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797771511 seconds [Time delta from previous captured frame: 0.000015436 seconds] [Time delta from previous displayed frame: 0.000015436 seconds] [Time since reference or first frame: 77.000202658 seconds] Frame Number: 1111 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff1 (28657) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f91 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 110757, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 110757 (relative sequence number) [Next sequence number: 112137 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x23f2 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 27600] TCP segment data (1380 bytes) Frame 1112: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797788111 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797788111 seconds [Time delta from previous captured frame: 0.000016600 seconds] [Time delta from previous displayed frame: 0.000016600 seconds] [Time since reference or first frame: 77.000219258 seconds] Frame Number: 1112 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38a (54154) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 112137, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 112137 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1111] [The RTT to ACK the segment was: 0.000016600 seconds] [iRTT: 0.003305578 seconds] Frame 1113: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797957438 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797957438 seconds [Time delta from previous captured frame: 0.000169327 seconds] [Time delta from previous displayed frame: 0.000169327 seconds] [Time since reference or first frame: 77.000388585 seconds] Frame Number: 1113 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff2 (28658) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f90 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 112137, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 112137 (relative sequence number) [Next sequence number: 113517 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9e7a [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 28980] TCP segment data (1380 bytes) Frame 1114: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797974586 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797974586 seconds [Time delta from previous captured frame: 0.000017148 seconds] [Time delta from previous displayed frame: 0.000017148 seconds] [Time since reference or first frame: 77.000405733 seconds] Frame Number: 1114 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38b (54155) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 113517, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 113517 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1113] [The RTT to ACK the segment was: 0.000017148 seconds] [iRTT: 0.003305578 seconds] Frame 1115: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797990072 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797990072 seconds [Time delta from previous captured frame: 0.000015486 seconds] [Time delta from previous displayed frame: 0.000015486 seconds] [Time since reference or first frame: 77.000421219 seconds] Frame Number: 1115 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff3 (28659) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 113517, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 113517 (relative sequence number) [Next sequence number: 114897 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xff06 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 30360] TCP segment data (1380 bytes) Frame 1116: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798005270 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798005270 seconds [Time delta from previous captured frame: 0.000015198 seconds] [Time delta from previous displayed frame: 0.000015198 seconds] [Time since reference or first frame: 77.000436417 seconds] Frame Number: 1116 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38c (54156) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 114897, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 114897 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1115] [The RTT to ACK the segment was: 0.000015198 seconds] [iRTT: 0.003305578 seconds] Frame 1117: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798190808 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798190808 seconds [Time delta from previous captured frame: 0.000185538 seconds] [Time delta from previous displayed frame: 0.000185538 seconds] [Time since reference or first frame: 77.000621955 seconds] Frame Number: 1117 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff4 (28660) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 114897, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 114897 (relative sequence number) [Next sequence number: 116277 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0639 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 31740] TCP segment data (1380 bytes) Frame 1118: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798208870 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798208870 seconds [Time delta from previous captured frame: 0.000018062 seconds] [Time delta from previous displayed frame: 0.000018062 seconds] [Time since reference or first frame: 77.000640017 seconds] Frame Number: 1118 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38d (54157) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d59 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 116277, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 116277 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1117] [The RTT to ACK the segment was: 0.000018062 seconds] [iRTT: 0.003305578 seconds] Frame 1119: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798223662 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798223662 seconds [Time delta from previous captured frame: 0.000014792 seconds] [Time delta from previous displayed frame: 0.000014792 seconds] [Time since reference or first frame: 77.000654809 seconds] Frame Number: 1119 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff5 (28661) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8d [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 116277, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 116277 (relative sequence number) [Next sequence number: 117657 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x089d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 33120] TCP segment data (1134 bytes) TCP segment data (246 bytes) [12 Reassembled TCP Segments (16437 bytes): #1097(123), #1099(1380), #1101(1380), #1103(2760), #1105(1380), #1107(1380), #1109(1380), #1111(1380), #1113(1380), #1115(1380), #1117(1380), #1119(1134)] [Frame: 1097, payload: 0-122 (123 bytes)] [Frame: 1099, payload: 123-1502 (1380 bytes)] [Frame: 1101, payload: 1503-2882 (1380 bytes)] [Frame: 1103, payload: 2883-5642 (2760 bytes)] [Frame: 1105, payload: 5643-7022 (1380 bytes)] [Frame: 1107, payload: 7023-8402 (1380 bytes)] [Frame: 1109, payload: 8403-9782 (1380 bytes)] [Frame: 1111, payload: 9783-11162 (1380 bytes)] [Frame: 1113, payload: 11163-12542 (1380 bytes)] [Frame: 1115, payload: 12543-13922 (1380 bytes)] [Frame: 1117, payload: 13923-15302 (1380 bytes)] [Frame: 1119, payload: 15303-16436 (1134 bytes)] [Segment count: 12] [Reassembled TCP length: 16437] [Reassembled TCP Data: 1703034030a18aced9ba8f1d387d083af5aca53d4261a88d...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: a18aced9ba8f1d387d083af5aca53d4261a88d5d77dc519c... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1120: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798261836 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798261836 seconds [Time delta from previous captured frame: 0.000038174 seconds] [Time delta from previous displayed frame: 0.000038174 seconds] [Time since reference or first frame: 77.000692983 seconds] Frame Number: 1120 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38e (54158) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d58 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 117657, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 117657 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1119] [The RTT to ACK the segment was: 0.000038174 seconds] [iRTT: 0.003305578 seconds] Frame 1121: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798426570 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798426570 seconds [Time delta from previous captured frame: 0.000164734 seconds] [Time delta from previous displayed frame: 0.000164734 seconds] [Time since reference or first frame: 77.000857717 seconds] Frame Number: 1121 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff6 (28662) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 117657, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 117657 (relative sequence number) [Next sequence number: 119037 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc572 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 34500] TCP segment data (1380 bytes) Frame 1122: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798446025 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798446025 seconds [Time delta from previous captured frame: 0.000019455 seconds] [Time delta from previous displayed frame: 0.000019455 seconds] [Time since reference or first frame: 77.000877172 seconds] Frame Number: 1122 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38f (54159) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d57 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 119037, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 119037 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1121] [The RTT to ACK the segment was: 0.000019455 seconds] [iRTT: 0.003305578 seconds] Frame 1123: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798457889 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798457889 seconds [Time delta from previous captured frame: 0.000011864 seconds] [Time delta from previous displayed frame: 0.000011864 seconds] [Time since reference or first frame: 77.000889036 seconds] Frame Number: 1123 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff7 (28663) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8b [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 119037, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 119037 (relative sequence number) [Next sequence number: 120417 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe6cb [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 35880] TCP segment data (1380 bytes) Frame 1124: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798473534 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798473534 seconds [Time delta from previous captured frame: 0.000015645 seconds] [Time delta from previous displayed frame: 0.000015645 seconds] [Time since reference or first frame: 77.000904681 seconds] Frame Number: 1124 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd390 (54160) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d56 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 120417, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 120417 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1123] [The RTT to ACK the segment was: 0.000015645 seconds] [iRTT: 0.003305578 seconds] Frame 1125: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798659822 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798659822 