tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on en1, link-type EN10MB (Ethernet), capture size 65535 bytes
18:13:00.817973 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 3781497070, win 5318, length 0
18:13:00.818064 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 44331:45761, ack 0, win 65535, length 1430
18:13:00.818096 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 45761:47191, ack 0, win 65535, length 1430
18:13:00.898860 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 1431, win 5318, length 0
18:13:00.898938 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 47191:48621, ack 0, win 65535, length 1430
18:13:00.974794 IP 192.168.1.1.56077 > 239.255.255.250.ssdp: UDP, length 270
18:13:00.978390 IP 192.168.1.1.56077 > 239.255.255.250.ssdp: UDP, length 342
18:13:00.982016 IP 192.168.1.1.56077 > 239.255.255.250.ssdp: UDP, length 338
18:13:00.985439 IP 192.168.1.1.56077 > 239.255.255.250.ssdp: UDP, length 318
18:13:00.989141 IP 192.168.1.1.56077 > 239.255.255.250.ssdp: UDP, length 350
18:13:00.992696 IP 192.168.1.1.56077 > 239.255.255.250.ssdp: UDP, length 332
18:13:00.996257 IP 192.168.1.1.56077 > 239.255.255.250.ssdp: UDP, length 334
18:13:01.000028 IP 192.168.1.1.56077 > 239.255.255.250.ssdp: UDP, length 334
18:13:01.000042 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 2861, win 5318, length 0
18:13:01.000107 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 48621:50051, ack 0, win 65535, length 1430
18:13:01.089792 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 4291, win 5318, length 0
18:13:01.089868 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 50051:51481, ack 0, win 65535, length 1430
18:13:01.169115 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 5721, win 5318, length 0
18:13:01.169191 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 51481:52911, ack 0, win 65535, length 1430
18:13:01.253380 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 7151, win 5318, length 0
18:13:01.253453 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 52911:54341, ack 0, win 65535, length 1430
18:13:01.333448 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 8581, win 5318, length 0
18:13:01.333521 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 54341:55771, ack 0, win 65535, length 1430
18:13:01.415760 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 10011, win 5318, length 0
18:13:01.415835 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 55771:57201, ack 0, win 65535, length 1430
18:13:01.496875 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 11441, win 5318, length 0
18:13:01.496948 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 57201:58631, ack 0, win 65535, length 1430
18:13:01.579022 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 12871, win 5318, length 0
18:13:01.579099 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 58631:60061, ack 0, win 65535, length 1430
18:13:01.660031 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 14301, win 5318, length 0
18:13:01.660108 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 60061:61491, ack 0, win 65535, length 1430
18:13:01.684007 IP wg-in-f125.1e100.net.jabber-client > 192.168.1.23.50665: Flags [.], ack 1351376665, win 356, options [nop,nop,TS val 2342547704 ecr 700401747], length 0
18:13:01.684154 IP 192.168.1.23.50665 > wg-in-f125.1e100.net.jabber-client: Flags [P.], seq 1:2, ack 0, win 65535, options [nop,nop,TS val 700404298 ecr 2342547704], length 1
18:13:01.746313 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 15731, win 5318, length 0
18:13:01.746390 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 61491:62921, ack 0, win 65535, length 1430
18:13:01.777315 IP 192.168.1.23.53898 > resolver1.opendns.com.domain: 17355+ PTR? 250.255.255.239.in-addr.arpa. (46)
18:13:01.832461 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 17161, win 5318, length 0
18:13:01.832607 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 62921:64351, ack 0, win 65535, length 1430
18:13:01.910738 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 18591, win 5318, length 0
18:13:01.910811 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 64351:65781, ack 0, win 65535, length 1430
18:13:01.991783 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 20021, win 5318, length 0
18:13:01.991858 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 65781:67211, ack 0, win 65535, length 1430
18:13:02.074350 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 21451, win 5318, length 0
18:13:02.074423 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 67211:68641, ack 0, win 65535, length 1430
18:13:02.156231 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 22881, win 5318, length 0
18:13:02.156312 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 68641:70071, ack 0, win 65535, length 1430
18:13:02.235916 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 24311, win 5318, length 0
18:13:02.235990 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 70071:71501, ack 0, win 65535, length 1430
18:13:02.318036 IP wg-in-f117.1e100.net.https > 192.168.1.23.50667: Flags [.], ack 25741, win 5318, length 0
18:13:02.318113 IP 192.168.1.23.50667 > wg-in-f117.1e100.net.https: Flags [.], seq 71501:72931, ack 0, win 65535, length 1430
50 packets captured
131 packets received by filter
0 packets dropped by kernel