Frame 68: 76 bytes on wire (608 bits), 76 bytes captured (608 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.232208115 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.232208115 seconds [Time delta from previous captured frame: 0.020328278 seconds] [Time delta from previous displayed frame: 0.000000000 seconds] [Time since reference or first frame: 11.434639262 seconds] Frame Number: 68 Frame Length: 76 bytes (608 bits) Capture Length: 76 bytes (608 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 60 Identification: 0xd332 (54066) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4da0 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 0, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 0 (relative sequence number) Acknowledgment number: 0 Header Length: 40 bytes Flags: 0x002 (SYN) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...0 .... = Acknowledgment: Not set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..1. = Syn: Set [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 443] [Connection establish request (SYN): server port 443] [Severity level: Chat] [Group: Sequence] .... .... ...0 = Fin: Not set [TCP Flags: ··········S·] Window size value: 29200 [Calculated window size: 29200] Checksum: 0x1a18 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 Options: (20 bytes), Maximum segment size, SACK permitted, Timestamps, No-Operation (NOP), Window scale Maximum segment size: 1460 bytes Kind: Maximum Segment Size (2) Length: 4 MSS Value: 1460 TCP SACK Permitted Option: True Kind: SACK Permitted (4) Length: 2 Timestamps: TSval 335923422, TSecr 0 Kind: Time Stamp Option (8) Length: 10 Timestamp value: 335923422 Timestamp echo reply: 0 No-Operation (NOP) Type: 1 0... .... = Copy on fragmentation: No .00. .... = Class: Control (0) ...0 0001 = Number: No-Operation (NOP) (1) Window scale: 7 (multiply by 128) Kind: Window Scale (3) Length: 3 Shift count: 7 [Multiplier: 128] Frame 69: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.235436206 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.235436206 seconds [Time delta from previous captured frame: 0.003228091 seconds] [Time delta from previous displayed frame: 0.003228091 seconds] [Time since reference or first frame: 11.437867353 seconds] Frame Number: 69 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 44 Identification: 0x6e86 (28294) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x765c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 0, Ack: 1, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 0 (relative sequence number) Acknowledgment number: 1 (relative ack number) Header Length: 24 bytes Flags: 0x012 (SYN, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..1. = Syn: Set [Expert Info (Chat/Sequence): Connection establish acknowledge (SYN+ACK): server port 443] [Connection establish acknowledge (SYN+ACK): server port 443] [Severity level: Chat] [Group: Sequence] .... .... ...0 = Fin: Not set [TCP Flags: ·······A··S·] Window size value: 8192 [Calculated window size: 8192] Checksum: 0x9b5e [unverified] [Checksum Status: Unverified] Urgent pointer: 0 Options: (4 bytes), Maximum segment size Maximum segment size: 1380 bytes Kind: Maximum Segment Size (2) Length: 4 MSS Value: 1380 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 68] [The RTT to ACK the segment was: 0.003228091 seconds] VSS-Monitoring ethernet trailer, Source Port: 59834 Src Port: 59834 Frame 70: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.235513693 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.235513693 seconds [Time delta from previous captured frame: 0.000077487 seconds] [Time delta from previous displayed frame: 0.000077487 seconds] [Time since reference or first frame: 11.437944840 seconds] Frame Number: 70 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd333 (54067) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4db3 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1, Ack: 1, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1 (relative sequence number) Acknowledgment number: 1 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 29200 [Calculated window size: 29200] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 69] [The RTT to ACK the segment was: 0.000077487 seconds] [iRTT: 0.003305578 seconds] Frame 71: 278 bytes on wire (2224 bits), 278 bytes captured (2224 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.235741071 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.235741071 seconds [Time delta from previous captured frame: 0.000227378 seconds] [Time delta from previous displayed frame: 0.000227378 seconds] [Time since reference or first frame: 11.438172218 seconds] Frame Number: 71 Frame Length: 278 bytes (2224 bits) Capture Length: 278 bytes (2224 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 262 Identification: 0xd334 (54068) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cd4 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1, Ack: 1, Len: 222 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 222] Sequence number: 1 (relative sequence number) [Next sequence number: 223 (relative sequence number)] Acknowledgment number: 1 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 29200 [Calculated window size: 29200] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1ae2 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 222] [Bytes sent since last PSH flag: 222] Secure Sockets Layer SSL Record Layer: Handshake Protocol: Client Hello Content Type: Handshake (22) Version: TLS 1.0 (0x0301) Length: 217 Handshake Protocol: Client Hello Handshake Type: Client Hello (1) Length: 213 Version: TLS 1.2 (0x0303) Random GMT Unix Time: Mar 26, 2001 23:53:33.000000000 CEST Random Bytes: 1cb55dacbc7a1d01b951d0afa723cf96deb340250b2a6f9a... Session ID Length: 32 Session ID: ef4000008d2b250df63370d0ffd4feaec1d82f98c6a00ac2... Cipher Suites Length: 22 Cipher Suites (11 suites) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033) Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039) Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f) Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035) Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a) Compression Methods Length: 1 Compression Methods (1 method) Compression Method: null (0) Extensions Length: 118 Extension: server_name Type: server_name (0x0000) Length: 27 Server Name Indication extension Server Name list length: 25 Server Name Type: host_name (0) Server Name length: 22 Server Name: moj.hrvatskitelekom.hr Extension: renegotiation_info Type: renegotiation_info (0xff01) Length: 1 Renegotiation Info extension Renegotiation info extension length: 0 Extension: elliptic_curves Type: elliptic_curves (0x000a) Length: 8 Elliptic Curves Length: 6 Elliptic curves (3 curves) Elliptic curve: secp256r1 (0x0017) Elliptic curve: secp384r1 (0x0018) Elliptic curve: secp521r1 (0x0019) Extension: ec_point_formats Type: ec_point_formats (0x000b) Length: 2 EC point formats Length: 1 Elliptic curves point formats (1) EC point format: uncompressed (0) Extension: SessionTicket TLS Type: SessionTicket TLS (0x0023) Length: 0 Data (0 