seconds [Time delta from previous captured frame: 0.000186288 seconds] [Time delta from previous displayed frame: 0.000186288 seconds] [Time since reference or first frame: 77.001090969 seconds] Frame Number: 1125 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff8 (28664) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 120417, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 120417 (relative sequence number) [Next sequence number: 121797 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdeb4 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 37260] TCP segment data (1380 bytes) Frame 1126: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798679159 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798679159 seconds [Time delta from previous captured frame: 0.000019337 seconds] [Time delta from previous displayed frame: 0.000019337 seconds] [Time since reference or first frame: 77.001110306 seconds] Frame Number: 1126 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd391 (54161) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d55 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 121797, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 121797 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1125] [The RTT to ACK the segment was: 0.000019337 seconds] [iRTT: 0.003305578 seconds] Frame 1127: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798843496 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798843496 seconds [Time delta from previous captured frame: 0.000164337 seconds] [Time delta from previous displayed frame: 0.000164337 seconds] [Time since reference or first frame: 77.001274643 seconds] Frame Number: 1127 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff9 (28665) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f89 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 121797, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 121797 (relative sequence number) [Next sequence number: 123177 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x80a8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 38640] TCP segment data (1380 bytes) Frame 1128: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798860828 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798860828 seconds [Time delta from previous captured frame: 0.000017332 seconds] [Time delta from previous displayed frame: 0.000017332 seconds] [Time since reference or first frame: 77.001291975 seconds] Frame Number: 1128 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd392 (54162) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d54 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 123177, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 123177 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1127] [The RTT to ACK the segment was: 0.000017332 seconds] [iRTT: 0.003305578 seconds] Frame 1129: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798877043 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798877043 seconds [Time delta from previous captured frame: 0.000016215 seconds] [Time delta from previous displayed frame: 0.000016215 seconds] [Time since reference or first frame: 77.001308190 seconds] Frame Number: 1129 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ffa (28666) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f88 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 123177, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 123177 (relative sequence number) [Next sequence number: 124557 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfe44 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 40020] TCP segment data (1380 bytes) Frame 1130: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798894141 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798894141 seconds [Time delta from previous captured frame: 0.000017098 seconds] [Time delta from previous displayed frame: 0.000017098 seconds] [Time since reference or first frame: 77.001325288 seconds] Frame Number: 1130 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd393 (54163) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d53 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 124557, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 124557 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1129] [The RTT to ACK the segment was: 0.000017098 seconds] [iRTT: 0.003305578 seconds] Frame 1131: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799076480 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799076480 seconds [Time delta from previous captured frame: 0.000182339 seconds] [Time delta from previous displayed frame: 0.000182339 seconds] [Time since reference or first frame: 77.001507627 seconds] Frame Number: 1131 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ffb (28667) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f87 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 124557, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 124557 (relative sequence number) [Next sequence number: 125937 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0f66 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 41400] TCP segment data (1380 bytes) Frame 1132: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799094131 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799094131 seconds [Time delta from previous captured frame: 0.000017651 seconds] [Time delta from previous displayed frame: 0.000017651 seconds] [Time since reference or first frame: 77.001525278 seconds] Frame Number: 1132 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd394 (54164) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d52 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 125937, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 125937 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1131] [The RTT to ACK the segment was: 0.000017651 seconds] [iRTT: 0.003305578 seconds] Frame 1133: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799108683 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799108683 seconds [Time delta from previous captured frame: 0.000014552 seconds] [Time delta from previous displayed frame: 0.000014552 seconds] [Time since reference or first frame: 77.001539830 seconds] Frame Number: 1133 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ffc (28668) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f86 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 125937, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 125937 (relative sequence number) [Next sequence number: 127317 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x3484 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 42780] TCP segment data (1380 bytes) Frame 1134: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799123904 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799123904 seconds [Time delta from previous captured frame: 0.000015221 seconds] [Time delta from previous displayed frame: 0.000015221 seconds] [Time since reference or first frame: 77.001555051 seconds] Frame Number: 1134 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd395 (54165) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d51 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 127317, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 127317 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1133] [The RTT to ACK the segment was: 0.000015221 seconds] [iRTT: 0.003305578 seconds] Frame 1135: 1115 bytes on wire (8920 bits), 1115 bytes captured (8920 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799281231 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799281231 seconds [Time delta from previous captured frame: 0.000157327 seconds] [Time delta from previous displayed frame: 0.000157327 seconds] [Time since reference or first frame: 77.001712378 seconds] Frame Number: 1135 Frame Length: 1115 bytes (8920 bits) Capture Length: 1115 bytes (8920 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:media] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1099 Identification: 0x6ffd (28669) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x70c6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 127317, Ack: 11831, Len: 1059 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1059] Sequence number: 127317 (relative sequence number) [Next sequence number: 128376 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf75d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1059] [Bytes sent since last PSH flag: 43839] TCP segment data (1059 bytes) [9 Reassembled TCP Segments (10965 bytes): #1119(246), #1121(1380), #1123(1380), #1125(1380), #1127(1380), #1129(1380), #1131(1380), #1133(1380), #1135(1059)] [Frame: 1119, payload: 0-245 (246 bytes)] [Frame: 1121, payload: 246-1625 (1380 bytes)] [Frame: 1123, payload: 1626-3005 (1380 bytes)] [Frame: 1125, payload: 3006-4385 (1380 bytes)] [Frame: 1127, payload: 4386-5765 (1380 bytes)] [Frame: 1129, payload: 5766-7145 (1380 bytes)] [Frame: 1131, payload: 7146-8525 (1380 bytes)] [Frame: 1133, payload: 8526-9905 (1380 bytes)] [Frame: 1135, payload: 9906-10964 (1059 bytes)] [Segment count: 9] [Reassembled TCP length: 10965] [Reassembled TCP Data: 1703032ad075e40b4579457524cae5dc22efa7faeb827eb7...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 10960 Encrypted Application Data: 75e40b4579457524cae5dc22efa7faeb827eb749dcf126d2... SSL segment data (10913 bytes) [3 Reassembled SSL segments (43681 bytes): #1097(16384), #1119(16384), #1135(10913)] [Frame: 1097, payload: 0-16383 (16384 bytes)] [Frame: 1119, payload: 16384-32767 (16384 bytes)] [Frame: 1135, payload: 32768-43680 (10913 bytes)] [Segment count: 3] [Reassembled PDU length: 43681] [Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...] Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: application/pdf\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: f952686a-3930-41c0-afcb-438f579bc8eb\r\n Content-Disposition: attachment; filename="424888813.pdf"\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:31:06 GMT\r\n Content-Length: 43358\r\n [Content length: 43358] \r\n [HTTP response 9/9] [Time since request: 0.325024859 seconds] [Prev request in frame: 885] [Prev response in frame: 947] [Request in frame: 1073] File Data: 43358 bytes Media Type Media type: application/pdf (43358 bytes) Frame 1136: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799298304 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799298304 seconds [Time delta from previous captured frame: 0.000017073 seconds] [Time delta from previous displayed frame: 0.000017073 seconds] [Time since reference or first frame: 77.001729451 seconds] Frame Number: 1136 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd396 (54166) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d50 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 128376, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 128376 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1135] [The RTT to ACK the segment was: 0.000017073 seconds] [iRTT: 0.003305578 seconds] Frame 1180: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:02.297672802 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724262.297672802 seconds [Time delta from previous captured frame: 0.171309183 seconds] [Time delta from previous displayed frame: 10.498374498 seconds] [Time since reference or first frame: 87.500103949 seconds] Frame Number: 1180 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd397 (54167) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d4f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11830, Ack: 128376, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11830 (relative sequence number) Acknowledgment number: 128376 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1181: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:02.300563451 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724262.300563451 seconds [Time delta from previous captured frame: 0.002890649 seconds] [Time delta from previous displayed frame: 0.002890649 seconds] [Time since reference or first frame: 87.502994598 seconds] Frame Number: 1181 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 15dfee11 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x71ed (29165) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x72f9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 11831, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 128376 (relative sequence number) Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb1bf [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 63243 Src Port: 63243 Frame 1202: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:12.537643566 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724272.537643566 seconds [Time delta from previous captured frame: 0.611686018 seconds] [Time delta from previous displayed frame: 10.237080115 seconds] [Time since reference or first frame: 97.740074713 seconds] Frame Number: 1202 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd398 (54168) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d4e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11830, Ack: 128376, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11830 (relative sequence number) Acknowledgment number: 128376 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1203: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:12.540331065 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724272.540331065 seconds [Time delta from previous captured frame: 0.002687499 seconds] [Time delta from previous displayed frame: 0.002687499 seconds] [Time since reference or first frame: 97.742762212 seconds] Frame Number: 1203 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: f0246e88 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x03e1 (993) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xe105 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 11831, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 128376 (relative sequence number) Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb1bf [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 55395 Src Port: 55395 Frame 1223: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:17.957213066 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724277.957213066 seconds [Time delta from previous captured frame: 0.000280947 seconds] [Time delta from previous displayed frame: 5.416882001 seconds] [Time since reference or first frame: 103.159644213 seconds] Frame Number: 1223 Frame Length: 1325 bytes (10600 bits) Capture Length: 1325 bytes (10600 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1309 Identification: 0xd399 (54169) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4858 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 128376, Len: 1269 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1269] Sequence number: 11831 (relative sequence number) [Next sequence number: 13100 (relative sequence number)] Acknowledgment number: 128376 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1ef9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1269] [Bytes sent since last PSH flag: 1269] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1264 Encrypted Application Data: 1de03765c5bc93dfc7e28d4e1ce4323f692db0504dd09fd2... Hypertext Transfer Protocol GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf HTTP/1.1\r\n] [GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf Request URI Path: /racuni/pregled-racuna-pdf Request URI Query: serviceid=12018216&metaid=431372012&filename=431372012.pdf Request URI Query Parameter: serviceid=12018216 Request URI Query Parameter: metaid=431372012 Request URI Query Parameter: filename=431372012.pdf Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf] [HTTP request 10/10] [Prev request in frame: 1073] Frame 1226: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.018995769 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.018995769 seconds [Time delta from previous captured frame: 0.032120897 seconds] [Time delta from previous displayed frame: 0.061782703 seconds] [Time since reference or first frame: 103.221426916 seconds] Frame Number: 1226 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 9d0aae13 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x1761 (5985) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xcd85 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 13100, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 128376 (relative sequence number) Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb1bf [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1223] [The RTT to ACK the segment was: 0.061782703 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 33769 Src Port: 33769 Frame 1229: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.357946505 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.357946505 seconds [Time delta from previous captured frame: 0.116225971 seconds] [Time delta from previous displayed frame: 0.338950736 seconds] [Time since reference or first frame: 103.560377652 seconds] Frame Number: 1229 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x1767 (5991) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc2b7 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 13100, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 128376 (relative sequence number) [Next sequence number: 131136 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 2760] TCP segment data (2760 bytes) Secure Sockets Layer Frame 1230: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358118225 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358118225 seconds [Time delta from previous captured frame: 0.000171720 seconds] [Time delta from previous displayed frame: 0.000171720 seconds] [Time since reference or first frame: 103.560549372 seconds] Frame Number: 1230 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39a (54170) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d4c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 131136, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 131136 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1229] [The RTT to ACK the segment was: 0.000171720 seconds] [iRTT: 0.003305578 seconds] Frame 1231: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358303779 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358303779 seconds [Time delta from previous captured frame: 0.000185554 seconds] [Time delta from previous displayed frame: 0.000185554 seconds] [Time since reference or first frame: 103.560734926 seconds] Frame Number: 1231 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x1769 (5993) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc2b5 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 131136, Ack: 13100, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 131136 (relative sequence number) [Next sequence number: 133896 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 5520] TCP segment data (2760 bytes) Frame 1232: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358376562 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358376562 seconds [Time delta from previous captured frame: 0.000072783 seconds] [Time delta from previous displayed frame: 0.000072783 seconds] [Time since reference or first frame: 103.560807709 seconds] Frame Number: 1232 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x176b (5995) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc817 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 133896, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 133896 (relative sequence number) [Next sequence number: 135276 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc653 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 4140] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 1233: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358415527 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358415527 seconds [Time delta from previous captured frame: 0.000038965 seconds] [Time delta from previous displayed frame: 0.000038965 seconds] [Time since reference or first frame: 103.560846674 seconds] Frame Number: 1233 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x176c (5996) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc816 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 135276, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 135276 (relative sequence number) [Next sequence number: 136656 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x717f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 5520] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 1234: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358452577 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358452577 seconds [Time delta from previous captured frame: 0.000037050 seconds] [Time delta from previous displayed frame: 0.000037050 seconds] [Time since reference or first frame: 103.560883724 seconds] Frame Number: 1234 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39b (54171) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d4b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 133896, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 133896 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1231] [The RTT to ACK the segment was: 0.000148798 seconds] [iRTT: 0.003305578 seconds] Frame 1235: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358478392 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358478392 seconds [Time delta from previous captured frame: 0.000025815 seconds] [Time delta from previous displayed frame: 0.000025815 seconds] [Time since reference or first frame: 103.560909539 seconds] Frame Number: 1235 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39c (54172) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d4a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 135276, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 135276 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1232] [The RTT to ACK the segment was: 0.000101830 seconds] [iRTT: 0.003305578 seconds] Frame 1236: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358499028 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358499028 seconds [Time delta from previous captured frame: 0.000020636 seconds] [Time delta from previous displayed frame: 0.000020636 seconds] [Time since reference or first frame: 103.560930175 seconds] Frame Number: 1236 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39d (54173) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d49 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 136656, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 136656 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1233] [The RTT to ACK the segment was: 0.000083501 seconds] [iRTT: 0.003305578 seconds] Frame 1237: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358632941 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358632941 