coolsnowwolf / lede

Lean's LEDE source
Other
29.55k stars 19.5k forks source link

请教一个旁路由联网的问题 #10759

Closed onlyJinx closed 1 year ago

onlyJinx commented 1 year ago

网络设备如图所示:

image

老毛子当无线中继去连接客厅的主路由, 所有网络设备都是静态IP地址, 如果手机连接老毛子wifiB的话(网关指向openwrt), 是可以正常使用网络, 包括翻墙, 这时候网络一切正常; 但是当我手机连接主路由wifiA的时候, 手机就无法上网, 只能访问一些内网资源, 比如文件服务器的smb共享文件夹, 还有openwrt/主路由的后台界面, 无法访问其余包括国内外所有网站, 相当于流量没法从主路由出去; 我试着按照网上的一些说法, 在openwrt防火墙里添加一条iptables -t nat -I POSTROUTING -o eth0 -j MASQUERADE 还有取消lan口桥接, 但是并没有解决问题, 想请问下还有哪里需要做修改的嘛?

MageDelfador commented 1 year ago

好像解密小游戏,我猜。。手机只在wifiB下设置了网关,连接wifiA的时候没设置网关?

onlyJinx commented 1 year ago

好像解密小游戏,我猜。。手机只在wifiB下设置了网关,连接wifiA的时候没设置网关?

不是的,所有设备的ip & 网关全都是不变的,区别只有手机去连接wifiA和B,不管连接哪个,都不变更设置

MageDelfador commented 1 year ago

好像解密小游戏,我猜。。手机只在wifiB下设置了网关,连接wifiA的时候没设置网关?

不是的,所有设备的ip & 网关全都是不变的,区别只有手机去连接wifiA和B,不管连接哪个,都不变更设置

一般手机里的ip设置是跟wifi绑定的,也就是说手机上的网关需要分别在两个wifi下都设置一次

onlyJinx commented 1 year ago

@MageDelfador 这里的老毛子(wifiB)充当的是WiFi放大器的作用,所有的流量都是交给主路由处理的。 当连接主路由wifiA时,难道是流量出现兜圈子之类的? 此时手机流量是 主路由(wifi连接)--老毛子--旁路由openwrt--老毛子--主路由--公网

MageDelfador commented 1 year ago

原来主路由才是真正网关,我猜事情是这样的 手机在wifiA下,发了一个数据包(目的IP地址:外网,源IP地址:192.168.1.10,源MAC地址:手机,目的MAC地址:Openwrt),数据包到了Openwrt,Openwrt向主路由并转发出去,然后数据包到达主路由,此时数据包是这样的(目的IP地址:外网,源IP地址:192.168.1.10,源MAC地址:Openwrt,目的MAC地址:主路由),主路由如果开启了反向路由验证功能,就会发现数据包的反向路由与入口不符(数据包入口是无线桥接,反向对192.168.1.10的路由是自己的wifi),于是丢弃数据包。 反向路由验证主要是为了防止伪造IP源地址。关闭这个功能的方法看主路由固件了。openwrt关闭的方法是echo "0">/proc/sys/net/ipv4/conf/all/rp_filter 在wifiB下,反向路由和数据包入口都是无线桥接,所以可以通过主路由的反向路由验证。

onlyJinx commented 1 year ago

是的,主路由为所有设备的网络出口,我想确认下,这个关闭反向路由验证的操作是在主路由上操作还是在旁路由(openwrt)上操作?主路由的话是运营商给的,动不了。。

MageDelfador commented 1 year ago

要在主路由操作。也可以给旁路由加NAT。在防火墙设置里,把LAN的“IP动态伪装”勾上试试。

onlyJinx commented 1 year ago

勾选了还是不行, 只能访问一些内网的资源

image

MageDelfador commented 1 year ago

我猜。。因为wan被删掉了,防火墙的配置出错导致启动失败? 命令行fw3 restart看看输出的结果正不正常

onlyJinx commented 1 year ago

结果如下:

root@OpenWrt:~# fw3 restart
 * Flushing IPv4 filter table
 * Flushing IPv4 nat table
 * Flushing IPv4 mangle table
 * Flushing IPv6 filter table
 * Flushing IPv6 nat table
 * Flushing IPv6 mangle table
 * Flushing conntrack table ...
 * Populating IPv4 filter table
   * Redirect 'jellyfin'
   * Zone 'lan'
 * Populating IPv4 nat table
   * Redirect 'jellyfin'
   * Zone 'lan'
 * Populating IPv4 mangle table
   * Zone 'lan'
 * Populating IPv6 filter table
   * Zone 'lan'
 * Populating IPv6 nat table
Warning: fw3_ipt_rule_append(): Can't find target 'prerouting_lan_rule'
Warning: fw3_ipt_rule_append(): Can't find target 'postrouting_lan_rule'
Warning: fw3_ipt_rule_append(): Can't find target 'prerouting_rule'
Warning: fw3_ipt_rule_append(): Can't find target 'postrouting_rule'
   * Zone 'lan'
 * Populating IPv6 mangle table
   * Zone 'lan'
 * Set tcp_ecn to off
 * Set tcp_syncookies to on
 * Set tcp_window_scaling to on
 * Running script '/etc/firewall.user'
 * Running script '/var/etc/adbyby.include'
   ! Skipping due to path error: No such file or directory
 * Running script '/var/etc/openclash.include'
   ! Skipping due to path error: No such file or directory
 * Running script '/var/etc/passwall2.include'
   ! Skipping due to path error: No such file or directory
 * Running script '/var/etc/passwall2_server.include'
   ! Skipping due to path error: No such file or directory
 * Running script '/var/etc/shadowsocksr.include'
   ! Skipping due to path error: No such file or directory
 * Running script '/var/etc/v2ray_server.include'
   ! Skipping due to path error: No such file or directory
 * Running script '/var/etc/vssr.include'
   ! Skipping due to path error: No such file or directory
root@OpenWrt:~#
MageDelfador commented 1 year ago

试试iptables -t nat -I POSTROUTING -j MASQUERADE 顺便再看下DNS服务器设置的对不对

onlyJinx commented 1 year ago

刚做测试的时候发现了一个问题, 就是其实流量是出的去的, 但是只能打开国外的网页, 比如我的vps伪装域名, 我几台服务器web页面都可以打开, 但是国内的域名全部打不开; 为了排除干扰已经将旁路由的所有翻墙插件都关闭了. DNS设置的话, 旁路由指向主路由(192.168.1.1), 网络正常; 手机的DNS和网关都是指向旁路由(192.168.1.200) 下面这条iptables规则刚测试了加不加都是一样的结果

root@OpenWrt:~# iptables -t nat -nvL POSTROUTING
Chain POSTROUTING (policy ACCEPT 23 packets, 1620 bytes)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 SNAT       tcp  --  *      *       0.0.0.0/0            192.168.1.203        tcp dpt:3389 to:192.168.1.200
    0     0 SNAT       udp  --  *      *       0.0.0.0/0            192.168.1.203        udp dpt:3389 to:192.168.1.200
  189 14832 MASQUERADE  all  --  *      eth0    0.0.0.0/0            0.0.0.0/0           
   23  1620 postrouting_rule  all  --  *      *       0.0.0.0/0            0.0.0.0/0            /* !fw3: Custom postrouting rule chain */
    0     0 zone_lan_postrouting  all  --  *      eth0    0.0.0.0/0            0.0.0.0/0            /* !fw3 */
root@OpenWrt:~# 

网卡为eth0

root@OpenWrt:~# ip addr
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether b2:12:0f:6e:32:2d brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.200/24 brd 192.168.1.255 scope global eth0
       valid_lft forever preferred_lft forever
    inet6 fe80::b012:fff:fe6e:322d/64 scope link 
       valid_lft forever preferred_lft forever
3: sit0@NONE: <NOARP> mtu 1480 qdisc noop state DOWN group default qlen 1000
    link/sit 0.0.0.0 brd 0.0.0.0
root@OpenWrt:~# 
MageDelfador commented 1 year ago

想了半天,没什么思路 看下路由表吧 然后旁路由上tcpdump抓个包看看 现在仍然是连主路由不正常 连老毛子完全正常吗

MageDelfador commented 1 year ago

不用域名直接用ip访问国内网站试一下

onlyJinx commented 1 year ago

想了半天,没什么思路 看下路由表吧 然后旁路由上tcpdump抓个包看看 现在仍然是连主路由不正常 连老毛子完全正常吗

是的, 现在的情况就是 -- 手机连接连接老毛子wifiB(192.168.1.199)时, 可以正常上网以及使用旁路由的代理功能 -- 手机连接主路由(192.168.1.1)时, 只能打开我的v2ray的伪装网站界面(确认不是浏览器缓存问题,服务端可以看到访问日志) 但是手机打开v2rayN代理全局流量时网络就都正常了, 有那种只有访问我vps服务器的流量才能正常通行... -- 旁路由上已经关闭了ssrp -- 国内域名或者IP都无法打开 -- 我稍后再全新安装一次openwrt, 在保持所有设置都是初始值的时候再测试下

以上手机的ip & 网关 & dns设置都是指向旁路由192.168.1.200

onlyJinx commented 1 year ago

当前路由表 & 防火墙规则

192 168 1 200_cgi-bin_luci_admin_status_iptables 192 168 1 200_cgi-bin_luci_admin_status_routes

onlyJinx commented 1 year ago

我把电脑连接到主路由里做了路由跟踪,人都傻了.

首先重新装了openwrt(不保留任何配置), ip 192.168.1.111, 网关和主路由都指向主路由192.168.1.1 Transparent 是我的另一台debian

电脑(192.168.1.11)上网关&DNS都是指向新装的openwrt,对我的vps ip地址进行路由跟踪的时候, 发现他的流量会跑到我的debian上去, 然后就正常的跑出去了, 跟踪其余的ip都是全部超时, 到网关这一步都没有, 搞不明白为什么vps的跟踪路径会是经过debian的, 按照我的理解应该是 电脑 --> openwrt(192.168.1.111) --> 主路由 --> 外网 中间都不需要经过debian的

C:\Users\Na>tracert xxxxx.xyz

通过最多 30 个跃点跟踪
到 xxxxx.xyz [x.x.x.105] 的路由:

  1    59 ms    34 ms     4 ms  Transparent [192.168.1.250]
  2    31 ms     4 ms     4 ms  TianYi.Home [192.168.1.1]
  3   168 ms    17 ms     7 ms  119.131.128.1
  4    12 ms     7 ms     7 ms  x.x.36.169
  5    30 ms     8 ms     8 ms  x.x.34.45
  6     *        8 ms     *     202.97.94.142
  7    86 ms     8 ms     8 ms  202.97.94.114
  8    11 ms     7 ms     9 ms  59.43.244.141
  9   161 ms   161 ms   174 ms  59.43.182.77
 10   195 ms   168 ms   176 ms  218.30.48.146
 11   174 ms   173 ms     *     lax1-fatpipe-2.it7.net [x.x.70.235]
 12     *        *        *     请求超时。
 13   185 ms   163 ms   162 ms  xxxxx.xyz [x.x.x.105]

跟踪完成。

C:\Users\Na>tracert baidu.com

通过最多 30 个跃点跟踪
到 baidu.com [39.156.66.10] 的路由:

  1     *        *        *     请求超时。
  2     *        *        *     请求超时。
  3     *        *        *     请求超时。
  4     *        *        *     请求超时。
  5     *        *        *     请求超时。
  6     *        *        *     请求超时。
  7     *        *        *     请求超时。
  8     *        *        *     请求超时。
  9     *        *        *     请求超时。
 10     *        *        *     请求超时。
 11     *        *        *     请求超时。
 12     *        *        *     请求超时。
 13     *        *        *     请求超时。
 14     *        *        *     请求超时。
 15     *        *        *     请求超时。
 16     *        *        *     请求超时。
 17     *        *        *     请求超时。
 18     *        *        *     请求超时。
 19     *        *        *     请求超时。
 20     *        *        *     请求超时。
 21     *        *        *     请求超时。

电脑的网络配置

11

openwrt的网络配置

image

MageDelfador commented 1 year ago

所以这个Transparent是接在哪里的?也是连接的老毛子吗 老毛子本身除了无线桥接有没有其他设置? 建议电脑、openwrt、老毛子都抓包看看

onlyJinx commented 1 year ago

是的,Transparent也是放在老毛子下面的 老毛子开了ap模式之后, 是做不了设置的 image

老毛子流量是直接走主路由的

[JDC-1 /opt/home/admin]# traceroute baidu.com
traceroute to baidu.com (39.156.66.10), 30 hops max, 38 byte packets
 1  TianYi.Home (192.168.1.1)  2.300 ms  2.700 ms  2.220 ms
 2  119.131.128.1 (119.131.128.1)  4.280 ms  4.380 ms  3.700 ms
 3  14.147.5.114 (14.147.5.114)  6.280 ms  14.147.10.214 (14.147.10.214)  6.960 ms  14.147.5.114 (14.147.5.114)  14.540 ms
 4  14.147.11.145 (14.147.11.145)  5.320 ms  14.147.10.225 (14.147.10.225)  5.880 ms  14.147.4.113 (14.147.4.113)  5.120 ms
 5  202.97.44.161 (202.97.44.161)  35.920 ms  202.97.22.149 (202.97.22.149)  38.860 ms  *
 6  202.97.17.66 (202.97.17.66)  36.880 ms  202.97.17.62 (202.97.17.62)  38.620 ms  202.97.17.94 (202.97.17.94)  40.600 ms
 7  221.183.128.141 (221.183.128.141)  39.360 ms  36.800 ms  221.183.95.173 (221.183.95.173)  38.780 ms
 8  221.183.94.25 (221.183.94.25)  40.920 ms  39.060 ms  221.183.94.21 (221.183.94.21)  38.840 ms
 9  221.183.49.134 (221.183.49.134)  41.720 ms  221.183.49.138 (221.183.49.138)  38.080 ms  *
10  *  111.13.188.38 (111.13.188.38)  40.540 ms  111.13.0.174 (111.13.0.174)  40.240 ms
11  39.156.27.1 (39.156.27.1)  40.700 ms  *  41.420 ms

openwrt也是走主路由的

BusyBox v1.35.0 (2022-12-23 17:26:46 UTC) built-in shell (ash)

     _________
    /        /\      _    ___ ___  ___
   /  LE    /  \    | |  | __|   \| __|
  /    DE  /    \   | |__| _|| |) | _|
 /________/  LE  \  |____|___|___/|___|
 \        \   DE /
  \    LE  \    /  -------------------------------------------
   \  DE    \  /    OpenWrt SNAPSHOT, r5619-5acc56143
    \________\/    -------------------------------------------

root@OpenWrt:~# traceroute baidu.com
traceroute to baidu.com (39.156.66.10), 30 hops max, 46 byte packets
 1  192.168.1.1 (192.168.1.1)  3.229 ms  2.557 ms  2.522 ms
 2  119.131.128.1 (119.131.128.1)  23.449 ms  4.406 ms  2.902 ms
 3  14.147.9.130 (14.147.9.130)  5.479 ms  183.56.36.173 (183.56.36.173)  9.876 ms  12.431 ms
 4  113.98.75.165 (113.98.75.165)  32.583 ms  14.147.4.113 (14.147.4.113)  5.373 ms  6.068 ms
 5  202.97.100.9 (202.97.100.9)  44.781 ms  202.97.55.241 (202.97.55.241)  41.572 ms  202.97.109.190 (202.97.109.190)  37.416 ms
 6  202.97.17.74 (202.97.17.74)  39.399 ms  202.97.17.66 (202.97.17.66)  38.903 ms  202.97.17.94 (202.97.17.94)  43.025 ms
 7  221.183.86.45 (221.183.86.45)  39.128 ms  43.876 ms  *
 8  221.183.94.25 (221.183.94.25)  41.152 ms  39.309 ms  221.183.94.21 (221.183.94.21)  43.767 ms
 9  221.183.49.142 (221.183.49.142)  41.346 ms  221.183.49.138 (221.183.49.138)  38.516 ms  39.054 ms
10  111.13.188.38 (111.13.188.38)  42.110 ms  42.384 ms  39.156.27.1 (39.156.27.1)  41.567 ms
MageDelfador commented 1 year ago

不抓包的话 我猜不出还有哪里有问题

onlyJinx commented 1 year ago

抓包数据来了

下面我分为两种请将情景抓包:

第一种: 手机连接主路由wifiA, 然后把网关和DNS设置为旁路由192.168.1.200(此时网络故障) 第二种: 手机连接老毛子wifiB, 然后把网关和DNS设置为旁路由192.168.1.200(此时网络正常)