bytes) Extension: Application Layer Protocol Negotiation Type: Application Layer Protocol Negotiation (0x0010) Length: 11 ALPN Extension Length: 9 ALPN Protocol ALPN string length: 8 ALPN Next Protocol: http/1.1 Extension: status_request Type: status_request (0x0005) Length: 5 Certificate Status Type: OCSP (1) Responder ID list Length: 0 Request Extensions Length: 0 Extension: signature_algorithms Type: signature_algorithms (0x000d) Length: 32 Signature Hash Algorithms Length: 30 Signature Hash Algorithms (15 algorithms) Signature Hash Algorithm: 0x0403 Signature Hash Algorithm Hash: SHA256 (4) Signature Hash Algorithm Signature: ECDSA (3) Signature Hash Algorithm: 0x0503 Signature Hash Algorithm Hash: SHA384 (5) Signature Hash Algorithm Signature: ECDSA (3) Signature Hash Algorithm: 0x0603 Signature Hash Algorithm Hash: SHA512 (6) Signature Hash Algorithm Signature: ECDSA (3) Signature Hash Algorithm: 0x0203 Signature Hash Algorithm Hash: SHA1 (2) Signature Hash Algorithm Signature: ECDSA (3) Signature Hash Algorithm: 0x0804 Signature Hash Algorithm Hash: Unknown (8) Signature Hash Algorithm Signature: Unknown (4) Signature Hash Algorithm: 0x0805 Signature Hash Algorithm Hash: Unknown (8) Signature Hash Algorithm Signature: Unknown (5) Signature Hash Algorithm: 0x0806 Signature Hash Algorithm Hash: Unknown (8) Signature Hash Algorithm Signature: Unknown (6) Signature Hash Algorithm: 0x0401 Signature Hash Algorithm Hash: SHA256 (4) Signature Hash Algorithm Signature: RSA (1) Signature Hash Algorithm: 0x0501 Signature Hash Algorithm Hash: SHA384 (5) Signature Hash Algorithm Signature: RSA (1) Signature Hash Algorithm: 0x0601 Signature Hash Algorithm Hash: SHA512 (6) Signature Hash Algorithm Signature: RSA (1) Signature Hash Algorithm: 0x0201 Signature Hash Algorithm Hash: SHA1 (2) Signature Hash Algorithm Signature: RSA (1) Signature Hash Algorithm: 0x0402 Signature Hash Algorithm Hash: SHA256 (4) Signature Hash Algorithm Signature: DSA (2) Signature Hash Algorithm: 0x0502 Signature Hash Algorithm Hash: SHA384 (5) Signature Hash Algorithm Signature: DSA (2) Signature Hash Algorithm: 0x0602 Signature Hash Algorithm Hash: SHA512 (6) Signature Hash Algorithm Signature: DSA (2) Signature Hash Algorithm: 0x0202 Signature Hash Algorithm Hash: SHA1 (2) Signature Hash Algorithm Signature: DSA (2) Frame 72: 217 bytes on wire (1736 bits), 217 bytes captured (1736 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.239404913 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.239404913 seconds [Time delta from previous captured frame: 0.003663842 seconds] [Time delta from previous displayed frame: 0.003663842 seconds] [Time since reference or first frame: 11.441836060 seconds] Frame Number: 72 Frame Length: 217 bytes (1736 bits) Capture Length: 217 bytes (1736 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 201 Identification: 0x6e87 (28295) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x75be [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 1, Ack: 223, Len: 161 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 161] Sequence number: 1 (relative sequence number) [Next sequence number: 162 (relative sequence number)] Acknowledgment number: 223 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf8ab [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 71] [The RTT to ACK the segment was: 0.003663842 seconds] [iRTT: 0.003305578 seconds] [Bytes in flight: 161] [Bytes sent since last PSH flag: 161] Secure Sockets Layer TLSv1.2 Record Layer: Handshake Protocol: Server Hello Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 81 Handshake Protocol: Server Hello Handshake Type: Server Hello (2) Length: 77 Version: TLS 1.2 (0x0303) Random GMT Unix Time: Nov 21, 2016 11:30:01.000000000 CET Random Bytes: c00e52a749f504485e5e3543addc2a5769037dc1775bf988... Session ID Length: 32 Session ID: ef4000008d2b250df63370d0ffd4feaec1d82f98c6a00ac2... Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) Compression Method: null (0) Extensions Length: 5 Extension: renegotiation_info Type: renegotiation_info (0xff01) Length: 1 Renegotiation Info extension Renegotiation info extension length: 0 TLSv1.2 Record Layer: Change Cipher Spec Protocol: Change Cipher Spec Content Type: Change Cipher Spec (20) Version: TLS 1.2 (0x0303) Length: 1 Change Cipher Spec Message [Expert Info (Note/Sequence): This session reuses previously negotiated keys (Session resumption)] [This session reuses previously negotiated keys (Session resumption)] [Severity level: Note] [Group: Sequence] TLSv1.2 Record Layer: Handshake Protocol: Finished Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 64 Handshake Protocol: Finished Handshake Type: Finished (20) Length: 12 Verify Data Frame 73: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.239448070 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.239448070 seconds [Time delta from previous captured frame: 0.000043157 seconds] [Time delta from previous displayed frame: 0.000043157 seconds] [Time since reference or first frame: 11.441879217 seconds] Frame Number: 73 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd335 (54069) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4db1 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 223, Ack: 162, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 223 (relative sequence number) Acknowledgment number: 162 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 30016 [Calculated window size: 30016] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 72] [The RTT to ACK the segment was: 0.000043157 seconds] [iRTT: 0.003305578 seconds] Frame 74: 131 bytes on wire (1048 bits), 131 bytes captured (1048 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.239807321 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.239807321 seconds [Time delta from previous captured frame: 0.000359251 seconds] [Time delta from previous displayed frame: 0.000359251 seconds] [Time since reference or first frame: 11.442238468 seconds] Frame Number: 74 Frame Length: 131 bytes (1048 bits) Capture Length: 131 bytes (1048 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 115 Identification: 0xd336 (54070) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d65 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 223, Ack: 162, Len: 75 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 75] Sequence number: 223 (relative sequence number) [Next sequence number: 298 (relative sequence number)] Acknowledgment number: 162 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 30016 [Calculated window size: 30016] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a4f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 75] [Bytes sent since last PSH flag: 75] Secure Sockets Layer TLSv1.2 Record Layer: Change Cipher Spec Protocol: Change Cipher Spec Content Type: Change Cipher Spec (20) Version: TLS 1.2 (0x0303) Length: 1 Change Cipher Spec Message TLSv1.2 Record Layer: Handshake Protocol: Finished Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 64 Handshake Protocol: Finished Handshake Type: Finished (20) Length: 12 Verify Data Frame 75: 1181 bytes on wire (9448 