seconds [Time delta from previous captured frame: 0.000133913 seconds] [Time delta from previous displayed frame: 0.000133913 seconds] [Time since reference or first frame: 103.561064088 seconds] Frame Number: 1237 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x176d (5997) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc815 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 136656, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 136656 (relative sequence number) [Next sequence number: 138036 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x27e8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 1238: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358681401 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358681401 seconds [Time delta from previous captured frame: 0.000048460 seconds] [Time delta from previous displayed frame: 0.000048460 seconds] [Time since reference or first frame: 103.561112548 seconds] Frame Number: 1238 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39e (54174) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d48 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 138036, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 138036 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1237] [The RTT to ACK the segment was: 0.000048460 seconds] [iRTT: 0.003305578 seconds] Frame 1239: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358705064 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358705064 seconds [Time delta from previous captured frame: 0.000023663 seconds] [Time delta from previous displayed frame: 0.000023663 seconds] [Time since reference or first frame: 103.561136211 seconds] Frame Number: 1239 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x176e (5998) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc814 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 138036, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 138036 (relative sequence number) [Next sequence number: 139416 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x73be [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 1240: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358766554 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358766554 seconds [Time delta from previous captured frame: 0.000061490 seconds] [Time delta from previous displayed frame: 0.000061490 seconds] [Time since reference or first frame: 103.561197701 seconds] Frame Number: 1240 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39f (54175) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d47 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 139416, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 139416 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1239] [The RTT to ACK the segment was: 0.000061490 seconds] [iRTT: 0.003305578 seconds] Frame 1241: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358871028 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358871028 seconds [Time delta from previous captured frame: 0.000104474 seconds] [Time delta from previous displayed frame: 0.000104474 seconds] [Time since reference or first frame: 103.561302175 seconds] Frame Number: 1241 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x176f (5999) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc813 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 139416, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 139416 (relative sequence number) [Next sequence number: 140796 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb98f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 12420] TCP segment data (1380 bytes) Frame 1242: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358919180 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358919180 seconds [Time delta from previous captured frame: 0.000048152 seconds] [Time delta from previous displayed frame: 0.000048152 seconds] [Time since reference or first frame: 103.561350327 seconds] Frame Number: 1242 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a0 (54176) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d46 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 140796, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 140796 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1241] [The RTT to ACK the segment was: 0.000048152 seconds] [iRTT: 0.003305578 seconds] Frame 1243: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358947529 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358947529 seconds [Time delta from previous captured frame: 0.000028349 seconds] [Time delta from previous displayed frame: 0.000028349 seconds] [Time since reference or first frame: 103.561378676 seconds] Frame Number: 1243 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1770 (6000) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc812 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 140796, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 140796 (relative sequence number) [Next sequence number: 142176 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x666f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 13800] TCP segment data (1380 bytes) Frame 1244: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358989051 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358989051 seconds [Time delta from previous captured frame: 0.000041522 seconds] [Time delta from previous displayed frame: 0.000041522 seconds] [Time since reference or first frame: 103.561420198 seconds] Frame Number: 1244 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a1 (54177) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d45 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 142176, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 142176 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1243] [The RTT to ACK the segment was: 0.000041522 seconds] [iRTT: 0.003305578 seconds] Frame 1245: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359101219 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359101219 seconds [Time delta from previous captured frame: 0.000112168 seconds] [Time delta from previous displayed frame: 0.000112168 seconds] [Time since reference or first frame: 103.561532366 seconds] Frame Number: 1245 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1771 (6001) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc811 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 142176, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 142176 (relative sequence number) [Next sequence number: 143556 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfd4c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 15180] TCP segment data (1380 bytes) Frame 1246: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359146935 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359146935 seconds [Time delta from previous captured frame: 0.000045716 seconds] [Time delta from previous displayed frame: 0.000045716 seconds] [Time since reference or first frame: 103.561578082 seconds] Frame Number: 1246 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a2 (54178) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d44 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 143556, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 143556 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1245] [The RTT to ACK the segment was: 0.000045716 seconds] [iRTT: 0.003305578 seconds] Frame 1247: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359168912 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359168912 seconds [Time delta from previous captured frame: 0.000021977 seconds] [Time delta from previous displayed frame: 0.000021977 seconds] [Time since reference or first frame: 103.561600059 seconds] Frame Number: 1247 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1772 (6002) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc810 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 143556, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 143556 (relative sequence number) [Next sequence number: 144936 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xef26 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 16560] TCP segment data (1257 bytes) TCP segment data (123 bytes) [10 Reassembled TCP Segments (16437 bytes): #1229(2760), #1231(2760), #1232(1380), #1233(1380), #1237(1380), #1239(1380), #1241(1380), #1243(1380), #1245(1380), #1247(1257)] [Frame: 1229, payload: 0-2759 (2760 bytes)] [Frame: 1231, payload: 2760-5519 (2760 bytes)] [Frame: 1232, payload: 5520-6899 (1380 bytes)] [Frame: 1233, payload: 6900-8279 (1380 bytes)] [Frame: 1237, payload: 8280-9659 (1380 bytes)] [Frame: 1239, payload: 9660-11039 (1380 bytes)] [Frame: 1241, payload: 11040-12419 (1380 bytes)] [Frame: 1243, payload: 12420-13799 (1380 bytes)] [Frame: 1245, payload: 13800-15179 (1380 bytes)] [Frame: 1247, payload: 15180-16436 (1257 bytes)] [Segment count: 10] [Reassembled TCP length: 16437] [Reassembled TCP Data: 1703034030297e6a7edbc823c45e3a18b19f70eb4ac5e9f1...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: 297e6a7edbc823c45e3a18b19f70eb4ac5e9f17c98fd687e... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1248: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359209307 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359209307 seconds [Time delta from previous captured frame: 0.000040395 seconds] [Time delta from previous displayed frame: 0.000040395 seconds] [Time since reference or first frame: 103.561640454 seconds] Frame Number: 1248 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a3 (54179) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d43 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 144936, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 144936 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1247] [The RTT to ACK the segment was: 0.000040395 seconds] [iRTT: 0.003305578 seconds] Frame 1249: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359335068 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359335068 seconds [Time delta from previous captured frame: 0.000125761 seconds] [Time delta from previous displayed frame: 0.000125761 seconds] [Time since reference or first frame: 103.561766215 seconds] Frame Number: 1249 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1773 (6003) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 144936, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 144936 (relative sequence number) [Next sequence number: 146316 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc92e [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 17940] TCP segment data (1380 bytes) Frame 1250: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359379526 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359379526 seconds [Time delta from previous captured frame: 0.000044458 seconds] [Time delta from previous displayed frame: 0.000044458 seconds] [Time since reference or first frame: 103.561810673 seconds] Frame Number: 1250 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a4 (54180) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d42 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 146316, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 146316 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1249] [The RTT to ACK the segment was: 0.000044458 seconds] [iRTT: 0.003305578 seconds] Frame 1251: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359522449 