这是第一种: 下面为旁路由openwrt(192.168.1.200)的日志,不知道为什么, Transparent同样也会产生日志,这个时候是网络不通的

root@OpenWrt:~# tcpdump -s 0 -i eth0  port 443 or 80
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
20:07:26.050442 IP 192.168.1.10.48038 > 120.232.51.154.80: Flags [S], seq 72027684, win 65535, options [mss 1400,sackOK,TS val 4209981840 ecr 0,nop,wscale 10], length 0
20:07:26.347032 IP 192.168.1.10.51108 > szshort.weixin.qq.com.80: Flags [S], seq 2542776088, win 65535, options [mss 1400,sackOK,TS val 1891889376 ecr 0,nop,wscale 10], length 0
20:07:26.570372 IP 192.168.1.10.35144 > 183.60.8.218.80: Flags [S], seq 4141095502, win 65535, options [mss 1400,sackOK,TS val 219859846 ecr 0,nop,wscale 10], length 0
20:07:26.598120 IP 192.168.1.10.58704 > 183.60.8.69.80: Flags [S], seq 3394346461, win 65535, options [mss 1400,sackOK,TS val 308498730 ecr 0,nop,wscale 10], length 0
20:07:26.791387 IP 192.168.1.10.52704 > 36.103.232.140.80: Flags [S], seq 1583204484, win 65535, options [mss 1460,sackOK,TS val 3879612480 ecr 0,nop,wscale 10], length 0
20:07:26.791388 IP 192.168.1.10.52358 > connectivity.samsung.com.cn.443: Flags [S], seq 1734796193, win 65535, options [mss 1460,sackOK,TS val 1440929971 ecr 0,nop,wscale 10], length 0
20:07:26.854331 IP 192.168.1.10.56908 > 183.47.124.77.80: Flags [S], seq 3087601997, win 65535, options [mss 1400,sackOK,TS val 364758355 ecr 0,nop,wscale 10], length 0
20:07:27.081708 IP 192.168.1.10.48038 > 120.232.51.154.80: Flags [S], seq 72027684, win 65535, options [mss 1400,sackOK,TS val 4209982868 ecr 0,nop,wscale 10], length 0
20:07:27.367169 IP 192.168.1.10.51108 > szshort.weixin.qq.com.80: Flags [S], seq 2542776088, win 65535, options [mss 1400,sackOK,TS val 1891890401 ecr 0,nop,wscale 10], length 0
20:07:27.593608 IP 192.168.1.10.54934 > 110.76.8.204.443: Flags [S], seq 4250216857, win 65535, options [mss 1400,sackOK,TS val 2304553169 ecr 0,nop,wscale 10], length 0
20:07:27.811590 IP 192.168.1.10.36958 > 180.97.34.146.80: Flags [S], seq 1778919700, win 65535, options [mss 1460,sackOK,TS val 2189941262 ecr 0,nop,wscale 10], length 0
20:07:31.403958 IP 192.168.1.10.53718 > nms-m0-cn1.mdc-prd.cn.443: Flags [S], seq 3845682437, win 65535, options [mss 1460,sackOK,TS val 2497542902 ecr 0,nop,wscale 10], length 0
20:07:31.659314 IP 192.168.1.10.54934 > 110.76.8.204.443: Flags [S], seq 4250216857, win 65535, options [mss 1400,sackOK,TS val 2304557233 ecr 0,nop,wscale 10], length 0
20:07:31.883939 IP 192.168.1.10.41296 > 157.148.59.239.80: Flags [S], seq 698061538, win 65535, options [mss 1400,sackOK,TS val 3248493339 ecr 0,nop,wscale 10], length 0
20:07:33.197167 IP 192.168.1.10.48038 > 120.232.51.154.80: Flags [S], seq 72027684, win 65535, options [mss 1400,sackOK,TS val 4209988981 ecr 0,nop,wscale 10], length 0
20:07:33.451527 IP 192.168.1.10.51108 > szshort.weixin.qq.com.80: Flags [S], seq 2542776088, win 65535, options [mss 1400,sackOK,TS val 1891896481 ecr 0,nop,wscale 10], length 0
20:07:34.378919 IP 192.168.1.10.41738 > www.google.com.443: UDP, length 1250
20:07:34.418664 IP 192.168.1.10.54058 > safebrowsing.google.com.443: Flags [S], seq 1464341530, win 65535, options [mss 1460,sackOK,TS val 4097958962 ecr 0,nop,wscale 10], length 0
20:07:36.502738 IP 192.168.1.10.41738 > www.google.com.443: UDP, length 1250
20:07:36.682992 IP 192.168.1.10.51736 > www.google.com.443: Flags [S], seq 4214884307, win 65535, options [mss 1460,sackOK,TS val 204711180 ecr 0,nop,wscale 10], length 0
20:07:36.742714 IP 192.168.1.10.33120 > 121.40.206.159.443: Flags [S], seq 3499225937, win 65535, options [mss 1460,sackOK,TS val 265423285 ecr 0,nop,wscale 10], length 0
20:07:36.926270 IP 192.168.1.10.51740 > www.google.com.443: Flags [S], seq 2807327533, win 65535, options [mss 1460,sackOK,TS val 204711424 ecr 0,nop,wscale 10], length 0
20:07:36.978041 IP 192.168.1.10.51742 > www.google.com.443: Flags [S], seq 2594324269, win 65535, options [mss 1460,sackOK,TS val 204711476 ecr 0,nop,wscale 10], length 0
20:07:37.222426 IP 192.168.1.10.47322 > 101.227.132.126.443: Flags [S], seq 1704954101, win 65535, options [mss 1460,sackOK,TS val 1240055749 ecr 0,nop,wscale 10], length 0
20:07:37.283095 IP 192.168.1.10.51748 > www.google.com.443: Flags [S], seq 2120051268, win 65535, options [mss 1460,sackOK,TS val 204711781 ecr 0,nop,wscale 10], length 0
20:07:37.286000 IP 192.168.1.10.37424 > gear.sca.samsung.cn.443: Flags [S], seq 1646846100, win 65535, options [mss 1460,sackOK,TS val 673469362 ecr 0,nop,wscale 10], length 0
20:07:37.286001 IP 192.168.1.10.48758 > 203.209.230.36.443: Flags [S], seq 3566581355, win 65535, options [mss 1400,sackOK,TS val 198879192 ecr 0,nop,wscale 10], length 0
20:07:37.330881 IP 192.168.1.10.42540 > clientservices.googleapis.com.443: UDP, length 1250
20:07:37.330883 IP 192.168.1.10.49596 > clientservices.googleapis.com.443: Flags [S], seq 1620362195, win 65535, options [mss 1460,sackOK,TS val 3778719150 ecr 0,nop,wscale 10], length 0
20:07:37.445304 IP 192.168.1.10.54058 > safebrowsing.google.com.443: Flags [S], seq 1464341530, win 65535, options [mss 1460,sackOK,TS val 4097961989 ecr 0,nop,wscale 10], length 0
20:07:37.569467 IP 192.168.1.10.50772 > 220.181.174.98.80: Flags [S], seq 3108022790, win 65535, options [mss 1460,sackOK,TS val 226828101 ecr 0,nop,wscale 10], length 0
20:07:37.591497 IP 192.168.1.10.49600 > clientservices.googleapis.com.443: Flags [S], seq 3945347259, win 65535, options [mss 1460,sackOK,TS val 3778719411 ecr 0,nop,wscale 10], length 0
20:07:37.605104 IP 192.168.1.10.48258 > 36.103.232.129.443: Flags [S], seq 1261352372, win 65535, options [mss 1460,sackOK,TS val 1302348874 ecr 0,nop,wscale 10], length 0
20:07:37.605105 IP 192.168.1.10.45316 > 36.103.232.129.80: Flags [S], seq 3530263251, win 65535, options [mss 1460,sackOK,TS val 1302348874 ecr 0,nop,wscale 10], length 0
20:07:37.639097 IP 192.168.1.10.42540 > clientservices.googleapis.com.443: UDP, length 1250
20:07:37.703065 IP 192.168.1.10.54064 > safebrowsing.google.com.443: Flags [S], seq 2024331871, win 65535, options [mss 1460,sackOK,TS val 4097962245 ecr 0,nop,wscale 10], length 0
20:07:37.953802 IP 192.168.1.10.51756 > www.google.com.443: Flags [S], seq 2175868250, win 65535, options [mss 1460,sackOK,TS val 204712451 ecr 0,nop,wscale 10], length 0
20:07:37.971520 IP 192.168.1.10.33036 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 656103490, win 65535, options [mss 1460,sackOK,TS val 3226159285 ecr 0,nop,wscale 10], length 0
20:07:37.997546 IP 192.168.1.10.34632 > m.facebook.com.443: Flags [S], seq 2510077081, win 65535, options [mss 1460,sackOK,TS val 1858462911 ecr 0,nop,wscale 10], length 0
20:07:38.172941 IP 192.168.1.10.58520 > szextshort.weixin.qq.com.80: Flags [S], seq 2214254207, win 65535, options [mss 1400,sackOK,TS val 3092140435 ecr 0,nop,wscale 10], length 0
20:07:38.229894 IP 192.168.1.10.33042 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 430857714, win 65535, options [mss 1460,sackOK,TS val 3226159543 ecr 0,nop,wscale 10], length 0
20:07:38.238417 IP 192.168.1.10.42540 > clientservices.googleapis.com.443: UDP, length 1250
20:07:38.254730 IP 192.168.1.10.34638 > m.facebook.com.443: Flags [S], seq 1206859231, win 65535, options [mss 1460,sackOK,TS val 1858463168 ecr 0,nop,wscale 10], length 0
20:07:38.309854 IP 192.168.1.10.51748 > www.google.com.443: Flags [S], seq 2120051268, win 65535, options [mss 1460,sackOK,TS val 204712808 ecr 0,nop,wscale 10], length 0
20:07:38.341085 IP 192.168.1.10.49596 > clientservices.googleapis.com.443: Flags [S], seq 1620362195, win 65535, options [mss 1460,sackOK,TS val 3778720160 ecr 0,nop,wscale 10], length 0
20:07:38.362976 IP 192.168.1.10.41898 > mail.xxxxxx.com.cn.443: Flags [S], seq 1655601765, win 65535, options [mss 1460,sackOK,TS val 1610960660 ecr 0,nop,wscale 10], length 0
20:07:38.381595 IP 192.168.1.10.41738 > www.google.com.443: UDP, length 1250
20:07:38.597347 IP 192.168.1.10.49600 > clientservices.googleapis.com.443: Flags [S], seq 3945347259, win 65535, options [mss 1460,sackOK,TS val 3778720416 ecr 0,nop,wscale 10], length 0
20:07:38.597447 IP 192.168.1.10.50772 > 220.181.174.98.80: Flags [S], seq 3108022790, win 65535, options [mss 1460,sackOK,TS val 226829129 ecr 0,nop,wscale 10], length 0
20:07:38.693482 IP 192.168.1.10.51736 > www.google.com.443: Flags [S], seq 4214884307, win 65535, options [mss 1460,sackOK,TS val 204713192 ecr 0,nop,wscale 10], length 0
20:07:38.758767 IP 192.168.1.10.33120 > 121.40.206.159.443: Flags [S], seq 3499225937, win 65535, options [mss 1460,sackOK,TS val 265425301 ecr 0,nop,wscale 10], length 0
20:07:38.950152 IP 192.168.1.10.51740 > www.google.com.443: Flags [S], seq 2807327533, win 65535, options [mss 1460,sackOK,TS val 204713448 ecr 0,nop,wscale 10], length 0
20:07:38.950153 IP 192.168.1.10.51756 > www.google.com.443: Flags [S], seq 2175868250, win 65535, options [mss 1460,sackOK,TS val 204713449 ecr 0,nop,wscale 10], length 0
20:07:38.975999 IP 192.168.1.10.47348 > 101.227.132.126.443: Flags [S], seq 1151113391, win 65535, options [mss 1460,sackOK,TS val 1240057503 ecr 0,nop,wscale 10], length 0
20:07:38.977322 IP 192.168.1.10.47350 > 101.227.132.126.443: Flags [S], seq 525243747, win 65535, options [mss 1460,sackOK,TS val 1240057505 ecr 0,nop,wscale 10], length 0
20:07:38.977323 IP 192.168.1.10.47352 > 101.227.132.126.443: Flags [S], seq 165909, win 65535, options [mss 1460,sackOK,TS val 1240057505 ecr 0,nop,wscale 10], length 0
20:07:38.982527 IP 192.168.1.10.33036 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 656103490, win 65535, options [mss 1460,sackOK,TS val 3226160294 ecr 0,nop,wscale 10], length 0
20:07:38.982527 IP 192.168.1.10.51742 > www.google.com.443: Flags [S], seq 2594324269, win 65535, options [mss 1460,sackOK,TS val 204713480 ecr 0,nop,wscale 10], length 0
20:07:39.017436 IP 192.168.1.10.34632 > m.facebook.com.443: Flags [S], seq 2510077081, win 65535, options [mss 1460,sackOK,TS val 1858463930 ecr 0,nop,wscale 10], length 0
20:07:39.045554 IP 192.168.1.10.55906 > www.google.com.443: UDP, length 1250
20:07:39.173403 IP 192.168.1.10.58520 > szextshort.weixin.qq.com.80: Flags [S], seq 2214254207, win 65535, options [mss 1400,sackOK,TS val 3092141435 ecr 0,nop,wscale 10], length 0
20:07:39.238098 IP 192.168.1.10.33042 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 430857714, win 65535, options [mss 1460,sackOK,TS val 3226160550 ecr 0,nop,wscale 10], length 0
20:07:39.238099 IP 192.168.1.10.47322 > 101.227.132.126.443: Flags [S], seq 1704954101, win 65535, options [mss 1460,sackOK,TS val 1240057765 ecr 0,nop,wscale 10], length 0
20:07:39.270483 IP 192.168.1.10.34638 > m.facebook.com.443: Flags [S], seq 1206859231, win 65535, options [mss 1460,sackOK,TS val 1858464182 ecr 0,nop,wscale 10], length 0
20:07:39.301346 IP 192.168.1.10.37424 > gear.sca.samsung.cn.443: Flags [S], seq 1646846100, win 65535, options [mss 1460,sackOK,TS val 673471378 ecr 0,nop,wscale 10], length 0
20:07:39.350768 IP 192.168.1.10.55906 > www.google.com.443: UDP, length 1250
20:07:39.350769 IP 192.168.1.10.51776 > www.google.com.443: Flags [S], seq 2676063872, win 65535, options [mss 1460,sackOK,TS val 204713850 ecr 0,nop,wscale 10], length 0
20:07:39.366372 IP 192.168.1.10.41898 > mail.xxxxxx.com.cn.443: Flags [S], seq 1655601765, win 65535, options [mss 1460,sackOK,TS val 1610961662 ecr 0,nop,wscale 10], length 0
20:07:39.446552 IP 192.168.1.10.42540 > clientservices.googleapis.com.443: UDP, length 1250
20:07:39.852064 IP 192.168.1.10.54934 > 110.76.8.204.443: Flags [S], seq 4250216857, win 65535, options [mss 1400,sackOK,TS val 2304565426 ecr 0,nop,wscale 10], length 0
20:07:39.960505 IP 192.168.1.10.55906 > www.google.com.443: UDP, length 1250
20:07:39.973461 IP 192.168.1.10.47352 > 101.227.132.126.443: Flags [S], seq 165909, win 65535, options [mss 1460,sackOK,TS val 1240058501 ecr 0,nop,wscale 10], length 0
20:07:39.973462 IP 192.168.1.10.47348 > 101.227.132.126.443: Flags [S], seq 1151113391, win 65535, options [mss 1460,sackOK,TS val 1240058501 ecr 0,nop,wscale 10], length 0
20:07:39.973463 IP 192.168.1.10.47350 > 101.227.132.126.443: Flags [S], seq 525243747, win 65535, options [mss 1460,sackOK,TS val 1240058501 ecr 0,nop,wscale 10], length 0
20:07:40.234312 IP 192.168.1.10.51170 > szshort.weixin.qq.com.80: Flags [S], seq 3417478205, win 65535, options [mss 1400,sackOK,TS val 1891903270 ecr 0,nop,wscale 10], length 0
20:07:40.254127 IP 192.168.1.10.58730 > api.appcenter.ms.443: Flags [S], seq 1102430898, win 65535, options [mss 1460,sackOK,TS val 24745259 ecr 0,nop,wscale 10], length 0
20:07:40.325496 IP 192.168.1.10.51748 > www.google.com.443: Flags [S], seq 2120051268, win 65535, options [mss 1460,sackOK,TS val 204714824 ecr 0,nop,wscale 10], length 0
20:07:40.357559 IP 192.168.1.10.49596 > clientservices.googleapis.com.443: Flags [S], seq 1620362195, win 65535, options [mss 1460,sackOK,TS val 3778722176 ecr 0,nop,wscale 10], length 0
20:07:40.357560 IP 192.168.1.10.51776 > www.google.com.443: Flags [S], seq 2676063872, win 65535, options [mss 1460,sackOK,TS val 204714856 ecr 0,nop,wscale 10], length 0
20:07:40.619451 IP 192.168.1.10.50772 > 220.181.174.98.80: Flags [S], seq 3108022790, win 65535, options [mss 1460,sackOK,TS val 226831145 ecr 0,nop,wscale 10], length 0
20:07:40.678323 IP 192.168.1.10.58540 > szextshort.weixin.qq.com.80: Flags [S], seq 954892822, win 65535, options [mss 1400,sackOK,TS val 3092142940 ecr 0,nop,wscale 10], length 0
20:07:40.971275 IP 192.168.1.10.51756 > www.google.com.443: Flags [S], seq 2175868250, win 65535, options [mss 1460,sackOK,TS val 204715464 ecr 0,nop,wscale 10], length 0
20:07:40.997721 IP 192.168.1.10.33036 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 656103490, win 65535, options [mss 1460,sackOK,TS val 3226162310 ecr 0,nop,wscale 10], length 0
20:07:41.031748 IP 192.168.1.10.34632 > m.facebook.com.443: Flags [S], seq 2510077081, win 65535, options [mss 1460,sackOK,TS val 1858465942 ecr 0,nop,wscale 10], length 0
20:07:41.166417 IP 192.168.1.10.55906 > www.google.com.443: UDP, length 1250
20:07:41.190551 IP 192.168.1.10.58520 > szextshort.weixin.qq.com.80: Flags [S], seq 2214254207, win 65535, options [mss 1400,sackOK,TS val 3092143451 ecr 0,nop,wscale 10], length 0
20:07:41.253484 IP 192.168.1.10.58730 > api.appcenter.ms.443: Flags [S], seq 1102430898, win 65535, options [mss 1460,sackOK,TS val 24746259 ecr 0,nop,wscale 10], length 0
20:07:41.253486 IP 192.168.1.10.51170 > szshort.weixin.qq.com.80: Flags [S], seq 3417478205, win 65535, options [mss 1400,sackOK,TS val 1891904289 ecr 0,nop,wscale 10], length 0
20:07:41.253486 IP 192.168.1.10.33042 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 430857714, win 65535, options [mss 1460,sackOK,TS val 3226162566 ecr 0,nop,wscale 10], length 0
20:07:41.293280 IP 192.168.1.10.34638 > m.facebook.com.443: Flags [S], seq 1206859231, win 65535, options [mss 1460,sackOK,TS val 1858466198 ecr 0,nop,wscale 10], length 0
20:07:41.381268 IP 192.168.1.10.41898 > mail.xxxxxx.com.cn.443: Flags [S], seq 1655601765, win 65535, options [mss 1460,sackOK,TS val 1610963678 ecr 0,nop,wscale 10], length 0
20:07:41.638447 IP 192.168.1.10.45316 > 36.103.232.129.80: Flags [S], seq 3530263251, win 65535, options [mss 1460,sackOK,TS val 1302352906 ecr 0,nop,wscale 10], length 0
20:07:41.638448 IP 192.168.1.10.48258 > 36.103.232.129.443: Flags [S], seq 1261352372, win 65535, options [mss 1460,sackOK,TS val 1302352906 ecr 0,nop,wscale 10], length 0
20:07:41.638448 IP 192.168.1.10.54058 > safebrowsing.google.com.443: Flags [S], seq 1464341530, win 65535, options [mss 1460,sackOK,TS val 4097966181 ecr 0,nop,wscale 10], length 0
20:07:41.705189 IP 192.168.1.10.58540 > szextshort.weixin.qq.com.80: Flags [S], seq 954892822, win 65535, options [mss 1400,sackOK,TS val 3092143967 ecr 0,nop,wscale 10], length 0
20:07:41.807269 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [S], seq 1441237628, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
20:07:41.807389 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [S.], seq 2995082957, ack 1441237629, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
20:07:41.808436 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 1, win 1026, length 0
20:07:41.809206 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [P.], seq 1:509, ack 1, win 1026, length 508: HTTP: GET /cgi-bin/luci/admin/status/overview?status=1&_=0.3913993296149474 HTTP/1.1
20:07:41.809288 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:41.893131 IP 192.168.1.10.54064 > safebrowsing.google.com.443: Flags [S], seq 2024331871, win 65535, options [mss 1460,sackOK,TS val 4097966437 ecr 0,nop,wscale 10], length 0
20:07:41.989188 IP 192.168.1.10.47348 > 101.227.132.126.443: Flags [S], seq 1151113391, win 65535, options [mss 1460,sackOK,TS val 1240060517 ecr 0,nop,wscale 10], length 0
20:07:41.989188 IP 192.168.1.10.47352 > 101.227.132.126.443: Flags [S], seq 165909, win 65535, options [mss 1460,sackOK,TS val 1240060517 ecr 0,nop,wscale 10], length 0
20:07:41.989189 IP 192.168.1.10.47350 > 101.227.132.126.443: Flags [S], seq 525243747, win 65535, options [mss 1460,sackOK,TS val 1240060517 ecr 0,nop,wscale 10], length 0
20:07:41.991598 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [P.], seq 1:70, ack 509, win 501, length 69: HTTP: HTTP/1.1 200 OK
20:07:42.037098 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 70, win 1026, length 0
20:07:42.037157 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [P.], seq 70:888, ack 509, win 501, length 818: HTTP
20:07:42.082919 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:42.380078 IP 192.168.1.10.51776 > www.google.com.443: Flags [S], seq 2676063872, win 65535, options [mss 1460,sackOK,TS val 204716872 ecr 0,nop,wscale 10], length 0
20:07:42.748040 IP 192.168.1.10.51176 > szshort.weixin.qq.com.80: Flags [S], seq 140454774, win 65535, options [mss 1400,sackOK,TS val 1891905778 ecr 0,nop,wscale 10], length 0
20:07:42.888621 IP 192.168.1.10.34658 > m.facebook.com.443: Flags [S], seq 295212418, win 65535, options [mss 1460,sackOK,TS val 1858467802 ecr 0,nop,wscale 10], length 0
20:07:42.896114 IP 192.168.1.10.37630 > baidu.com.80: Flags [S], seq 3096043437, win 65535, options [mss 1460,sackOK,TS val 697373879 ecr 0,nop,wscale 10], length 0
20:07:42.900335 IP 192.168.1.10.37632 > baidu.com.80: Flags [S], seq 3316573468, win 65535, options [mss 1460,sackOK,TS val 697373884 ecr 0,nop,wscale 10], length 0
20:07:42.918691 IP 192.168.1.10.33120 > 121.40.206.159.443: Flags [S], seq 3499225937, win 65535, options [mss 1460,sackOK,TS val 265429461 ecr 0,nop,wscale 10], length 0
20:07:42.918692 IP 192.168.1.10.51736 > www.google.com.443: Flags [S], seq 4214884307, win 65535, options [mss 1460,sackOK,TS val 204717416 ecr 0,nop,wscale 10], length 0
20:07:43.054431 IP 192.168.1.10.55906 > www.google.com.443: UDP, length 1250
20:07:43.091667 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:43.092664 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:43.135059 IP 192.168.1.10.37634 > baidu.com.80: Flags [S], seq 2599128669, win 65535, options [mss 1460,sackOK,TS val 697374119 ecr 0,nop,wscale 10], length 0
20:07:43.173346 IP 192.168.1.10.51742 > www.google.com.443: Flags [S], seq 2594324269, win 65535, options [mss 1460,sackOK,TS val 204717672 ecr 0,nop,wscale 10], length 0
20:07:43.173347 IP 192.168.1.10.36958 > 180.97.34.146.80: Flags [S], seq 1778919700, win 65535, options [mss 1460,sackOK,TS val 2189956623 ecr 0,nop,wscale 10], length 0
20:07:43.173348 IP 192.168.1.10.51740 > www.google.com.443: Flags [S], seq 2807327533, win 65535, options [mss 1460,sackOK,TS val 204717672 ecr 0,nop,wscale 10], length 0
20:07:43.183894 IP 192.168.1.10.58102 > 157.148.61.213.80: Flags [S], seq 3433459971, win 65535, options [mss 1400,sackOK,TS val 3141397136 ecr 0,nop,wscale 10], length 0
20:07:43.198818 IP 192.168.1.10.33074 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 3773690983, win 65535, options [mss 1460,sackOK,TS val 3226164512 ecr 0,nop,wscale 10], length 0
20:07:43.269278 IP 192.168.1.10.58730 > api.appcenter.ms.443: Flags [S], seq 1102430898, win 65535, options [mss 1460,sackOK,TS val 24748275 ecr 0,nop,wscale 10], length 0
20:07:43.269278 IP 192.168.1.10.51170 > szshort.weixin.qq.com.80: Flags [S], seq 3417478205, win 65535, options [mss 1400,sackOK,TS val 1891906305 ecr 0,nop,wscale 10], length 0
20:07:43.429909 IP 192.168.1.10.47322 > 101.227.132.126.443: Flags [S], seq 1704954101, win 65535, options [mss 1460,sackOK,TS val 1240061957 ecr 0,nop,wscale 10], length 0
20:07:43.723913 IP 192.168.1.10.58540 > szextshort.weixin.qq.com.80: Flags [S], seq 954892822, win 65535, options [mss 1400,sackOK,TS val 3092145979 ecr 0,nop,wscale 10], length 0
20:07:43.750104 IP 192.168.1.10.51176 > szshort.weixin.qq.com.80: Flags [S], seq 140454774, win 65535, options [mss 1400,sackOK,TS val 1891906785 ecr 0,nop,wscale 10], length 0
20:07:43.909385 IP 192.168.1.10.37630 > baidu.com.80: Flags [S], seq 3096043437, win 65535, options [mss 1460,sackOK,TS val 697374893 ecr 0,nop,wscale 10], length 0
20:07:43.909386 IP 192.168.1.10.34658 > m.facebook.com.443: Flags [S], seq 295212418, win 65535, options [mss 1460,sackOK,TS val 1858468822 ecr 0,nop,wscale 10], length 0
20:07:43.909386 IP 192.168.1.10.37632 > baidu.com.80: Flags [S], seq 3316573468, win 65535, options [mss 1460,sackOK,TS val 697374893 ecr 0,nop,wscale 10], length 0
20:07:44.143538 IP 192.168.1.10.37634 > baidu.com.80: Flags [S], seq 2599128669, win 65535, options [mss 1460,sackOK,TS val 697375117 ecr 0,nop,wscale 10], length 0
20:07:44.151641 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:44.152471 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:44.197383 IP 192.168.1.10.58102 > 157.148.61.213.80: Flags [S], seq 3433459971, win 65535, options [mss 1400,sackOK,TS val 3141398149 ecr 0,nop,wscale 10], length 0
20:07:44.199513 IP 192.168.1.10.33074 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 3773690983, win 65535, options [mss 1460,sackOK,TS val 3226165511 ecr 0,nop,wscale 10], length 0
20:07:44.460395 IP 192.168.1.10.51748 > www.google.com.443: Flags [S], seq 2120051268, win 65535, options [mss 1460,sackOK,TS val 204718953 ecr 0,nop,wscale 10], length 0
20:07:44.715858 IP 192.168.1.10.50772 > 220.181.174.98.80: Flags [S], seq 3108022790, win 65535, options [mss 1460,sackOK,TS val 226835241 ecr 0,nop,wscale 10], length 0
20:07:44.970850 IP 192.168.1.10.51756 > www.google.com.443: Flags [S], seq 2175868250, win 65535, options [mss 1460,sackOK,TS val 204719464 ecr 0,nop,wscale 10], length 0
20:07:45.191647 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:45.192551 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:45.221705 IP 192.168.1.10.34632 > m.facebook.com.443: Flags [S], seq 2510077081, win 65535, options [mss 1460,sackOK,TS val 1858470134 ecr 0,nop,wscale 10], length 0
20:07:45.221706 IP 192.168.1.10.58520 > szextshort.weixin.qq.com.80: Flags [S], seq 2214254207, win 65535, options [mss 1400,sackOK,TS val 3092147483 ecr 0,nop,wscale 10], length 0
20:07:45.221707 IP 192.168.1.10.33036 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 656103490, win 65535, options [mss 1460,sackOK,TS val 3226166534 ecr 0,nop,wscale 10], length 0
20:07:45.251590 IP 192.168.1.10.41372 > 157.148.59.239.80: Flags [S], seq 3318216454, win 65535, options [mss 1400,sackOK,TS val 3248506713 ecr 0,nop,wscale 10], length 0
20:07:45.477367 IP 192.168.1.10.33042 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 430857714, win 65535, options [mss 1460,sackOK,TS val 3226166790 ecr 0,nop,wscale 10], length 0
20:07:45.477578 IP 192.168.1.10.41898 > mail.xxxxxx.com.cn.443: Flags [S], seq 1655601765, win 65535, options [mss 1460,sackOK,TS val 1610967774 ecr 0,nop,wscale 10], length 0
20:07:45.477578 IP 192.168.1.10.34638 > m.facebook.com.443: Flags [S], seq 1206859231, win 65535, options [mss 1460,sackOK,TS val 1858470390 ecr 0,nop,wscale 10], length 0
20:07:45.771353 IP 192.168.1.10.51176 > szshort.weixin.qq.com.80: Flags [S], seq 140454774, win 65535, options [mss 1400,sackOK,TS val 1891908801 ecr 0,nop,wscale 10], length 0
20:07:45.926974 IP 192.168.1.10.37632 > baidu.com.80: Flags [S], seq 3316573468, win 65535, options [mss 1460,sackOK,TS val 697376909 ecr 0,nop,wscale 10], length 0
20:07:45.926975 IP 192.168.1.10.37630 > baidu.com.80: Flags [S], seq 3096043437, win 65535, options [mss 1460,sackOK,TS val 697376909 ecr 0,nop,wscale 10], length 0
20:07:45.926976 IP 192.168.1.10.34658 > m.facebook.com.443: Flags [S], seq 295212418, win 65535, options [mss 1460,sackOK,TS val 1858470838 ecr 0,nop,wscale 10], length 0
20:07:45.989773 IP 192.168.1.10.47350 > 101.227.132.126.443: Flags [S], seq 525243747, win 65535, options [mss 1460,sackOK,TS val 1240064517 ecr 0,nop,wscale 10], length 0
20:07:45.989774 IP 192.168.1.10.47352 > 101.227.132.126.443: Flags [S], seq 165909, win 65535, options [mss 1460,sackOK,TS val 1240064517 ecr 0,nop,wscale 10], length 0
20:07:45.989774 IP 192.168.1.10.47348 > 101.227.132.126.443: Flags [S], seq 1151113391, win 65535, options [mss 1460,sackOK,TS val 1240064517 ecr 0,nop,wscale 10], length 0
20:07:46.150360 IP 192.168.1.10.37634 > baidu.com.80: Flags [S], seq 2599128669, win 65535, options [mss 1460,sackOK,TS val 697377134 ecr 0,nop,wscale 10], length 0
20:07:46.213811 IP 192.168.1.10.58102 > 157.148.61.213.80: Flags [S], seq 3433459971, win 65535, options [mss 1400,sackOK,TS val 3141400165 ecr 0,nop,wscale 10], length 0
20:07:46.213812 IP 192.168.1.10.33074 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 3773690983, win 65535, options [mss 1460,sackOK,TS val 3226167526 ecr 0,nop,wscale 10], length 0
20:07:46.221836 IP 192.168.1.10.45340 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 1685864087, win 65535, options [mss 1460,sackOK,TS val 1133394614 ecr 0,nop,wscale 10], length 0
20:07:46.231593 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:46.232433 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:46.233992 IP 192.168.1.10.46492 > ec2-54-223-115-154.cn-north-1.compute.amazonaws.com.cn.443: Flags [S], seq 2318772053, win 65535, options [mss 1460,sackOK,TS val 4285677784 ecr 0,nop,wscale 10], length 0
20:07:46.240940 IP 192.168.1.10.45344 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 2172863234, win 65535, options [mss 1460,sackOK,TS val 1133394633 ecr 0,nop,wscale 10], length 0
20:07:46.277056 IP 192.168.1.10.41372 > 157.148.59.239.80: Flags [S], seq 3318216454, win 65535, options [mss 1400,sackOK,TS val 3248507739 ecr 0,nop,wscale 10], length 0
20:07:46.503303 IP 192.168.1.10.51776 > www.google.com.443: Flags [S], seq 2676063872, win 65535, options [mss 1460,sackOK,TS val 204721001 ecr 0,nop,wscale 10], length 0
20:07:47.242283 IP 192.168.1.10.45344 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 2172863234, win 65535, options [mss 1460,sackOK,TS val 1133395630 ecr 0,nop,wscale 10], length 0
20:07:47.242284 IP 192.168.1.10.46492 > ec2-54-223-115-154.cn-north-1.compute.amazonaws.com.cn.443: Flags [S], seq 2318772053, win 65535, options [mss 1460,sackOK,TS val 4285678789 ecr 0,nop,wscale 10], length 0
20:07:47.242285 IP 192.168.1.10.45340 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 1685864087, win 65535, options [mss 1460,sackOK,TS val 1133395631 ecr 0,nop,wscale 10], length 0
20:07:47.269480 IP 192.168.1.10.58730 > api.appcenter.ms.443: Flags [S], seq 1102430898, win 65535, options [mss 1460,sackOK,TS val 24752275 ecr 0,nop,wscale 10], length 0
20:07:47.269481 IP 192.168.1.10.51170 > szshort.weixin.qq.com.80: Flags [S], seq 3417478205, win 65535, options [mss 1400,sackOK,TS val 1891910305 ecr 0,nop,wscale 10], length 0
20:07:47.271663 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:47.272527 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:48.295956 IP 192.168.1.10.41372 > 157.148.59.239.80: Flags [S], seq 3318216454, win 65535, options [mss 1400,sackOK,TS val 3248509755 ecr 0,nop,wscale 10], length 0
20:07:48.311662 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:48.312512 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:48.995033 IP 192.168.1.10.45346 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 1036306264, win 65535, options [mss 1460,sackOK,TS val 1133397383 ecr 0,nop,wscale 10], length 0
20:07:48.995034 IP 192.168.1.10.45348 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 1327777293, win 65535, options [mss 1460,sackOK,TS val 1133397383 ecr 0,nop,wscale 10], length 0
20:07:48.995034 IP 192.168.1.10.45350 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 4058963890, win 65535, options [mss 1460,sackOK,TS val 1133397384 ecr 0,nop,wscale 10], length 0
20:07:49.259922 IP 192.168.1.10.45340 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 1685864087, win 65535, options [mss 1460,sackOK,TS val 1133397646 ecr 0,nop,wscale 10], length 0
20:07:49.259923 IP 192.168.1.10.46492 > ec2-54-223-115-154.cn-north-1.compute.amazonaws.com.cn.443: Flags [S], seq 2318772053, win 65535, options [mss 1460,sackOK,TS val 4285680804 ecr 0,nop,wscale 10], length 0
20:07:49.259923 IP 192.168.1.10.45344 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 2172863234, win 65535, options [mss 1460,sackOK,TS val 1133397647 ecr 0,nop,wscale 10], length 0
20:07:49.351616 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:49.352440 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:49.835618 IP 192.168.1.10.54058 > safebrowsing.google.com.443: Flags [S], seq 1464341530, win 65535, options [mss 1460,sackOK,TS val 4097974373 ecr 0,nop,wscale 10], length 0
20:07:49.835619 IP 192.168.1.10.51176 > szshort.weixin.qq.com.80: Flags [S], seq 140454774, win 65535, options [mss 1400,sackOK,TS val 1891912865 ecr 0,nop,wscale 10], length 0
20:07:49.925468 IP 192.168.1.10.34658 > m.facebook.com.443: Flags [S], seq 295212418, win 65535, options [mss 1460,sackOK,TS val 1858474838 ecr 0,nop,wscale 10], length 0
20:07:49.925469 IP 192.168.1.10.37632 > baidu.com.80: Flags [S], seq 3316573468, win 65535, options [mss 1460,sackOK,TS val 697380909 ecr 0,nop,wscale 10], length 0
20:07:49.989907 IP 192.168.1.10.45346 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 1036306264, win 65535, options [mss 1460,sackOK,TS val 1133398382 ecr 0,nop,wscale 10], length 0
20:07:49.989908 IP 192.168.1.10.45350 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 4058963890, win 65535, options [mss 1460,sackOK,TS val 1133398382 ecr 0,nop,wscale 10], length 0
20:07:49.989909 IP 192.168.1.10.45348 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 1327777293, win 65535, options [mss 1460,sackOK,TS val 1133398382 ecr 0,nop,wscale 10], length 0
20:07:50.085459 IP 192.168.1.10.37630 > baidu.com.80: Flags [S], seq 3096043437, win 65535, options [mss 1460,sackOK,TS val 697381069 ecr 0,nop,wscale 10], length 0
20:07:50.085460 IP 192.168.1.10.54064 > safebrowsing.google.com.443: Flags [S], seq 2024331871, win 65535, options [mss 1460,sackOK,TS val 4097974629 ecr 0,nop,wscale 10], length 0
20:07:50.149375 IP 192.168.1.10.37634 > baidu.com.80: Flags [S], seq 2599128669, win 65535, options [mss 1460,sackOK,TS val 697381133 ecr 0,nop,wscale 10], length 0
20:07:50.213812 IP 192.168.1.10.33074 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 3773690983, win 65535, options [mss 1460,sackOK,TS val 3226171526 ecr 0,nop,wscale 10], length 0
20:07:50.391683 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:50.392683 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:50.434206 IP 192.168.1.10.51168 > 39.109.122.128.443: Flags [S], seq 3279256655, win 65535, options [mss 1460,sackOK,TS val 48429060 ecr 0,nop,wscale 10], length 0
20:07:50.500607 IP 192.168.1.10.54146 > safebrowsing.google.com.443: Flags [S], seq 1407989237, win 65535, options [mss 1460,sackOK,TS val 4097975043 ecr 0,nop,wscale 10], length 0
20:07:50.569391 IP beacons.gcp.gvt2.com.443 > 192.168.1.200.56446: Flags [P.], seq 3563362319:3563362392, ack 1692302893, win 287, options [nop,nop,TS val 535387765 ecr 1622923763], length 73
20:07:50.569439 IP beacons.gcp.gvt2.com.443 > 192.168.1.10.56446: Flags [P.], seq 3563362319:3563362392, ack 1692302893, win 287, options [nop,nop,TS val 535387765 ecr 1622923763], length 73
20:07:50.574474 IP 192.168.1.10.56446 > beacons.gcp.gvt2.com.443: Flags [R], seq 1692302893, win 0, length 0
20:07:50.574540 IP 192.168.1.200.56446 > beacons.gcp.gvt2.com.443: Flags [R], seq 1692302893, win 0, length 0
20:07:50.687239 IP 192.168.1.10.51172 > 39.109.122.128.443: Flags [S], seq 1284111448, win 65535, options [mss 1460,sackOK,TS val 48429315 ecr 0,nop,wscale 10], length 0
20:07:50.704385 IP 192.168.1.10.54150 > safebrowsing.google.com.443: Flags [S], seq 4077463281, win 65535, options [mss 1460,sackOK,TS val 4097975248 ecr 0,nop,wscale 10], length 0
20:07:50.712321 IP 192.168.1.10.33098 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 629285236, win 65535, options [mss 1460,sackOK,TS val 3226172025 ecr 0,nop,wscale 10], length 0
20:07:50.764398 IP 192.168.1.10.54154 > safebrowsing.google.com.443: Flags [S], seq 3268585173, win 65535, options [mss 1460,sackOK,TS val 4097975303 ecr 0,nop,wscale 10], length 0
20:07:50.991669 IP 192.168.1.10.33102 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 477470186, win 65535, options [mss 1460,sackOK,TS val 3226172304 ecr 0,nop,wscale 10], length 0
20:07:51.024579 IP 192.168.1.10.53522 > 20.205.243.166.443: Flags [S], seq 1662829971, win 65535, options [mss 1460,sackOK,TS val 3594986528 ecr 0,nop,wscale 10], length 0
20:07:51.034419 IP 192.168.1.10.54160 > safebrowsing.google.com.443: Flags [S], seq 3153370787, win 65535, options [mss 1460,sackOK,TS val 4097975578 ecr 0,nop,wscale 10], length 0
20:07:51.036062 IP 192.168.1.10.53526 > 20.205.243.166.443: Flags [S], seq 3995408203, win 65535, options [mss 1460,sackOK,TS val 3594986540 ecr 0,nop,wscale 10], length 0
20:07:51.110995 IP 192.168.1.10.51736 > www.google.com.443: Flags [S], seq 4214884307, win 65535, options [mss 1460,sackOK,TS val 204725608 ecr 0,nop,wscale 10], length 0
20:07:51.110996 IP 192.168.1.10.33120 > 121.40.206.159.443: Flags [S], seq 3499225937, win 65535, options [mss 1460,sackOK,TS val 265437653 ecr 0,nop,wscale 10], length 0
20:07:51.279031 IP 192.168.1.10.53528 > 20.205.243.166.443: Flags [S], seq 1830246889, win 65535, options [mss 1460,sackOK,TS val 3594986784 ecr 0,nop,wscale 10], length 0
20:07:51.320373 IP 192.168.1.10.33112 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 2271846675, win 65535, options [mss 1460,sackOK,TS val 3226172632 ecr 0,nop,wscale 10], length 0
20:07:51.366409 IP 192.168.1.10.51740 > www.google.com.443: Flags [S], seq 2807327533, win 65535, options [mss 1460,sackOK,TS val 204725864 ecr 0,nop,wscale 10], length 0
20:07:51.366410 IP 192.168.1.10.51742 > www.google.com.443: Flags [S], seq 2594324269, win 65535, options [mss 1460,sackOK,TS val 204725864 ecr 0,nop,wscale 10], length 0
20:07:51.431666 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:51.432594 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:51.434523 IP 192.168.1.10.51168 > 39.109.122.128.443: Flags [S], seq 3279256655, win 65535, options [mss 1460,sackOK,TS val 48430061 ecr 0,nop,wscale 10], length 0
20:07:51.529077 IP 192.168.1.10.54146 > safebrowsing.google.com.443: Flags [S], seq 1407989237, win 65535, options [mss 1460,sackOK,TS val 4097976069 ecr 0,nop,wscale 10], length 0
20:07:51.602578 IP 192.168.1.10.60600 > 36.103.232.140.443: Flags [S], seq 3330664265, win 65535, options [mss 1460,sackOK,TS val 3879637292 ecr 0,nop,wscale 10], length 0
20:07:51.602579 IP 192.168.1.10.36462 > connectivity.samsung.com.cn.80: Flags [S], seq 262415307, win 65535, options [mss 1460,sackOK,TS val 1440954783 ecr 0,nop,wscale 10], length 0
20:07:51.687774 IP 192.168.1.10.51172 > 39.109.122.128.443: Flags [S], seq 1284111448, win 65535, options [mss 1460,sackOK,TS val 48430313 ecr 0,nop,wscale 10], length 0
20:07:51.717301 IP 192.168.1.10.33098 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 629285236, win 65535, options [mss 1460,sackOK,TS val 3226173030 ecr 0,nop,wscale 10], length 0
20:07:51.717302 IP 192.168.1.10.54150 > safebrowsing.google.com.443: Flags [S], seq 4077463281, win 65535, options [mss 1460,sackOK,TS val 4097976261 ecr 0,nop,wscale 10], length 0
20:07:51.780935 IP 192.168.1.10.54154 > safebrowsing.google.com.443: Flags [S], seq 3268585173, win 65535, options [mss 1460,sackOK,TS val 4097976325 ecr 0,nop,wscale 10], length 0
20:07:52.011540 IP 192.168.1.10.45346 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 1036306264, win 65535, options [mss 1460,sackOK,TS val 1133400398 ecr 0,nop,wscale 10], length 0
20:07:52.011540 IP 192.168.1.10.33102 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 477470186, win 65535, options [mss 1460,sackOK,TS val 3226173318 ecr 0,nop,wscale 10], length 0
20:07:52.011541 IP 192.168.1.10.45350 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 4058963890, win 65535, options [mss 1460,sackOK,TS val 1133400398 ecr 0,nop,wscale 10], length 0
20:07:52.011541 IP 192.168.1.10.45348 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 1327777293, win 65535, options [mss 1460,sackOK,TS val 1133400402 ecr 0,nop,wscale 10], length 0
20:07:52.037960 IP 192.168.1.10.53526 > 20.205.243.166.443: Flags [S], seq 3995408203, win 65535, options [mss 1460,sackOK,TS val 3594987542 ecr 0,nop,wscale 10], length 0
20:07:52.037961 IP 192.168.1.10.54160 > safebrowsing.google.com.443: Flags [S], seq 3153370787, win 65535, options [mss 1460,sackOK,TS val 4097976581 ecr 0,nop,wscale 10], length 0
20:07:52.037961 IP 192.168.1.10.53522 > 20.205.243.166.443: Flags [S], seq 1662829971, win 65535, options [mss 1460,sackOK,TS val 3594987542 ecr 0,nop,wscale 10], length 0
20:07:52.303541 IP 192.168.1.10.53528 > 20.205.243.166.443: Flags [S], seq 1830246889, win 65535, options [mss 1460,sackOK,TS val 3594987800 ecr 0,nop,wscale 10], length 0
20:07:52.326253 IP 192.168.1.10.33112 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 2271846675, win 65535, options [mss 1460,sackOK,TS val 3226173639 ecr 0,nop,wscale 10], length 0
20:07:52.389521 IP 192.168.1.10.41372 > 157.148.59.239.80: Flags [S], seq 3318216454, win 65535, options [mss 1400,sackOK,TS val 3248513851 ecr 0,nop,wscale 10], length 0
20:07:52.471602 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:52.472472 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:52.613178 IP 192.168.1.10.60600 > 36.103.232.140.443: Flags [S], seq 3330664265, win 65535, options [mss 1460,sackOK,TS val 3879638303 ecr 0,nop,wscale 10], length 0
20:07:52.613179 IP 192.168.1.10.36462 > connectivity.samsung.com.cn.80: Flags [S], seq 262415307, win 65535, options [mss 1460,sackOK,TS val 1440955793 ecr 0,nop,wscale 10], length 0
20:07:52.649400 IP 192.168.1.10.51748 > www.google.com.443: Flags [S], seq 2120051268, win 65535, options [mss 1460,sackOK,TS val 204727148 ecr 0,nop,wscale 10], length 0
20:07:52.668717 IP 192.168.1.10.40180 > 128.242.245.93.443: UDP, length 1250
20:07:52.671854 IP 192.168.1.10.42910 > 128.242.245.93.443: Flags [S], seq 379147794, win 65535, options [mss 1460,sackOK,TS val 3092600127 ecr 0,nop,wscale 10], length 0
20:07:52.677832 IP 192.168.1.10.38820 > a23-206-250-89.deploy.static.akamaitechnologies.com.443: Flags [S], seq 1754236800, win 65535, options [mss 1460,sackOK,TS val 1238213086 ecr 0,nop,wscale 10], length 0
20:07:52.679515 IP 192.168.1.10.60414 > 104.244.43.131.443: Flags [S], seq 3021496396, win 65535, options [mss 1460,sackOK,TS val 4174602917 ecr 0,nop,wscale 10], length 0
20:07:52.686368 IP 192.168.1.10.58334 > vps25349.dreamhostps.com.443: Flags [S], seq 2482842485, win 65535, options [mss 1460,sackOK,TS val 1577559276 ecr 0,nop,wscale 10], length 0
20:07:52.689178 IP 192.168.1.10.52704 > redirweb2.reg.free.org.443: Flags [S], seq 2742518016, win 65535, options [mss 1460,sackOK,TS val 1945788634 ecr 0,nop,wscale 10], length 0
20:07:52.694993 IP 192.168.1.10.40764 > 108.160.161.83.443: Flags [S], seq 3678796286, win 65535, options [mss 1460,sackOK,TS val 1544903628 ecr 0,nop,wscale 10], length 0
20:07:52.926240 IP 192.168.1.10.42924 > 128.242.245.93.443: Flags [S], seq 1931120772, win 65535, options [mss 1460,sackOK,TS val 3092600381 ecr 0,nop,wscale 10], length 0
20:07:52.934611 IP 192.168.1.10.38834 > a23-206-250-89.deploy.static.akamaitechnologies.com.443: Flags [S], seq 1268432475, win 65535, options [mss 1460,sackOK,TS val 1238213342 ecr 0,nop,wscale 10], length 0
20:07:52.935402 IP 192.168.1.10.60428 > 104.244.43.131.443: Flags [S], seq 131135500, win 65535, options [mss 1460,sackOK,TS val 4174603172 ecr 0,nop,wscale 10], length 0
20:07:52.942106 IP 192.168.1.10.52718 > redirweb2.reg.free.org.443: Flags [S], seq 2023412619, win 65535, options [mss 1460,sackOK,TS val 1945788889 ecr 0,nop,wscale 10], length 0
20:07:52.942107 IP 192.168.1.10.58348 > vps25349.dreamhostps.com.443: Flags [S], seq 3233976667, win 65535, options [mss 1460,sackOK,TS val 1577559531 ecr 0,nop,wscale 10], length 0
20:07:52.942107 IP 192.168.1.10.40778 > 108.160.161.83.443: Flags [S], seq 2446835030, win 65535, options [mss 1460,sackOK,TS val 1544903882 ecr 0,nop,wscale 10], length 0
20:07:52.974071 IP 192.168.1.10.40180 > 128.242.245.93.443: UDP, length 1250
20:07:53.157397 IP 192.168.1.10.51756 > www.google.com.443: Flags [S], seq 2175868250, win 65535, options [mss 1460,sackOK,TS val 204727656 ecr 0,nop,wscale 10], length 0
20:07:53.413923 IP 192.168.1.10.33036 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 656103490, win 65535, options [mss 1460,sackOK,TS val 3226174726 ecr 0,nop,wscale 10], length 0
20:07:53.413924 IP 192.168.1.10.45340 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 1685864087, win 65535, options [mss 1460,sackOK,TS val 1133401806 ecr 0,nop,wscale 10], length 0
20:07:53.415034 IP 192.168.1.10.45344 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.443: Flags [S], seq 2172863234, win 65535, options [mss 1460,sackOK,TS val 1133401806 ecr 0,nop,wscale 10], length 0
20:07:53.415035 IP 192.168.1.10.34632 > m.facebook.com.443: Flags [S], seq 2510077081, win 65535, options [mss 1460,sackOK,TS val 1858478327 ecr 0,nop,wscale 10], length 0
20:07:53.415035 IP 192.168.1.10.46492 > ec2-54-223-115-154.cn-north-1.compute.amazonaws.com.cn.443: Flags [S], seq 2318772053, win 65535, options [mss 1460,sackOK,TS val 4285684965 ecr 0,nop,wscale 10], length 0
20:07:53.445325 IP 192.168.1.10.51168 > 39.109.122.128.443: Flags [S], seq 3279256655, win 65535, options [mss 1460,sackOK,TS val 48432073 ecr 0,nop,wscale 10], length 0
20:07:53.511674 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:07:53.512535 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:07:53.541452 IP 192.168.1.10.54146 > safebrowsing.google.com.443: Flags [S], seq 1407989237, win 65535, options [mss 1460,sackOK,TS val 4097978085 ecr 0,nop,wscale 10], length 0
20:07:53.581834 IP 192.168.1.10.40180 > 128.242.245.93.443: UDP, length 1250
20:07:53.669258 IP 192.168.1.10.42910 > 128.242.245.93.443: Flags [S], seq 379147794, win 65535, options [mss 1460,sackOK,TS val 3092601124 ecr 0,nop,wscale 10], length 0
20:07:53.669259 IP 192.168.1.10.33042 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 430857714, win 65535, options [mss 1460,sackOK,TS val 3226174982 ecr 0,nop,wscale 10], length 0
20:07:53.669259 IP 192.168.1.10.34638 > m.facebook.com.443: Flags [S], seq 1206859231, win 65535, options [mss 1460,sackOK,TS val 1858478582 ecr 0,nop,wscale 10], length 0
20:07:53.669259 IP 192.168.1.10.41898 > mail.xxxxxx.com.cn.443: Flags [S], seq 1655601765, win 65535, options [mss 1460,sackOK,TS val 1610975966 ecr 0,nop,wscale 10], length 0
20:07:53.681408 IP 192.168.1.10.34738 > m.facebook.com.443: Flags [S], seq 354053526, win 65535, options [mss 1460,sackOK,TS val 1858478594 ecr 0,nop,wscale 10], length 0
20:07:53.708997 IP 192.168.1.10.40764 > 108.160.161.83.443: Flags [S], seq 3678796286, win 65535, options [mss 1460,sackOK,TS val 1544904640 ecr 0,nop,wscale 10], length 0
20:07:53.708997 IP 192.168.1.10.52704 > redirweb2.reg.free.org.443: Flags [S], seq 2742518016, win 65535, options [mss 1460,sackOK,TS val 1945789648 ecr 0,nop,wscale 10], length 0
20:07:53.708998 IP 192.168.1.10.58334 > vps25349.dreamhostps.com.443: Flags [S], seq 2482842485, win 65535, options [mss 1460,sackOK,TS val 1577560290 ecr 0,nop,wscale 10], length 0
20:07:53.708998 IP 192.168.1.10.60414 > 104.244.43.131.443: Flags [S], seq 3021496396, win 65535, options [mss 1460,sackOK,TS val 4174603938 ecr 0,nop,wscale 10], length 0
20:07:53.708998 IP 192.168.1.10.51172 > 39.109.122.128.443: Flags [S], seq 1284111448, win 65535, options [mss 1460,sackOK,TS val 48432329 ecr 0,nop,wscale 10], length 0
20:07:53.708999 IP 192.168.1.10.38820 > a23-206-250-89.deploy.static.akamaitechnologies.com.443: Flags [S], seq 1754236800, win 65535, options [mss 1460,sackOK,TS val 1238214109 ecr 0,nop,wscale 10], length 0
20:07:53.733012 IP 192.168.1.10.54150 > safebrowsing.google.com.443: Flags [S], seq 4077463281, win 65535, options [mss 1460,sackOK,TS val 4097978277 ecr 0,nop,wscale 10], length 0
20:07:53.733013 IP 192.168.1.10.33098 > tsa01s11-in-f10.1e100.net.443: Flags [S], seq 629285236, win 65535, options [mss 1460,sackOK,TS val 3226175046 ecr 0,nop,wscale 10], length 0
20:07:53.797015 IP 192.168.1.10.54154 > safebrowsing.google.com.443: Flags [S], seq 3268585173, win 65535, options [mss 1460,sackOK,TS val 4097978341 ecr 0,nop,wscale 10], length 0
20:08:00.331323 IP 192.168.1.10.60952 > c.tieba.baidu.com.80: Flags [S], seq 4110853439, win 65535, options [mss 1460,sackOK,TS val 2941315553 ecr 0,nop,wscale 10], length 0
20:08:00.791622 IP 192.168.1.200.80 > 192.168.1.100.9961: Flags [.], ack 509, win 501, length 0
20:08:00.792351 IP 192.168.1.100.9961 > 192.168.1.200.80: Flags [.], ack 888, win 1023, length 0
20:08:00.845442 IP 192.168.1.10.34738 > m.facebook.com.443: Flags [S], seq 354053526, win 65535, options [mss 1460,sackOK,TS val 1858485750 ecr 0,nop,wscale 10], length 0
^C
285 packets captured
473 packets received by filter
188 packets dropped by kernel
root@OpenWrt:~# 