bits), 1181 bytes captured (9448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.240483464 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.240483464 seconds [Time delta from previous captured frame: 0.000676143 seconds] [Time delta from previous displayed frame: 0.000676143 seconds] [Time since reference or first frame: 11.442914611 seconds] Frame Number: 75 Frame Length: 1181 bytes (9448 bits) Capture Length: 1181 bytes (9448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1165 Identification: 0xd337 (54071) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x494a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 298, Ack: 162, Len: 1125 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1125] Sequence number: 298 (relative sequence number) [Next sequence number: 1423 (relative sequence number)] Acknowledgment number: 162 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 30016 [Calculated window size: 30016] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1e69 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1200] [Bytes sent since last PSH flag: 1125] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1120 Encrypted Application Data: a98773884d21c3385a96c8713084bfe319ea873efc151a28... Hypertext Transfer Protocol GET / HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET / HTTP/1.1\r\n] [GET / HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: / Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmbv; _ceg.u=ogzmbv; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmbv Cookie pair: _ceg.u=ogzmbv Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/] [HTTP request 1/1] Frame 76: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:46.243436307 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724186.243436307 seconds [Time delta from previous captured frame: 0.002952843 seconds] [Time delta from previous displayed frame: 0.002952843 seconds] [Time since reference or first frame: 11.445867454 seconds] Frame Number: 76 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 1dd72672 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6e88 (28296) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x765e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 162, Ack: 1423, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 162 (relative sequence number) Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd3ef [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 75] [The RTT to ACK the segment was: 0.002952843 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 43690 Src Port: 43690 Frame 78: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.289985769 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.289985769 seconds [Time delta from previous captured frame: 0.472785382 seconds] [Time delta from previous displayed frame: 1.046549462 seconds] [Time since reference or first frame: 12.492416916 seconds] Frame Number: 78 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x6ee4 (28388) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6b3a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 162, Ack: 1423, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 162 (relative sequence number) [Next sequence number: 2922 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 2760] TCP segment data (2760 bytes) Secure Sockets Layer Frame 79: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.290107273 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.290107273 seconds [Time delta from previous captured frame: 0.000121504 seconds] [Time delta from previous displayed frame: 0.000121504 seconds] [Time since reference or first frame: 12.492538420 seconds] Frame Number: 79 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd338 (54072) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4dae [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 2922, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1423 (relative sequence number) Acknowledgment number: 2922 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 34500 [Calculated window size: 34500] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 78] [The RTT to ACK the segment was: 0.000121504 seconds] [iRTT: 0.003305578 seconds] Frame 80: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.290798946 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.290798946 seconds [Time delta from previous captured frame: 0.000691673 seconds] [Time delta from previous displayed frame: 0.000691673 seconds] [Time since reference or first frame: 12.493230093 seconds] Frame Number: 80 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ee6 (28390) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x709c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 2922, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 2922 (relative sequence number) [Next sequence number: 4302 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x4028 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 4140] TCP segment data (1380 bytes) Frame 81: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.290872470 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.290872470 seconds [Time delta from previous captured frame: 0.000073524 seconds] [Time delta from previous displayed frame: 0.000073524 seconds] [Time since reference or first frame: 12.493303617 seconds] Frame Number: 81 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ee7 (28391) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x709b [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 4302, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 4302 (relative sequence number) [Next sequence number: 5682 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9d74 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 5520] TCP segment data (1380 bytes) Frame 82: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.290924108 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.290924108 seconds [Time delta from previous captured frame: 0.000051638 seconds] [Time delta from previous displayed frame: 0.000051638 seconds] [Time since reference or first frame: 12.493355255 seconds] Frame Number: 82 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd339 (54073) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4dad [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 5682, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1423 (relative sequence number) Acknowledgment number: 5682 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 41400 [Calculated window size: 41400] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 81] [The RTT to ACK the segment was: 0.000051638 seconds] [iRTT: 0.003305578 seconds] Frame 83: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293524311 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293524311 seconds [Time delta from previous captured frame: 0.002600203 seconds] [Time delta from previous displayed frame: 0.002600203 seconds] [Time since reference or first frame: 12.495955458 seconds] Frame Number: 83 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ee8 (28392) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x709a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 