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359522449 seconds [Time delta from previous captured frame: 0.000142923 seconds] [Time delta from previous displayed frame: 0.000142923 seconds] [Time since reference or first frame: 103.561953596 seconds] Frame Number: 1251 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1774 (6004) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 146316, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 146316 (relative sequence number) [Next sequence number: 147696 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x06d5 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 19320] TCP segment data (1380 bytes) Frame 1252: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359581317 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359581317 seconds [Time delta from previous captured frame: 0.000058868 seconds] [Time delta from previous displayed frame: 0.000058868 seconds] [Time since reference or first frame: 103.562012464 seconds] Frame Number: 1252 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a5 (54181) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d41 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 147696, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 147696 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1251] [The RTT to ACK the segment was: 0.000058868 seconds] [iRTT: 0.003305578 seconds] Frame 1253: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359604601 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359604601 seconds [Time delta from previous captured frame: 0.000023284 seconds] [Time delta from previous displayed frame: 0.000023284 seconds] [Time since reference or first frame: 103.562035748 seconds] Frame Number: 1253 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1775 (6005) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80d [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 147696, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 147696 (relative sequence number) [Next sequence number: 149076 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5979 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 20700] TCP segment data (1380 bytes) Frame 1254: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359642051 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359642051 seconds [Time delta from previous captured frame: 0.000037450 seconds] [Time delta from previous displayed frame: 0.000037450 seconds] [Time since reference or first frame: 103.562073198 seconds] Frame Number: 1254 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a6 (54182) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d40 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 149076, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 149076 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1253] [The RTT to ACK the segment was: 0.000037450 seconds] [iRTT: 0.003305578 seconds] Frame 1255: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359754254 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359754254 seconds [Time delta from previous captured frame: 0.000112203 seconds] [Time delta from previous displayed frame: 0.000112203 seconds] [Time since reference or first frame: 103.562185401 seconds] Frame Number: 1255 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1776 (6006) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 149076, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 149076 (relative sequence number) [Next sequence number: 150456 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe3c1 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 22080] TCP segment data (1380 bytes) Frame 1256: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359793184 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359793184 seconds [Time delta from previous captured frame: 0.000038930 seconds] [Time delta from previous displayed frame: 0.000038930 seconds] [Time since reference or first frame: 103.562224331 seconds] Frame Number: 1256 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a7 (54183) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 150456, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 150456 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1255] [The RTT to ACK the segment was: 0.000038930 seconds] [iRTT: 0.003305578 seconds] Frame 1257: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359838241 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359838241 seconds [Time delta from previous captured frame: 0.000045057 seconds] [Time delta from previous displayed frame: 0.000045057 seconds] [Time since reference or first frame: 103.562269388 seconds] Frame Number: 1257 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1777 (6007) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80b [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 150456, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 150456 (relative sequence number) [Next sequence number: 151836 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xcddd [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 23460] TCP segment data (1380 bytes) Frame 1258: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359881949 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359881949 seconds [Time delta from previous captured frame: 0.000043708 seconds] [Time delta from previous displayed frame: 0.000043708 seconds] [Time since reference or first frame: 103.562313096 seconds] Frame Number: 1258 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a8 (54184) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 151836, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 151836 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1257] [The RTT to ACK the segment was: 0.000043708 seconds] [iRTT: 0.003305578 seconds] Frame 1259: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359990309 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359990309 seconds [Time delta from previous captured frame: 0.000108360 seconds] [Time delta from previous displayed frame: 0.000108360 seconds] [Time since reference or first frame: 103.562421456 seconds] Frame Number: 1259 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1778 (6008) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 151836, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 151836 (relative sequence number) [Next sequence number: 153216 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5658 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 24840] TCP segment data (1380 bytes) Frame 1260: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360029759 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360029759 seconds [Time delta from previous captured frame: 0.000039450 seconds] [Time delta from previous displayed frame: 0.000039450 seconds] [Time since reference or first frame: 103.562460906 seconds] Frame Number: 1260 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a9 (54185) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 153216, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 153216 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1259] [The RTT to ACK the segment was: 0.000039450 seconds] [iRTT: 0.003305578 seconds] Frame 1261: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360051302 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360051302 seconds [Time delta from previous captured frame: 0.000021543 seconds] [Time delta from previous displayed frame: 0.000021543 seconds] [Time since reference or first frame: 103.562482449 seconds] Frame Number: 1261 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1779 (6009) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc809 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 153216, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 153216 (relative sequence number) [Next sequence number: 154596 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xccb8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 26220] TCP segment data (1380 bytes) Frame 1262: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360091357 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360091357 seconds [Time delta from previous captured frame: 0.000040055 seconds] [Time delta from previous displayed frame: 0.000040055 seconds] [Time since reference or first frame: 103.562522504 seconds] Frame Number: 1262 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3aa (54186) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 154596, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 154596 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1261] [The RTT to ACK the segment was: 0.000040055 seconds] [iRTT: 0.003305578 seconds] Frame 1263: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360221434 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360221434 seconds [Time delta from previous captured frame: 0.000130077 seconds] [Time delta from previous displayed frame: 0.000130077 seconds] [Time since reference or first frame: 103.562652581 seconds] Frame Number: 1263 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177a (6010) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc808 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 154596, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 154596 (relative sequence number) [Next sequence number: 155976 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x98ed [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 27600] TCP segment data (1380 bytes) Frame 1264: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360259969 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360259969 seconds [Time delta from previous captured frame: 0.000038535 seconds] [Time delta from previous displayed frame: 0.000038535 seconds] [Time since reference or first frame: 103.562691116 seconds] Frame Number: 1264 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ab (54187) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 155976, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 155976 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1263] [The RTT to ACK the segment was: 0.000038535 seconds] [iRTT: 0.003305578 seconds] Frame 1265: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360280665 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360280665 seconds [Time delta from previous captured frame: 0.000020696 seconds] [Time delta from previous displayed frame: 0.000020696 seconds] [Time since reference or first frame: 103.562711812 seconds] Frame Number: 1265 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177b (6011) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc807 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 155976, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 155976 (relative sequence number) [Next sequence number: 157356 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xecd1 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 28980] TCP segment data (1380 bytes) Frame 1266: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360321613 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360321613 seconds [Time delta from previous captured frame: 0.000040948 seconds] [Time delta from previous displayed frame: 0.000040948 seconds] [Time since reference or first frame: 103.562752760 seconds] Frame Number: 1266 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ac (54188) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 