下面的是Transparent(192.168.1.250)的抓包日志

root@Transparent:~# tcpdump -s 0 -i eth0  port 443 or 80
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
12:07:25.580462 IP 192.168.1.10.54934 > 110.76.8.204.https: Flags [S], seq 4250216857, win 65535, options [mss 1400,sackOK,TS val 2304551153 ecr 0,nop,wscale 10], length 0
12:07:25.580464 IP 192.168.1.10.50720 > 220.181.174.98.http: Flags [S], seq 2359677126, win 65535, options [mss 1460,sackOK,TS val 226816105 ecr 0,nop,wscale 10], length 0
12:07:26.050833 IP 192.168.1.10.48038 > 120.232.51.154.http: Flags [S], seq 72027684, win 65535, options [mss 1400,sackOK,TS val 4209981840 ecr 0,nop,wscale 10], length 0
12:07:26.347383 IP 192.168.1.10.51108 > szshort.weixin.qq.com.http: Flags [S], seq 2542776088, win 65535, options [mss 1400,sackOK,TS val 1891889376 ecr 0,nop,wscale 10], length 0
12:07:26.570612 IP 192.168.1.10.35144 > 183.60.8.218.http: Flags [S], seq 4141095502, win 65535, options [mss 1400,sackOK,TS val 219859846 ecr 0,nop,wscale 10], length 0
12:07:26.598496 IP 192.168.1.10.58704 > 183.60.8.69.http: Flags [S], seq 3394346461, win 65535, options [mss 1400,sackOK,TS val 308498730 ecr 0,nop,wscale 10], length 0
12:07:26.791672 IP 192.168.1.10.52358 > connectivity.samsung.com.cn.https: Flags [S], seq 1734796193, win 65535, options [mss 1460,sackOK,TS val 1440929971 ecr 0,nop,wscale 10], length 0
12:07:26.791675 IP 192.168.1.10.52704 > 36.103.232.140.http: Flags [S], seq 1583204484, win 65535, options [mss 1460,sackOK,TS val 3879612480 ecr 0,nop,wscale 10], length 0
12:07:26.854666 IP 192.168.1.10.56908 > 183.47.124.77.http: Flags [S], seq 3087601997, win 65535, options [mss 1400,sackOK,TS val 364758355 ecr 0,nop,wscale 10], length 0
12:07:27.081938 IP 192.168.1.10.48038 > 120.232.51.154.http: Flags [S], seq 72027684, win 65535, options [mss 1400,sackOK,TS val 4209982868 ecr 0,nop,wscale 10], length 0
12:07:27.367519 IP 192.168.1.10.51108 > szshort.weixin.qq.com.http: Flags [S], seq 2542776088, win 65535, options [mss 1400,sackOK,TS val 1891890401 ecr 0,nop,wscale 10], length 0
12:07:27.594028 IP 192.168.1.10.54934 > 110.76.8.204.https: Flags [S], seq 4250216857, win 65535, options [mss 1400,sackOK,TS val 2304553169 ecr 0,nop,wscale 10], length 0
12:07:27.812004 IP 192.168.1.10.36958 > 180.97.34.146.http: Flags [S], seq 1778919700, win 65535, options [mss 1460,sackOK,TS val 2189941262 ecr 0,nop,wscale 10], length 0
12:07:33.197455 IP 192.168.1.10.48038 > 120.232.51.154.http: Flags [S], seq 72027684, win 65535, options [mss 1400,sackOK,TS val 4209988981 ecr 0,nop,wscale 10], length 0
12:07:33.451956 IP 192.168.1.10.51108 > szshort.weixin.qq.com.http: Flags [S], seq 2542776088, win 65535, options [mss 1400,sackOK,TS val 1891896481 ecr 0,nop,wscale 10], length 0
12:07:34.379169 IP 192.168.1.10.41738 > www.google.com.https: UDP, length 1250
12:07:34.419031 IP 192.168.1.10.54058 > safebrowsing.google.com.https: Flags [S], seq 1464341530, win 65535, options [mss 1460,sackOK,TS val 4097958962 ecr 0,nop,wscale 10], length 0
12:07:34.573750 IP 192.168.1.10.45316 > 36.103.232.129.http: Flags [S], seq 3530263251, win 65535, options [mss 1460,sackOK,TS val 1302345842 ecr 0,nop,wscale 10], length 0
12:07:34.573774 IP 192.168.1.10.48258 > 36.103.232.129.https: Flags [S], seq 1261352372, win 65535, options [mss 1460,sackOK,TS val 1302345843 ecr 0,nop,wscale 10], length 0
12:07:34.671086 IP 192.168.1.10.54064 > safebrowsing.google.com.https: Flags [S], seq 2024331871, win 65535, options [mss 1460,sackOK,TS val 4097959215 ecr 0,nop,wscale 10], length 0
12:07:34.680464 IP 192.168.1.10.41738 > www.google.com.https: UDP, length 1250
12:07:34.984301 IP 192.168.1.10.36958 > 180.97.34.146.http: Flags [S], seq 1778919700, win 65535, options [mss 1460,sackOK,TS val 2189948431 ecr 0,nop,wscale 10], length 0
12:07:35.294798 IP 192.168.1.10.41738 > www.google.com.https: UDP, length 1250
12:07:35.430920 IP 192.168.1.10.54058 > safebrowsing.google.com.https: Flags [S], seq 1464341530, win 65535, options [mss 1460,sackOK,TS val 4097959973 ecr 0,nop,wscale 10], length 0
12:07:35.593460 IP 192.168.1.10.45316 > 36.103.232.129.http: Flags [S], seq 3530263251, win 65535, options [mss 1460,sackOK,TS val 1302346861 ecr 0,nop,wscale 10], length 0
12:07:35.593462 IP 192.168.1.10.48258 > 36.103.232.129.https: Flags [S], seq 1261352372, win 65535, options [mss 1460,sackOK,TS val 1302346860 ecr 0,nop,wscale 10], length 0
12:07:35.672080 IP 192.168.1.10.51736 > www.google.com.https: Flags [S], seq 4214884307, win 65535, options [mss 1460,sackOK,TS val 204710169 ecr 0,nop,wscale 10], length 0
12:07:35.686941 IP 192.168.1.10.54064 > safebrowsing.google.com.https: Flags [S], seq 2024331871, win 65535, options [mss 1460,sackOK,TS val 4097960229 ecr 0,nop,wscale 10], length 0
12:07:35.739075 IP 192.168.1.10.33120 > sdkapiv2.bizport.cn.https: Flags [S], seq 3499225937, win 65535, options [mss 1460,sackOK,TS val 265422283 ecr 0,nop,wscale 10], length 0
12:07:35.926580 IP 192.168.1.10.51740 > www.google.com.https: Flags [S], seq 2807327533, win 65535, options [mss 1460,sackOK,TS val 204710425 ecr 0,nop,wscale 10], length 0
12:07:35.976282 IP 192.168.1.10.51742 > www.google.com.https: Flags [S], seq 2594324269, win 65535, options [mss 1460,sackOK,TS val 204710474 ecr 0,nop,wscale 10], length 0
12:07:36.006740 IP 192.168.1.10.41296 > 157.148.59.239.http: Flags [S], seq 698061538, win 65535, options [mss 1400,sackOK,TS val 3248497467 ecr 0,nop,wscale 10], length 0
12:07:36.215924 IP 192.168.1.10.47322 > 101.227.132.126.https: Flags [S], seq 1704954101, win 65535, options [mss 1460,sackOK,TS val 1240054743 ecr 0,nop,wscale 10], length 0
12:07:36.263165 IP 192.168.1.10.37424 > gear.sca.samsung.cn.https: Flags [S], seq 1646846100, win 65535, options [mss 1460,sackOK,TS val 673468339 ecr 0,nop,wscale 10], length 0
12:07:36.503043 IP 192.168.1.10.41738 > www.google.com.https: UDP, length 1250
12:07:36.683360 IP 192.168.1.10.51736 > www.google.com.https: Flags [S], seq 4214884307, win 65535, options [mss 1460,sackOK,TS val 204711180 ecr 0,nop,wscale 10], length 0
12:07:36.743034 IP 192.168.1.10.33120 > sdkapiv2.bizport.cn.https: Flags [S], seq 3499225937, win 65535, options [mss 1460,sackOK,TS val 265423285 ecr 0,nop,wscale 10], length 0
12:07:36.926669 IP 192.168.1.10.51740 > www.google.com.https: Flags [S], seq 2807327533, win 65535, options [mss 1460,sackOK,TS val 204711424 ecr 0,nop,wscale 10], length 0
12:07:36.978452 IP 192.168.1.10.51742 > www.google.com.https: Flags [S], seq 2594324269, win 65535, options [mss 1460,sackOK,TS val 204711476 ecr 0,nop,wscale 10], length 0
12:07:37.222850 IP 192.168.1.10.47322 > 101.227.132.126.https: Flags [S], seq 1704954101, win 65535, options [mss 1460,sackOK,TS val 1240055749 ecr 0,nop,wscale 10], length 0
12:07:37.283417 IP 192.168.1.10.51748 > www.google.com.https: Flags [S], seq 2120051268, win 65535, options [mss 1460,sackOK,TS val 204711781 ecr 0,nop,wscale 10], length 0
12:07:37.286311 IP 192.168.1.10.48758 > 203.209.230.36.https: Flags [S], seq 3566581355, win 65535, options [mss 1400,sackOK,TS val 198879192 ecr 0,nop,wscale 10], length 0
12:07:37.286312 IP 192.168.1.10.37424 > gear.sca.samsung.cn.https: Flags [S], seq 1646846100, win 65535, options [mss 1460,sackOK,TS val 673469362 ecr 0,nop,wscale 10], length 0
12:07:37.331306 IP 192.168.1.10.42540 > clientservices.googleapis.com.https: UDP, length 1250
12:07:37.331306 IP 192.168.1.10.49596 > clientservices.googleapis.com.https: Flags [S], seq 1620362195, win 65535, options [mss 1460,sackOK,TS val 3778719150 ecr 0,nop,wscale 10], length 0
12:07:37.331973 IP Transparent.192.168.1.1.43439 > clientservices.googleapis.com.https: UDP, length 1250
12:07:37.445739 IP 192.168.1.10.54058 > safebrowsing.google.com.https: Flags [S], seq 1464341530, win 65535, options [mss 1460,sackOK,TS val 4097961989 ecr 0,nop,wscale 10], length 0
12:07:37.569761 IP 192.168.1.10.50772 > 220.181.174.98.http: Flags [S], seq 3108022790, win 65535, options [mss 1460,sackOK,TS val 226828101 ecr 0,nop,wscale 10], length 0
12:07:37.591930 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [S], seq 3945347259, win 65535, options [mss 1460,sackOK,TS val 3778719411 ecr 0,nop,wscale 10], length 0
12:07:37.605512 IP 192.168.1.10.48258 > 36.103.232.129.https: Flags [S], seq 1261352372, win 65535, options [mss 1460,sackOK,TS val 1302348874 ecr 0,nop,wscale 10], length 0
12:07:37.605586 IP 192.168.1.10.45316 > 36.103.232.129.http: Flags [S], seq 3530263251, win 65535, options [mss 1460,sackOK,TS val 1302348874 ecr 0,nop,wscale 10], length 0
12:07:37.639533 IP 192.168.1.10.42540 > clientservices.googleapis.com.https: UDP, length 1250
12:07:37.639785 IP Transparent.192.168.1.1.43439 > clientservices.googleapis.com.https: UDP, length 1250
12:07:37.703506 IP 192.168.1.10.54064 > safebrowsing.google.com.https: Flags [S], seq 2024331871, win 65535, options [mss 1460,sackOK,TS val 4097962245 ecr 0,nop,wscale 10], length 0
12:07:37.954259 IP 192.168.1.10.51756 > www.google.com.https: Flags [S], seq 2175868250, win 65535, options [mss 1460,sackOK,TS val 204712451 ecr 0,nop,wscale 10], length 0
12:07:37.971922 IP 192.168.1.10.33036 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 656103490, win 65535, options [mss 1460,sackOK,TS val 3226159285 ecr 0,nop,wscale 10], length 0
12:07:37.998049 IP 192.168.1.10.34632 > m.facebook.com.https: Flags [S], seq 2510077081, win 65535, options [mss 1460,sackOK,TS val 1858462911 ecr 0,nop,wscale 10], length 0
12:07:38.173395 IP 192.168.1.10.58520 > szextshort.weixin.qq.com.http: Flags [S], seq 2214254207, win 65535, options [mss 1400,sackOK,TS val 3092140435 ecr 0,nop,wscale 10], length 0
12:07:38.230330 IP 192.168.1.10.33042 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 430857714, win 65535, options [mss 1460,sackOK,TS val 3226159543 ecr 0,nop,wscale 10], length 0
12:07:38.238828 IP 192.168.1.10.42540 > clientservices.googleapis.com.https: UDP, length 1250
12:07:38.239054 IP Transparent.192.168.1.1.43439 > clientservices.googleapis.com.https: UDP, length 1250
12:07:38.255176 IP 192.168.1.10.34638 > m.facebook.com.https: Flags [S], seq 1206859231, win 65535, options [mss 1460,sackOK,TS val 1858463168 ecr 0,nop,wscale 10], length 0
12:07:38.310265 IP 192.168.1.10.51748 > www.google.com.https: Flags [S], seq 2120051268, win 65535, options [mss 1460,sackOK,TS val 204712808 ecr 0,nop,wscale 10], length 0
12:07:38.341463 IP 192.168.1.10.49596 > clientservices.googleapis.com.https: Flags [S], seq 1620362195, win 65535, options [mss 1460,sackOK,TS val 3778720160 ecr 0,nop,wscale 10], length 0
12:07:38.363393 IP 192.168.1.10.41898 > mail.xxxxxx.com.cn.https: Flags [S], seq 1655601765, win 65535, options [mss 1460,sackOK,TS val 1610960660 ecr 0,nop,wscale 10], length 0
12:07:38.381984 IP 192.168.1.10.41738 > www.google.com.https: UDP, length 1250
12:07:38.597784 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [S], seq 3945347259, win 65535, options [mss 1460,sackOK,TS val 3778720416 ecr 0,nop,wscale 10], length 0
12:07:38.597844 IP 192.168.1.10.50772 > 220.181.174.98.http: Flags [S], seq 3108022790, win 65535, options [mss 1460,sackOK,TS val 226829129 ecr 0,nop,wscale 10], length 0
12:07:38.693837 IP 192.168.1.10.51736 > www.google.com.https: Flags [S], seq 4214884307, win 65535, options [mss 1460,sackOK,TS val 204713192 ecr 0,nop,wscale 10], length 0
12:07:38.759183 IP 192.168.1.10.33120 > sdkapiv2.bizport.cn.https: Flags [S], seq 3499225937, win 65535, options [mss 1460,sackOK,TS val 265425301 ecr 0,nop,wscale 10], length 0
12:07:38.950480 IP 192.168.1.10.51756 > www.google.com.https: Flags [S], seq 2175868250, win 65535, options [mss 1460,sackOK,TS val 204713449 ecr 0,nop,wscale 10], length 0
12:07:38.950480 IP 192.168.1.10.51740 > www.google.com.https: Flags [S], seq 2807327533, win 65535, options [mss 1460,sackOK,TS val 204713448 ecr 0,nop,wscale 10], length 0
12:07:38.976311 IP 192.168.1.10.47348 > 101.227.132.126.https: Flags [S], seq 1151113391, win 65535, options [mss 1460,sackOK,TS val 1240057503 ecr 0,nop,wscale 10], length 0
12:07:38.977737 IP 192.168.1.10.47350 > 101.227.132.126.https: Flags [S], seq 525243747, win 65535, options [mss 1460,sackOK,TS val 1240057505 ecr 0,nop,wscale 10], length 0
12:07:38.977829 IP 192.168.1.10.47352 > 101.227.132.126.https: Flags [S], seq 165909, win 65535, options [mss 1460,sackOK,TS val 1240057505 ecr 0,nop,wscale 10], length 0
12:07:38.983010 IP 192.168.1.10.33036 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 656103490, win 65535, options [mss 1460,sackOK,TS val 3226160294 ecr 0,nop,wscale 10], length 0
12:07:38.983053 IP 192.168.1.10.51742 > www.google.com.https: Flags [S], seq 2594324269, win 65535, options [mss 1460,sackOK,TS val 204713480 ecr 0,nop,wscale 10], length 0
12:07:39.017821 IP 192.168.1.10.34632 > m.facebook.com.https: Flags [S], seq 2510077081, win 65535, options [mss 1460,sackOK,TS val 1858463930 ecr 0,nop,wscale 10], length 0
12:07:39.046056 IP 192.168.1.10.55906 > www.google.com.https: UDP, length 1250
12:07:39.173787 IP 192.168.1.10.58520 > szextshort.weixin.qq.com.http: Flags [S], seq 2214254207, win 65535, options [mss 1400,sackOK,TS val 3092141435 ecr 0,nop,wscale 10], length 0
12:07:39.238519 IP 192.168.1.10.33042 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 430857714, win 65535, options [mss 1460,sackOK,TS val 3226160550 ecr 0,nop,wscale 10], length 0
12:07:39.238604 IP 192.168.1.10.47322 > 101.227.132.126.https: Flags [S], seq 1704954101, win 65535, options [mss 1460,sackOK,TS val 1240057765 ecr 0,nop,wscale 10], length 0
12:07:39.270809 IP 192.168.1.10.34638 > m.facebook.com.https: Flags [S], seq 1206859231, win 65535, options [mss 1460,sackOK,TS val 1858464182 ecr 0,nop,wscale 10], length 0
12:07:39.301736 IP 192.168.1.10.37424 > gear.sca.samsung.cn.https: Flags [S], seq 1646846100, win 65535, options [mss 1460,sackOK,TS val 673471378 ecr 0,nop,wscale 10], length 0
12:07:39.351186 IP 192.168.1.10.51776 > www.google.com.https: Flags [S], seq 2676063872, win 65535, options [mss 1460,sackOK,TS val 204713850 ecr 0,nop,wscale 10], length 0
12:07:39.351188 IP 192.168.1.10.55906 > www.google.com.https: UDP, length 1250
12:07:39.366797 IP 192.168.1.10.41898 > mail.xxxxxx.com.cn.https: Flags [S], seq 1655601765, win 65535, options [mss 1460,sackOK,TS val 1610961662 ecr 0,nop,wscale 10], length 0
12:07:39.446950 IP 192.168.1.10.42540 > clientservices.googleapis.com.https: UDP, length 1250
12:07:39.447198 IP Transparent.192.168.1.1.43439 > clientservices.googleapis.com.https: UDP, length 1250
12:07:39.852496 IP 192.168.1.10.54934 > 110.76.8.204.https: Flags [S], seq 4250216857, win 65535, options [mss 1400,sackOK,TS val 2304565426 ecr 0,nop,wscale 10], length 0
12:07:39.960848 IP 192.168.1.10.55906 > www.google.com.https: UDP, length 1250
12:07:39.973885 IP 192.168.1.10.47352 > 101.227.132.126.https: Flags [S], seq 165909, win 65535, options [mss 1460,sackOK,TS val 1240058501 ecr 0,nop,wscale 10], length 0
12:07:39.973924 IP 192.168.1.10.47348 > 101.227.132.126.https: Flags [S], seq 1151113391, win 65535, options [mss 1460,sackOK,TS val 1240058501 ecr 0,nop,wscale 10], length 0
12:07:39.973930 IP 192.168.1.10.47350 > 101.227.132.126.https: Flags [S], seq 525243747, win 65535, options [mss 1460,sackOK,TS val 1240058501 ecr 0,nop,wscale 10], length 0
12:07:40.234751 IP 192.168.1.10.51170 > szshort.weixin.qq.com.http: Flags [S], seq 3417478205, win 65535, options [mss 1400,sackOK,TS val 1891903270 ecr 0,nop,wscale 10], length 0
12:07:40.254579 IP 192.168.1.10.58730 > api.appcenter.ms.https: Flags [S], seq 1102430898, win 65535, options [mss 1460,sackOK,TS val 24745259 ecr 0,nop,wscale 10], length 0
12:07:40.325958 IP 192.168.1.10.51748 > www.google.com.https: Flags [S], seq 2120051268, win 65535, options [mss 1460,sackOK,TS val 204714824 ecr 0,nop,wscale 10], length 0
12:07:40.357925 IP 192.168.1.10.49596 > clientservices.googleapis.com.https: Flags [S], seq 1620362195, win 65535, options [mss 1460,sackOK,TS val 3778722176 ecr 0,nop,wscale 10], length 0
12:07:40.357928 IP 192.168.1.10.51776 > www.google.com.https: Flags [S], seq 2676063872, win 65535, options [mss 1460,sackOK,TS val 204714856 ecr 0,nop,wscale 10], length 0
12:07:40.371233 IP clientservices.googleapis.com.https > Transparent.192.168.1.1.43439: UDP, length 23
12:07:40.371516 IP clientservices.googleapis.com.https > 192.168.1.10.42540: UDP, length 23
12:07:40.619576 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [S], seq 3945347259, win 65535, options [mss 1460,sackOK,TS val 3778722432 ecr 0,nop,wscale 10], length 0
12:07:40.619654 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [S.], seq 3415844755, ack 3945347260, win 65160, options [mss 1460,sackOK,TS val 2415110750 ecr 3778722432,nop,wscale 7], length 0
12:07:40.619771 IP 192.168.1.10.50772 > 220.181.174.98.http: Flags [S], seq 3108022790, win 65535, options [mss 1460,sackOK,TS val 226831145 ecr 0,nop,wscale 10], length 0
12:07:40.623232 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [.], ack 1, win 64, options [nop,nop,TS val 3778722442 ecr 2415110750], length 0
12:07:40.623896 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [P.], seq 1:796, ack 1, win 64, options [nop,nop,TS val 3778722443 ecr 2415110750], length 795
12:07:40.623926 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [.], ack 796, win 503, options [nop,nop,TS val 2415110754 ecr 3778722443], length 0
12:07:40.678701 IP 192.168.1.10.58540 > szextshort.weixin.qq.com.http: Flags [S], seq 954892822, win 65535, options [mss 1400,sackOK,TS val 3092142940 ecr 0,nop,wscale 10], length 0
12:07:40.971694 IP 192.168.1.10.51756 > www.google.com.https: Flags [S], seq 2175868250, win 65535, options [mss 1460,sackOK,TS val 204715464 ecr 0,nop,wscale 10], length 0
12:07:40.998158 IP 192.168.1.10.33036 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 656103490, win 65535, options [mss 1460,sackOK,TS val 3226162310 ecr 0,nop,wscale 10], length 0
12:07:41.032207 IP 192.168.1.10.34632 > m.facebook.com.https: Flags [S], seq 2510077081, win 65535, options [mss 1460,sackOK,TS val 1858465942 ecr 0,nop,wscale 10], length 0
12:07:41.166837 IP 192.168.1.10.55906 > www.google.com.https: UDP, length 1250
12:07:41.191024 IP 192.168.1.10.58520 > szextshort.weixin.qq.com.http: Flags [S], seq 2214254207, win 65535, options [mss 1400,sackOK,TS val 3092143451 ecr 0,nop,wscale 10], length 0
12:07:41.253893 IP 192.168.1.10.58730 > api.appcenter.ms.https: Flags [S], seq 1102430898, win 65535, options [mss 1460,sackOK,TS val 24746259 ecr 0,nop,wscale 10], length 0
12:07:41.253947 IP 192.168.1.10.51170 > szshort.weixin.qq.com.http: Flags [S], seq 3417478205, win 65535, options [mss 1400,sackOK,TS val 1891904289 ecr 0,nop,wscale 10], length 0
12:07:41.253949 IP 192.168.1.10.33042 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 430857714, win 65535, options [mss 1460,sackOK,TS val 3226162566 ecr 0,nop,wscale 10], length 0
12:07:41.293754 IP 192.168.1.10.34638 > m.facebook.com.https: Flags [S], seq 1206859231, win 65535, options [mss 1460,sackOK,TS val 1858466198 ecr 0,nop,wscale 10], length 0
12:07:41.352889 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [P.], seq 1:3536, ack 796, win 503, options [nop,nop,TS val 2415111483 ecr 3778722443], length 3535
12:07:41.352989 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [P.], seq 3536:4859, ack 796, win 503, options [nop,nop,TS val 2415111483 ecr 3778722443], length 1323
12:07:41.358866 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [.], ack 3536, win 71, options [nop,nop,TS val 3778723177 ecr 2415111483], length 0
12:07:41.358908 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [.], ack 4859, win 74, options [nop,nop,TS val 3778723178 ecr 2415111483], length 0
12:07:41.359580 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [P.], seq 796:870, ack 4859, win 74, options [nop,nop,TS val 3778723178 ecr 2415111483], length 74
12:07:41.359622 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [.], ack 870, win 503, options [nop,nop,TS val 2415111490 ecr 3778723178], length 0
12:07:41.359652 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [P.], seq 870:968, ack 4859, win 74, options [nop,nop,TS val 3778723179 ecr 2415111483], length 98
12:07:41.359657 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [.], ack 968, win 503, options [nop,nop,TS val 2415111490 ecr 3778723179], length 0
12:07:41.363947 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [.], seq 968:3864, ack 4859, win 74, options [nop,nop,TS val 3778723182 ecr 2415111490], length 2896
12:07:41.363991 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [.], ack 3864, win 491, options [nop,nop,TS val 2415111494 ecr 3778723182], length 0
12:07:41.364069 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [P.], seq 3864:6440, ack 4859, win 74, options [nop,nop,TS val 3778723182 ecr 2415111490], length 2576
12:07:41.364075 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [.], ack 6440, win 491, options [nop,nop,TS val 2415111494 ecr 3778723182], length 0
12:07:41.381713 IP 192.168.1.10.41898 > mail.xxxxxx.com.cn.https: Flags [S], seq 1655601765, win 65535, options [mss 1460,sackOK,TS val 1610963678 ecr 0,nop,wscale 10], length 0
12:07:41.593022 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [P.], seq 4859:5876, ack 6440, win 501, options [nop,nop,TS val 2415111723 ecr 3778723182], length 1017
12:07:41.630167 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [P.], seq 6440:6471, ack 5876, win 77, options [nop,nop,TS val 3778723449 ecr 2415111723], length 31
12:07:41.630236 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [.], ack 6471, win 501, options [nop,nop,TS val 2415111761 ecr 3778723449], length 0
12:07:41.630992 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [P.], seq 5876:6451, ack 6471, win 501, options [nop,nop,TS val 2415111761 ecr 3778723449], length 575
12:07:41.633354 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [P.], seq 6451:6610, ack 6471, win 501, options [nop,nop,TS val 2415111764 ecr 3778723449], length 159
12:07:41.634931 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [P.], seq 6610:6649, ack 6471, win 501, options [nop,nop,TS val 2415111765 ecr 3778723449], length 39
12:07:41.638839 IP 192.168.1.10.45316 > 36.103.232.129.http: Flags [S], seq 3530263251, win 65535, options [mss 1460,sackOK,TS val 1302352906 ecr 0,nop,wscale 10], length 0
12:07:41.638918 IP 192.168.1.10.48258 > 36.103.232.129.https: Flags [S], seq 1261352372, win 65535, options [mss 1460,sackOK,TS val 1302352906 ecr 0,nop,wscale 10], length 0
12:07:41.638957 IP 192.168.1.10.54058 > safebrowsing.google.com.https: Flags [S], seq 1464341530, win 65535, options [mss 1460,sackOK,TS val 4097966181 ecr 0,nop,wscale 10], length 0
12:07:41.638962 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [.], ack 6610, win 83, options [nop,nop,TS val 3778723456 ecr 2415111761], length 0
12:07:41.638983 IP 192.168.1.10.49600 > clientservices.googleapis.com.https: Flags [P.], seq 6471:6510, ack 6649, win 83, options [nop,nop,TS val 3778723457 ecr 2415111765], length 39
12:07:41.679817 IP clientservices.googleapis.com.https > 192.168.1.10.49600: Flags [.], ack 6510, win 501, options [nop,nop,TS val 2415111810 ecr 3778723457], length 0