5682, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 5682 (relative sequence number) [Next sequence number: 7062 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xddaa [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 84: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293653251 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293653251 seconds [Time delta from previous captured frame: 0.000128940 seconds] [Time delta from previous displayed frame: 0.000128940 seconds] [Time since reference or first frame: 12.496084398 seconds] Frame Number: 84 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ee9 (28393) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7099 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 7062, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 7062 (relative sequence number) [Next sequence number: 8442 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5921 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 85: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293676636 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293676636 seconds [Time delta from previous captured frame: 0.000023385 seconds] [Time delta from previous displayed frame: 0.000023385 seconds] [Time since reference or first frame: 12.496107783 seconds] Frame Number: 85 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd33a (54074) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4dac [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 8442, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1423 (relative sequence number) Acknowledgment number: 8442 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 46920 [Calculated window size: 46920] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 84] [The RTT to ACK the segment was: 0.000023385 seconds] [iRTT: 0.003305578 seconds] Frame 86: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293746108 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293746108 seconds [Time delta from previous captured frame: 0.000069472 seconds] [Time delta from previous displayed frame: 0.000069472 seconds] [Time since reference or first frame: 12.496177255 seconds] Frame Number: 86 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6eea (28394) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7098 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 8442, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 8442 (relative sequence number) [Next sequence number: 9822 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc8e8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 87: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293771181 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293771181 seconds [Time delta from previous captured frame: 0.000025073 seconds] [Time delta from previous displayed frame: 0.000025073 seconds] [Time since reference or first frame: 12.496202328 seconds] Frame Number: 87 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6eeb (28395) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7097 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 9822, Ack: 1423, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 9822 (relative sequence number) [Next sequence number: 11202 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xbc86 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 88: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293787572 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293787572 seconds [Time delta from previous captured frame: 0.000016391 seconds] [Time delta from previous displayed frame: 0.000016391 seconds] [Time since reference or first frame: 12.496218719 seconds] Frame Number: 88 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd33b (54075) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4dab [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 11202, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1423 (relative sequence number) Acknowledgment number: 11202 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 52440 [Calculated window size: 52440] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 87] [The RTT to ACK the segment was: 0.000016391 seconds] [iRTT: 0.003305578 seconds] Frame 89: 2237 bytes on wire (17896 bits), 2237 bytes captured (17896 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293978474 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293978474 seconds [Time delta from previous captured frame: 0.000190902 seconds] [Time delta from previous displayed frame: 0.000190902 seconds] [Time since reference or first frame: 12.496409621 seconds] Frame Number: 89 Frame Length: 2237 bytes (17896 bits) Capture Length: 2237 bytes (17896 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2221 Identification: 0x6eec (28396) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6d75 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 11202, Ack: 1423, Len: 2181 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2181] Sequence number: 11202 (relative sequence number) [Next sequence number: 13383 (relative sequence number)] Acknowledgment number: 1423 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63660 [Calculated window size: 63660] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2289 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2181] [Bytes sent since last PSH flag: 13221] TCP segment data (2181 bytes) [8 Reassembled TCP Segments (13221 bytes): #78(2760), #80(1380), #81(1380), #83(1380), #84(1380), #86(1380), #87(1380), #89(2181)] [Frame: 78, payload: 0-2759 (2760 bytes)] [Frame: 80, payload: 2760-4139 (1380 bytes)] [Frame: 81, payload: 4140-5519 (1380 bytes)] [Frame: 83, payload: 5520-6899 (1380 bytes)] [Frame: 84, payload: 6900-8279 (1380 bytes)] [Frame: 86, payload: 8280-9659 (1380 bytes)] [Frame: 87, payload: 9660-11039 (1380 bytes)] [Frame: 89, payload: 11040-13220 (2181 bytes)] [Segment count: 8] [Reassembled TCP length: 13221] [Reassembled TCP Data: 17030333a0e757ad26f1d17fccaa0a9bd1c94c06e5e05050...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 13216 Encrypted Application Data: e757ad26f1d17fccaa0a9bd1c94c06e5e050501c66cc92b9... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 6ddd971b-77a1-4618-9089-045b55a88ca1\r\n Set-Cookie: CurrentServiceId=0; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:01 GMT\r\n Content-Length: 12808\r\n [Content length: 12808] \r\n [HTTP response 1/1] [Time since request: 1.053495010 seconds] [Request in frame: 75] Content-encoded entity body (gzip): 12808 bytes -> 32333 bytes File Data: 32333 bytes Line-based text data: text/html \r\n \r\n \r\n \tMoj Telekom Portal | Hrvatski Telekom\r\n \r\n \t\t\r\n \t\t\r\n \t\r\n \r\n \r\n \r\n [truncated] \r\n \r\n \t\r\n \r\n \r\n \r\n \r\n \r\n \t\r\n \r\n \r\n \r\n \r\n \r\n \t\r\n \t\r\n \t\r\n \t\r\n \t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \t\t\r\n \r\n \t\r\n \t\r\n \t\r\n \t\t\r\n \r\n \r\n
\r\n
\r\n \r\n \r\n [truncated]\r\n //\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n [truncated]\r\n \r\n [truncated]\r\n \r\n \t\r\n \t\r\n \r\n \r\n
\r\n
\r\n