157356, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 157356 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1265] [The RTT to ACK the segment was: 0.000040948 seconds] [iRTT: 0.003305578 seconds] Frame 1267: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360454444 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360454444 seconds [Time delta from previous captured frame: 0.000132831 seconds] [Time delta from previous displayed frame: 0.000132831 seconds] [Time since reference or first frame: 103.562885591 seconds] Frame Number: 1267 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177c (6012) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc806 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 157356, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 157356 (relative sequence number) [Next sequence number: 158736 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc23e [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 30360] TCP segment data (1380 bytes) Frame 1268: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360492845 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360492845 seconds [Time delta from previous captured frame: 0.000038401 seconds] [Time delta from previous displayed frame: 0.000038401 seconds] [Time since reference or first frame: 103.562923992 seconds] Frame Number: 1268 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ad (54189) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d39 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 158736, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 158736 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1267] [The RTT to ACK the segment was: 0.000038401 seconds] [iRTT: 0.003305578 seconds] Frame 1269: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360513840 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360513840 seconds [Time delta from previous captured frame: 0.000020995 seconds] [Time delta from previous displayed frame: 0.000020995 seconds] [Time since reference or first frame: 103.562944987 seconds] Frame Number: 1269 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177d (6013) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc805 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 158736, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 158736 (relative sequence number) [Next sequence number: 160116 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x088a [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 31740] TCP segment data (1380 bytes) Frame 1270: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360573950 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360573950 seconds [Time delta from previous captured frame: 0.000060110 seconds] [Time delta from previous displayed frame: 0.000060110 seconds] [Time since reference or first frame: 103.563005097 seconds] Frame Number: 1270 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ae (54190) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d38 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 160116, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 160116 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1269] [The RTT to ACK the segment was: 0.000060110 seconds] [iRTT: 0.003305578 seconds] Frame 1271: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360625180 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360625180 seconds [Time delta from previous captured frame: 0.000051230 seconds] [Time delta from previous displayed frame: 0.000051230 seconds] [Time since reference or first frame: 103.563056327 seconds] Frame Number: 1271 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177e (6014) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc804 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 160116, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 160116 (relative sequence number) [Next sequence number: 161496 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xaf00 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 33120] TCP segment data (1134 bytes) TCP segment data (246 bytes) [13 Reassembled TCP Segments (16437 bytes): #1247(123), #1249(1380), #1251(1380), #1253(1380), #1255(1380), #1257(1380), #1259(1380), #1261(1380), #1263(1380), #1265(1380), #1267(1380), #1269(1380), #1271(1134)] [Frame: 1247, payload: 0-122 (123 bytes)] [Frame: 1249, payload: 123-1502 (1380 bytes)] [Frame: 1251, payload: 1503-2882 (1380 bytes)] [Frame: 1253, payload: 2883-4262 (1380 bytes)] [Frame: 1255, payload: 4263-5642 (1380 bytes)] [Frame: 1257, payload: 5643-7022 (1380 bytes)] [Frame: 1259, payload: 7023-8402 (1380 bytes)] [Frame: 1261, payload: 8403-9782 (1380 bytes)] [Frame: 1263, payload: 9783-11162 (1380 bytes)] [Frame: 1265, payload: 11163-12542 (1380 bytes)] [Frame: 1267, payload: 12543-13922 (1380 bytes)] [Frame: 1269, payload: 13923-15302 (1380 bytes)] [Frame: 1271, payload: 15303-16436 (1134 bytes)] [Segment count: 13] [Reassembled TCP length: 16437] [Reassembled TCP Data: 1703034030add682fee4293188f3d84adcc0f8190a0e1f55...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: add682fee4293188f3d84adcc0f8190a0e1f55eedad6189c... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1272: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360663646 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360663646 seconds [Time delta from previous captured frame: 0.000038466 seconds] [Time delta from previous displayed frame: 0.000038466 seconds] [Time since reference or first frame: 103.563094793 seconds] Frame Number: 1272 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3af (54191) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d37 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 161496, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 161496 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1271] [The RTT to ACK the segment was: 0.000038466 seconds] [iRTT: 0.003305578 seconds] Frame 1273: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360805699 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360805699 seconds [Time delta from previous captured frame: 0.000142053 seconds] [Time delta from previous displayed frame: 0.000142053 seconds] [Time since reference or first frame: 103.563236846 seconds] Frame Number: 1273 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177f (6015) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc803 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 161496, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 161496 (relative sequence number) [Next sequence number: 162876 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe813 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 34500] TCP segment data (1380 bytes) Frame 1274: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360845997 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360845997 seconds [Time delta from previous captured frame: 0.000040298 seconds] [Time delta from previous displayed frame: 0.000040298 seconds] [Time since reference or first frame: 103.563277144 seconds] Frame Number: 1274 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b0 (54192) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d36 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 162876, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 162876 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1273] [The RTT to ACK the segment was: 0.000040298 seconds] [iRTT: 0.003305578 seconds] Frame 1275: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360867369 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360867369 seconds [Time delta from previous captured frame: 0.000021372 seconds] [Time delta from previous displayed frame: 0.000021372 seconds] [Time since reference or first frame: 103.563298516 seconds] Frame Number: 1275 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1780 (6016) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc802 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 162876, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 162876 (relative sequence number) [Next sequence number: 164256 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x940b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 35880] TCP segment data (1380 bytes) Frame 1276: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360907698 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360907698 seconds [Time delta from previous captured frame: 0.000040329 seconds] [Time delta from previous displayed frame: 0.000040329 seconds] [Time since reference or first frame: 103.563338845 seconds] Frame Number: 1276 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b1 (54193) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d35 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 164256, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 164256 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1275] [The RTT to ACK the segment was: 0.000040329 seconds] [iRTT: 0.003305578 seconds] Frame 1277: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361037731 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361037731 seconds [Time delta from previous captured frame: 0.000130033 seconds] [Time delta from previous displayed frame: 0.000130033 seconds] [Time since reference or first frame: 103.563468878 seconds] Frame Number: 1277 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1781 (6017) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc801 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 164256, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 164256 (relative sequence number) [Next sequence number: 165636 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc7a7 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 37260] TCP segment data (1380 bytes) Frame 1278: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361080384 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361080384 seconds [Time delta from previous captured frame: 0.000042653 seconds] [Time delta from previous displayed frame: 0.000042653 seconds] [Time since reference or first frame: 103.563511531 seconds] Frame Number: 1278 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b2 (54194) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d34 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 165636, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 165636 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1277] [The RTT to ACK the segment was: 0.000042653 seconds] [iRTT: 0.003305578 seconds] Frame 1279: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361101975 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361101975 seconds [Time delta from previous captured frame: 0.000021591 seconds] [Time delta from previous displayed frame: 0.000021591 seconds] [Time since reference or first frame: 103.563533122 seconds] Frame Number: 1279 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1782 (6018) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc800 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 165636, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 165636 (relative sequence number) [Next sequence number: 167016 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1518 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 38640] TCP segment data (1380 bytes) Frame 1280: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361142049 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361142049 