12:07:41.705604 IP 192.168.1.10.58540 > szextshort.weixin.qq.com.http: Flags [S], seq 954892822, win 65535, options [mss 1400,sackOK,TS val 3092143967 ecr 0,nop,wscale 10], length 0
12:07:41.893592 IP 192.168.1.10.54064 > safebrowsing.google.com.https: Flags [S], seq 2024331871, win 65535, options [mss 1460,sackOK,TS val 4097966437 ecr 0,nop,wscale 10], length 0
12:07:41.989615 IP 192.168.1.10.47348 > 101.227.132.126.https: Flags [S], seq 1151113391, win 65535, options [mss 1460,sackOK,TS val 1240060517 ecr 0,nop,wscale 10], length 0
12:07:41.989681 IP 192.168.1.10.47352 > 101.227.132.126.https: Flags [S], seq 165909, win 65535, options [mss 1460,sackOK,TS val 1240060517 ecr 0,nop,wscale 10], length 0
12:07:41.989691 IP 192.168.1.10.47350 > 101.227.132.126.https: Flags [S], seq 525243747, win 65535, options [mss 1460,sackOK,TS val 1240060517 ecr 0,nop,wscale 10], length 0
12:07:42.380338 IP 192.168.1.10.51776 > www.google.com.https: Flags [S], seq 2676063872, win 65535, options [mss 1460,sackOK,TS val 204716872 ecr 0,nop,wscale 10], length 0
12:07:42.748401 IP 192.168.1.10.51176 > szshort.weixin.qq.com.http: Flags [S], seq 140454774, win 65535, options [mss 1400,sackOK,TS val 1891905778 ecr 0,nop,wscale 10], length 0
12:07:42.889082 IP 192.168.1.10.34658 > m.facebook.com.https: Flags [S], seq 295212418, win 65535, options [mss 1460,sackOK,TS val 1858467802 ecr 0,nop,wscale 10], length 0
12:07:42.896572 IP 192.168.1.10.37630 > baidu.com.http: Flags [S], seq 3096043437, win 65535, options [mss 1460,sackOK,TS val 697373879 ecr 0,nop,wscale 10], length 0
12:07:42.900779 IP 192.168.1.10.37632 > baidu.com.http: Flags [S], seq 3316573468, win 65535, options [mss 1460,sackOK,TS val 697373884 ecr 0,nop,wscale 10], length 0
12:07:42.919111 IP 192.168.1.10.33120 > sdkapiv2.bizport.cn.https: Flags [S], seq 3499225937, win 65535, options [mss 1460,sackOK,TS val 265429461 ecr 0,nop,wscale 10], length 0
12:07:42.919159 IP 192.168.1.10.51736 > www.google.com.https: Flags [S], seq 4214884307, win 65535, options [mss 1460,sackOK,TS val 204717416 ecr 0,nop,wscale 10], length 0
12:07:43.054762 IP 192.168.1.10.55906 > www.google.com.https: UDP, length 1250
12:07:43.135534 IP 192.168.1.10.37634 > baidu.com.http: Flags [S], seq 2599128669, win 65535, options [mss 1460,sackOK,TS val 697374119 ecr 0,nop,wscale 10], length 0
12:07:43.173641 IP 192.168.1.10.36958 > 180.97.34.146.http: Flags [S], seq 1778919700, win 65535, options [mss 1460,sackOK,TS val 2189956623 ecr 0,nop,wscale 10], length 0
12:07:43.173641 IP 192.168.1.10.51742 > www.google.com.https: Flags [S], seq 2594324269, win 65535, options [mss 1460,sackOK,TS val 204717672 ecr 0,nop,wscale 10], length 0
12:07:43.173644 IP 192.168.1.10.51740 > www.google.com.https: Flags [S], seq 2807327533, win 65535, options [mss 1460,sackOK,TS val 204717672 ecr 0,nop,wscale 10], length 0
12:07:43.184334 IP 192.168.1.10.58102 > 157.148.61.213.http: Flags [S], seq 3433459971, win 65535, options [mss 1400,sackOK,TS val 3141397136 ecr 0,nop,wscale 10], length 0
12:07:43.199286 IP 192.168.1.10.33074 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 3773690983, win 65535, options [mss 1460,sackOK,TS val 3226164512 ecr 0,nop,wscale 10], length 0
12:07:43.269728 IP 192.168.1.10.58730 > api.appcenter.ms.https: Flags [S], seq 1102430898, win 65535, options [mss 1460,sackOK,TS val 24748275 ecr 0,nop,wscale 10], length 0
12:07:43.269799 IP 192.168.1.10.51170 > szshort.weixin.qq.com.http: Flags [S], seq 3417478205, win 65535, options [mss 1400,sackOK,TS val 1891906305 ecr 0,nop,wscale 10], length 0
12:07:43.430312 IP 192.168.1.10.47322 > 101.227.132.126.https: Flags [S], seq 1704954101, win 65535, options [mss 1460,sackOK,TS val 1240061957 ecr 0,nop,wscale 10], length 0
12:07:43.724340 IP 192.168.1.10.58540 > szextshort.weixin.qq.com.http: Flags [S], seq 954892822, win 65535, options [mss 1400,sackOK,TS val 3092145979 ecr 0,nop,wscale 10], length 0
12:07:43.750559 IP 192.168.1.10.51176 > szshort.weixin.qq.com.http: Flags [S], seq 140454774, win 65535, options [mss 1400,sackOK,TS val 1891906785 ecr 0,nop,wscale 10], length 0
12:07:43.909795 IP 192.168.1.10.34658 > m.facebook.com.https: Flags [S], seq 295212418, win 65535, options [mss 1460,sackOK,TS val 1858468822 ecr 0,nop,wscale 10], length 0
12:07:43.909800 IP 192.168.1.10.37630 > baidu.com.http: Flags [S], seq 3096043437, win 65535, options [mss 1460,sackOK,TS val 697374893 ecr 0,nop,wscale 10], length 0
12:07:43.909804 IP 192.168.1.10.37632 > baidu.com.http: Flags [S], seq 3316573468, win 65535, options [mss 1460,sackOK,TS val 697374893 ecr 0,nop,wscale 10], length 0
12:07:44.144031 IP 192.168.1.10.37634 > baidu.com.http: Flags [S], seq 2599128669, win 65535, options [mss 1460,sackOK,TS val 697375117 ecr 0,nop,wscale 10], length 0
12:07:44.197813 IP 192.168.1.10.58102 > 157.148.61.213.http: Flags [S], seq 3433459971, win 65535, options [mss 1400,sackOK,TS val 3141398149 ecr 0,nop,wscale 10], length 0
12:07:44.199946 IP 192.168.1.10.33074 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 3773690983, win 65535, options [mss 1460,sackOK,TS val 3226165511 ecr 0,nop,wscale 10], length 0
12:07:44.460710 IP 192.168.1.10.49596 > clientservices.googleapis.com.https: Flags [S], seq 1620362195, win 65535, options [mss 1460,sackOK,TS val 3778726272 ecr 0,nop,wscale 10], length 0
12:07:44.460793 IP clientservices.googleapis.com.https > 192.168.1.10.49596: Flags [S.], seq 595994435, ack 1620362196, win 65160, options [mss 1460,sackOK,TS val 2415114591 ecr 3778726272,nop,wscale 7], length 0
12:07:44.460845 IP 192.168.1.10.51748 > www.google.com.https: Flags [S], seq 2120051268, win 65535, options [mss 1460,sackOK,TS val 204718953 ecr 0,nop,wscale 10], length 0
12:07:44.466164 IP 192.168.1.10.49596 > clientservices.googleapis.com.https: Flags [.], ack 1, win 64, options [nop,nop,TS val 3778726284 ecr 2415114591], length 0
12:07:44.467167 IP 192.168.1.10.49596 > clientservices.googleapis.com.https: Flags [P.], seq 1:796, ack 1, win 64, options [nop,nop,TS val 3778726286 ecr 2415114591], length 795
12:07:44.467200 IP clientservices.googleapis.com.https > 192.168.1.10.49596: Flags [.], ack 796, win 503, options [nop,nop,TS val 2415114598 ecr 3778726286], length 0
12:07:44.716208 IP 192.168.1.10.50772 > 220.181.174.98.http: Flags [S], seq 3108022790, win 65535, options [mss 1460,sackOK,TS val 226835241 ecr 0,nop,wscale 10], length 0
12:07:44.971171 IP 192.168.1.10.51756 > www.google.com.https: Flags [S], seq 2175868250, win 65535, options [mss 1460,sackOK,TS val 204719464 ecr 0,nop,wscale 10], length 0
12:07:45.147928 IP clientservices.googleapis.com.https > 192.168.1.10.49596: Flags [P.], seq 1:391, ack 796, win 503, options [nop,nop,TS val 2415115278 ecr 3778726286], length 390
12:07:45.152265 IP 192.168.1.10.49596 > clientservices.googleapis.com.https: Flags [.], ack 391, win 66, options [nop,nop,TS val 3778726971 ecr 2415115278], length 0
12:07:45.153604 IP 192.168.1.10.49596 > clientservices.googleapis.com.https: Flags [P.], seq 796:870, ack 391, win 66, options [nop,nop,TS val 3778726972 ecr 2415115278], length 74
12:07:45.153650 IP clientservices.googleapis.com.https > 192.168.1.10.49596: Flags [.], ack 870, win 503, options [nop,nop,TS val 2415115284 ecr 3778726972], length 0
12:07:45.221945 IP 192.168.1.10.34632 > m.facebook.com.https: Flags [S], seq 2510077081, win 65535, options [mss 1460,sackOK,TS val 1858470134 ecr 0,nop,wscale 10], length 0
12:07:45.221991 IP 192.168.1.10.58520 > szextshort.weixin.qq.com.http: Flags [S], seq 2214254207, win 65535, options [mss 1400,sackOK,TS val 3092147483 ecr 0,nop,wscale 10], length 0
12:07:45.221999 IP 192.168.1.10.33036 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 656103490, win 65535, options [mss 1460,sackOK,TS val 3226166534 ecr 0,nop,wscale 10], length 0
12:07:45.252038 IP 192.168.1.10.41372 > 157.148.59.239.http: Flags [S], seq 3318216454, win 65535, options [mss 1400,sackOK,TS val 3248506713 ecr 0,nop,wscale 10], length 0
12:07:45.391570 IP clientservices.googleapis.com.https > 192.168.1.10.49596: Flags [P.], seq 391:1377, ack 870, win 503, options [nop,nop,TS val 2415115522 ecr 3778726972], length 986
12:07:45.433701 IP 192.168.1.10.49596 > clientservices.googleapis.com.https: Flags [.], ack 1377, win 67, options [nop,nop,TS val 3778727252 ecr 2415115522], length 0
12:07:45.477794 IP 192.168.1.10.33042 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 430857714, win 65535, options [mss 1460,sackOK,TS val 3226166790 ecr 0,nop,wscale 10], length 0
12:07:45.478059 IP 192.168.1.10.41898 > mail.xxxxxx.com.cn.https: Flags [S], seq 1655601765, win 65535, options [mss 1460,sackOK,TS val 1610967774 ecr 0,nop,wscale 10], length 0
12:07:45.478085 IP 192.168.1.10.34638 > m.facebook.com.https: Flags [S], seq 1206859231, win 65535, options [mss 1460,sackOK,TS val 1858470390 ecr 0,nop,wscale 10], length 0
12:07:45.771718 IP 192.168.1.10.51176 > szshort.weixin.qq.com.http: Flags [S], seq 140454774, win 65535, options [mss 1400,sackOK,TS val 1891908801 ecr 0,nop,wscale 10], length 0
12:07:45.927374 IP 192.168.1.10.34658 > m.facebook.com.https: Flags [S], seq 295212418, win 65535, options [mss 1460,sackOK,TS val 1858470838 ecr 0,nop,wscale 10], length 0
12:07:45.927377 IP 192.168.1.10.37630 > baidu.com.http: Flags [S], seq 3096043437, win 65535, options [mss 1460,sackOK,TS val 697376909 ecr 0,nop,wscale 10], length 0
12:07:45.927377 IP 192.168.1.10.37632 > baidu.com.http: Flags [S], seq 3316573468, win 65535, options [mss 1460,sackOK,TS val 697376909 ecr 0,nop,wscale 10], length 0
12:07:45.990071 IP 192.168.1.10.47350 > 101.227.132.126.https: Flags [S], seq 525243747, win 65535, options [mss 1460,sackOK,TS val 1240064517 ecr 0,nop,wscale 10], length 0
12:07:45.990141 IP 192.168.1.10.47352 > 101.227.132.126.https: Flags [S], seq 165909, win 65535, options [mss 1460,sackOK,TS val 1240064517 ecr 0,nop,wscale 10], length 0
12:07:45.990149 IP 192.168.1.10.47348 > 101.227.132.126.https: Flags [S], seq 1151113391, win 65535, options [mss 1460,sackOK,TS val 1240064517 ecr 0,nop,wscale 10], length 0
12:07:46.150791 IP 192.168.1.10.37634 > baidu.com.http: Flags [S], seq 2599128669, win 65535, options [mss 1460,sackOK,TS val 697377134 ecr 0,nop,wscale 10], length 0
12:07:46.214135 IP 192.168.1.10.33074 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 3773690983, win 65535, options [mss 1460,sackOK,TS val 3226167526 ecr 0,nop,wscale 10], length 0
12:07:46.214137 IP 192.168.1.10.58102 > 157.148.61.213.http: Flags [S], seq 3433459971, win 65535, options [mss 1400,sackOK,TS val 3141400165 ecr 0,nop,wscale 10], length 0
12:07:46.222279 IP 192.168.1.10.45340 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 1685864087, win 65535, options [mss 1460,sackOK,TS val 1133394614 ecr 0,nop,wscale 10], length 0
12:07:46.234451 IP 192.168.1.10.46492 > ec2-54-223-115-154.cn-north-1.compute.amazonaws.com.cn.https: Flags [S], seq 2318772053, win 65535, options [mss 1460,sackOK,TS val 4285677784 ecr 0,nop,wscale 10], length 0
12:07:46.241361 IP 192.168.1.10.45344 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 2172863234, win 65535, options [mss 1460,sackOK,TS val 1133394633 ecr 0,nop,wscale 10], length 0
12:07:46.277517 IP 192.168.1.10.41372 > 157.148.59.239.http: Flags [S], seq 3318216454, win 65535, options [mss 1400,sackOK,TS val 3248507739 ecr 0,nop,wscale 10], length 0
12:07:46.503705 IP 192.168.1.10.51776 > www.google.com.https: Flags [S], seq 2676063872, win 65535, options [mss 1460,sackOK,TS val 204721001 ecr 0,nop,wscale 10], length 0
12:07:47.242724 IP 192.168.1.10.45344 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 2172863234, win 65535, options [mss 1460,sackOK,TS val 1133395630 ecr 0,nop,wscale 10], length 0
12:07:47.242779 IP 192.168.1.10.46492 > ec2-54-223-115-154.cn-north-1.compute.amazonaws.com.cn.https: Flags [S], seq 2318772053, win 65535, options [mss 1460,sackOK,TS val 4285678789 ecr 0,nop,wscale 10], length 0
12:07:47.242805 IP 192.168.1.10.45340 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 1685864087, win 65535, options [mss 1460,sackOK,TS val 1133395631 ecr 0,nop,wscale 10], length 0
12:07:47.269885 IP 192.168.1.10.51170 > szshort.weixin.qq.com.http: Flags [S], seq 3417478205, win 65535, options [mss 1400,sackOK,TS val 1891910305 ecr 0,nop,wscale 10], length 0
12:07:47.269886 IP 192.168.1.10.58730 > api.appcenter.ms.https: Flags [S], seq 1102430898, win 65535, options [mss 1460,sackOK,TS val 24752275 ecr 0,nop,wscale 10], length 0
12:07:48.296393 IP 192.168.1.10.41372 > 157.148.59.239.http: Flags [S], seq 3318216454, win 65535, options [mss 1400,sackOK,TS val 3248509755 ecr 0,nop,wscale 10], length 0
12:07:48.995297 IP 192.168.1.10.45346 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 1036306264, win 65535, options [mss 1460,sackOK,TS val 1133397383 ecr 0,nop,wscale 10], length 0
12:07:48.995322 IP 192.168.1.10.45348 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 1327777293, win 65535, options [mss 1460,sackOK,TS val 1133397383 ecr 0,nop,wscale 10], length 0
12:07:48.995444 IP 192.168.1.10.45350 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 4058963890, win 65535, options [mss 1460,sackOK,TS val 1133397384 ecr 0,nop,wscale 10], length 0
12:07:49.260227 IP 192.168.1.10.45340 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 1685864087, win 65535, options [mss 1460,sackOK,TS val 1133397646 ecr 0,nop,wscale 10], length 0
12:07:49.260239 IP 192.168.1.10.46492 > ec2-54-223-115-154.cn-north-1.compute.amazonaws.com.cn.https: Flags [S], seq 2318772053, win 65535, options [mss 1460,sackOK,TS val 4285680804 ecr 0,nop,wscale 10], length 0
12:07:49.260355 IP 192.168.1.10.45344 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 2172863234, win 65535, options [mss 1460,sackOK,TS val 1133397647 ecr 0,nop,wscale 10], length 0
12:07:49.835942 IP 192.168.1.10.54058 > safebrowsing.google.com.https: Flags [S], seq 1464341530, win 65535, options [mss 1460,sackOK,TS val 4097974373 ecr 0,nop,wscale 10], length 0
12:07:49.835976 IP 192.168.1.10.51176 > szshort.weixin.qq.com.http: Flags [S], seq 140454774, win 65535, options [mss 1400,sackOK,TS val 1891912865 ecr 0,nop,wscale 10], length 0
12:07:49.925790 IP 192.168.1.10.37632 > baidu.com.http: Flags [S], seq 3316573468, win 65535, options [mss 1460,sackOK,TS val 697380909 ecr 0,nop,wscale 10], length 0
12:07:49.925791 IP 192.168.1.10.34658 > m.facebook.com.https: Flags [S], seq 295212418, win 65535, options [mss 1460,sackOK,TS val 1858474838 ecr 0,nop,wscale 10], length 0
12:07:49.990294 IP 192.168.1.10.45346 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 1036306264, win 65535, options [mss 1460,sackOK,TS val 1133398382 ecr 0,nop,wscale 10], length 0
12:07:49.990302 IP 192.168.1.10.45350 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 4058963890, win 65535, options [mss 1460,sackOK,TS val 1133398382 ecr 0,nop,wscale 10], length 0
12:07:49.990312 IP 192.168.1.10.45348 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 1327777293, win 65535, options [mss 1460,sackOK,TS val 1133398382 ecr 0,nop,wscale 10], length 0
12:07:50.085821 IP 192.168.1.10.37630 > baidu.com.http: Flags [S], seq 3096043437, win 65535, options [mss 1460,sackOK,TS val 697381069 ecr 0,nop,wscale 10], length 0
12:07:50.085821 IP 192.168.1.10.54064 > safebrowsing.google.com.https: Flags [S], seq 2024331871, win 65535, options [mss 1460,sackOK,TS val 4097974629 ecr 0,nop,wscale 10], length 0
12:07:50.149801 IP 192.168.1.10.37634 > baidu.com.http: Flags [S], seq 2599128669, win 65535, options [mss 1460,sackOK,TS val 697381133 ecr 0,nop,wscale 10], length 0
12:07:50.214233 IP 192.168.1.10.33074 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 3773690983, win 65535, options [mss 1460,sackOK,TS val 3226171526 ecr 0,nop,wscale 10], length 0
12:07:50.434636 IP 192.168.1.10.51168 > 39.109.122.128.https: Flags [S], seq 3279256655, win 65535, options [mss 1460,sackOK,TS val 48429060 ecr 0,nop,wscale 10], length 0
12:07:50.501068 IP 192.168.1.10.54146 > safebrowsing.google.com.https: Flags [S], seq 1407989237, win 65535, options [mss 1460,sackOK,TS val 4097975043 ecr 0,nop,wscale 10], length 0
12:07:50.687690 IP 192.168.1.10.51172 > 39.109.122.128.https: Flags [S], seq 1284111448, win 65535, options [mss 1460,sackOK,TS val 48429315 ecr 0,nop,wscale 10], length 0
12:07:50.704837 IP 192.168.1.10.54150 > safebrowsing.google.com.https: Flags [S], seq 4077463281, win 65535, options [mss 1460,sackOK,TS val 4097975248 ecr 0,nop,wscale 10], length 0
12:07:50.712665 IP 192.168.1.10.33098 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 629285236, win 65535, options [mss 1460,sackOK,TS val 3226172025 ecr 0,nop,wscale 10], length 0
12:07:50.764827 IP 192.168.1.10.54154 > safebrowsing.google.com.https: Flags [S], seq 3268585173, win 65535, options [mss 1460,sackOK,TS val 4097975303 ecr 0,nop,wscale 10], length 0
12:07:50.992125 IP 192.168.1.10.33102 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 477470186, win 65535, options [mss 1460,sackOK,TS val 3226172304 ecr 0,nop,wscale 10], length 0
12:07:51.025062 IP 192.168.1.10.53522 > 20.205.243.166.https: Flags [S], seq 1662829971, win 65535, options [mss 1460,sackOK,TS val 3594986528 ecr 0,nop,wscale 10], length 0
12:07:51.034858 IP 192.168.1.10.54160 > safebrowsing.google.com.https: Flags [S], seq 3153370787, win 65535, options [mss 1460,sackOK,TS val 4097975578 ecr 0,nop,wscale 10], length 0
12:07:51.036496 IP 192.168.1.10.53526 > 20.205.243.166.https: Flags [S], seq 3995408203, win 65535, options [mss 1460,sackOK,TS val 3594986540 ecr 0,nop,wscale 10], length 0
12:07:51.111441 IP 192.168.1.10.51736 > www.google.com.https: Flags [S], seq 4214884307, win 65535, options [mss 1460,sackOK,TS val 204725608 ecr 0,nop,wscale 10], length 0
12:07:51.111505 IP 192.168.1.10.33120 > sdkapiv2.bizport.cn.https: Flags [S], seq 3499225937, win 65535, options [mss 1460,sackOK,TS val 265437653 ecr 0,nop,wscale 10], length 0
12:07:51.279453 IP 192.168.1.10.53528 > 20.205.243.166.https: Flags [S], seq 1830246889, win 65535, options [mss 1460,sackOK,TS val 3594986784 ecr 0,nop,wscale 10], length 0
12:07:51.320705 IP 192.168.1.10.33112 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 2271846675, win 65535, options [mss 1460,sackOK,TS val 3226172632 ecr 0,nop,wscale 10], length 0
12:07:51.366811 IP 192.168.1.10.51742 > www.google.com.https: Flags [S], seq 2594324269, win 65535, options [mss 1460,sackOK,TS val 204725864 ecr 0,nop,wscale 10], length 0
12:07:51.366812 IP 192.168.1.10.51740 > www.google.com.https: Flags [S], seq 2807327533, win 65535, options [mss 1460,sackOK,TS val 204725864 ecr 0,nop,wscale 10], length 0
12:07:51.434938 IP 192.168.1.10.51168 > 39.109.122.128.https: Flags [S], seq 3279256655, win 65535, options [mss 1460,sackOK,TS val 48430061 ecr 0,nop,wscale 10], length 0
12:07:51.529551 IP 192.168.1.10.54146 > safebrowsing.google.com.https: Flags [S], seq 1407989237, win 65535, options [mss 1460,sackOK,TS val 4097976069 ecr 0,nop,wscale 10], length 0
12:07:51.602997 IP 192.168.1.10.60600 > 36.103.232.140.https: Flags [S], seq 3330664265, win 65535, options [mss 1460,sackOK,TS val 3879637292 ecr 0,nop,wscale 10], length 0
12:07:51.603054 IP 192.168.1.10.36462 > connectivity.samsung.com.cn.http: Flags [S], seq 262415307, win 65535, options [mss 1460,sackOK,TS val 1440954783 ecr 0,nop,wscale 10], length 0
12:07:51.688231 IP 192.168.1.10.51172 > 39.109.122.128.https: Flags [S], seq 1284111448, win 65535, options [mss 1460,sackOK,TS val 48430313 ecr 0,nop,wscale 10], length 0
12:07:51.717665 IP 192.168.1.10.33098 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 629285236, win 65535, options [mss 1460,sackOK,TS val 3226173030 ecr 0,nop,wscale 10], length 0
12:07:51.717686 IP 192.168.1.10.54150 > safebrowsing.google.com.https: Flags [S], seq 4077463281, win 65535, options [mss 1460,sackOK,TS val 4097976261 ecr 0,nop,wscale 10], length 0
12:07:51.781409 IP 192.168.1.10.54154 > safebrowsing.google.com.https: Flags [S], seq 3268585173, win 65535, options [mss 1460,sackOK,TS val 4097976325 ecr 0,nop,wscale 10], length 0
12:07:52.011899 IP 192.168.1.10.45350 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 4058963890, win 65535, options [mss 1460,sackOK,TS val 1133400398 ecr 0,nop,wscale 10], length 0
12:07:52.011899 IP 192.168.1.10.33102 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 477470186, win 65535, options [mss 1460,sackOK,TS val 3226173318 ecr 0,nop,wscale 10], length 0
12:07:52.011901 IP 192.168.1.10.45346 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 1036306264, win 65535, options [mss 1460,sackOK,TS val 1133400398 ecr 0,nop,wscale 10], length 0
12:07:52.011962 IP 192.168.1.10.45348 > 145.229.151.61.dial.xw.sh.dynamic.163data.com.cn.https: Flags [S], seq 1327777293, win 65535, options [mss 1460,sackOK,TS val 1133400402 ecr 0,nop,wscale 10], length 0
12:07:52.038377 IP 192.168.1.10.53526 > 20.205.243.166.https: Flags [S], seq 3995408203, win 65535, options [mss 1460,sackOK,TS val 3594987542 ecr 0,nop,wscale 10], length 0
12:07:52.038408 IP 192.168.1.10.54160 > safebrowsing.google.com.https: Flags [S], seq 3153370787, win 65535, options [mss 1460,sackOK,TS val 4097976581 ecr 0,nop,wscale 10], length 0
12:07:52.038451 IP 192.168.1.10.53522 > 20.205.243.166.https: Flags [S], seq 1662829971, win 65535, options [mss 1460,sackOK,TS val 3594987542 ecr 0,nop,wscale 10], length 0
12:07:52.303902 IP 192.168.1.10.53528 > 20.205.243.166.https: Flags [S], seq 1830246889, win 65535, options [mss 1460,sackOK,TS val 3594987800 ecr 0,nop,wscale 10], length 0
12:07:52.326698 IP 192.168.1.10.33112 > tsa01s11-in-f10.1e100.net.https: Flags [S], seq 2271846675, win 65535, options [mss 1460,sackOK,TS val 3226173639 ecr 0,nop,wscale 10], length 0
12:07:52.389932 IP 192.168.1.10.41372 > 157.148.59.239.http: Flags [S], seq 3318216454, win 65535, options [mss 1400,sackOK,TS val 3248513851 ecr 0,nop,wscale 10], length 0
12:07:52.613637 IP 192.168.1.10.60600 > 36.103.232.140.https: Flags [S], seq 3330664265, win 65535, options [mss 1460,sackOK,TS val 3879638303 ecr 0,nop,wscale 10], length 0
12:07:52.613699 IP 192.168.1.10.36462 > connectivity.samsung.com.cn.http: Flags [S], seq 262415307, win 65535, options [mss 1460,sackOK,TS val 1440955793 ecr 0,nop,wscale 10], length 0
12:07:52.649879 IP 192.168.1.10.51748 > www.google.com.https: Flags [S], seq 2120051268, win 65535, options [mss 1460,sackOK,TS val 204727148 ecr 0,nop,wscale 10], length 0
12:07:52.669198 IP 192.168.1.10.40180 > 128.242.245.93.https: UDP, length 1250
12:07:52.672427 IP 192.168.1.10.42910 > 128.242.245.93.https: Flags [S], seq 379147794, win 65535, options [mss 1460,sackOK,TS val 3092600127 ecr 0,nop,wscale 10], length 0
12:07:52.678325 IP 192.168.1.10.38820 > a23-206-250-89.deploy.static.akamaitechnologies.com.https: Flags [S], seq 1754236800, win 65535, options [mss 1460,sackOK,TS val 1238213086 ecr 0,nop,wscale 10], length 0
^C12:07:52.679966 IP 192.168.1.10.60414 > 104.244.43.131.https: Flags [S], seq 3021496396, win 65535, options [mss 1460,sackOK,TS val 4174602917 ecr 0,nop,wscale 10], length 0

272 packets captured
449 packets received by filter
153 packets dropped by kernel
root@Transparent:~# 