\r\n \r\n \r\n \r\n [truncated] \r\n \r\n \r\n
\r\n
\r\n \r\n \r\n \r\n \r\n
\r\n \r\n
\r\n
\r\n

Novo na MojT portalu

\r\n
\r\n

Od sada mo\305\276ete platiti HT ra\304\215une kreditnim i debitnim karticama direktno preko MojT portala.

\r\n

\r\n Nove uvjete kori\305\241tenja MojT portala mo\305\276ete pro\304\215itati ovdje\r\n

\r\n
\r\n
\r\n
\r\n \r\n U redu\r\n \r\n \r\n
\r\n
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \t
\r\n \t\t\r\n \t\t
\r\n \t\t\t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \t\t\t
\r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\r\n \r\n
\r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\t\t\t
\r\n \t\t\t\t\t\r\n \t\t\t\t\t\t\r\n \t\r\n \t\r\n \t\r\n \t\t\t\t\t\t\t\t\t\t\t\t\r\n \t\t\t\t\t \r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n \t\t\t\t\t\r\n \t
\r\n

Moji paketi

\r\n
    \r\n \r\n
\r\n \r\n \t\t\r\n \t\t\t\t\r\n \r\n \t
\r\n \t\r\n \t\r\n \t
\r\n \t\t\t\t
\r\n \t\t\t\t\t
\r\n \t\t

