Répondre à la discussion

connecté en root , je tape ta commande


sh-3.2# tcpdump -c 10 host 88.141.143.38

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode

listening on en0, link-type EN10MB (Ethernet), capture size 96 bytes



C'est beau le chinois ! ^^


---------- Nouveau message ajouté à 21h00 ---------- Le message précédent a été envoyé à 20h52 ----------


0:59:11.117598 IP 192.168.1.9.50034 > 38.143.141.88.rev.sfr.net.25565: S 2383867725:2383867725(0) win 65535 <mss 1460,nop,wscale 3,nop,nop,timestamp 668322743 0,sackOK,eol>

20:59:12.073314 IP 192.168.1.9.50034 > 38.143.141.88.rev.sfr.net.25565: S 2383867725:2383867725(0) win 65535 <mss 1460,nop,wscale 3,nop,nop,timestamp 668322752 0,sackOK,eol>

20:59:13.074190 IP 192.168.1.9.50034 > 38.143.141.88.rev.sfr.net.25565: S 2383867725:2383867725(0) win 65535 <mss 1460,nop,wscale 3,nop,nop,timestamp 668322762 0,sackOK,eol>

20:59:14.075034 IP 192.168.1.9.50034 > 38.143.141.88.rev.sfr.net.25565: S 2383867725:2383867725(0) win 65535 <mss 1460,sackOK,eol>

20:59:15.075824 IP 192.168.1.9.50034 > 38.143.141.88.rev.sfr.net.25565: S 2383867725:2383867725(0) win 65535 <mss 1460,sackOK,eol>

20:59:16.076682 IP 192.168.1.9.50034 > 38.143.141.88.rev.sfr.net.25565: S 2383867725:2383867725(0) win 65535 <mss 1460,sackOK,eol>

20:59:18.078033 IP 192.168.1.9.50034 > 38.143.141.88.rev.sfr.net.25565: S 2383867725:2383867725(0) win 65535 <mss 1460,sackOK,eol>

20:59:22.081005 IP 192.168.1.9.50034 > 38.143.141.88.rev.sfr.net.25565: S 2383867725:2383867725(0) win 65535 <mss 1460,sackOK,eol>

20:59:30.086933 IP 192.168.1.9.50034 > 38.143.141.88.rev.sfr.net.25565: S 2383867725:2383867725(0) win 65535 <mss 1460,sackOK,eol>

20:59:46.099075 IP 192.168.1.9.50034 > 38.143.141.88.rev.sfr.net.25565: S 2383867725:2383867725(0) win 65535 <mss 1460,sackOK,eol>

10 packets captured

1403 packets received by filter

0 packets dropped by kernel