下面是第二种(手机连接老毛子wifiB, 然后把网关和DNS设置为旁路由192.168.1.200), 此时网络正常

下面是openwrt的抓包日志

root@OpenWrt:~# tcpdump -s 0 -i eth0  port 443 or 80 
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
20:12:27.031683 IP 192.168.1.200.80 > 192.168.1.100.9993: Flags [.], ack 425237189, win 501, length 0
20:12:27.032602 IP 192.168.1.100.9993 > 192.168.1.200.80: Flags [.], ack 1, win 8195, length 0
20:12:27.659515 IP 192.168.1.10.37456 > 180.97.34.146.80: Flags [F.], seq 3422036227, ack 703928822, win 224, length 0
20:12:27.659563 IP 192.168.1.200.37456 > 180.97.34.146.80: Flags [F.], seq 3422036227, ack 703928822, win 224, length 0
20:12:27.807907 IP 192.168.1.100.9993 > 192.168.1.200.80: Flags [P.], seq 1:516, ack 1, win 8195, length 515: HTTP: GET /cgi-bin/luci/admin/services/shadowsocksr/run?_=0.5489285523620604 HTTP/1.1
20:12:27.838808 IP 192.168.1.200.80 > 192.168.1.100.9993: Flags [P.], seq 1:70, ack 516, win 501, length 69: HTTP: HTTP/1.1 200 OK
20:12:27.883610 IP 192.168.1.100.9993 > 192.168.1.200.80: Flags [.], ack 70, win 8195, length 0
20:12:27.883664 IP 192.168.1.200.80 > 192.168.1.100.9993: Flags [P.], seq 70:211, ack 516, win 501, length 141: HTTP
20:12:27.929149 IP 192.168.1.100.9993 > 192.168.1.200.80: Flags [.], ack 211, win 8194, length 0
20:12:28.182415 IP 192.168.1.10.47518 > tb.himg.baidu.com.80: Flags [P.], seq 3496653728:3496653966, ack 2177916345, win 70, length 238: HTTP: GET /sys/portrait/item/tb.1.b77556e6.B5c1F1cvdQPPhbv47zpeVg?t=1667720140 HTTP/1.1
20:12:28.182416 IP 192.168.1.10.47498 > tb.himg.baidu.com.80: Flags [P.], seq 3671824711:3671824949, ack 1396731132, win 184, length 238: HTTP: GET /sys/portrait/item/tb.1.b77556e6.B5c1F1cvdQPPhbv47zpeVg?t=1667720140 HTTP/1.1
20:12:28.182416 IP 192.168.1.10.47516 > tb.himg.baidu.com.80: Flags [P.], seq 1230127144:1230127382, ack 1077003141, win 74, length 238: HTTP: GET /sys/portrait/item/tb.1.b77556e6.B5c1F1cvdQPPhbv47zpeVg?t=1667720140 HTTP/1.1
20:12:28.182416 IP 192.168.1.10.47498 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 184, length 0
20:12:28.182417 IP 192.168.1.10.47516 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 74, length 0
20:12:28.182417 IP 192.168.1.10.47518 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 70, length 0
20:12:28.182417 IP 192.168.1.10.48026 > tb.himg.baidu.com.80: Flags [S], seq 3258262897, win 65535, options [mss 1460,sackOK,TS val 3397232130 ecr 0,nop,wscale 10], length 0
20:12:28.182483 IP 192.168.1.200.47518 > tb.himg.baidu.com.80: Flags [P.], seq 3496653728:3496653966, ack 2177916345, win 70, length 238: HTTP: GET /sys/portrait/item/tb.1.b77556e6.B5c1F1cvdQPPhbv47zpeVg?t=1667720140 HTTP/1.1
20:12:28.182503 IP 192.168.1.200.47498 > tb.himg.baidu.com.80: Flags [P.], seq 3671824711:3671824949, ack 1396731132, win 184, length 238: HTTP: GET /sys/portrait/item/tb.1.b77556e6.B5c1F1cvdQPPhbv47zpeVg?t=1667720140 HTTP/1.1
20:12:28.182528 IP 192.168.1.200.47516 > tb.himg.baidu.com.80: Flags [P.], seq 1230127144:1230127382, ack 1077003141, win 74, length 238: HTTP: GET /sys/portrait/item/tb.1.b77556e6.B5c1F1cvdQPPhbv47zpeVg?t=1667720140 HTTP/1.1
20:12:28.182530 IP 192.168.1.200.47498 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 184, length 0
20:12:28.182533 IP 192.168.1.200.47516 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 74, length 0
20:12:28.182535 IP 192.168.1.200.47518 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 70, length 0
20:12:28.182544 IP 192.168.1.200.48026 > tb.himg.baidu.com.80: Flags [S], seq 3258262897, win 65535, options [mss 1460,sackOK,TS val 3397232130 ecr 0,nop,wscale 10], length 0
20:12:28.186082 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [P.], seq 451251937:451252269, ack 878898701, win 858, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=bbf47d02d5529822053335c5e7f10af6/4de400ed08fa513ddb402d1b786d55fbb0fbd9ff.jpg?tbpicau=2023-01-17-05_432ea71151f109f3187fd6493f9c2f81 HTTP/1.1
20:12:28.186083 IP 192.168.1.10.48704 > tiebapic.baidu.com.80: Flags [P.], seq 843119541:843119873, ack 41686191, win 466, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=61b878c6c244ebf86d716839e9c2a617/9a48a9f69052982278d6780692ca7bcb0846d4ff.jpg?tbpicau=2023-01-17-05_6525df7206a117cf731509d44bd1be79 HTTP/1.1
20:12:28.186135 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [P.], seq 451251937:451252269, ack 878898701, win 858, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=bbf47d02d5529822053335c5e7f10af6/4de400ed08fa513ddb402d1b786d55fbb0fbd9ff.jpg?tbpicau=2023-01-17-05_432ea71151f109f3187fd6493f9c2f81 HTTP/1.1
20:12:28.186156 IP 192.168.1.200.48704 > tiebapic.baidu.com.80: Flags [P.], seq 843119541:843119873, ack 41686191, win 466, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=61b878c6c244ebf86d716839e9c2a617/9a48a9f69052982278d6780692ca7bcb0846d4ff.jpg?tbpicau=2023-01-17-05_6525df7206a117cf731509d44bd1be79 HTTP/1.1
20:12:28.189728 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [S], seq 1096675311, win 65535, options [mss 1460,sackOK,TS val 347804555 ecr 0,nop,wscale 10], length 0
20:12:28.189792 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [S], seq 1096675311, win 65535, options [mss 1460,sackOK,TS val 347804555 ecr 0,nop,wscale 10], length 0
20:12:28.207340 IP tb.himg.baidu.com.80 > 192.168.1.200.48026: Flags [S.], seq 773894324, ack 3258262898, win 65535, options [mss 1412,nop,nop,sackOK,nop,wscale 7], length 0
20:12:28.207385 IP tb.himg.baidu.com.80 > 192.168.1.10.48026: Flags [S.], seq 773894324, ack 3258262898, win 65535, options [mss 1412,nop,nop,sackOK,nop,wscale 7], length 0
20:12:28.208869 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], ack 332, win 573, length 0
20:12:28.208914 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], ack 332, win 573, length 0
20:12:28.210410 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [S.], seq 1219207478, ack 1096675312, win 65535, options [mss 1412,nop,nop,sackOK,nop,wscale 7], length 0
20:12:28.210411 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], ack 332, win 581, length 0
20:12:28.210458 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [S.], seq 1219207478, ack 1096675312, win 65535, options [mss 1412,nop,nop,sackOK,nop,wscale 7], length 0
20:12:28.210477 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], ack 332, win 581, length 0
20:12:28.210650 IP 192.168.1.10.48026 > tb.himg.baidu.com.80: Flags [.], ack 1, win 64, length 0
20:12:28.210686 IP 192.168.1.200.48026 > tb.himg.baidu.com.80: Flags [.], ack 1, win 64, length 0
20:12:28.210700 IP 192.168.1.10.48026 > tb.himg.baidu.com.80: Flags [P.], seq 1:239, ack 1, win 64, length 238: HTTP: GET /sys/portrait/item/tb.1.b77556e6.B5c1F1cvdQPPhbv47zpeVg?t=1667720140 HTTP/1.1
20:12:28.210714 IP 192.168.1.200.48026 > tb.himg.baidu.com.80: Flags [P.], seq 1:239, ack 1, win 64, length 238: HTTP: GET /sys/portrait/item/tb.1.b77556e6.B5c1F1cvdQPPhbv47zpeVg?t=1667720140 HTTP/1.1
20:12:28.213405 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 1, win 64, length 0
20:12:28.213406 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [P.], seq 1:333, ack 1, win 64, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=4a2c37e328224f4a57997f1539cce16f/75872a12632762d00fd4e57ae5ec08fa533dc6ff.jpg?tbpicau=2023-01-17-05_5e971a0d999b4d8700a996953a5a4b01 HTTP/1.1
20:12:28.213454 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 1, win 64, length 0
20:12:28.213478 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [P.], seq 1:333, ack 1, win 64, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=4a2c37e328224f4a57997f1539cce16f/75872a12632762d00fd4e57ae5ec08fa533dc6ff.jpg?tbpicau=2023-01-17-05_5e971a0d999b4d8700a996953a5a4b01 HTTP/1.1
20:12:28.228735 IP 192.168.1.10.47498 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 184, length 0
20:12:28.228783 IP 192.168.1.200.47498 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 184, length 0
20:12:28.232428 IP tb.himg.baidu.com.80 > 192.168.1.200.48026: Flags [.], ack 239, win 556, length 0
20:12:28.232474 IP tb.himg.baidu.com.80 > 192.168.1.10.48026: Flags [.], ack 239, win 556, length 0
20:12:28.232499 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 1:2825, ack 332, win 573, length 2824: HTTP: HTTP/1.1 200 OK
20:12:28.232500 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 2825:5649, ack 332, win 573, length 2824: HTTP
20:12:28.232512 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 1:2825, ack 332, win 573, length 2824: HTTP: HTTP/1.1 200 OK
20:12:28.232523 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 2825:5649, ack 332, win 573, length 2824: HTTP
20:12:28.232942 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 5649:19769, ack 332, win 573, length 14120: HTTP
20:12:28.232954 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 5649:19769, ack 332, win 573, length 14120: HTTP
20:12:28.233560 IP tb.himg.baidu.com.80 > 192.168.1.200.48026: Flags [.], seq 1:2825, ack 239, win 556, length 2824: HTTP: HTTP/1.1 200 OK
20:12:28.233607 IP tb.himg.baidu.com.80 > 192.168.1.10.48026: Flags [.], seq 1:2825, ack 239, win 556, length 2824: HTTP: HTTP/1.1 200 OK
20:12:28.234576 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], ack 333, win 556, length 0
20:12:28.234577 IP tb.himg.baidu.com.80 > 192.168.1.200.48026: Flags [.], seq 2825:5649, ack 239, win 556, length 2824: HTTP
20:12:28.234578 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 19769:22593, ack 332, win 573, length 2824: HTTP
20:12:28.234579 IP tb.himg.baidu.com.80 > 192.168.1.200.48026: Flags [.], seq 5649:7061, ack 239, win 556, length 1412: HTTP
20:12:28.234629 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], ack 333, win 556, length 0
20:12:28.234651 IP tb.himg.baidu.com.80 > 192.168.1.10.48026: Flags [.], seq 2825:5649, ack 239, win 556, length 2824: HTTP
20:12:28.234662 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 19769:22593, ack 332, win 573, length 2824: HTTP
20:12:28.234665 IP tb.himg.baidu.com.80 > 192.168.1.10.48026: Flags [.], seq 5649:7061, ack 239, win 556, length 1412: HTTP
20:12:28.234696 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 22593:29653, ack 332, win 573, length 7060: HTTP
20:12:28.234710 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 22593:29653, ack 332, win 573, length 7060: HTTP
20:12:28.235509 IP tb.himg.baidu.com.80 > 192.168.1.200.48026: Flags [.], seq 7061:8473, ack 239, win 556, length 1412: HTTP
20:12:28.235510 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 29653:31065, ack 332, win 573, length 1412: HTTP
20:12:28.235511 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 1:1413, ack 332, win 581, length 1412: HTTP: HTTP/1.1 200 OK
20:12:28.235559 IP tb.himg.baidu.com.80 > 192.168.1.10.48026: Flags [.], seq 7061:8473, ack 239, win 556, length 1412: HTTP
20:12:28.235580 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 29653:31065, ack 332, win 573, length 1412: HTTP
20:12:28.235583 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 1:1413, ack 332, win 581, length 1412: HTTP: HTTP/1.1 200 OK
20:12:28.235678 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [P.], seq 1413:8115, ack 332, win 581, length 6702: HTTP
20:12:28.235680 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 31065:38125, ack 332, win 573, length 7060: HTTP
20:12:28.235691 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [P.], seq 1413:8115, ack 332, win 581, length 6702: HTTP
20:12:28.235705 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 31065:38125, ack 332, win 573, length 7060: HTTP
20:12:28.235968 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 38125:43773, ack 332, win 573, length 5648: HTTP
20:12:28.235972 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 8115:16587, ack 332, win 581, length 8472: HTTP
20:12:28.235973 IP tb.himg.baidu.com.80 > 192.168.1.200.48026: Flags [.], seq 8473:11297, ack 239, win 556, length 2824: HTTP
20:12:28.235988 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 38125:43773, ack 332, win 573, length 5648: HTTP
20:12:28.236002 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 8115:16587, ack 332, win 581, length 8472: HTTP
20:12:28.236006 IP tb.himg.baidu.com.80 > 192.168.1.10.48026: Flags [.], seq 8473:11297, ack 239, win 556, length 2824: HTTP
20:12:28.236013 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 43773:49421, ack 332, win 573, length 5648: HTTP
20:12:28.236014 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 16587:17999, ack 332, win 581, length 1412: HTTP
20:12:28.236022 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 43773:49421, ack 332, win 573, length 5648: HTTP
20:12:28.236027 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 16587:17999, ack 332, win 581, length 1412: HTTP
20:12:28.236130 IP tb.himg.baidu.com.80 > 192.168.1.200.48026: Flags [P.], seq 11297:11495, ack 239, win 556, length 198: HTTP
20:12:28.236140 IP tb.himg.baidu.com.80 > 192.168.1.10.48026: Flags [P.], seq 11297:11495, ack 239, win 556, length 198: HTTP
20:12:28.236189 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 17999:25059, ack 332, win 581, length 7060: HTTP
20:12:28.236193 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 49421:59305, ack 332, win 573, length 9884: HTTP
20:12:28.236204 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 17999:25059, ack 332, win 581, length 7060: HTTP
20:12:28.236217 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 49421:59305, ack 332, win 573, length 9884: HTTP
20:12:28.238408 IP 192.168.1.10.47516 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 74, length 0
20:12:28.238409 IP 192.168.1.10.48704 > tiebapic.baidu.com.80: Flags [.], ack 2825, win 472, length 0
20:12:28.238409 IP 192.168.1.10.48704 > tiebapic.baidu.com.80: Flags [.], ack 19769, win 505, length 0
20:12:28.238439 IP 192.168.1.200.47516 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 74, length 0
20:12:28.238449 IP 192.168.1.200.48704 > tiebapic.baidu.com.80: Flags [.], ack 2825, win 472, length 0
20:12:28.238463 IP 192.168.1.200.48704 > tiebapic.baidu.com.80: Flags [.], ack 19769, win 505, length 0
20:12:28.238482 IP 192.168.1.10.48026 > tb.himg.baidu.com.80: Flags [.], ack 2825, win 70, length 0
20:12:28.238490 IP 192.168.1.200.48026 > tb.himg.baidu.com.80: Flags [.], ack 2825, win 70, length 0
20:12:28.238824 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 25059:26471, ack 332, win 581, length 1412: HTTP
20:12:28.238833 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 25059:26471, ack 332, win 581, length 1412: HTTP
20:12:28.239114 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 26471:33531, ack 332, win 581, length 7060: HTTP
20:12:28.239117 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 59305:69189, ack 332, win 573, length 9884: HTTP
20:12:28.239129 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 26471:33531, ack 332, win 581, length 7060: HTTP
20:12:28.239142 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 59305:69189, ack 332, win 573, length 9884: HTTP
20:12:28.239398 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 33531:49063, ack 332, win 581, length 15532: HTTP
20:12:28.239402 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 69189:79073, ack 332, win 573, length 9884: HTTP
20:12:28.239415 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 33531:49063, ack 332, win 581, length 15532: HTTP
20:12:28.239430 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 69189:79073, ack 332, win 573, length 9884: HTTP
20:12:28.239782 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 79073:84721, ack 332, win 573, length 5648: HTTP
20:12:28.239785 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 84721:93193, ack 332, win 573, length 8472: HTTP
20:12:28.239787 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 49063:50475, ack 332, win 581, length 1412: HTTP
20:12:28.239787 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 93193:94605, ack 332, win 573, length 1412: HTTP
20:12:28.239802 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 79073:84721, ack 332, win 573, length 5648: HTTP
20:12:28.239816 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 84721:93193, ack 332, win 573, length 8472: HTTP
20:12:28.239819 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 49063:50475, ack 332, win 581, length 1412: HTTP
20:12:28.239822 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 93193:94605, ack 332, win 573, length 1412: HTTP
20:12:28.240855 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 58947:61771, ack 332, win 581, length 2824: HTTP
20:12:28.240866 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 58947:61771, ack 332, win 581, length 2824: HTTP
20:12:28.241035 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 61771:67419, ack 332, win 581, length 5648: HTTP
20:12:28.241037 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 94605:101665, ack 332, win 573, length 7060: HTTP
20:12:28.241050 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 61771:67419, ack 332, win 581, length 5648: HTTP
20:12:28.241063 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 94605:101665, ack 332, win 573, length 7060: HTTP
20:12:28.241223 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 101665:104489, ack 332, win 573, length 2824: HTTP
20:12:28.241225 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 67419:73067, ack 332, win 581, length 5648: HTTP
20:12:28.241235 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 101665:104489, ack 332, win 573, length 2824: HTTP
20:12:28.241248 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 67419:73067, ack 332, win 581, length 5648: HTTP
20:12:28.241398 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 73067:75891, ack 332, win 581, length 2824: HTTP
20:12:28.241402 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 104489:114373, ack 332, win 573, length 9884: HTTP
20:12:28.241412 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 73067:75891, ack 332, win 581, length 2824: HTTP
20:12:28.241446 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 104489:114373, ack 332, win 573, length 9884: HTTP
20:12:28.241458 IP 192.168.1.10.47518 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 70, length 0
20:12:28.241495 IP 192.168.1.200.47518 > tb.himg.baidu.com.80: Flags [F.], seq 238, ack 1, win 70, length 0
20:12:28.242725 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 114373:115785, ack 332, win 573, length 1412: HTTP
20:12:28.242735 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 114373:115785, ack 332, win 573, length 1412: HTTP
20:12:28.242791 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 115785:118609, ack 332, win 573, length 2824: HTTP
20:12:28.242793 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 75891:77303, ack 332, win 581, length 1412: HTTP
20:12:28.242803 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 115785:118609, ack 332, win 573, length 2824: HTTP
20:12:28.242815 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 75891:77303, ack 332, win 581, length 1412: HTTP
20:12:28.243046 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 77303:84363, ack 332, win 581, length 7060: HTTP
20:12:28.243048 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 118609:127081, ack 332, win 573, length 8472: HTTP
20:12:28.243059 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 77303:84363, ack 332, win 581, length 7060: HTTP
20:12:28.243072 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 118609:127081, ack 332, win 573, length 8472: HTTP
20:12:28.243236 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [P.], seq 127081:132430, ack 332, win 573, length 5349: HTTP
20:12:28.243239 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 84363:92835, ack 332, win 581, length 8472: HTTP
20:12:28.243251 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [P.], seq 127081:132430, ack 332, win 573, length 5349: HTTP
20:12:28.243266 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 84363:92835, ack 332, win 581, length 8472: HTTP
20:12:28.243389 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 92835:101307, ack 332, win 581, length 8472: HTTP
20:12:28.243398 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 92835:101307, ack 332, win 581, length 8472: HTTP
20:12:28.244541 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 8115, win 874, length 0
20:12:28.244541 IP 192.168.1.10.48026 > tb.himg.baidu.com.80: Flags [.], ack 11297, win 87, length 0
20:12:28.244553 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 8115, win 874, length 0
20:12:28.244595 IP 192.168.1.200.48026 > tb.himg.baidu.com.80: Flags [.], ack 11297, win 87, length 0
20:12:28.244618 IP 192.168.1.10.48704 > tiebapic.baidu.com.80: Flags [.], ack 45185, win 554, length 0
20:12:28.244618 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 16587, win 890, length 0
20:12:28.244619 IP 192.168.1.10.48026 > tb.himg.baidu.com.80: Flags [.], ack 11495, win 89, length 0
20:12:28.244619 IP 192.168.1.10.48704 > tiebapic.baidu.com.80: Flags [.], ack 59305, win 582, length 0
20:12:28.244619 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 25059, win 907, length 0
20:12:28.244620 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 33531, win 923, length 0
20:12:28.244620 IP 192.168.1.10.48704 > tiebapic.baidu.com.80: Flags [.], ack 63541, win 590, length 0
20:12:28.244633 IP 192.168.1.200.48704 > tiebapic.baidu.com.80: Flags [.], ack 45185, win 554, length 0
20:12:28.244645 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 16587, win 890, length 0
20:12:28.244657 IP 192.168.1.200.48026 > tb.himg.baidu.com.80: Flags [.], ack 11495, win 89, length 0
20:12:28.244669 IP 192.168.1.200.48704 > tiebapic.baidu.com.80: Flags [.], ack 59305, win 582, length 0
20:12:28.244683 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 25059, win 907, length 0
20:12:28.244695 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 33531, win 923, length 0
20:12:28.244708 IP 192.168.1.200.48704 > tiebapic.baidu.com.80: Flags [.], ack 63541, win 590, length 0
20:12:28.244719 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 47651, win 951, length 0
20:12:28.244719 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 49063, win 954, length 0
20:12:28.244730 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 47651, win 951, length 0
20:12:28.244742 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 49063, win 954, length 0
20:12:28.245860 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 101307:102719, ack 332, win 581, length 1412: HTTP
20:12:28.245869 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 101307:102719, ack 332, win 581, length 1412: HTTP
20:12:28.245926 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 102719:108367, ack 332, win 581, length 5648: HTTP
20:12:28.245936 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 102719:108367, ack 332, win 581, length 5648: HTTP
20:12:28.245973 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 108367:115427, ack 332, win 581, length 7060: HTTP
20:12:28.245982 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 108367:115427, ack 332, win 581, length 7060: HTTP
20:12:28.247942 IP 192.168.1.10.48704 > tiebapic.baidu.com.80: Flags [.], ack 94605, win 651, length 0
20:12:28.247943 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 957, length 0
20:12:28.247953 IP 192.168.1.200.48704 > tiebapic.baidu.com.80: Flags [.], ack 94605, win 651, length 0
20:12:28.247965 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 957, length 0
20:12:28.247982 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 962, options [nop,nop,sack 1 {58947:61771}], length 0
20:12:28.247982 IP 192.168.1.10.48704 > tiebapic.baidu.com.80: Flags [.], ack 132430, win 725, length 0
20:12:28.247983 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 1023, options [nop,nop,sack 1 {58947:92835}], length 0
20:12:28.247993 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 962, options [nop,nop,sack 1 {58947:61771}], length 0
20:12:28.248005 IP 192.168.1.200.48704 > tiebapic.baidu.com.80: Flags [.], ack 132430, win 725, length 0
20:12:28.248018 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 1023, options [nop,nop,sack 1 {58947:92835}], length 0
20:12:28.248327 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 115427:118251, ack 332, win 581, length 2824: HTTP
20:12:28.248336 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 115427:118251, ack 332, win 581, length 2824: HTTP
20:12:28.248379 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 118251:123899, ack 332, win 581, length 5648: HTTP
20:12:28.248388 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 118251:123899, ack 332, win 581, length 5648: HTTP
20:12:28.248417 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [P.], seq 123899:124197, ack 332, win 581, length 298: HTTP
20:12:28.248425 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [P.], seq 123899:124197, ack 332, win 581, length 298: HTTP
20:12:28.248561 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 1039, options [nop,nop,sack 1 {58947:101307}], length 0
20:12:28.248570 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 1039, options [nop,nop,sack 1 {58947:101307}], length 0
20:12:28.251027 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 1067, options [nop,nop,sack 1 {58947:115427}], length 0
20:12:28.251028 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 1073, options [nop,nop,sack 1 {58947:118251}], length 0
20:12:28.251038 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 1067, options [nop,nop,sack 1 {58947:115427}], length 0
20:12:28.251050 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 1073, options [nop,nop,sack 1 {58947:118251}], length 0
20:12:28.252078 IP 192.168.1.10.48704 > tiebapic.baidu.com.80: Flags [P.], seq 332:664, ack 132430, win 725, length 332: HTTP: GET /forum/w%3D960%3Bq%3D80/sign=7c9a59e7f57eca80120535e1a118e6e0/38dbb6fd5266d016c7af61ecd22bd40734fa3544.jpg?tbpicau=2023-01-17-05_175552c724b22b123786df8a5696c0d8 HTTP/1.1
20:12:28.252088 IP 192.168.1.200.48704 > tiebapic.baidu.com.80: Flags [P.], seq 332:664, ack 132430, win 725, length 332: HTTP: GET /forum/w%3D960%3Bq%3D80/sign=7c9a59e7f57eca80120535e1a118e6e0/38dbb6fd5266d016c7af61ecd22bd40734fa3544.jpg?tbpicau=2023-01-17-05_175552c724b22b123786df8a5696c0d8 HTTP/1.1
20:12:28.252381 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 1084, options [nop,nop,sack 1 {58947:124197}], length 0
20:12:28.252390 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 50475, win 1084, options [nop,nop,sack 1 {58947:124197}], length 0
20:12:28.256186 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 1:1413, ack 333, win 556, length 1412: HTTP: HTTP/1.1 200 OK
20:12:28.256196 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 1:1413, ack 333, win 556, length 1412: HTTP: HTTP/1.1 200 OK
20:12:28.256312 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 1413:2825, ack 333, win 556, length 1412: HTTP
20:12:28.256320 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 1413:2825, ack 333, win 556, length 1412: HTTP
20:12:28.256806 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 2825:5649, ack 333, win 556, length 2824: HTTP
20:12:28.256817 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 2825:5649, ack 333, win 556, length 2824: HTTP
20:12:28.257574 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 5649:7061, ack 333, win 556, length 1412: HTTP
20:12:28.257583 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 5649:7061, ack 333, win 556, length 1412: HTTP
20:12:28.257668 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 7061:8473, ack 333, win 556, length 1412: HTTP
20:12:28.257677 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 7061:8473, ack 333, win 556, length 1412: HTTP
20:12:28.258402 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 8473:9885, ack 333, win 556, length 1412: HTTP
20:12:28.258411 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 8473:9885, ack 333, win 556, length 1412: HTTP
20:12:28.258426 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 9885:11297, ack 333, win 556, length 1412: HTTP
20:12:28.258437 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 9885:11297, ack 333, win 556, length 1412: HTTP
20:12:28.259032 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 11297:12709, ack 333, win 556, length 1412: HTTP
20:12:28.259041 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 11297:12709, ack 333, win 556, length 1412: HTTP
20:12:28.259217 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 12709:14121, ack 333, win 556, length 1412: HTTP
20:12:28.259226 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 12709:14121, ack 333, win 556, length 1412: HTTP
20:12:28.259769 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 14121:15533, ack 333, win 556, length 1412: HTTP
20:12:28.259776 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 14121:15533, ack 333, win 556, length 1412: HTTP
20:12:28.259960 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 15533:19769, ack 333, win 556, length 4236: HTTP
20:12:28.259968 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 15533:19769, ack 333, win 556, length 4236: HTTP
20:12:28.260514 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 2825, win 70, length 0
20:12:28.260514 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 5649, win 76, length 0
20:12:28.260524 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 2825, win 70, length 0
20:12:28.260534 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 5649, win 76, length 0
20:12:28.260575 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 8473, win 81, length 0
20:12:28.260583 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 8473, win 81, length 0
20:12:28.260810 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 19769:21181, ack 333, win 556, length 1412: HTTP
20:12:28.260819 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 19769:21181, ack 333, win 556, length 1412: HTTP
20:12:28.260996 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 21181:22593, ack 333, win 556, length 1412: HTTP
20:12:28.261005 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 21181:22593, ack 333, win 556, length 1412: HTTP
20:12:28.261507 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 22593:24005, ack 333, win 556, length 1412: HTTP
20:12:28.261515 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 22593:24005, ack 333, win 556, length 1412: HTTP
20:12:28.261690 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 24005:25417, ack 333, win 556, length 1412: HTTP
20:12:28.261698 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 24005:25417, ack 333, win 556, length 1412: HTTP
20:12:28.262413 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 25417:28241, ack 333, win 556, length 2824: HTTP
20:12:28.262460 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 25417:28241, ack 333, win 556, length 2824: HTTP
20:12:28.263302 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 28241:31065, ack 333, win 556, length 2824: HTTP
20:12:28.263303 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 31065:33889, ack 333, win 556, length 2824: HTTP
20:12:28.263349 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 28241:31065, ack 333, win 556, length 2824: HTTP
20:12:28.263371 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 31065:33889, ack 333, win 556, length 2824: HTTP
20:12:28.264383 IP 192.168.1.10.49226 > tiebapic.baidu.com.80: Flags [S], seq 836691028, win 65535, options [mss 1460,sackOK,TS val 347804630 ecr 0,nop,wscale 10], length 0
20:12:28.264384 IP 192.168.1.10.48026 > tb.himg.baidu.com.80: Flags [P.], seq 239:477, ack 11495, win 89, length 238: HTTP: GET /sys/portrait/item/tb.1.56daccf2.Q6JkjApfZl7kLh6RHA7avA?t=1599314728 HTTP/1.1
20:12:28.264384 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 11297, win 87, length 0
20:12:28.264385 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 12709, win 89, length 0
20:12:28.264385 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 19769, win 103, length 0
20:12:28.264385 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 22593, win 109, length 0
20:12:28.264386 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 25417, win 114, length 0
20:12:28.264456 IP 192.168.1.200.49226 > tiebapic.baidu.com.80: Flags [S], seq 836691028, win 65535, options [mss 1460,sackOK,TS val 347804630 ecr 0,nop,wscale 10], length 0
20:12:28.264484 IP 192.168.1.200.48026 > tb.himg.baidu.com.80: Flags [P.], seq 239:477, ack 11495, win 89, length 238: HTTP: GET /sys/portrait/item/tb.1.56daccf2.Q6JkjApfZl7kLh6RHA7avA?t=1599314728 HTTP/1.1
20:12:28.264509 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 11297, win 87, length 0
20:12:28.264522 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 12709, win 89, length 0
20:12:28.264525 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 19769, win 103, length 0
20:12:28.264527 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 22593, win 109, length 0
20:12:28.264529 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 25417, win 114, length 0
20:12:28.264536 IP tiebapic.baidu.com.80 > 192.168.1.200.49224: Flags [.], seq 33889:35301, ack 333, win 556, length 1412: HTTP
20:12:28.264543 IP tiebapic.baidu.com.80 > 192.168.1.10.49224: Flags [.], seq 33889:35301, ack 333, win 556, length 1412: HTTP
20:12:28.266490 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 28241, win 120, length 0
20:12:28.266500 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 28241, win 120, length 0
20:12:28.268505 IP 192.168.1.10.49224 > tiebapic.baidu.com.80: Flags [.], ack 35301, win 134, length 0
20:12:28.268553 IP 192.168.1.200.49224 > tiebapic.baidu.com.80: Flags [.], ack 35301, win 134, length 0
20:12:28.270333 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 50475:54711, ack 332, win 581, length 4236: HTTP
20:12:28.270380 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 50475:54711, ack 332, win 581, length 4236: HTTP
20:12:28.270507 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 54711:57535, ack 332, win 581, length 2824: HTTP
20:12:28.270516 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 54711:57535, ack 332, win 581, length 2824: HTTP
20:12:28.270627 IP tiebapic.baidu.com.80 > 192.168.1.200.48702: Flags [.], seq 57535:58947, ack 332, win 581, length 1412: HTTP
20:12:28.270636 IP tiebapic.baidu.com.80 > 192.168.1.10.48702: Flags [.], seq 57535:58947, ack 332, win 581, length 1412: HTTP
20:12:28.272790 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], ack 664, win 581, length 0
20:12:28.272799 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], ack 664, win 581, length 0
20:12:28.273382 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 53299, win 1090, options [nop,nop,sack 1 {58947:124197}], length 0
20:12:28.273431 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 53299, win 1090, options [nop,nop,sack 1 {58947:124197}], length 0
20:12:28.273944 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 132430:133842, ack 664, win 581, length 1412: HTTP: HTTP/1.1 200 OK
20:12:28.273956 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 132430:133842, ack 664, win 581, length 1412: HTTP: HTTP/1.1 200 OK
20:12:28.274065 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 133842:142314, ack 664, win 581, length 8472: HTTP
20:12:28.274076 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 133842:142314, ack 664, win 581, length 8472: HTTP
20:12:28.274563 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 142314:145138, ack 664, win 581, length 2824: HTTP
20:12:28.274573 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 142314:145138, ack 664, win 581, length 2824: HTTP
20:12:28.274710 IP tiebapic.baidu.com.80 > 192.168.1.200.48704: Flags [.], seq 145138:152198, ack 664, win 581, length 7060: HTTP
20:12:28.274719 IP tiebapic.baidu.com.80 > 192.168.1.10.48704: Flags [.], seq 145138:152198, ack 664, win 581, length 7060: HTTP
20:12:28.275177 IP 192.168.1.10.48702 > tiebapic.baidu.com.80: Flags [.], ack 124197, win 1101, length 0
20:12:28.275186 IP 192.168.1.200.48702 > tiebapic.baidu.com.80: Flags [.], ack 124197, win 1101, length 0