Moje fiksne usluge

\r\n \t\t
    \r\n \t\t\t\r\n \t\t\t\r\n \t\t
\t\t\t\r\n \t\t
    \t\t\t\t\r\n \r\n \r\n \t\t\t\t\t\t\r\n \t\t\t\t\t\t\r\n \t\t\t\t\t\t\r\n \r\n \t\t\t\r\n
  • \r\n
  • \r\n \t\t\t\r\n
\r\n \t
\r\n \t\t\t\t
\r\n \t\t\t
\r\n \r\n \t\t\t\t\t\t\r\n \r\n \t\t\t\t\t\t\r\n \r\n \r\n \r\n \t
\302\240
\t\t\t\t\t\t\r\n \t\t\t\t\t\t\r\n \t\t\t\t
\r\n \t\t\t\t\r\n \t\t\t\t\r\n \r\n \t\t\t\t\r\n \t\t\t\t\r\n \r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\t\t
\r\n \t\t\t
\r\n \t\r\n \t\r\n \r\n \t\r\n \t\r\n
\r\n

JOŠ BOLJA I BR\305\275A! ISPROBAJTE MOJ TELEKOM HR APLIKACIJU

\r\n
\r\n
\r\n [truncated]\r\n \r\n \r\n \r\n \r\n
\r\n
\r\n
\r\n \t\r\n \r\n \t\r\n \r\n \t\r\n \r\n \r\n \t\r\n \t\r\n \t\r\n \t\r\n \t\r\n
\r\n \t\t\r\n \t\t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \t
\t\r\n \r\n
\r\n \r\n \t\r\n
\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n Frame 90: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.293999116 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.293999116 seconds [Time delta from previous captured frame: 0.000020642 seconds] [Time delta from previous displayed frame: 0.000020642 seconds] [Time since reference or first frame: 12.496430263 seconds] Frame Number: 90 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd33c (54076) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4daa [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 13383, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 1423 (relative sequence number) Acknowledgment number: 13383 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 56580 [Calculated window size: 56580] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 89] [The RTT to ACK the segment was: 0.000020642 seconds] [iRTT: 0.003305578 seconds] Frame 122: 1213 bytes on wire (9704 bits), 1213 bytes captured (9704 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.521697402 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.521697402 seconds [Time delta from previous captured frame: 0.020401327 seconds] [Time delta from previous displayed frame: 0.227698286 seconds] [Time since reference or first frame: 12.724128549 seconds] Frame Number: 122 Frame Length: 1213 bytes (9704 bits) Capture Length: 1213 bytes (9704 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1197 Identification: 0xd33d (54077) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4924 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 1423, Ack: 13383, Len: 1157 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1157] Sequence number: 1423 (relative sequence number) [Next sequence number: 2580 (relative sequence number)] Acknowledgment number: 13383 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 56580 [Calculated window size: 56580] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1e89 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1157] [Bytes sent since last PSH flag: 1157] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1152 Encrypted Application Data: 884c2e6bf23b8f824cf8f0daf02a45fe2457805f00fdbfcd... Hypertext Transfer Protocol GET /notice-mobile HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /notice-mobile HTTP/1.1\r\n] [GET /notice-mobile HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /notice-mobile Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html, */*; q=0.01\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n X-Requested-With: XMLHttpRequest\r\n Referer: https://moj.hrvatskitelekom.hr/\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmbv; _ceg.u=ogzmbv; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmbv Cookie pair: _ceg.u=ogzmbv Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/notice-mobile] [HTTP request 2/2] [Prev request in frame: 75] Frame 143: 701 bytes on wire (5608 bits), 701 bytes captured (5608 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.580858055 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.580858055 seconds [Time delta from previous captured frame: 0.000566194 seconds] [Time delta from previous displayed frame: 0.059160653 seconds] [Time since reference or first frame: 12.783289202 seconds] Frame Number: 143 Frame Length: 701 bytes (5608 bits) Capture Length: 701 bytes (5608 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 685 Identification: 0x6ef2 (28402) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x736f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 13383, Ack: 2580, Len: 645 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 645] Sequence number: 13383 (relative sequence number) [Next sequence number: 14028 (relative sequence number)] Acknowledgment number: 2580 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5c87 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 122] [The RTT to ACK the segment was: 0.059160653 seconds] [iRTT: 0.003305578 seconds] [Bytes in flight: 645] [Bytes sent since last PSH flag: 645] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 640 Encrypted Application Data: 3ee2186a4a5e9e96ae629014df36f64f53e157f71af9f411... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 281a3490-9e45-4ea9-afe1-65ea803852f6\r\n Set-Cookie: CurrentServiceId=0; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:02 GMT\r\n Content-Length: 221\r\n [Content length: 221] \r\n [HTTP response 2/2] [Time since request: 0.059160653 seconds] [Prev request in frame: 75] [Prev response in frame: 89] [Request in frame: 122] Content-encoded entity body (gzip): 221 bytes -> 197 bytes File Data: 197 bytes Line-based text data: text/html
\r\n
\r\n
\r\n
\r\n