seconds [Time delta from previous captured frame: 0.000040074 seconds] [Time delta from previous displayed frame: 0.000040074 seconds] [Time since reference or first frame: 103.563573196 seconds] Frame Number: 1280 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b3 (54195) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d33 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 167016, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 167016 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1279] [The RTT to ACK the segment was: 0.000040074 seconds] [iRTT: 0.003305578 seconds] Frame 1281: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361272537 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361272537 seconds [Time delta from previous captured frame: 0.000130488 seconds] [Time delta from previous displayed frame: 0.000130488 seconds] [Time since reference or first frame: 103.563703684 seconds] Frame Number: 1281 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1783 (6019) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7ff [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 167016, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 167016 (relative sequence number) [Next sequence number: 168396 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdada [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 40020] TCP segment data (1380 bytes) Frame 1282: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361314548 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361314548 seconds [Time delta from previous captured frame: 0.000042011 seconds] [Time delta from previous displayed frame: 0.000042011 seconds] [Time since reference or first frame: 103.563745695 seconds] Frame Number: 1282 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b4 (54196) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d32 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 168396, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 168396 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1281] [The RTT to ACK the segment was: 0.000042011 seconds] [iRTT: 0.003305578 seconds] Frame 1283: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361335258 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361335258 seconds [Time delta from previous captured frame: 0.000020710 seconds] [Time delta from previous displayed frame: 0.000020710 seconds] [Time since reference or first frame: 103.563766405 seconds] Frame Number: 1283 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1784 (6020) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7fe [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 168396, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 168396 (relative sequence number) [Next sequence number: 169776 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdf24 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 41400] TCP segment data (1380 bytes) Frame 1284: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361374741 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361374741 seconds [Time delta from previous captured frame: 0.000039483 seconds] [Time delta from previous displayed frame: 0.000039483 seconds] [Time since reference or first frame: 103.563805888 seconds] Frame Number: 1284 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b5 (54197) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d31 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 169776, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 169776 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1283] [The RTT to ACK the segment was: 0.000039483 seconds] [iRTT: 0.003305578 seconds] Frame 1285: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361504019 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361504019 seconds [Time delta from previous captured frame: 0.000129278 seconds] [Time delta from previous displayed frame: 0.000129278 seconds] [Time since reference or first frame: 103.563935166 seconds] Frame Number: 1285 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1785 (6021) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7fd [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 169776, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 169776 (relative sequence number) [Next sequence number: 171156 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x167b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 42780] TCP segment data (1380 bytes) Frame 1286: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361572157 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361572157 seconds [Time delta from previous captured frame: 0.000068138 seconds] [Time delta from previous displayed frame: 0.000068138 seconds] [Time since reference or first frame: 103.564003304 seconds] Frame Number: 1286 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b6 (54198) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d30 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 171156, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 171156 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1285] [The RTT to ACK the segment was: 0.000068138 seconds] [iRTT: 0.003305578 seconds] Frame 1287: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361594618 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361594618 seconds [Time delta from previous captured frame: 0.000022461 seconds] [Time delta from previous displayed frame: 0.000022461 seconds] [Time since reference or first frame: 103.564025765 seconds] Frame Number: 1287 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1786 (6022) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7fc [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 171156, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 171156 (relative sequence number) [Next sequence number: 172536 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x88ce [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 44160] TCP segment data (1380 bytes) Frame 1288: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361636037 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361636037 seconds [Time delta from previous captured frame: 0.000041419 seconds] [Time delta from previous displayed frame: 0.000041419 seconds] [Time since reference or first frame: 103.564067184 seconds] Frame Number: 1288 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b7 (54199) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 172536, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 172536 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1287] [The RTT to ACK the segment was: 0.000041419 seconds] [iRTT: 0.003305578 seconds] Frame 1289: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361737904 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361737904 seconds [Time delta from previous captured frame: 0.000101867 seconds] [Time delta from previous displayed frame: 0.000101867 seconds] [Time since reference or first frame: 103.564169051 seconds] Frame Number: 1289 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1787 (6023) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7fb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 172536, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 172536 (relative sequence number) [Next sequence number: 173916 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x03e6 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 45540] TCP segment data (1380 bytes) Frame 1290: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361778931 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361778931 seconds [Time delta from previous captured frame: 0.000041027 seconds] [Time delta from previous displayed frame: 0.000041027 seconds] [Time since reference or first frame: 103.564210078 seconds] Frame Number: 1290 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b8 (54200) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 173916, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 173916 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1289] [The RTT to ACK the segment was: 0.000041027 seconds] [iRTT: 0.003305578 seconds] Frame 1291: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361845526 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361845526 seconds [Time delta from previous captured frame: 0.000066595 seconds] [Time delta from previous displayed frame: 0.000066595 seconds] [Time since reference or first frame: 103.564276673 seconds] Frame Number: 1291 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1788 (6024) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7fa [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 173916, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 173916 (relative sequence number) [Next sequence number: 175296 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1d7f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 46920] TCP segment data (1380 bytes) Frame 1292: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361917629 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361917629 seconds [Time delta from previous captured frame: 0.000072103 seconds] [Time delta from previous displayed frame: 0.000072103 seconds] [Time since reference or first frame: 103.564348776 seconds] Frame Number: 1292 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b9 (54201) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 175296, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 175296 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1291] [The RTT to ACK the segment was: 0.000072103 seconds] [iRTT: 0.003305578 seconds] Frame 1293: 2207 bytes on wire (17656 bits), 2207 bytes captured (17656 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361973608 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361973608 seconds [Time delta from previous captured frame: 0.000055979 seconds] [Time delta from previous displayed frame: 0.000055979 seconds] [Time since reference or first frame: 103.564404755 seconds] Frame Number: 1293 Frame Length: 2207 bytes (17656 bits) Capture Length: 2207 bytes (17656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:media] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2191 Identification: 0x1789 (6025) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc4f6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 175296, Ack: 13100, Len: 2151 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2151] Sequence number: 175296 (relative sequence number) [Next sequence number: 177447 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x226b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2151] [Bytes sent since last PSH flag: 49071] TCP segment data (2151 bytes) [12 Reassembled TCP Segments (16197 bytes): #1271(246), #1273(1380), #1275(1380), #1277(1380), #1279(1380), #1281(1380), #1283(1380), #1285(1380), #1287(1380), #1289(1380), #1291(1380), #1293(2151)] [Frame: 1271, payload: 0-245 (246 bytes)] [Frame: 1273, payload: 246-1625 (1380 bytes)] [Frame: 1275, payload: 1626-3005 (1380 bytes)] [Frame: 1277, payload: 3006-4385 (1380 bytes)] [Frame: 1279, payload: 4386-5765 (1380 bytes)] [Frame: 1281, payload: 5766-7145 (1380 bytes)] [Frame: 1283, payload: 7146-8525 (1380 bytes)] [Frame: 1285, payload: 8526-9905 (1380 bytes)] [Frame: 1287, payload: 9906-11285 (1380 bytes)] [Frame: 1289, payload: 11286-12665 (1380 bytes)] [Frame: 1291, payload: 12666-14045 (1380 bytes)] [Frame: 1293, payload: 14046-16196 (2151 bytes)] [Segment count: 12] [Reassembled TCP length: 16197] [Reassembled TCP Data: 1703033f4021b2022279ba0f518472eb936f474c8b2d22db...