Transparent有少量日志

root@Transparent:~# tcpdump -s 0 -i eth0  port 443 or 80
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
12:12:27.807874 IP 220.181.174.34.https > 192.168.1.10.49600: Flags [.], ack 3945377216, win 501, options [nop,nop,TS val 2415397938 ecr 3778934191], length 0
12:12:27.807877 IP ruo.http > 192.168.1.10.41840: Flags [F.], seq 3904504113, ack 2483131813, win 510, options [nop,nop,TS val 536664748 ecr 2222627937], length 0
12:12:28.831876 IP ruo.http > 192.168.1.10.41842: Flags [F.], seq 755516899, ack 3631266260, win 510, options [nop,nop,TS val 536665772 ecr 2222627937], length 0
12:12:42.143834 IP 220.181.174.34.https > 192.168.1.10.49596: Flags [FP.], seq 595995812:595995965, ack 1620363065, win 503, options [nop,nop,TS val 2415412274 ecr 3778938799], length 153
12:12:42.399857 IP ruo.http > 192.168.1.10.41840: Flags [F.], seq 0, ack 1, win 510, options [nop,nop,TS val 536679340 ecr 2222627937], length 0
12:12:42.911813 IP 220.181.174.34.https > 192.168.1.10.49600: Flags [.], ack 1, win 501, options [nop,nop,TS val 2415413042 ecr 3778934191], length 0
12:12:43.423868 IP ruo.http > 192.168.1.10.41842: Flags [F.], seq 0, ack 1, win 510, options [nop,nop,TS val 536680364 ecr 2222627937], length 0
12:12:58.015799 IP 220.181.174.34.https > 192.168.1.10.49600: Flags [.], ack 1, win 501, options [nop,nop,TS val 2415428146 ecr 3778934191], length 0
^C
8 packets captured
8 packets received by filter
0 packets dropped by kernel
MageDelfador commented 1 year ago

我猜。。 可能Transparent搞了事情,比如ARP欺骗什么的 tcpdump加-e看看MAC地址信息 最好电脑也抓个包 Transparent关机,openwrt把LAN的"IP动态伪装"打开,所有设备重启,或许能解决问题

onlyJinx commented 1 year ago

Transparent已关机, 老毛子和openwrt重启了; "IP动态伪装" 已经是勾选状态 电脑抓包的话, 我装个wireshark试试 这是连接主路由wifiA的日志(网络不通)

root@OpenWrt:~# tcpdump -e -s 0 -i eth0  port 443 or 80
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
21:50:57.930090 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.45174 > beacons3.gvt2.com.80: Flags [S], seq 1034132078, win 65535, options [mss 1460,sackOK,TS val 1627675219 ecr 0,nop,wscale 10], length 0
21:50:57.930091 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.44340 > 119.147.182.133.443: Flags [S], seq 39924836, win 65535, options [mss 1460,sackOK,TS val 4092336327 ecr 0,nop,wscale 10], length 0
21:50:57.930091 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.36088 > 119.147.182.130.80: Flags [S], seq 487309509, win 65535, options [mss 1460,sackOK,TS val 129934590 ecr 0,nop,wscale 10], length 0
21:50:58.930683 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.45174 > beacons3.gvt2.com.80: Flags [S], seq 1034132078, win 65535, options [mss 1460,sackOK,TS val 1627676227 ecr 0,nop,wscale 10], length 0
21:51:00.388782 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.46482 > mail.sogservice.com.cn.443: Flags [S], seq 2130475276, win 65535, options [mss 1460,sackOK,TS val 1615486837 ecr 0,nop,wscale 10], length 0
21:51:00.908777 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.45174 > beacons3.gvt2.com.80: Flags [S], seq 1034132078, win 65535, options [mss 1460,sackOK,TS val 1627678243 ecr 0,nop,wscale 10], length 0
21:51:01.981418 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.36088 > 119.147.182.130.80: Flags [S], seq 487309509, win 65535, options [mss 1460,sackOK,TS val 129938590 ecr 0,nop,wscale 10], length 0
21:51:01.981419 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.44340 > 119.147.182.133.443: Flags [S], seq 39924836, win 65535, options [mss 1460,sackOK,TS val 4092340327 ecr 0,nop,wscale 10], length 0
21:51:05.063087 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.45174 > beacons3.gvt2.com.80: Flags [S], seq 1034132078, win 65535, options [mss 1460,sackOK,TS val 1627682339 ecr 0,nop,wscale 10], length 0
21:51:08.602054 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.46482 > mail.sogservice.com.cn.443: Flags [S], seq 2130475276, win 65535, options [mss 1460,sackOK,TS val 1615495029 ecr 0,nop,wscale 10], length 0
21:51:12.088117 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.35080 > 52.138.116.79.443: Flags [S], seq 2864412874, win 65535, options [mss 1460,sackOK,TS val 29281219 ecr 0,nop,wscale 10], length 0
21:51:13.084412 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.35080 > 52.138.116.79.443: Flags [S], seq 2864412874, win 65535, options [mss 1460,sackOK,TS val 29282218 ecr 0,nop,wscale 10], length 0
21:51:15.086231 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.35080 > 52.138.116.79.443: Flags [S], seq 2864412874, win 65535, options [mss 1460,sackOK,TS val 29284218 ecr 0,nop,wscale 10], length 0
21:51:15.801385 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.51642 > tb.himg.baidu.com.80: Flags [S], seq 3083974147, win 65535, options [mss 1460,sackOK,TS val 3401483876 ecr 0,nop,wscale 10], length 0
21:51:15.849463 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.51644 > tb.himg.baidu.com.80: Flags [S], seq 1410205670, win 65535, options [mss 1460,sackOK,TS val 3401483924 ecr 0,nop,wscale 10], length 0
21:51:15.875761 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.51646 > tb.himg.baidu.com.80: Flags [S], seq 3688551480, win 65535, options [mss 1460,sackOK,TS val 3401483950 ecr 0,nop,wscale 10], length 0
21:51:15.910838 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.51648 > tb.himg.baidu.com.80: Flags [S], seq 3698704992, win 65535, options [mss 1460,sackOK,TS val 3401483984 ecr 0,nop,wscale 10], length 0
21:51:15.934784 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.60428 > 119.147.182.130.443: Flags [S], seq 152695495, win 65535, options [mss 1460,sackOK,TS val 129952573 ecr 0,nop,wscale 10], length 0
21:51:15.934785 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.46894 > connectivity.samsung.com.cn.80: Flags [S], seq 2329988405, win 65535, options [mss 1460,sackOK,TS val 3555909504 ecr 0,nop,wscale 10], length 0
21:51:16.133886 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.52850 > tiebapic.baidu.com.80: Flags [S], seq 662106343, win 65535, options [mss 1460,sackOK,TS val 352056622 ecr 0,nop,wscale 10], length 0
21:51:16.806335 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.51642 > tb.himg.baidu.com.80: Flags [S], seq 3083974147, win 65535, options [mss 1460,sackOK,TS val 3401484873 ecr 0,nop,wscale 10], length 0
21:51:16.844324 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.37212 > c.tieba.baidu.com.80: Flags [S], seq 2262335960, win 65535, options [mss 1460,sackOK,TS val 2945836196 ecr 0,nop,wscale 10], length 0
21:51:16.848266 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.51644 > tb.himg.baidu.com.80: Flags [S], seq 1410205670, win 65535, options [mss 1460,sackOK,TS val 3401484921 ecr 0,nop,wscale 10], length 0
21:51:16.877207 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.51646 > tb.himg.baidu.com.80: Flags [S], seq 3688551480, win 65535, options [mss 1460,sackOK,TS val 3401484949 ecr 0,nop,wscale 10], length 0
21:51:16.910309 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.51648 > tb.himg.baidu.com.80: Flags [S], seq 3698704992, win 65535, options [mss 1460,sackOK,TS val 3401484981 ecr 0,nop,wscale 10], length 0
21:51:16.932420 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.60428 > 119.147.182.130.443: Flags [S], seq 152695495, win 65535, options [mss 1460,sackOK,TS val 129953570 ecr 0,nop,wscale 10], length 0
21:51:16.932421 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.46894 > connectivity.samsung.com.cn.80: Flags [S], seq 2329988405, win 65535, options [mss 1460,sackOK,TS val 3555910501 ecr 0,nop,wscale 10], length 0
21:51:17.158726 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.52850 > tiebapic.baidu.com.80: Flags [S], seq 662106343, win 65535, options [mss 1460,sackOK,TS val 352057640 ecr 0,nop,wscale 10], length 0
21:51:17.849898 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.37212 > c.tieba.baidu.com.80: Flags [S], seq 2262335960, win 65535, options [mss 1460,sackOK,TS val 2945837196 ecr 0,nop,wscale 10], length 0
21:51:18.932475 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.45194 > beacons3.gvt2.com.80: Flags [S], seq 2920629281, win 65535, options [mss 1460,sackOK,TS val 1627696239 ecr 0,nop,wscale 10], length 0
21:51:18.947937 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.46894 > connectivity.samsung.com.cn.80: Flags [S], seq 2329988405, win 65535, options [mss 1460,sackOK,TS val 3555912513 ecr 0,nop,wscale 10], length 0
21:51:18.947938 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.60428 > 119.147.182.130.443: Flags [S], seq 152695495, win 65535, options [mss 1460,sackOK,TS val 129955582 ecr 0,nop,wscale 10], length 0
21:51:19.109195 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.35080 > 52.138.116.79.443: Flags [S], seq 2864412874, win 65535, options [mss 1460,sackOK,TS val 29288234 ecr 0,nop,wscale 10], length 0
21:51:19.884930 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.37212 > c.tieba.baidu.com.80: Flags [S], seq 2262335960, win 65535, options [mss 1460,sackOK,TS val 2945839224 ecr 0,nop,wscale 10], length 0
21:51:19.941514 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.45194 > beacons3.gvt2.com.80: Flags [S], seq 2920629281, win 65535, options [mss 1460,sackOK,TS val 1627697251 ecr 0,nop,wscale 10], length 0
21:51:21.964551 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.45194 > beacons3.gvt2.com.80: Flags [S], seq 2920629281, win 65535, options [mss 1460,sackOK,TS val 1627699267 ecr 0,nop,wscale 10], length 0
21:51:22.961585 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.60428 > 119.147.182.130.443: Flags [S], seq 152695495, win 65535, options [mss 1460,sackOK,TS val 129959582 ecr 0,nop,wscale 10], length 0
21:51:22.961586 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.46894 > connectivity.samsung.com.cn.80: Flags [S], seq 2329988405, win 65535, options [mss 1460,sackOK,TS val 3555916513 ecr 0,nop,wscale 10], length 0
21:51:23.986080 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.37212 > c.tieba.baidu.com.80: Flags [S], seq 2262335960, win 65535, options [mss 1460,sackOK,TS val 2945843320 ecr 0,nop,wscale 10], length 0
21:51:24.827430 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.46514 > mail.sogservice.com.cn.443: Flags [S], seq 4072067946, win 65535, options [mss 1460,sackOK,TS val 1615511229 ecr 0,nop,wscale 10], length 0
21:51:25.838495 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.46514 > mail.sogservice.com.cn.443: Flags [S], seq 4072067946, win 65535, options [mss 1460,sackOK,TS val 1615512245 ecr 0,nop,wscale 10], length 0
21:51:26.030819 fe:b7:33:81:26:60 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.45194 > beacons3.gvt2.com.80: Flags [S], seq 2920629281, win 65535, options [mss 1460,sackOK,TS val 1627703331 ecr 0,nop,wscale 10], length 0
^C
42 packets captured
42 packets received by filter
0 packets dropped by kernel

这是连接老毛子wifiB的日志(网络正常)

root@OpenWrt:~# tcpdump -e -s 0 -i eth0  port 443 or 80
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
21:55:58.715353 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 74: 192.168.1.10.41944 > 180.97.34.146.80: Flags [S], seq 1241643288, win 65535, options [mss 1460,sackOK,TS val 2194776113 ecr 0,nop,wscale 10], length 0
21:55:58.715402 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 74: 192.168.1.200.41944 > 180.97.34.146.80: Flags [S], seq 1241643288, win 65535, options [mss 1460,sackOK,TS val 2194776113 ecr 0,nop,wscale 10], length 0
21:55:58.750389 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 74: 180.97.34.146.80 > 192.168.1.200.41944: Flags [S.], seq 319293803, ack 1241643289, win 8192, options [mss 1452,sackOK,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,wscale 5], length 0
21:55:58.750423 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 74: 180.97.34.146.80 > 192.168.1.10.41944: Flags [S.], seq 319293803, ack 1241643289, win 8192, options [mss 1452,sackOK,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,wscale 5], length 0
21:55:58.757476 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 1, win 64, length 0
21:55:58.757478 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1485: 192.168.1.10.41944 > 180.97.34.146.80: Flags [P.], seq 1:1432, ack 1, win 64, length 1431: HTTP: POST /c/f/pb/page HTTP/1.1
21:55:58.757514 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 1, win 64, length 0
21:55:58.757532 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 1485: 192.168.1.200.41944 > 180.97.34.146.80: Flags [P.], seq 1:1432, ack 1, win 64, length 1431: HTTP: POST /c/f/pb/page HTTP/1.1
21:55:58.793380 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], ack 1432, win 1004, length 0
21:55:58.793413 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], ack 1432, win 1004, length 0
21:55:59.138651 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 643: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 1:590, ack 1432, win 1004, length 589: HTTP: HTTP/1.1 200 OK
21:55:59.138652 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 914: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 590:1450, ack 1432, win 1004, length 860: HTTP
21:55:59.138653 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 1450:4354, ack 1432, win 1004, length 2904: HTTP
21:55:59.138655 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1246: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 4354:5546, ack 1432, win 1004, length 1192: HTTP
21:55:59.138712 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 643: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 1:590, ack 1432, win 1004, length 589: HTTP: HTTP/1.1 200 OK
21:55:59.138731 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 914: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 590:1450, ack 1432, win 1004, length 860: HTTP
21:55:59.138739 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 1450:4354, ack 1432, win 1004, length 2904: HTTP
21:55:59.138742 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1246: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 4354:5546, ack 1432, win 1004, length 1192: HTTP
21:55:59.138747 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 5546:8450, ack 1432, win 1004, length 2904: HTTP
21:55:59.138782 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 5546:8450, ack 1432, win 1004, length 2904: HTTP
21:55:59.139024 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 8450:11354, ack 1432, win 1004, length 2904: HTTP
21:55:59.139034 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 8450:11354, ack 1432, win 1004, length 2904: HTTP
21:55:59.139050 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1506: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 11354:12806, ack 1432, win 1004, length 1452: HTTP
21:55:59.139056 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1506: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 11354:12806, ack 1432, win 1004, length 1452: HTTP
21:55:59.141955 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1506: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 12806:14258, ack 1432, win 1004, length 1452: HTTP
21:55:59.141988 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1506: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 12806:14258, ack 1432, win 1004, length 1452: HTTP
21:55:59.187905 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 590, win 66, length 0
21:55:59.187906 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 1450, win 67, length 0
21:55:59.187906 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 5546, win 75, length 0
21:55:59.187906 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 14258, win 92, length 0
21:55:59.187943 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 590, win 66, length 0
21:55:59.187960 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 1450, win 67, length 0
21:55:59.187989 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 5546, win 75, length 0
21:55:59.187991 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 14258, win 92, length 0
21:55:59.222032 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 4410: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 14258:18614, ack 1432, win 1004, length 4356: HTTP
21:55:59.222067 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 4410: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 14258:18614, ack 1432, win 1004, length 4356: HTTP
21:55:59.222386 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 18614:21518, ack 1432, win 1004, length 2904: HTTP
21:55:59.222395 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 18614:21518, ack 1432, win 1004, length 2904: HTTP
21:55:59.222598 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1506: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 21518:22970, ack 1432, win 1004, length 1452: HTTP
21:55:59.222637 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1506: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 21518:22970, ack 1432, win 1004, length 1452: HTTP
21:55:59.222685 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1722: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 22970:24638, ack 1432, win 1004, length 1668: HTTP
21:55:59.222691 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1722: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 22970:24638, ack 1432, win 1004, length 1668: HTTP
21:55:59.227751 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 24638, win 113, length 0
21:55:59.227786 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 24638, win 113, length 0
21:55:59.737135 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.10.41114 > 119.100.50.48.80: Flags [P.], seq 85842403:85842641, ack 3529834373, win 69, length 238: HTTP: GET /sys/portrait/item/tb.1.d793f050.NMsVAGzVoRHbXUDQOVDYqw?t=1673790958 HTTP/1.1
21:55:59.737172 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.200.41114 > 119.100.50.48.80: Flags [P.], seq 85842403:85842641, ack 3529834373, win 69, length 238: HTTP: GET /sys/portrait/item/tb.1.d793f050.NMsVAGzVoRHbXUDQOVDYqw?t=1673790958 HTTP/1.1
21:55:59.740421 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.10.41116 > 119.100.50.48.80: Flags [P.], seq 2815135374:2815135612, ack 4246928193, win 72, length 238: HTTP: GET /sys/portrait/item/tb.1.d793f050.NMsVAGzVoRHbXUDQOVDYqw?t=1673790958 HTTP/1.1
21:55:59.740458 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.200.41116 > 119.100.50.48.80: Flags [P.], seq 2815135374:2815135612, ack 4246928193, win 72, length 238: HTTP: GET /sys/portrait/item/tb.1.d793f050.NMsVAGzVoRHbXUDQOVDYqw?t=1673790958 HTTP/1.1
21:55:59.749072 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 386: 192.168.1.10.53170 > tiebapic.baidu.com.80: Flags [P.], seq 2568137476:2568137808, ack 403297924, win 107, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=f83d14cdf3003af34dbad0660511b761/30623ff33a87e950fbc407a855385343f9f2b482.jpg?tbpicau=2023-01-17-05_ec0a903f502d9c54e28d40e88639c6ae HTTP/1.1
21:55:59.749073 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.10.41118 > 119.100.50.48.80: Flags [P.], seq 2741902726:2741902964, ack 469037907, win 70, length 238: HTTP: GET /sys/portrait/item/tb.1.4afdfa8c.FFsiG9HsKV0u2p005J5WFg?t=1673790958 HTTP/1.1
21:55:59.749110 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 386: 192.168.1.200.53170 > tiebapic.baidu.com.80: Flags [P.], seq 2568137476:2568137808, ack 403297924, win 107, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=f83d14cdf3003af34dbad0660511b761/30623ff33a87e950fbc407a855385343f9f2b482.jpg?tbpicau=2023-01-17-05_ec0a903f502d9c54e28d40e88639c6ae HTTP/1.1
21:55:59.749128 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.200.41118 > 119.100.50.48.80: Flags [P.], seq 2741902726:2741902964, ack 469037907, win 70, length 238: HTTP: GET /sys/portrait/item/tb.1.4afdfa8c.FFsiG9HsKV0u2p005J5WFg?t=1673790958 HTTP/1.1
21:55:59.760573 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 119.100.50.48.80 > 192.168.1.200.41114: Flags [.], ack 238, win 565, length 0
21:55:59.760607 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 119.100.50.48.80 > 192.168.1.10.41114: Flags [.], ack 238, win 565, length 0
21:55:59.764782 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 119.100.50.48.80 > 192.168.1.200.41116: Flags [.], ack 238, win 565, length 0
21:55:59.764815 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 119.100.50.48.80 > 192.168.1.10.41116: Flags [.], ack 238, win 565, length 0
21:55:59.768860 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], ack 332, win 565, length 0
21:55:59.768894 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], ack 332, win 565, length 0
21:55:59.773206 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 119.100.50.48.80 > 192.168.1.200.41118: Flags [.], ack 238, win 565, length 0
21:55:59.773240 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 119.100.50.48.80 > 192.168.1.10.41118: Flags [.], ack 238, win 565, length 0
21:55:59.774210 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: 119.100.50.48.80 > 192.168.1.200.41118: Flags [.], seq 1:2825, ack 238, win 565, length 2824: HTTP: HTTP/1.1 200 OK
21:55:59.774244 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: 119.100.50.48.80 > 192.168.1.10.41118: Flags [.], seq 1:2825, ack 238, win 565, length 2824: HTTP: HTTP/1.1 200 OK
21:55:59.774515 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 140: 119.100.50.48.80 > 192.168.1.200.41118: Flags [P.], seq 2825:2911, ack 238, win 565, length 86: HTTP
21:55:59.774522 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 140: 119.100.50.48.80 > 192.168.1.10.41118: Flags [P.], seq 2825:2911, ack 238, win 565, length 86: HTTP
21:55:59.777456 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41118 > 119.100.50.48.80: Flags [.], ack 2911, win 76, length 0
21:55:59.777465 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41118 > 119.100.50.48.80: Flags [.], ack 2911, win 76, length 0
21:55:59.784270 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2813: 119.100.50.48.80 > 192.168.1.200.41114: Flags [P.], seq 1:2760, ack 238, win 565, length 2759: HTTP: HTTP/1.1 200 OK
21:55:59.784306 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2813: 119.100.50.48.80 > 192.168.1.10.41114: Flags [P.], seq 1:2760, ack 238, win 565, length 2759: HTTP: HTTP/1.1 200 OK
21:55:59.784668 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: 119.100.50.48.80 > 192.168.1.200.41116: Flags [.], seq 1:1413, ack 238, win 565, length 1412: HTTP: HTTP/1.1 200 OK
21:55:59.784676 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: 119.100.50.48.80 > 192.168.1.10.41116: Flags [.], seq 1:1413, ack 238, win 565, length 1412: HTTP: HTTP/1.1 200 OK
21:55:59.784849 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1401: 119.100.50.48.80 > 192.168.1.200.41116: Flags [P.], seq 1413:2760, ack 238, win 565, length 1347: HTTP
21:55:59.784857 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1401: 119.100.50.48.80 > 192.168.1.10.41116: Flags [P.], seq 1413:2760, ack 238, win 565, length 1347: HTTP
21:55:59.788681 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41114 > 119.100.50.48.80: Flags [.], ack 2760, win 75, length 0
21:55:59.788682 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41116 > 119.100.50.48.80: Flags [.], ack 2760, win 78, length 0
21:55:59.788719 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41114 > 119.100.50.48.80: Flags [.], ack 2760, win 75, length 0
21:55:59.788737 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41116 > 119.100.50.48.80: Flags [.], ack 2760, win 78, length 0
21:55:59.936351 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 1:2825, ack 332, win 565, length 2824: HTTP: HTTP/1.1 200 OK
21:55:59.936385 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 1:2825, ack 332, win 565, length 2824: HTTP: HTTP/1.1 200 OK
21:55:59.936600 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 2825:4237, ack 332, win 565, length 1412: HTTP
21:55:59.936608 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 2825:4237, ack 332, win 565, length 1412: HTTP
21:55:59.936817 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 4237:5649, ack 332, win 565, length 1412: HTTP
21:55:59.936825 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 4237:5649, ack 332, win 565, length 1412: HTTP
21:55:59.937274 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 5649:7061, ack 332, win 565, length 1412: HTTP
21:55:59.937305 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 5649:7061, ack 332, win 565, length 1412: HTTP
21:55:59.937342 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 7061:8473, ack 332, win 565, length 1412: HTTP
21:55:59.937368 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 7061:8473, ack 332, win 565, length 1412: HTTP
21:55:59.938270 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 8473:11297, ack 332, win 565, length 2824: HTTP
21:55:59.938305 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 8473:11297, ack 332, win 565, length 2824: HTTP
21:55:59.938994 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 11297:14121, ack 332, win 565, length 2824: HTTP
21:55:59.939027 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 11297:14121, ack 332, win 565, length 2824: HTTP
21:55:59.939788 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 14121:16945, ack 332, win 565, length 2824: HTTP
21:55:59.939822 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 14121:16945, ack 332, win 565, length 2824: HTTP
21:55:59.940291 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 16945:19769, ack 332, win 565, length 2824: HTTP
21:55:59.940337 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 16945:19769, ack 332, win 565, length 2824: HTTP
21:55:59.941131 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2354: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [P.], seq 19769:22069, ack 332, win 565, length 2300: HTTP
21:55:59.941165 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2354: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [P.], seq 19769:22069, ack 332, win 565, length 2300: HTTP
21:55:59.941740 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.53170 > tiebapic.baidu.com.80: Flags [.], ack 8473, win 124, length 0
21:55:59.941741 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.53170 > tiebapic.baidu.com.80: Flags [.], ack 11297, win 129, length 0
21:55:59.941775 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.53170 > tiebapic.baidu.com.80: Flags [.], ack 8473, win 124, length 0
21:55:59.941792 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.53170 > tiebapic.baidu.com.80: Flags [.], ack 11297, win 129, length 0
21:55:59.942437 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.53170 > tiebapic.baidu.com.80: Flags [.], ack 14121, win 135, length 0
21:55:59.942471 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.53170 > tiebapic.baidu.com.80: Flags [.], ack 14121, win 135, length 0
21:55:59.944505 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.53170 > tiebapic.baidu.com.80: Flags [.], ack 22069, win 150, length 0
21:55:59.944540 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.53170 > tiebapic.baidu.com.80: Flags [.], ack 22069, win 150, length 0
21:56:02.356120 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1160: 192.168.1.10.41944 > 180.97.34.146.80: Flags [P.], seq 1432:2538, ack 24638, win 113, length 1106: HTTP: POST /c/f/frs/page HTTP/1.1
21:56:02.356157 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 1160: 192.168.1.200.41944 > 180.97.34.146.80: Flags [P.], seq 1432:2538, ack 24638, win 113, length 1106: HTTP: POST /c/f/frs/page HTTP/1.1
21:56:02.390009 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], ack 2538, win 1096, length 0
21:56:02.390041 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], ack 2538, win 1096, length 0
21:56:02.738284 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 643: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 24638:25227, ack 2538, win 1096, length 589: HTTP: HTTP/1.1 200 OK
21:56:02.738288 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 3562: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 25227:26679, ack 2538, win 1096, length 1452: HTTP
21:56:02.738289 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 28735:31639, ack 2538, win 1096, length 2904: HTTP
21:56:02.738343 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 643: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 24638:25227, ack 2538, win 1096, length 589: HTTP: HTTP/1.1 200 OK
21:56:02.738393 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1506: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 25227:26679, ack 2538, win 1096, length 1452: HTTP
21:56:02.738414 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 28735:31639, ack 2538, win 1096, length 2904: HTTP
21:56:02.738429 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1246: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 31639:32831, ack 2538, win 1096, length 1192: HTTP
21:56:02.738431 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 7314: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 32831:40091, ack 2538, win 1096, length 7260: HTTP
21:56:02.738459 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1246: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 31639:32831, ack 2538, win 1096, length 1192: HTTP
21:56:02.738468 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 7314: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 32831:40091, ack 2538, win 1096, length 7260: HTTP
21:56:02.738475 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1599: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 40091:41636, ack 2538, win 1096, length 1545: HTTP
21:56:02.738477 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 4150: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 41636:45732, ack 2538, win 1096, length 4096: HTTP
21:56:02.738479 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 7314: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 45732:52992, ack 2538, win 1096, length 7260: HTTP
21:56:02.738507 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1599: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 40091:41636, ack 2538, win 1096, length 1545: HTTP
21:56:02.738514 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 4150: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 41636:45732, ack 2538, win 1096, length 4096: HTTP
21:56:02.738518 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 7314: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 45732:52992, ack 2538, win 1096, length 7260: HTTP
21:56:02.738603 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 7314: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 52992:60252, ack 2538, win 1096, length 7260: HTTP
21:56:02.738610 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 7314: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 52992:60252, ack 2538, win 1096, length 7260: HTTP
21:56:02.738624 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 60252:63156, ack 2538, win 1096, length 2904: HTTP
21:56:02.738629 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 60252:63156, ack 2538, win 1096, length 2904: HTTP
21:56:02.773782 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 115, length 0
21:56:02.773783 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 123, options [nop,nop,sack 1 {28735:32831}], length 0
21:56:02.773783 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 141, options [nop,nop,sack 1 {28735:41636}], length 0
21:56:02.773784 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 149, options [nop,nop,sack 1 {28735:45732}], length 0
21:56:02.773784 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 183, options [nop,nop,sack 1 {28735:63156}], length 0
21:56:02.773841 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 115, length 0
21:56:02.773858 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 123, options [nop,nop,sack 1 {28735:32831}], length 0
21:56:02.773885 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 141, options [nop,nop,sack 1 {28735:41636}], length 0
21:56:02.773887 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 149, options [nop,nop,sack 1 {28735:45732}], length 0
21:56:02.773888 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 183, options [nop,nop,sack 1 {28735:63156}], length 0
21:56:02.808004 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 63156:66060, ack 2538, win 1096, length 2904: HTTP
21:56:02.808006 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 3562: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 25227:28735, ack 2538, win 1096, length 3508: HTTP
21:56:02.808006 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 861: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 66060:66867, ack 2538, win 1096, length 807: HTTP
21:56:02.808041 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 63156:66060, ack 2538, win 1096, length 2904: HTTP
21:56:02.808060 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 3562: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 25227:28735, ack 2538, win 1096, length 3508: HTTP
21:56:02.808064 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 861: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 66060:66867, ack 2538, win 1096, length 807: HTTP
21:56:02.812540 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 188, options [nop,nop,sack 1 {28735:66060}], length 0
21:56:02.812541 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 66060, win 195, length 0
21:56:02.812541 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 66867, win 198, length 0
21:56:02.812577 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 25227, win 188, options [nop,nop,sack 1 {28735:66060}], length 0
21:56:02.812594 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 66060, win 195, length 0
21:56:02.812597 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 66867, win 198, length 0
21:56:02.862152 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1485: 192.168.1.10.41944 > 180.97.34.146.80: Flags [P.], seq 2538:3969, ack 66867, win 198, length 1431: HTTP: POST /c/f/pb/page HTTP/1.1
21:56:02.862188 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 1485: 192.168.1.200.41944 > 180.97.34.146.80: Flags [P.], seq 2538:3969, ack 66867, win 198, length 1431: HTTP: POST /c/f/pb/page HTTP/1.1
21:56:02.895756 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], ack 3969, win 1188, length 0
21:56:02.895808 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], ack 3969, win 1188, length 0
21:56:03.207427 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 643: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 66867:67456, ack 3969, win 1188, length 589: HTTP: HTTP/1.1 200 OK
21:56:03.207428 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 914: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 67456:68316, ack 3969, win 1188, length 860: HTTP
21:56:03.207429 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 68316:71220, ack 3969, win 1188, length 2904: HTTP
21:56:03.207431 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 8766: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 71220:79932, ack 3969, win 1188, length 8712: HTTP
21:56:03.207432 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1506: 180.97.34.146.80 > 192.168.1.200.41944: Flags [.], seq 79932:81384, ack 3969, win 1188, length 1452: HTTP
21:56:03.207474 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 643: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 66867:67456, ack 3969, win 1188, length 589: HTTP: HTTP/1.1 200 OK
21:56:03.207510 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 914: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 67456:68316, ack 3969, win 1188, length 860: HTTP
21:56:03.207534 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2958: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 68316:71220, ack 3969, win 1188, length 2904: HTTP
21:56:03.207539 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 8766: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 71220:79932, ack 3969, win 1188, length 8712: HTTP
21:56:03.207541 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1506: 180.97.34.146.80 > 192.168.1.10.41944: Flags [.], seq 79932:81384, ack 3969, win 1188, length 1452: HTTP
21:56:03.207551 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 10344: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 81384:91674, ack 3969, win 1188, length 10290: HTTP
21:56:03.207558 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 10344: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 81384:91674, ack 3969, win 1188, length 10290: HTTP
21:56:03.286907 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 67456, win 201, length 0
21:56:03.286910 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 68316, win 204, length 0
21:56:03.286965 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 67456, win 201, length 0
21:56:03.286983 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 68316, win 204, length 0
21:56:03.287012 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 91674, win 249, length 0
21:56:03.287018 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 91674, win 249, length 0
21:56:03.311417 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 180: 180.97.34.146.80 > 192.168.1.200.41944: Flags [P.], seq 91548:91674, ack 3969, win 1188, length 126: HTTP
21:56:03.311455 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 180: 180.97.34.146.80 > 192.168.1.10.41944: Flags [P.], seq 91548:91674, ack 3969, win 1188, length 126: HTTP
21:56:03.314886 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.10.41944 > 180.97.34.146.80: Flags [.], ack 91674, win 249, options [nop,nop,sack 1 {91548:91674}], length 0
21:56:03.314922 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.200.41944 > 180.97.34.146.80: Flags [.], ack 91674, win 249, options [nop,nop,sack 1 {91548:91674}], length 0
21:56:03.965549 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 386: 192.168.1.10.53170 > tiebapic.baidu.com.80: Flags [P.], seq 332:664, ack 22069, win 150, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=aaa778d107a7d933bfa8e8759d70a02e/c4c5dc33c895d143085fa6e636f082025baf07a8.jpg?tbpicau=2023-01-17-05_12c7e5740cc63e384953a3026c287d9f HTTP/1.1
21:56:03.965550 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.10.41114 > 119.100.50.48.80: Flags [P.], seq 238:476, ack 2760, win 75, length 238: HTTP: GET /sys/portrait/item/tb.1.71500165.SmH0mcZ2jkjJNYfskPkcwA?t=1673790962 HTTP/1.1
21:56:03.965612 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 386: 192.168.1.200.53170 > tiebapic.baidu.com.80: Flags [P.], seq 332:664, ack 22069, win 150, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=aaa778d107a7d933bfa8e8759d70a02e/c4c5dc33c895d143085fa6e636f082025baf07a8.jpg?tbpicau=2023-01-17-05_12c7e5740cc63e384953a3026c287d9f HTTP/1.1
21:56:03.965649 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.200.41114 > 119.100.50.48.80: Flags [P.], seq 238:476, ack 2760, win 75, length 238: HTTP: GET /sys/portrait/item/tb.1.71500165.SmH0mcZ2jkjJNYfskPkcwA?t=1673790962 HTTP/1.1
21:56:03.965654 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 74: 192.168.1.10.53182 > tiebapic.baidu.com.80: Flags [S], seq 1510316920, win 65535, options [mss 1460,sackOK,TS val 352344276 ecr 0,nop,wscale 10], length 0
21:56:03.965724 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 74: 192.168.1.200.53182 > tiebapic.baidu.com.80: Flags [S], seq 1510316920, win 65535, options [mss 1460,sackOK,TS val 352344276 ecr 0,nop,wscale 10], length 0
21:56:03.970226 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.10.41116 > 119.100.50.48.80: Flags [P.], seq 238:476, ack 2760, win 78, length 238: HTTP: GET /sys/portrait/item/tb.1.5c742583.y41A2Vkz572soI91zRAAqQ?t=1673790962 HTTP/1.1
21:56:03.970262 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.200.41116 > 119.100.50.48.80: Flags [P.], seq 238:476, ack 2760, win 78, length 238: HTTP: GET /sys/portrait/item/tb.1.5c742583.y41A2Vkz572soI91zRAAqQ?t=1673790962 HTTP/1.1
21:56:03.975769 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.10.41118 > 119.100.50.48.80: Flags [P.], seq 238:476, ack 2911, win 76, length 238: HTTP: GET /sys/portrait/item/tb.1.5be0abbc.kAFL_qN6q6NIbqk7d_bUVQ?t=1673790962 HTTP/1.1
21:56:03.975807 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 292: 192.168.1.200.41118 > 119.100.50.48.80: Flags [P.], seq 238:476, ack 2911, win 76, length 238: HTTP: GET /sys/portrait/item/tb.1.5be0abbc.kAFL_qN6q6NIbqk7d_bUVQ?t=1673790962 HTTP/1.1
21:56:03.985629 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], ack 664, win 573, length 0
21:56:03.985682 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], ack 664, win 573, length 0
21:56:03.987744 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 66: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [S.], seq 3530033062, ack 1510316921, win 65535, options [mss 1412,nop,nop,sackOK,nop,wscale 7], length 0
21:56:03.987745 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 119.100.50.48.80 > 192.168.1.200.41114: Flags [.], ack 476, win 573, length 0
21:56:03.987781 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 66: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [S.], seq 3530033062, ack 1510316921, win 65535, options [mss 1412,nop,nop,sackOK,nop,wscale 7], length 0
21:56:03.987799 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 119.100.50.48.80 > 192.168.1.10.41114: Flags [.], ack 476, win 573, length 0
21:56:03.991094 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.53182 > tiebapic.baidu.com.80: Flags [.], ack 1, win 64, length 0
21:56:03.991095 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 386: 192.168.1.10.53182 > tiebapic.baidu.com.80: Flags [P.], seq 1:333, ack 1, win 64, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=a93035529c33c895a67e947de12802cd/5f51cd95d143ad4b77070405c7025aafa50f06a8.jpg?tbpicau=2023-01-17-05_7a43a37edee8b04fc0ad716cb319adc9 HTTP/1.1
21:56:03.991130 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.53182 > tiebapic.baidu.com.80: Flags [.], ack 1, win 64, length 0
21:56:03.991151 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 386: 192.168.1.200.53182 > tiebapic.baidu.com.80: Flags [P.], seq 1:333, ack 1, win 64, length 332: HTTP: GET /forum/w%3D960%3Bq%3D60/sign=a93035529c33c895a67e947de12802cd/5f51cd95d143ad4b77070405c7025aafa50f06a8.jpg?tbpicau=2023-01-17-05_7a43a37edee8b04fc0ad716cb319adc9 HTTP/1.1
21:56:03.994229 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 119.100.50.48.80 > 192.168.1.200.41116: Flags [.], ack 476, win 573, length 0
21:56:03.994263 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 119.100.50.48.80 > 192.168.1.10.41116: Flags [.], ack 476, win 573, length 0
21:56:03.995903 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2822: 119.100.50.48.80 > 192.168.1.200.41116: Flags [P.], seq 2760:5528, ack 476, win 573, length 2768: HTTP: HTTP/1.1 200 OK
21:56:03.995938 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2822: 119.100.50.48.80 > 192.168.1.10.41116: Flags [P.], seq 2760:5528, ack 476, win 573, length 2768: HTTP: HTTP/1.1 200 OK
21:56:03.999889 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 119.100.50.48.80 > 192.168.1.200.41118: Flags [.], ack 476, win 573, length 0
21:56:03.999924 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 119.100.50.48.80 > 192.168.1.10.41118: Flags [.], ack 476, win 573, length 0
21:56:04.000054 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41116 > 119.100.50.48.80: Flags [.], ack 5528, win 83, length 0
21:56:04.000065 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41116 > 119.100.50.48.80: Flags [.], ack 5528, win 83, length 0
21:56:04.001102 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: 119.100.50.48.80 > 192.168.1.200.41118: Flags [.], seq 2911:5735, ack 476, win 573, length 2824: HTTP: HTTP/1.1 200 OK
21:56:04.001104 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1261: 119.100.50.48.80 > 192.168.1.200.41118: Flags [P.], seq 5735:6942, ack 476, win 573, length 1207: HTTP
21:56:04.001139 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: 119.100.50.48.80 > 192.168.1.10.41118: Flags [.], seq 2911:5735, ack 476, win 573, length 2824: HTTP: HTTP/1.1 200 OK
21:56:04.001159 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1261: 119.100.50.48.80 > 192.168.1.10.41118: Flags [P.], seq 5735:6942, ack 476, win 573, length 1207: HTTP
21:56:04.004915 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 22069:24893, ack 664, win 573, length 2824: HTTP: HTTP/1.1 200 OK
21:56:04.004949 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 22069:24893, ack 664, win 573, length 2824: HTTP: HTTP/1.1 200 OK
21:56:04.005480 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 24893:27717, ack 664, win 573, length 2824: HTTP
21:56:04.005516 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 24893:27717, ack 664, win 573, length 2824: HTTP
21:56:04.005715 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 27717:30541, ack 664, win 573, length 2824: HTTP
21:56:04.005724 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 27717:30541, ack 664, win 573, length 2824: HTTP
21:56:04.006065 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41118 > 119.100.50.48.80: Flags [.], ack 6942, win 84, length 0
21:56:04.006099 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41118 > 119.100.50.48.80: Flags [.], ack 6942, win 84, length 0
21:56:04.007658 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 30541:31953, ack 664, win 573, length 1412: HTTP
21:56:04.007670 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 30541:31953, ack 664, win 573, length 1412: HTTP
21:56:04.007916 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 7114: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [.], seq 31953:39013, ack 664, win 573, length 7060: HTTP
21:56:04.007924 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 7114: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [.], seq 31953:39013, ack 664, win 573, length 7060: HTTP
21:56:04.009570 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.53170 > tiebapic.baidu.com.80: Flags [.], ack 30541, win 167, length 0
21:56:04.009605 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.53170 > tiebapic.baidu.com.80: Flags [.], ack 30541, win 167, length 0
21:56:04.009707 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1222: tiebapic.baidu.com.80 > 192.168.1.200.53170: Flags [P.], seq 39013:40181, ack 664, win 573, length 1168: HTTP
21:56:04.009716 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1222: tiebapic.baidu.com.80 > 192.168.1.10.53170: Flags [P.], seq 39013:40181, ack 664, win 573, length 1168: HTTP
21:56:04.014177 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.53170 > tiebapic.baidu.com.80: Flags [.], ack 39013, win 183, length 0
21:56:04.014178 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.53170 > tiebapic.baidu.com.80: Flags [.], ack 40181, win 186, length 0
21:56:04.014216 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.53170 > tiebapic.baidu.com.80: Flags [.], ack 39013, win 183, length 0
21:56:04.014235 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.53170 > tiebapic.baidu.com.80: Flags [.], ack 40181, win 186, length 0
21:56:04.014241 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], ack 333, win 556, length 0
21:56:04.014247 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], ack 333, win 556, length 0
21:56:04.016622 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: 119.100.50.48.80 > 192.168.1.200.41114: Flags [.], seq 2760:5584, ack 476, win 573, length 2824: HTTP: HTTP/1.1 200 OK
21:56:04.016657 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: 119.100.50.48.80 > 192.168.1.10.41114: Flags [.], seq 2760:5584, ack 476, win 573, length 2824: HTTP: HTTP/1.1 200 OK
21:56:04.016688 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 5702: 119.100.50.48.80 > 192.168.1.200.41114: Flags [.], seq 5584:11232, ack 476, win 573, length 5648: HTTP
21:56:04.016695 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 5702: 119.100.50.48.80 > 192.168.1.10.41114: Flags [.], seq 5584:11232, ack 476, win 573, length 5648: HTTP
21:56:04.017822 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: 119.100.50.48.80 > 192.168.1.200.41114: Flags [.], seq 11232:14056, ack 476, win 573, length 2824: HTTP
21:56:04.017830 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: 119.100.50.48.80 > 192.168.1.10.41114: Flags [.], seq 11232:14056, ack 476, win 573, length 2824: HTTP
21:56:04.018549 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: 119.100.50.48.80 > 192.168.1.200.41114: Flags [.], seq 14056:15468, ack 476, win 573, length 1412: HTTP
21:56:04.018564 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: 119.100.50.48.80 > 192.168.1.10.41114: Flags [.], seq 14056:15468, ack 476, win 573, length 1412: HTTP
21:56:04.018665 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: 119.100.50.48.80 > 192.168.1.200.41114: Flags [.], seq 15468:16880, ack 476, win 573, length 1412: HTTP
21:56:04.018673 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: 119.100.50.48.80 > 192.168.1.10.41114: Flags [.], seq 15468:16880, ack 476, win 573, length 1412: HTTP
21:56:04.019713 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: 119.100.50.48.80 > 192.168.1.200.41114: Flags [.], seq 16880:19704, ack 476, win 573, length 2824: HTTP
21:56:04.019714 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1154: 119.100.50.48.80 > 192.168.1.200.41114: Flags [P.], seq 19704:20804, ack 476, win 573, length 1100: HTTP
21:56:04.019750 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: 119.100.50.48.80 > 192.168.1.10.41114: Flags [.], seq 16880:19704, ack 476, win 573, length 2824: HTTP
21:56:04.019771 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1154: 119.100.50.48.80 > 192.168.1.10.41114: Flags [P.], seq 19704:20804, ack 476, win 573, length 1100: HTTP
21:56:04.023970 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41114 > 119.100.50.48.80: Flags [.], ack 16880, win 102, length 0
21:56:04.024007 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41114 > 119.100.50.48.80: Flags [.], ack 16880, win 102, length 0
21:56:04.026222 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41114 > 119.100.50.48.80: Flags [.], ack 20804, win 110, length 0
21:56:04.026261 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41114 > 119.100.50.48.80: Flags [.], ack 20804, win 110, length 0
21:56:04.039014 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 1:2825, ack 333, win 556, length 2824: HTTP: HTTP/1.1 200 OK
21:56:04.039050 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 1:2825, ack 333, win 556, length 2824: HTTP: HTTP/1.1 200 OK
21:56:04.039695 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 2825:4237, ack 333, win 556, length 1412: HTTP
21:56:04.039731 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 2825:4237, ack 333, win 556, length 1412: HTTP
21:56:04.039754 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 4237:5649, ack 333, win 556, length 1412: HTTP
21:56:04.039760 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 4237:5649, ack 333, win 556, length 1412: HTTP
21:56:04.040326 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 5649:7061, ack 333, win 556, length 1412: HTTP
21:56:04.040361 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 5649:7061, ack 333, win 556, length 1412: HTTP
21:56:04.040383 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 7061:8473, ack 333, win 556, length 1412: HTTP
21:56:04.040389 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 7061:8473, ack 333, win 556, length 1412: HTTP
21:56:04.041567 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 8473:11297, ack 333, win 556, length 2824: HTTP
21:56:04.041569 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 11297:12709, ack 333, win 556, length 1412: HTTP
21:56:04.041603 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 8473:11297, ack 333, win 556, length 2824: HTTP
21:56:04.041621 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 11297:12709, ack 333, win 556, length 1412: HTTP
21:56:04.041726 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 12709:14121, ack 333, win 556, length 1412: HTTP
21:56:04.041734 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 12709:14121, ack 333, win 556, length 1412: HTTP
21:56:04.041916 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 14121:16945, ack 333, win 556, length 2824: HTTP
21:56:04.041925 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 14121:16945, ack 333, win 556, length 2824: HTTP
21:56:04.042767 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 16945:18357, ack 333, win 556, length 1412: HTTP
21:56:04.042774 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 16945:18357, ack 333, win 556, length 1412: HTTP
21:56:04.042950 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 18357:19769, ack 333, win 556, length 1412: HTTP
21:56:04.042957 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 18357:19769, ack 333, win 556, length 1412: HTTP
21:56:04.043549 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 19769:21181, ack 333, win 556, length 1412: HTTP
21:56:04.043554 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 19769:21181, ack 333, win 556, length 1412: HTTP
21:56:04.043727 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 21181:22593, ack 333, win 556, length 1412: HTTP
21:56:04.043733 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 1466: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 21181:22593, ack 333, win 556, length 1412: HTTP
21:56:04.044302 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [.], seq 22593:25417, ack 333, win 556, length 2824: HTTP
21:56:04.044310 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 2878: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [.], seq 22593:25417, ack 333, win 556, length 2824: HTTP
21:56:04.044683 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 685: tiebapic.baidu.com.80 > 192.168.1.200.53182: Flags [P.], seq 25417:26048, ack 333, win 556, length 631: HTTP
21:56:04.044692 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 685: tiebapic.baidu.com.80 > 192.168.1.10.53182: Flags [P.], seq 25417:26048, ack 333, win 556, length 631: HTTP
21:56:04.046841 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.53182 > tiebapic.baidu.com.80: Flags [.], ack 8473, win 81, length 0
21:56:04.046876 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.53182 > tiebapic.baidu.com.80: Flags [.], ack 8473, win 81, length 0
21:56:04.048907 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.53182 > tiebapic.baidu.com.80: Flags [.], ack 26048, win 115, length 0
21:56:04.048908 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41120 > 119.100.50.48.80: Flags [F.], seq 4214785709, ack 3689813378, win 71, length 0
21:56:04.048945 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.53182 > tiebapic.baidu.com.80: Flags [.], ack 26048, win 115, length 0
21:56:04.048962 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41120 > 119.100.50.48.80: Flags [F.], seq 4214785709, ack 3689813378, win 71, length 0
21:56:04.074582 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 119.100.50.48.80 > 192.168.1.200.41120: Flags [.], ack 1, win 556, length 0
21:56:04.074583 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 119.100.50.48.80 > 192.168.1.200.41120: Flags [F.], seq 1, ack 1, win 556, length 0
21:56:04.074617 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 119.100.50.48.80 > 192.168.1.10.41120: Flags [.], ack 1, win 556, length 0
21:56:04.074634 b2:12:0f:6e:32:2d (oui Unknown) > 1a:b1:43:bf:56:5a (oui Unknown), ethertype IPv4 (0x0800), length 54: 119.100.50.48.80 > 192.168.1.10.41120: Flags [F.], seq 1, ack 1, win 556, length 0
21:56:04.079622 1a:b1:43:bf:56:5a (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.41120 > 119.100.50.48.80: Flags [.], ack 2, win 71, length 0
21:56:04.079657 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.41120 > 119.100.50.48.80: Flags [.], ack 2, win 71, length 0
^C
290 packets captured
290 packets received by filter
0 packets dropped by kernel
onlyJinx commented 1 year ago