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16192 Encrypted Application Data: 21b2022279ba0f518472eb936f474c8b2d22db61d05aca31... SSL segment data (16140 bytes) [3 Reassembled SSL segments (48908 bytes): #1247(16384), #1271(16384), #1293(16140)] [Frame: 1247, payload: 0-16383 (16384 bytes)] [Frame: 1271, payload: 16384-32767 (16384 bytes)] [Frame: 1293, payload: 32768-48907 (16140 bytes)] [Segment count: 3] [Reassembled PDU length: 48908] [Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...] Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: application/pdf\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 91bf3b3d-07c6-412e-a6f0-300e6a3a2702\r\n Content-Disposition: attachment; filename="431372012.pdf"\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:31:32 GMT\r\n Content-Length: 48585\r\n [Content length: 48585] \r\n [HTTP response 10/10] [Time since request: 0.404760542 seconds] [Prev request in frame: 1073] [Prev response in frame: 1135] [Request in frame: 1223] File Data: 48585 bytes Media Type Media type: application/pdf (48585 bytes) Frame 1294: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.362019309 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.362019309 seconds [Time delta from previous captured frame: 0.000045701 seconds] [Time delta from previous displayed frame: 0.000045701 seconds] [Time since reference or first frame: 103.564450456 seconds] Frame Number: 1294 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ba (54202) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 177447, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 177447 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1293] [The RTT to ACK the segment was: 0.000045701 seconds] [iRTT: 0.003305578 seconds] Frame 1319: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:28.409632426 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724288.409632426 seconds [Time delta from previous captured frame: 0.017567978 seconds] [Time delta from previous displayed frame: 10.047613117 seconds] [Time since reference or first frame: 113.612063573 seconds] Frame Number: 1319 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3bb (54203) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13099, Ack: 177447, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13099 (relative sequence number) Acknowledgment number: 177447 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1320: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:28.412355101 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724288.412355101 seconds [Time delta from previous captured frame: 0.002722675 seconds] [Time delta from previous displayed frame: 0.002722675 seconds] [Time since reference or first frame: 113.614786248 seconds] Frame Number: 1320 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: fb47cbf5 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3068 (12392) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb47e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 13100, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 177447 (relative sequence number) Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf20f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 64193 Src Port: 64193 Frame 1354: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:38.649640447 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724298.649640447 seconds [Time delta from previous captured frame: 0.468298115 seconds] [Time delta from previous displayed frame: 10.237285346 seconds] [Time since reference or first frame: 123.852071594 seconds] Frame Number: 1354 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3bc (54204) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13099, Ack: 177447, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13099 (relative sequence number) Acknowledgment number: 177447 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1355: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:38.652724908 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724298.652724908 seconds [Time delta from previous captured frame: 0.003084461 seconds] [Time delta from previous displayed frame: 0.003084461 seconds] [Time since reference or first frame: 123.855156055 seconds] Frame Number: 1355 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 5576ce1d Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3077 (12407) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb46f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 13100, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 177447 (relative sequence number) Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf20f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 22493 Src Port: 22493 Frame 1358: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.217500075 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.217500075 seconds [Time delta from previous captured frame: 0.236751841 seconds] [Time delta from previous displayed frame: 1.564775167 seconds] [Time since reference or first frame: 125.419931222 seconds] Frame Number: 1358 Frame Length: 1325 bytes (10600 bits) Capture Length: 1325 bytes (10600 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1309 Identification: 0xd3bd (54205) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4834 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 177447, Len: 1269 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1269] Sequence number: 13100 (relative sequence number) [Next sequence number: 14369 (relative sequence number)] Acknowledgment number: 177447 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1ef9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1269] [Bytes sent since last PSH flag: 1269] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1264 Encrypted Application Data: f1d1eb837385f8e09eb785d2a5446264602af9695d26248c... Hypertext Transfer Protocol GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf HTTP/1.1\r\n] [GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf Request URI Path: /racuni/pregled-racuna-pdf Request URI Query: serviceid=12018216&metaid=435518423&filename=435518423.pdf Request URI Query Parameter: serviceid=12018216 Request URI Query Parameter: metaid=435518423 Request URI Query Parameter: filename=435518423.pdf Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf] [HTTP request 11/11] [Prev request in frame: 1223] Frame 1359: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.269378822 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.269378822 seconds [Time delta from previous captured frame: 0.051878747 seconds] [Time delta from previous displayed frame: 0.051878747 seconds] [Time since reference or first frame: 125.471809969 seconds] Frame Number: 1359 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: a034ae88 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3078 (12408) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb46e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 14369, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 177447 (relative sequence number) Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe825 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1358] [The RTT to ACK the segment was: 0.051878747 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 157 Src Port: 157 Frame 1364: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548307411 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548307411 seconds [Time delta from previous captured frame: 0.198776111 seconds] [Time delta from previous displayed frame: 0.278928589 seconds] [Time since reference or first frame: 125.750738558 seconds] Frame Number: 1364 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x307a (12410) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf08 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 177447 (relative sequence number) [Next sequence number: 178827 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x59b2 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 1380] TCP segment data (1380 bytes) Secure Sockets Layer Frame 1365: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548378690 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548378690 seconds [Time delta from previous captured frame: 0.000071279 seconds] [Time delta from previous displayed frame: 0.000071279 seconds] [Time since reference or first frame: 125.750809837 seconds] Frame Number: 1365 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3be (54206) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d28 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 178827, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 178827 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1364] [The RTT to ACK the segment was: 0.000071279 seconds] [iRTT: 0.003305578 seconds] Frame 1366: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548397692 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548397692 seconds [Time delta from previous captured frame: 0.000019002 seconds] [Time delta from previous displayed frame: 0.000019002 seconds] [Time since reference or first frame: 125.750828839 seconds] Frame Number: 1366 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x307b (12411) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf07 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 178827, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 178827 (relative sequence number) [Next sequence number: 180207 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7626 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 2760] TCP segment data (1380 bytes) Frame 1367: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548418583 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548418583 seconds [Time delta from previous captured frame: 0.000020891 seconds] [Time delta from previous displayed frame: 0.000020891 seconds] [Time since reference or first frame: 125.750849730 seconds] Frame Number: 1367 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3bf (54207) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d27 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 180207, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 180207 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1366] [The RTT to ACK the segment was: 0.000020891 seconds] [iRTT: 0.003305578 seconds] Frame 1368: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548533294 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548533294 seconds [Time delta from previous captured frame: 0.000114711 seconds] [Time delta from previous displayed frame: 0.000114711 seconds] [Time since reference or first frame: 125.750964441 seconds] Frame Number: 1368 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x307c (12412) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf06 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 180207, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 180207 (relative sequence number) [Next sequence number: 181587 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x49c3 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 4140] TCP segment data (1380 bytes) Frame 1369: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548555788 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548555788 seconds [Time delta from previous captured frame: 0.000022494 seconds] [Time delta from previo