这是电脑(192.168.1.77)连接wifiA时候wireshark抓包日志(日志有点大,我中间部分剪掉了)

image

No. Time    Source  Destination Protocol    Length  Info                                        
1   0   192.168.1.77    142.251.42.234  TCP 66  12278  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
2   0.620539    192.168.1.77    220.181.174.162 TCP 66  12280  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
3   0.900995    192.168.1.77    220.181.174.98  TCP 66  12281  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
4   1.149419    192.168.1.77    220.181.174.98  TCP 66  12282  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
5   1.228388    192.168.1.77    220.181.174.98  TCP 66  12283  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
6   2.488632    192.168.1.77    23.33.32.40 TCP 66  12272  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
7   2.488632    192.168.1.77    23.33.32.40 TCP 66  12271  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
8   3.456024    AzureWav_54:9c:51   8a:88:2b:00:00:00   ARP 42  Who has 192.168.1.200? Tell 192.168.1.77                                        
9   3.467815    8a:88:2b:00:00:00   AzureWav_54:9c:51   ARP 60  192.168.1.200 is at 8a:88:2b:00:00:00                                       
10  4.635155    192.168.1.77    220.181.174.162 TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12280  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
11  4.912574    192.168.1.77    220.181.174.98  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12281  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
12  5.160941    192.168.1.77    220.181.174.98  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12282  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
13  5.237488    192.168.1.77    220.181.174.98  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12283  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
14  5.301092    192.168.1.77    192.168.1.200   DNS 85  Standard query 0x0a35 A raw.githubusercontent.com                                       
15  5.30139 192.168.1.77    192.168.1.200   DNS 85  Standard query 0x4f77 HTTPS raw.githubusercontent.com                                       
16  5.307056    192.168.1.200   192.168.1.77    DNS 101 Standard query response 0x0a35 A raw.githubusercontent.com A 0.0.0.0                                        
17  5.318742    192.168.1.200   192.168.1.77    DNS 150 Standard query response 0x4f77 HTTPS raw.githubusercontent.com SOA dns1.p01.nsone.net                                       
18  5.624475    192.168.1.77    220.181.174.98  TCP 66  12285  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
19  6.181847    192.168.1.77    172.217.160.77  TCP 66  12286  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
619 57.714519   192.168.1.200   192.168.1.77    DNS 112 Standard query response 0x00dd HTTPS baidu.com SOA dns.baidu.com                                        
620 57.714519   192.168.1.200   192.168.1.77    DNS 359 Standard query response 0x2f73 A baidu.com A 39.156.66.10 A 110.242.68.66 NS ns3.baidu.com NS ns7.baidu.com NS dns.baidu.com NS ns4.baidu.com NS ns2.baidu.com A 180.76.76.92 A 110.242.68.134 A 111.45.3.226 A 14.215.178.80 A 220.181.33.31 A 112.80.248.64 A 36.152.45.193 AAAA 240e:940:603:4:0:ff:b01b:589a AAAA 240e:bf:b801:1002:0:ff:b024:26de                                      
621 57.715959   192.168.1.77    39.156.66.10    TCP 66  12334  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
622 57.717227   192.168.1.77    39.156.66.10    TCP 66  12335  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
623 57.729946   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=51083 Win=130816 Len=0                                      
624 57.783961   192.168.1.200   192.168.1.77    SSHv2   566 Server:                                         
625 57.824955   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=51595 Win=130304 Len=0                                      
626 57.980514   192.168.1.77    39.156.66.10    TCP 66  12336  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
627 58.001204   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
628 58.056026   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=51883 Win=130048 Len=0                                      
629 58.179995   AzureWav_54:9c:51   Broadcast   ARP 42  Who has 192.168.1.200? Tell 192.168.1.77                                        
630 58.227493   8a:88:2b:00:00:00   AzureWav_54:9c:51   ARP 60  192.168.1.200 is at 8a:88:2b:00:00:00                                       
631 58.227517   192.168.1.77    183.60.15.102   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12317  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
632 58.256211   192.168.1.77    10.75.162.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12323  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
633 58.256211   192.168.1.77    10.75.162.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12324  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
634 58.319081   AzureWav_54:9c:51   Broadcast   ARP 42  Who has 192.168.1.200? Tell 192.168.1.77                                        
635 58.32947    192.168.1.200   192.168.1.77    SSHv2   806 Server:                                         
636 58.43242    8a:88:2b:00:00:00   AzureWav_54:9c:51   ARP 60  192.168.1.200 is at 8a:88:2b:00:00:00                                       
637 58.432451   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=52635 Win=131328 Len=0                                      
638 58.458019   192.168.1.77    192.168.1.200   DNS 76  Standard query 0xe467 A dns.msftncsi.com                                        
639 58.46252    192.168.1.200   192.168.1.77    DNS 92  Standard query response 0xe467 A dns.msftncsi.com A 131.107.255.255                                     
640 58.472632   192.168.1.77    183.60.15.102   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12318  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
641 58.548138   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
642 58.600508   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=52923 Win=131072 Len=0                                      
643 58.726482   192.168.1.77    39.156.66.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12334  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
644 58.726573   192.168.1.77    39.156.66.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12335  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
645 58.774766   192.168.1.200   192.168.1.77    SSHv2   566 Server:                                         
646 58.821383   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=53435 Win=130560 Len=0                                      
647 58.992322   192.168.1.77    39.156.66.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12336  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
648 59.00784    192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12332  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
649 59.007841   192.168.1.77    142.251.42.234  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12331  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
650 59.101312   192.168.1.200   192.168.1.77    SSHv2   806 Server:                                         
651 59.148367   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=54187 Win=131328 Len=0                                      
652 59.423461   SichuanT_1d:83:46   Broadcast   ARP 42  Who has 192.168.1.100? Tell 192.168.1.1                                     
653 59.45833    192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12333  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
654 59.538502   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
655 59.583157   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=54475 Win=131072 Len=0                                      
656 59.66141    192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12325  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
657 59.707993   192.168.1.77    220.181.174.98  TCP 66  12337  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
658 59.758806   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
659 59.801343   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=55003 Win=130560 Len=0                                      
660 60.329276   192.168.1.77    142.251.43.14   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12326  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
661 60.418295   192.168.1.200   192.168.1.77    SSHv2   358 Server:                                         
662 60.467355   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=55307 Win=130048 Len=0                                      
663 60.517608   SichuanT_1d:83:46   Broadcast   ARP 42  Who has 192.168.1.100? Tell 192.168.1.1                                     
664 60.59183    192.168.1.77    142.251.43.14   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12327  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
665 60.645994   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
666 60.700285   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=55595 Win=129792 Len=0                                      
667 60.716323   192.168.1.77    220.181.174.98  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12337  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
668 60.732361   192.168.1.77    39.156.66.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12334  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
669 60.732437   192.168.1.77    39.156.66.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12335  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
670 60.751345   192.168.1.200   192.168.1.77    SSHv2   806 Server:                                         
671 60.794257   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=56347 Win=131328 Len=0                                      
672 60.819338   192.168.1.77    142.251.42.234  TCP 66  12338  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
673 60.86023    192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
674 60.904075   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=56635 Win=131072 Len=0                                      
675 60.999265   192.168.1.77    39.156.66.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12336  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
676 61.104769   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
677 61.156257   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=56923 Win=130816 Len=0                                      
678 61.426585   SichuanT_1d:83:46   Broadcast   ARP 42  Who has 192.168.1.100? Tell 192.168.1.1                                     
679 61.514395   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12328  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
680 61.576651   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12329  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
681 61.586757   192.168.1.77    14.23.122.157   TCP 66  12339  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
682 61.630578   192.168.1.200   192.168.1.77    SSHv2   806 Server:                                         
683 61.637924   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12330  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
684 61.68381    192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=57675 Win=130048 Len=0                                      
685 61.740543   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
686 61.778826   192.168.1.77    192.168.1.200   DNS 77  Standard query 0x3def A beacons4.gvt2.com                                       
687 61.779359   192.168.1.77    192.168.1.200   DNS 77  Standard query 0x8743 HTTPS beacons4.gvt2.com                                       
688 61.78843    192.168.1.200   192.168.1.77    DNS 93  Standard query response 0x3def A beacons4.gvt2.com A 216.239.32.116                                     
689 61.792512   192.168.1.200   192.168.1.77    DNS 134 Standard query response 0x8743 HTTPS beacons4.gvt2.com SOA ns1.google.com                                       
690 61.79297    192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=57963 Win=131328 Len=0                                      
691 61.793833   192.168.1.77    216.239.32.116  TCP 66  12340  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
692 61.824392   192.168.1.77    142.251.42.234  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12338  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
693 61.852163   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
694 61.902741   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=58491 Win=130816 Len=0                                      
695 61.950057   192.168.1.77    192.168.1.200   DNS 80  Standard query 0xc7ec A beacons.gcp.gvt2.com                                        
696 61.950356   192.168.1.77    192.168.1.200   DNS 80  Standard query 0x0bcf HTTPS beacons.gcp.gvt2.com                                        
697 61.977979   192.168.1.200   192.168.1.77    DNS 167 Standard query response 0x0bcf HTTPS beacons.gcp.gvt2.com CNAME beacons-handoff.gcp.gvt2.com SOA ns1.google.com                                     
698 61.977979   192.168.1.200   192.168.1.77    DNS 381 Standard query response 0xc7ec A beacons.gcp.gvt2.com CNAME beacons-handoff.gcp.gvt2.com A 220.181.174.226 NS ns3.google.com NS ns2.google.com NS ns1.google.com NS ns4.google.com A 216.239.34.10 A 216.239.32.10 A 216.239.36.10 A 216.239.38.10 AAAA 2001:4860:4802:34::a AAAA 2001:4860:4802:32::a AAAA 2001:4860:4802:36::a AAAA 2001:4860:4802:38::a                                      
699 61.978642   192.168.1.77    220.181.174.226 TCP 66  12341  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
700 62.045691   192.168.1.77    216.239.32.116  TCP 66  12342  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
701 62.085325   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
702 62.136334   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=59019 Win=130304 Len=0                                      
703 62.216186   192.168.1.77    220.181.174.226 TCP 66  12343  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
704 62.291623   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
705 62.338658   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=59307 Win=130048 Len=0                                      
706 62.448411   192.168.1.77    142.251.42.234  TCP 66  12344  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
707 62.510167   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
708 62.556147   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=59595 Win=131328 Len=0                                      
709 62.602098   192.168.1.77    14.23.122.157   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12339  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
710 62.618158   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
711 62.664379   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=59883 Win=131072 Len=0                                      
712 62.728293   192.168.1.77    220.181.174.98  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12337  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
713 62.807225   192.168.1.77    216.239.32.116  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12340  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
714 62.838251   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
715 62.88722    192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=60411 Win=130560 Len=0                                      
716 62.980751   192.168.1.77    220.181.174.226 TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12341  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
717 63.011306   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12332  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
718 63.011339   192.168.1.77    142.251.42.234  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12331  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
719 63.058206   192.168.1.200   192.168.1.77    SSHv2   822 Server:                                         
720 63.058988   192.168.1.77    216.239.32.116  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12342  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
721 63.106701   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=61179 Win=131328 Len=0                                      
722 63.170174   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
723 63.216917   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=61467 Win=131072 Len=0                                      
724 63.217013   192.168.1.77    220.181.174.226 TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12343  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
725 63.28106    192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
726 63.325493   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=61755 Win=130816 Len=0                                      
727 63.341571   192.168.1.77    220.181.174.98  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12322  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
728 63.390244   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
729 63.435934   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=62043 Win=130304 Len=0                                      
730 63.451443   AzureWav_54:9c:51   8a:88:2b:00:00:00   ARP 42  Who has 192.168.1.200? Tell 192.168.1.77                                        
731 63.451633   192.168.1.77    142.251.42.234  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12344  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
732 63.457433   8a:88:2b:00:00:00   AzureWav_54:9c:51   ARP 60  192.168.1.200 is at 8a:88:2b:00:00:00                                       
733 63.467173   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12333  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
734 63.504884   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
735 63.545772   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=62571 Win=129792 Len=0                                      
736 63.837514   192.168.1.77    142.251.42.234  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12338  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
737 63.941131   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
738 63.993075   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=62859 Win=131328 Len=0                                      
739 64.23785    192.168.1.77    192.168.1.200   DNS 75  Standard query 0x0299 A www.gstatic.com                                     
740 64.238424   192.168.1.77    192.168.1.200   DNS 75  Standard query 0x4f26 HTTPS www.gstatic.com                                     
741 64.255544   192.168.1.200   192.168.1.77    DNS 346 Standard query response 0x0299 A www.gstatic.com A 203.208.43.98 NS ns3.google.com NS ns4.google.com NS ns2.google.com NS ns1.google.com A 216.239.36.10 A 216.239.38.10 A 216.239.32.10 A 216.239.34.10 AAAA 2001:4860:4802:36::a AAAA 2001:4860:4802:38::a AAAA 2001:4860:4802:32::a AAAA 2001:4860:4802:34::a                                        
742 64.255544   192.168.1.200   192.168.1.77    DNS 132 Standard query response 0x4f26 HTTPS www.gstatic.com SOA ns1.google.com                                     
743 64.25649    192.168.1.77    203.208.43.98   TCP 66  12345  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
744 64.279166   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
745 64.33482    192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=63147 Win=131072 Len=0                                      
746 64.492698   192.168.1.77    203.208.43.98   TCP 66  12346  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
747 64.523948   192.168.1.77    220.181.174.226 TCP 66  12347  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                     
748 64.60233    192.168.1.77    14.23.122.157   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12339  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
749 64.606307   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
750 64.650091   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=63675 Win=130560 Len=0                                      
751 64.714129   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
752 64.744245   192.168.1.77    39.156.66.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12334  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
753 64.744327   192.168.1.77    39.156.66.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12335  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
754 64.760274   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=63963 Win=130048 Len=0                                      
755 64.808263   192.168.1.77    216.239.32.116  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12340  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
756 64.818978   192.168.1.200   192.168.1.77    SSHv2   806 Server:                                         
757 64.870296   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=64715 Win=131328 Len=0                                      
758 64.920237   SichuanT_1d:83:46   Broadcast   ARP 42  Who has 192.168.1.200? Tell 192.168.1.1                                     
759 64.922743   SichuanT_1d:83:46   Broadcast   ARP 42  Who has 192.168.1.3? Tell 192.168.1.1                                       
760 64.923671   SichuanT_1d:83:46   Broadcast   ARP 42  Who has 192.168.1.6? Tell 192.168.1.1                                       
761 64.992997   192.168.1.77    220.181.174.226 TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12341  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
762 65.007625   192.168.1.77    39.156.66.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12336  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
763 65.040344   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
764 65.069801   192.168.1.77    216.239.32.116  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12342  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
765 65.085701   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3647 Ack=65243 Win=130816 Len=0                                      
766 65.132327   192.168.1.77    192.168.1.200   SSHv2   102 Client:                                         
767 65.132458   192.168.1.77    192.168.1.200   SSHv2   86  Client:                                         
768 65.139003   192.168.1.200   192.168.1.77    TCP 60  22  >  12293 [ACK] Seq=65243 Ack=3727 Win=64128 Len=0                                       
769 65.139003   192.168.1.200   192.168.1.77    SSHv2   102 Server:                                         
770 65.153619   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
771 65.153673   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=65579 Win=130304 Len=0                                      
772 65.22551    192.168.1.77    220.181.174.226 TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12343  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
773 65.259768   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
774 65.272203   192.168.1.77    203.208.43.98   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12345  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                       
775 65.304345   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=65867 Win=130048 Len=0                                      
776 65.368116   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
777 65.412767   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=66155 Win=129792 Len=0                                      
778 65.459007   192.168.1.77    142.251.42.234  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12344  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
779 65.478187   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
780 65.504707   192.168.1.77    203.208.43.98   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12346  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                       
781 65.520095   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=66443 Win=131328 Len=0                                      
782 65.536068   192.168.1.77    220.181.174.226 TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12347  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
783 65.588377   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
784 65.642796   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=66971 Win=130816 Len=0                                      
785 66.261897   192.168.1.77    10.75.162.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12323  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
786 66.261903   192.168.1.77    10.75.162.10    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12324  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
787 66.358325   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
788 66.402509   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=67499 Win=130304 Len=0                                      
789 66.729252   192.168.1.77    220.181.174.98  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12337  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
790 66.798209   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
791 66.839245   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=67787 Win=130048 Len=0                                      
792 66.899106   8a:88:2b:00:00:00   Broadcast   ARP 60  Who has 192.168.1.77? Tell 192.168.1.199                                        
793 66.899131   AzureWav_54:9c:51   8a:88:2b:00:00:00   ARP 42  192.168.1.77 is at 28:c2:dd:54:9c:51                                        
794 67.286316   192.168.1.77    203.208.43.98   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12345  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                       
795 67.355045   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
796 67.398155   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=68075 Win=131328 Len=0                                      
797 67.508383   192.168.1.77    203.208.43.98   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12346  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                       
798 67.540246   192.168.1.77    220.181.174.226 TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12347  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
799 67.568552   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
800 67.617287   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=68603 Win=130816 Len=0                                      
801 67.664073   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12325  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
802 67.678206   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
803 67.725301   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=68891 Win=130560 Len=0                                      
804 67.849494   192.168.1.77    142.251.42.234  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12338  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
805 67.898687   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
806 67.942413   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=69179 Win=130048 Len=0                                      
807 68.337946   192.168.1.77    142.251.43.14   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12326  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
808 68.448148   192.168.1.200   192.168.1.77    SSHv2   358 Server:                                         
809 68.493143   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=69483 Win=129792 Len=0                                      
810 68.605298   192.168.1.77    142.251.43.14   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12327  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
811 68.605313   192.168.1.77    14.23.122.157   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12339  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
812 68.67179    192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
813 68.716268   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=70011 Win=131328 Len=0                                      
814 68.823266   192.168.1.77    216.239.32.116  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12340  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
815 68.888226   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
816 68.91291    8a:88:2b:00:00:00   Broadcast   ARP 60  Who has 192.168.1.201? Tell 192.168.1.199                                       
817 68.933251   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=70299 Win=131072 Len=0                                      
818 68.994948   192.168.1.77    220.181.174.226 TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12341  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
819 69.074275   192.168.1.77    216.239.32.116  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12342  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
820 69.109092   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
821 69.154237   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=70827 Win=130560 Len=0                                      
822 69.233308   192.168.1.77    220.181.174.226 TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12343  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
823 69.328343   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
824 69.376826   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=71115 Win=130048 Len=0                                      
825 69.470844   192.168.1.77    142.251.42.234  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12344  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
826 69.518853   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12328  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
827 69.549912   192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
828 69.582244   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12329  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
829 69.598714   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=71643 Win=131328 Len=0                                      
830 69.59956    192.168.1.77    14.23.122.157   TCP 66  12348  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
831 69.645247   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12330  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
832 69.669716   192.168.1.200   192.168.1.77    SSHv2   662 Server:                                         
833 69.676964   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
834 69.677018   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=72539 Win=130304 Len=0                                      
835 69.67737    192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
836 69.67737    192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
837 69.67737    192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
838 69.677392   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=73403 Win=131328 Len=0                                      
839 69.7691 192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
840 69.820307   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=73691 Win=131072 Len=0                                      
841 69.879783   192.168.1.200   192.168.1.77    SSHv2   374 Server:                                         
842 69.879783   192.168.1.200   192.168.1.77    SSHv2   374 Server:                                         
843 69.879834   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=74331 Win=130304 Len=0                                      
844 69.880064   192.168.1.200   192.168.1.77    SSHv2   326 Server:                                         
845 69.880064   192.168.1.200   192.168.1.77    SSHv2   326 Server:                                         
846 69.880086   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=74875 Win=131328 Len=0                                      
847 69.946857   AzureWav_54:9c:51   8a:88:2b:00:00:00   ARP 42  Who has 192.168.1.200? Tell 192.168.1.77                                        
848 69.96749    8a:88:2b:00:00:00   AzureWav_54:9c:51   ARP 60  192.168.1.200 is at 8a:88:2b:00:00:00                                       
849 69.989141   192.168.1.200   192.168.1.77    SSHv2   1514    Server:                                         
850 69.989398   192.168.1.200   192.168.1.77    SSHv2   786 Server:                                         
851 69.98942    192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=77067 Win=131328 Len=0                                      
852 70.614309   192.168.1.77    14.23.122.157   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12348  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                       
853 70.653952   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
854 70.708312   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=77355 Win=131072 Len=0                                      
855 71.019313   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12332  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
856 71.019315   192.168.1.77    142.251.42.234  TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12331  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
857 71.09695    192.168.1.200   192.168.1.77    SSHv2   582 Server:                                         
858 71.100415   192.168.1.200   192.168.1.77    SSHv2   534 Server:                                         
859 71.100473   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=78363 Win=130048 Len=0                                      
860 71.301247   192.168.1.77    203.208.43.98   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12345  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                       
861 71.311118   192.168.1.200   192.168.1.77    SSHv2   342 Server:                                         
862 71.363793   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3727 Ack=78651 Win=131328 Len=0                                      
863 71.406067   192.168.1.77    192.168.1.200   SSHv2   86  Client:                                         
864 71.406163   192.168.1.77    192.168.1.200   SSHv2   86  Client:                                         
865 71.412889   192.168.1.200   192.168.1.77    TCP 60  22  >  12293 [ACK] Seq=78651 Ack=3791 Win=64128 Len=0                                       
866 71.412889   192.168.1.200   192.168.1.77    SSHv2   118 Server:                                         
867 71.412889   192.168.1.200   192.168.1.77    SSHv2   198 Server:                                         
868 71.412936   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3791 Ack=78859 Win=131072 Len=0                                      
869 71.468271   192.168.1.200   192.168.1.77    SSHv2   150 Server:                                         
870 71.473983   192.168.1.77    31.13.96.195    TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12333  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      
871 71.521828   192.168.1.77    192.168.1.200   TCP 54  12293  >  22 [ACK] Seq=3791 Ack=78955 Win=131072 Len=0                                      
872 71.52184    192.168.1.77    203.208.43.98   TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12346  >  80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                       
873 71.553265   192.168.1.77    220.181.174.226 TCP 66  [TCP Retransmission] [TCP Port numbers reused] 12347  >  443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM                                      

下面是openwrt的日志

22:47:09.672999 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12320 > www.msftconnecttest.com.80: Flags [S], seq 605856290, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:09.936124 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12313 > beacons3.gvt2.com.443: Flags [S], seq 1582955502, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:10.183084 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12314 > beacons3.gvt2.com.443: Flags [S], seq 2984190223, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:10.369923 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12315 > beacons3.gvt2.com.443: Flags [S], seq 1025969822, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:10.739326 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12322 > beacons3.gvt2.com.443: Flags [S], seq 1097336322, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:11.740698 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12322 > beacons3.gvt2.com.443: Flags [S], seq 1097336322, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:12.624403 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12316 > wx.mail.qq.com.443: Flags [S], seq 1437229807, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:12.628289 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12317 > wx.mail.qq.com.443: Flags [S], seq 2755410992, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:12.889772 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12318 > wx.mail.qq.com.443: Flags [S], seq 2706053579, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:13.654092 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12323 > 10.75.162.10.443: Flags [S], seq 1257509045, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:13.654095 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12324 > 10.75.162.10.443: Flags [S], seq 2058948796, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:13.692585 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12320 > www.msftconnecttest.com.80: Flags [S], seq 605856290, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:13.692588 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12319 > a23-33-32-27.deploy.static.akamaitechnologies.com.80: Flags [S], seq 3545426894, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:13.693636 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12321 > www.msftconnecttest.com.80: Flags [S], seq 515247804, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:13.749281 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12322 > beacons3.gvt2.com.443: Flags [S], seq 1097336322, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:14.670280 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12324 > 10.75.162.10.443: Flags [S], seq 2058948796, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:14.670485 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12323 > 10.75.162.10.443: Flags [S], seq 1257509045, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:15.061517 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12325 > www.google.com.443: Flags [S], seq 3181448384, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:15.730091 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12326 > clients2.google.com.443: Flags [S], seq 1939826395, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:15.810287 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12311 > www.googleapis.com.443: Flags [S], seq 3632050357, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:15.982361 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12327 > clients2.google.com.443: Flags [S], seq 365271842, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:16.059039 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12325 > www.google.com.443: Flags [S], seq 3181448384, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:16.075317 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12312 > www.googleapis.com.443: Flags [S], seq 377043007, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:16.666436 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12324 > 10.75.162.10.443: Flags [S], seq 2058948796, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:16.667095 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12323 > 10.75.162.10.443: Flags [S], seq 1257509045, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:16.733380 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12326 > clients2.google.com.443: Flags [S], seq 1939826395, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:16.923263 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12328 > www.google.com.443: Flags [S], seq 2759607546, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:16.982618 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12329 > www.google.com.443: Flags [S], seq 3668759895, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:16.996388 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12327 > clients2.google.com.443: Flags [S], seq 365271842, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:17.028698 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12330 > www.google.com.443: Flags [S], seq 3448429037, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:17.755245 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12322 > beacons3.gvt2.com.443: Flags [S], seq 1097336322, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:17.930303 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12328 > www.google.com.443: Flags [S], seq 2759607546, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:17.947620 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12313 > beacons3.gvt2.com.443: Flags [S], seq 1582955502, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:17.994702 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12329 > www.google.com.443: Flags [S], seq 3668759895, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:18.049201 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12330 > www.google.com.443: Flags [S], seq 3448429037, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:18.072338 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12325 > www.google.com.443: Flags [S], seq 3181448384, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:18.183749 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12314 > beacons3.gvt2.com.443: Flags [S], seq 2984190223, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:18.368401 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12315 > beacons3.gvt2.com.443: Flags [S], seq 1025969822, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:18.422375 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12331 > www.googleapis.com.443: Flags [S], seq 2443748685, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:18.423181 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12332 > www.google.com.443: Flags [S], seq 3612097880, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:18.744055 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12326 > clients2.google.com.443: Flags [S], seq 1939826395, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:18.873302 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12333 > www.google.com.443: Flags [S], seq 4010141960, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:19.011320 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12327 > clients2.google.com.443: Flags [S], seq 365271842, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:19.419781 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12331 > www.googleapis.com.443: Flags [S], seq 2443748685, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:19.420197 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12332 > www.google.com.443: Flags [S], seq 3612097880, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:19.872016 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12333 > www.google.com.443: Flags [S], seq 4010141960, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:19.934044 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12328 > www.google.com.443: Flags [S], seq 2759607546, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:19.999198 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12329 > www.google.com.443: Flags [S], seq 3668759895, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:20.059354 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12330 > www.google.com.443: Flags [S], seq 3448429037, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:20.136275 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12334 > baidu.com.443: Flags [S], seq 2024480371, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:20.137212 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12335 > baidu.com.443: Flags [S], seq 2298492870, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:20.408569 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12336 > baidu.com.443: Flags [S], seq 581193546, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:20.647780 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12317 > wx.mail.qq.com.443: Flags [S], seq 2755410992, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:20.676228 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12324 > 10.75.162.10.443: Flags [S], seq 2058948796, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:20.676351 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12323 > 10.75.162.10.443: Flags [S], seq 1257509045, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:20.893226 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12318 > wx.mail.qq.com.443: Flags [S], seq 2706053579, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:21.149742 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12334 > baidu.com.443: Flags [S], seq 2024480371, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:21.150055 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12335 > baidu.com.443: Flags [S], seq 2298492870, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:21.436396 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12331 > www.googleapis.com.443: Flags [S], seq 2443748685, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:21.436400 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12332 > www.google.com.443: Flags [S], seq 3612097880, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:21.436401 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12336 > baidu.com.443: Flags [S], seq 581193546, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:21.879265 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12333 > www.google.com.443: Flags [S], seq 4010141960, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:22.082371 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12325 > www.google.com.443: Flags [S], seq 3181448384, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:22.128371 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12337 > beacons3.gvt2.com.443: Flags [S], seq 4183312696, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:22.749388 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12326 > clients2.google.com.443: Flags [S], seq 1939826395, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:23.012271 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12327 > clients2.google.com.443: Flags [S], seq 365271842, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:23.140936 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12337 > beacons3.gvt2.com.443: Flags [S], seq 4183312696, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:23.153461 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12334 > baidu.com.443: Flags [S], seq 2024480371, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:23.154369 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12335 > baidu.com.443: Flags [S], seq 2298492870, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:23.246739 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12338 > www.googleapis.com.443: Flags [S], seq 2303005202, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:23.423235 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12336 > baidu.com.443: Flags [S], seq 581193546, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:23.935012 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12328 > www.google.com.443: Flags [S], seq 2759607546, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:23.996682 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12329 > www.google.com.443: Flags [S], seq 3668759895, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:24.007567 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12339 > 14.23.122.157.443: Flags [S], seq 1710658147, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:24.066961 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12330 > www.google.com.443: Flags [S], seq 3448429037, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:24.213900 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12340 > beacons4.gvt2.com.443: Flags [S], seq 2611537802, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:24.245348 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12338 > www.googleapis.com.443: Flags [S], seq 2303005202, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:24.399390 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12341 > beacons2.gvt2.com.443: Flags [S], seq 2177265861, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:24.466088 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12342 > beacons4.gvt2.com.443: Flags [S], seq 1740889186, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:24.636294 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12343 > beacons2.gvt2.com.443: Flags [S], seq 2885765111, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:24.869174 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12344 > www.googleapis.com.443: Flags [S], seq 3436553312, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.023190 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12339 > 14.23.122.157.443: Flags [S], seq 1710658147, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.149948 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12337 > beacons3.gvt2.com.443: Flags [S], seq 4183312696, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.227346 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12340 > beacons4.gvt2.com.443: Flags [S], seq 2611537802, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.402298 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12341 > beacons2.gvt2.com.443: Flags [S], seq 2177265861, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.431259 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12332 > www.google.com.443: Flags [S], seq 3612097880, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.431471 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12331 > www.googleapis.com.443: Flags [S], seq 2443748685, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.479322 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12342 > beacons4.gvt2.com.443: Flags [S], seq 1740889186, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.637002 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12343 > beacons2.gvt2.com.443: Flags [S], seq 2885765111, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.762816 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12322 > beacons3.gvt2.com.443: Flags [S], seq 1097336322, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.872100 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12344 > www.googleapis.com.443: Flags [S], seq 3436553312, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:25.887312 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12333 > www.google.com.443: Flags [S], seq 4010141960, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:26.257810 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12338 > www.googleapis.com.443: Flags [S], seq 2303005202, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:26.677247 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12345 > www.gstatic.com.80: Flags [S], seq 8570323, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:26.913310 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12346 > www.gstatic.com.80: Flags [S], seq 352598614, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:26.963591 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12347 > beacons2.gvt2.com.443: Flags [S], seq 3682844562, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.024189 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12339 > 14.23.122.157.443: Flags [S], seq 1710658147, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.164250 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12334 > baidu.com.443: Flags [S], seq 2024480371, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.164535 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12335 > baidu.com.443: Flags [S], seq 2298492870, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.228317 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12340 > beacons4.gvt2.com.443: Flags [S], seq 2611537802, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.417054 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12341 > beacons2.gvt2.com.443: Flags [S], seq 2177265861, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.428941 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12336 > baidu.com.443: Flags [S], seq 581193546, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.490299 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12342 > beacons4.gvt2.com.443: Flags [S], seq 1740889186, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.646321 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12343 > beacons2.gvt2.com.443: Flags [S], seq 2885765111, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.693114 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12345 > www.gstatic.com.80: Flags [S], seq 8570323, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.879699 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12344 > www.googleapis.com.443: Flags [S], seq 3436553312, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.926083 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12346 > www.gstatic.com.80: Flags [S], seq 352598614, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:27.955992 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12347 > beacons2.gvt2.com.443: Flags [S], seq 3682844562, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:28.718751 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12323 > 10.75.162.10.443: Flags [S], seq 1257509045, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:28.718754 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12324 > 10.75.162.10.443: Flags [S], seq 2058948796, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:29.149707 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12337 > beacons3.gvt2.com.443: Flags [S], seq 4183312696, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:29.731649 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12345 > www.gstatic.com.80: Flags [S], seq 8570323, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:29.928431 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12346 > www.gstatic.com.80: Flags [S], seq 352598614, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:29.965255 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12347 > beacons2.gvt2.com.443: Flags [S], seq 3682844562, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:30.084344 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12325 > www.google.com.443: Flags [S], seq 3181448384, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:30.269802 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12338 > www.googleapis.com.443: Flags [S], seq 2303005202, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:30.758469 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12326 > clients2.google.com.443: Flags [S], seq 1939826395, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:31.025361 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12339 > 14.23.122.157.443: Flags [S], seq 1710658147, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:31.026197 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12327 > clients2.google.com.443: Flags [S], seq 365271842, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:31.262740 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12340 > beacons4.gvt2.com.443: Flags [S], seq 2611537802, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:31.416020 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12341 > beacons2.gvt2.com.443: Flags [S], seq 2177265861, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:31.494354 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12342 > beacons4.gvt2.com.443: Flags [S], seq 1740889186, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:31.691601 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12343 > beacons2.gvt2.com.443: Flags [S], seq 2885765111, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:31.891886 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12344 > www.googleapis.com.443: Flags [S], seq 3436553312, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:31.939615 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12328 > www.google.com.443: Flags [S], seq 2759607546, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:31.967755 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 66: 119.29.126.219.443 > 192.168.1.200.59574: Flags [F.], seq 3357013563, ack 1352869866, win 227, options [nop,nop,TS val 2793759005 ecr 1436153152], length 0
22:47:31.967793 b2:12:0f:6e:32:2d (oui Unknown) > 58:d5:0a:72:11:58 (oui Unknown), ethertype IPv4 (0x0800), length 66: 119.29.126.219.443 > 192.168.1.10.59574: Flags [F.], seq 3357013563, ack 1352869866, win 227, options [nop,nop,TS val 2793759005 ecr 1436153152], length 0
22:47:31.992270 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 203.76.217.195.443 > 192.168.1.200.55376: Flags [F.], seq 2619111734, ack 2256909027, win 29200, length 0
22:47:31.992324 b2:12:0f:6e:32:2d (oui Unknown) > 58:d5:0a:72:11:58 (oui Unknown), ethertype IPv4 (0x0800), length 54: 203.76.217.195.443 > 192.168.1.10.55376: Flags [F.], seq 2619111734, ack 2256909027, win 29200, length 0
22:47:32.003514 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12329 > www.google.com.443: Flags [S], seq 3668759895, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:32.022138 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12348 > 14.23.122.157.80: Flags [S], seq 3779065600, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:32.079435 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12330 > www.google.com.443: Flags [S], seq 3448429037, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:32.193732 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 66: 119.29.126.219.443 > 192.168.1.200.59574: Flags [F.], seq 0, ack 1, win 227, options [nop,nop,TS val 2793759232 ecr 1436153152], length 0
22:47:32.193768 b2:12:0f:6e:32:2d (oui Unknown) > 58:d5:0a:72:11:58 (oui Unknown), ethertype IPv4 (0x0800), length 66: 119.29.126.219.443 > 192.168.1.10.59574: Flags [F.], seq 0, ack 1, win 227, options [nop,nop,TS val 2793759232 ecr 1436153152], length 0
22:47:32.221258 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 203.76.217.195.443 > 192.168.1.200.55376: Flags [F.], seq 0, ack 1, win 29200, length 0
22:47:32.221294 b2:12:0f:6e:32:2d (oui Unknown) > 58:d5:0a:72:11:58 (oui Unknown), ethertype IPv4 (0x0800), length 54: 203.76.217.195.443 > 192.168.1.10.55376: Flags [F.], seq 0, ack 1, win 29200, length 0
22:47:32.335011 58:d5:0a:72:11:58 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.43182 > 119.147.182.7.443: Flags [S], seq 3452275921, win 65535, options [mss 1460,sackOK,TS val 2874813474 ecr 0,nop,wscale 10], length 0
22:47:32.335015 58:d5:0a:72:11:58 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 74: 192.168.1.10.54686 > 119.147.182.7.80: Flags [S], seq 391967332, win 65535, options [mss 1460,sackOK,TS val 2874813474 ecr 0,nop,wscale 10], length 0
22:47:32.337443 58:d5:0a:72:11:58 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.59574 > 119.29.126.219.443: Flags [R], seq 1352869866, win 0, length 0
22:47:32.337446 58:d5:0a:72:11:58 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.55376 > 203.76.217.195.443: Flags [R], seq 2256909027, win 0, length 0
22:47:32.337447 58:d5:0a:72:11:58 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.59574 > 119.29.126.219.443: Flags [R], seq 1352869866, win 0, length 0
22:47:32.337447 58:d5:0a:72:11:58 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: 192.168.1.10.55376 > 203.76.217.195.443: Flags [R], seq 2256909027, win 0, length 0
22:47:32.337501 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.59574 > 119.29.126.219.443: Flags [R], seq 1352869866, win 0, length 0
22:47:32.337518 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.55376 > 203.76.217.195.443: Flags [R], seq 2256909027, win 0, length 0
22:47:32.337521 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.59574 > 119.29.126.219.443: Flags [R], seq 1352869866, win 0, length 0
22:47:32.337543 b2:12:0f:6e:32:2d (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 54: 192.168.1.200.55376 > 203.76.217.195.443: Flags [R], seq 2256909027, win 0, length 0
22:47:33.035424 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12348 > 14.23.122.157.80: Flags [S], seq 3779065600, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:33.439364 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12331 > www.googleapis.com.443: Flags [S], seq 2443748685, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:33.440305 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12332 > www.google.com.443: Flags [S], seq 3612097880, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
22:47:33.456028 28:93:7d:1d:83:46 (oui Unknown) > b2:12:0f:6e:32:2d (oui Unknown), ethertype IPv4 (0x0800), length 60: catdot.dianping.com.443 > 192.168.1.200.33916: Flags [R], seq 3621544459, win 1000, length 0
22:47:33.456081 b2:12:0f:6e:32:2d (oui Unknown) > 58:d5:0a:72:11:58 (oui Unknown), ethertype IPv4 (0x0800), length 54: catdot.dianping.com.443 > 192.168.1.10.33916: Flags [R], seq 3621544459, win 1000, length 0
22:47:33.721409 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.12345 > www.gstatic.com.80: Flags [S], seq 8570323, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
^C
276 packets captured
276 packets received by filter
0 packets dropped by kernel
MageDelfador commented 1 year ago

原来答案是无线中继没开WDS 需要分别改主路由和老毛子的无线设置 改成WDS+AP模式,WDS主从也要设置好 不然数据包一过中继,目标MAC地址就没了

onlyJinx commented 1 year ago

改WDS的话,我得把光猫改成桥接,用路由器拨号,我晚上回去再试试 运营商自带的那个光猫设置非常简陋,没有WDS,本着能用就好好用的心态,一直没去改桥接

onlyJinx commented 1 year ago

WDS中继无法实现了, 我用TPlink的路由里面只有WDS桥接 然后连接后无法解决问题, 我想这个应该只是 WISP 想问下能通过软件层面解决嘛? 例如用iptables

然后我在老毛子抓包的时候发现一起有趣的问题

当我把其他设备关闭时,电脑连接wifiA, 此时老毛子日志里, 数据包是没有MAC目的地址, 像这样

23:26:14.068719 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9401 > 204.79.197.239.https: Flags [S], seq 2000422779, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:14.069199 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9400 > 204.79.197.239.https: Flags [S], seq 2198000620, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:14.780739 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9407 > checkappexec.microsoft.com.https: Flags [S], seq 4161732518, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:15.202919 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9409 > checkappexec.microsoft.com.https: Flags [S], seq 1773505195, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:15.239039 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9388 > ec2-44-232-249-16.us-west-2.compute.amazonaws.com.https: Flags [S], seq 3639308617, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:15.410779 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9410 > edge.microsoft.com.https: Flags [S], seq 2199282782, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:15.679279 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9411 > edge.microsoft.com.https: Flags [S], seq 3724265376, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:16.202879 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9409 > checkappexec.microsoft.com.https: Flags [S], seq 1773505195, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:16.424839 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9410 > edge.microsoft.com.https: Flags [S], seq 2199282782, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:16.693359 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9411 > edge.microsoft.com.https: Flags [S], seq 3724265376, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:17.305339 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9389 > 204.79.197.239.https: Flags [S], seq 752667037, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:17.319859 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9390 > deff.nelreports.net.https: Flags [S], seq 3693913803, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:17.537379 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9391 > 204.79.197.239.https: Flags [S], seq 482442274, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:17.552819 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9392 > deff.nelreports.net.https: Flags [S], seq 150265263, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:17.797919 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9403 > edge-http.microsoft.com.www: Flags [S], seq 1426720080, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:18.052439 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9404 > edge-http.microsoft.com.www: Flags [S], seq 112150629, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:18.208779 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9409 > checkappexec.microsoft.com.https: Flags [S], seq 1773505195, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:18.425839 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9410 > edge.microsoft.com.https: Flags [S], seq 2199282782, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:18.551879 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9393 > ntp.msn.cn.https: Flags [S], seq 43340754, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:18.690839 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9411 > edge.microsoft.com.https: Flags [S], seq 3724265376, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
23:26:18.786379 28:c2:dd:54:9c:51 (oui Unknown) > Broadcast, ethertype IPv4 (0x0800), length 66: 192.168.1.77.9407 > checkappexec.microsoft.com.https: Flags [S], seq 4161732518, wi

然后当我把我的充当smb文件服务器的debian开机了之后, 发现他把所有的数据包都往我的debian上面发送了


23:44:49.098460 e4:3a:6e:5a:f0:d6 (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.202.40630 > 172.67.70.128.https: Flags [.], ack 270213, win 2480, options [nop,nop,TS val 3014616620 ecr 2918859192], length 0
23:44:49.098620 e4:3a:6e:5a:f0:d6 (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 276: 192.168.1.202.40630 > 172.67.70.128.https: Flags [P.], seq 154606:154816, ack 270244, win 2449, options [nop,nop,TS val 3014616620 ecr 2918859192], length 210
23:44:49.098640 e4:3a:6e:5a:f0:d6 (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 278: 192.168.1.202.40630 > 172.67.70.128.https: Flags [P.], seq 154816:155028, ack 270244, win 2449, options [nop,nop,TS val 3014616620 ecr 2918859192], length 212
23:44:49.098680 e4:3a:6e:5a:f0:d6 (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 282: 192.168.1.202.40630 > 172.67.70.128.https: Flags [P.], seq 155028:155244, ack 270244, win 2449, options [nop,nop,TS val 3014616620 ecr 2918859192], length 216
23:44:49.098900 e4:3a:6e:5a:f0:d6 (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 272: 192.168.1.202.40630 > 172.67.70.128.https: Flags [P.], seq 155244:155450, ack 270244, win 2449, options [nop,nop,TS val 3014616620 ecr 2918859192], length 206
23:44:49.099360 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 437: 172.67.70.128.https > 192.168.1.202.40630: Flags [P.], seq 270244:270615, ack 154606, win 141, options [nop,nop,TS val 2918859193 ecr 3014616282], length 371
23:44:49.099400 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 97: 172.67.70.128.https > 192.168.1.202.40630: Flags [P.], seq 270615:270646, ack 154606, win 141, options [nop,nop,TS val 2918859193 ecr 3014616282], length 31
23:44:49.099640 e4:3a:6e:5a:f0:d6 (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.202.40630 > 172.67.70.128.https: Flags [.], ack 270646, win 2449, options [nop,nop,TS val 3014616621 ecr 2918859193], length 0
23:44:49.104440 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 434: 172.67.70.128.https > 192.168.1.202.40630: Flags [P.], seq 270646:271014, ack 154606, win 141, options [nop,nop,TS val 2918859198 ecr 3014616282], length 368
23:44:49.104460 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 98: 172.67.70.128.https > 192.168.1.202.40630: Flags [P.], seq 271014:271046, ack 154606, win 141, options [nop,nop,TS val 2918859198 ecr 3014616282], length 32
23:44:49.104480 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 97: 172.67.70.128.https > 192.168.1.202.40630: Flags [P.], seq 271046:271077, ack 154606, win 141, options [nop,nop,TS val 2918859198 ecr 3014616282], length 31
23:44:49.105020 e4:3a:6e:5a:f0:d6 (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.202.40630 > 172.67.70.128.https: Flags [.], ack 271077, win 2449, options [nop,nop,TS val 3014616626 ecr 2918859198], length 0
23:44:49.116980 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 412: 172.67.70.128.https > 192.168.1.202.40630: Flags [P.], seq 271077:271423, ack 154606, win 141, options [nop,nop,TS val 2918859200 ecr 3014616282], length 346
23:44:49.117000 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 97: 172.67.70.128.https > 192.168.1.202.40630: Flags [P.], seq 271423:271454, ack 154606, win 141, options [nop,nop,TS val 2918859201 ecr 3014616282], length 31
23:44:49.117860 e4:3a:6e:5a:f0:d6 (oui Unknown) > 28:93:7d:1d:83:46 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.202.40630 > 172.67.70.128.https: Flags [.], ack 271454, win 2449, options [nop,nop,TS val 3014616639 ecr 2918859200], length 0
23:44:49.278320 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 66: 172.67.70.128.https > 192.168.1.202.40630: Flags [.], ack 154816, win 141, options [nop,nop,TS val 2918859365 ecr 3014616620], length 0
23:44:49.278340 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 66: 172.67.70.128.https > 192.168.1.202.40630: Flags [.], ack 155028, win 141, options [nop,nop,TS val 2918859365 ecr 3014616620], length 0
23:44:49.278340 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 66: 172.67.70.128.https > 192.168.1.202.40630: Flags [.], ack 155244, win 142, options [nop,nop,TS val 2918859365 ecr 3014616620], length 0
23:44:49.278360 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 66: 172.67.70.128.https > 192.168.1.202.40630: Flags [.], ack 155450, win 142, options [nop,nop,TS val 2918859365 ecr 3014616620], length 0
23:44:49.435940 28:93:7d:1d:83:46 (oui Unknown) > e4:3a:6e:5a:f0:d6 (oui Unknown), ethertype IPv4 (0x0800), length 440: 172.67.70.128.https > 192.168.1.202.40630: Flags [P.], seq 271454:271828, ack 155450, win 142, options [nop,nop,TS val 2918859523 ecr 3014616639], length 374

为什么会出现这种情况? 之前他把数据都忘我的 Transparent 上丢是不是也是随机找一台主机当数据包的出口丢了? 之前连接wifiA的时候只能打开我的vps ip地址, 可能是我的Transparent 有一些iptables规则的原因, Transparent是我用来当透明网关的(debian11).

MageDelfador commented 1 year ago

这种情况恐怕最好桥接 要不连根网线? 或者再加个支持WDS的路由器?反正主路由的wifi也渣

iptables工作在网络层,无能为力

其他方法都会有些问题 试试把openwrt放在老毛子之前,让所有房间的流量都通过openwrt,然后自行判断哪些流量需要代理?这种方法又会引入很多关于主路由器设置的问题。。

老毛子向哪里发数据包的问题,这个因为前面来的数据包的目的MAC地址没有了,老毛子就自行判断该丢给谁,具体怎么判断就不知道了。 同网段但不桥接本身就是不正常的,应该尽可能避免。 也就是说要么弄好桥接,要么老毛子走NAT,后边换个网段比如192.168.2.x。然后再考虑openwrt的问题

onlyJinx commented 1 year ago

网线的话接不了,租的房间,房东当时没布线,不然我不用无线桥接。 买个支持WDS的路由是个好建议,到时候活动蹲一个。 老毛子下的设备单独一个网断的话,会比较麻烦,因为下面有好几个机器,需要弄好几条iptables还要我去记转发的端口。

目前的连接方法影响到的也就是不能连接主路由的时候把网关设置为openwrt来翻墙,其余的内网资源访问是全部正常的,只是这个问题困扰了我很久所以就发issue请教一下。

最后想问下,为啥连接主路由wifiA然后设置网关为openwrt时,虽然不能访问外网,但是内网资源为什么可以访问?理论上不是应该也无法访问才对,数据包在从主路由发往老毛子的时候目的MAC地址都会丢失的。

MageDelfador commented 1 year ago

老毛子把MAC地址改成广播,内网服务器收到后检查里面的目的ip地址,发现是自己的就接收了

MageDelfador commented 1 year ago

也可能是老毛子根据目的ip地址,猜出MAC地址,具体抓包看一下就知道了

onlyJinx commented 1 year ago

原来是这样。受教了,非常感谢耐心解答。