Moje mobilne usluge, nema podataka

\r\n
\r\n
\r\n
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n Frame 150: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.621614607 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.621614607 seconds [Time delta from previous captured frame: 0.001426831 seconds] [Time delta from previous displayed frame: 0.040756552 seconds] [Time since reference or first frame: 12.824045754 seconds] Frame Number: 150 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd33e (54078) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4da8 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 2580, Ack: 14028, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 2580 (relative sequence number) Acknowledgment number: 14028 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 59340 [Calculated window size: 59340] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 143] [The RTT to ACK the segment was: 0.040756552 seconds] [iRTT: 0.003305578 seconds] Frame 159: 1469 bytes on wire (11752 bits), 1469 bytes captured (11752 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.639492460 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.639492460 seconds [Time delta from previous captured frame: 0.000348764 seconds] [Time delta from previous displayed frame: 0.017877853 seconds] [Time since reference or first frame: 12.841923607 seconds] Frame Number: 159 Frame Length: 1469 bytes (11752 bits) Capture Length: 1469 bytes (11752 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1453 Identification: 0xd33f (54079) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4822 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 2580, Ack: 14028, Len: 1413 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1413] Sequence number: 2580 (relative sequence number) [Next sequence number: 3993 (relative sequence number)] Acknowledgment number: 14028 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 59340 [Calculated window size: 59340] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f89 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1413] [Bytes sent since last PSH flag: 1413] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1408 Encrypted Application Data: 93f85284ac1685f54399883d6496725dd123e0ccef5f4bd1... Hypertext Transfer Protocol POST /App_Modules__SnT.THTCms.CSC.Modules.Package__SnT.THTCms.CSC.Modules.Profile.MojTProfileService.asmx/HasPendingMagentaApplications HTTP/1.1\r\n [Expert Info (Chat/Sequence): POST /App_Modules__SnT.THTCms.CSC.Modules.Package__SnT.THTCms.CSC.Modules.Profile.MojTProfileService.asmx/HasPendingMagentaApplications HTTP/1.1\r\n] [POST /App_Modules__SnT.THTCms.CSC.Modules.Package__SnT.THTCms.CSC.Modules.Profile.MojTProfileService.asmx/HasPendingMagentaApplications HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: POST Request URI: /App_Modules__SnT.THTCms.CSC.Modules.Package__SnT.THTCms.CSC.Modules.Profile.MojTProfileService.asmx/HasPendingMagentaApplications Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: application/json, text/javascript, */*; q=0.01\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Content-Type: application/json; charset=utf-8\r\n X-AjaxRequest: true\r\n X-Requested-With: XMLHttpRequest\r\n Referer: https://moj.hrvatskitelekom.hr/\r\n Content-Length: 24\r\n [Content length: 24] [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmbv; _ceg.u=ogzmbv; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmbv Cookie pair: _ceg.u=ogzmbv Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/App_Modules__SnT.THTCms.CSC.Modules.Package__SnT.THTCms.CSC.Modules.Profile.MojTProfileService.asmx/HasPendingMagentaApplications] [HTTP request 3/3] [Prev request in frame: 122] File Data: 24 bytes JavaScript Object Notation: application/json Object Member Key: backendServiceType Number value: 2 Key: backendServiceType Frame 160: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.642886656 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.642886656 seconds [Time delta from previous captured frame: 0.003394196 seconds] [Time delta from previous displayed frame: 0.003394196 seconds] [Time since reference or first frame: 12.845317803 seconds] Frame Number: 160 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 10c481cd Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6ef5 (28405) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x75f1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 14028, Ack: 3993, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14028 (relative sequence number) Acknowledgment number: 3993 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x8f0b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 159] [The RTT to ACK the segment was: 0.003394196 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 24713 Src Port: 24713 Frame 165: 557 bytes on wire (4456 bits), 557 bytes captured (4456 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.655556146 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.655556146 seconds [Time delta from previous captured frame: 0.002590126 seconds] [Time delta from previous displayed frame: 0.012669490 seconds] [Time since reference or first frame: 12.857987293 seconds] Frame Number: 165 Frame Length: 557 bytes (4456 bits) Capture Length: 557 bytes (4456 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 541 Identification: 0x6ef6 (28406) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x73fb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 14028, Ack: 3993, Len: 501 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 501] Sequence number: 14028 (relative sequence number) [Next sequence number: 14529 (relative sequence number)] Acknowledgment number: 3993 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1839 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 501] [Bytes sent since last PSH flag: 501] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 496 Encrypted Application Data: 9866a709fc4185c8aa57a835dc4af29c2a45ed67237a8aec... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private, max-age=0\r\n Content-Type: application/json; charset=utf-8\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 053ee133-fb94-4354-a2d5-1fb7d06bbf40\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:02 GMT\r\n Content-Length: 170\r\n [Content length: 170] \r\n [HTTP response 3/3] [Time since request: 0.016063686 seconds] [Prev request in frame: 122] [Prev response in frame: 143] [Request in frame: 159] File Data: 170 bytes JavaScript Object Notation: application/json Object Member Key: d Object Member Key: __type String value: SnT.THTCms.MW.Common.MagentaOne.MagentaApplicationCheckResult Key: __type Member Key: IsProfileVerificationCompleted True value Key: IsProfileVerificationCompleted Member Key: HasPendingApplications False value Key: HasPendingApplications Member Key: ApplicationId Null value Key: ApplicationId Key: d Frame 166: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.655591518 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.655591518 seconds [Time delta from previous captured frame: 0.000035372 seconds] [Time delta from previous displayed frame: 0.000035372 seconds] [Time since reference or first frame: 12.858022665 seconds] Frame Number: 166 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd341 (54081) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4da5 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 3993, Ack: 14529, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 3993 (relative sequence number) Acknowledgment number: 14529 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 62100 [Calculated window size: 62100] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 165] [The RTT to ACK the segment was: 0.000035372 seconds] [iRTT: 0.003305578 seconds] Frame 174: 1389 bytes on wire (11112 bits), 1389 bytes captured (11112 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.662720236 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.662720236 seconds [Time delta from previous captured frame: 0.001069036 seconds] [Time delta from previous displayed frame: 0.007128718 seconds] [Time since reference or first frame: 12.865151383 seconds] Frame Number: 174 Frame Length: 1389 bytes (11112 bits) Capture Length: 1389 bytes (11112 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1373 Identification: 0xd342 (54082) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x486f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 3993, Ack: 14529, Len: 1333 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1333] Sequence number: 3993 (relative sequence number) [Next sequence number: 5326 (relative sequence number)] Acknowledgment number: 14529 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 62100 [Calculated window size: 62100] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f39 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1333] [Bytes sent since last PSH flag: 1333] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1328 Encrypted Application Data: 2c18c4ba0e1f7afbbf0f0f14c817b3b02081116da1422fa2... Hypertext Transfer Protocol GET /moredatamaxpackgage/?serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /moredatamaxpackgage/?serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 HTTP/1.1\r\n] [GET /moredatamaxpackgage/?serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /moredatamaxpackgage/?serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 Request URI Path: /moredatamaxpackgage/ Request URI Query: serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 Request URI Query Parameter: serviceType=Halo Request URI Query Parameter: ajaxrequest=true Request URI Query Parameter: maxPackageId=47657083 Request URI Query Parameter: maxpackagetype=Max2,Max3 Request URI Query Parameter: ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96 Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n X-AjaxRequest: true\r\n Referer: https://moj.hrvatskitelekom.hr/\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmbv; _ceg.u=ogzmbv; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmbv Cookie pair: _ceg.u=ogzmbv Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/moredatamaxpackgage/?serviceType=Halo&ajaxrequest=true&maxPackageId=47657083&maxpackagetype=Max2,Max3&ajaxRequestId=3718c994-c7d1-0fd3-5680-7ff840d55f96] [HTTP request 4/4] [Prev request in frame: 159] Frame 201: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:47.728710149 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724187.728710149 seconds [Time delta from previous captured frame: 0.005565809 seconds] [Time delta from previous displayed frame: 0.065989913 seconds] [Time since reference or first frame: 12.931141296 seconds] Frame Number: 201 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 83a864e9 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6ef7 (28407) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x75ef [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 14529, Ack: 5326, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14529 (relative sequence number) Acknowledgment number: 5326 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63527 [Calculated window size: 63527] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x8d16 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 174] [The RTT to ACK the segment was: 0.065989913 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 3 Src Port: 3 Frame 284: 909 bytes on wire (7272 bits), 909 bytes captured (7272 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.019418251 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.019418251 seconds [Time delta from previous captured frame: 0.000844154 seconds] [Time delta from previous displayed frame: 0.290708102 seconds] [Time since reference or first frame: 13.221849398 seconds] Frame Number: 284 Frame Length: 909 bytes (7272 bits) Capture Length: 909 bytes (7272 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 893 Identification: 0x6f13 (28435) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x727e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 14529, Ack: 5326, Len: 853 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 853] Sequence number: 14529 (relative sequence number) [Next sequence number: 15382 (relative sequence number)] Acknowledgment number: 5326 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63527 [Calculated window size: 63527] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe62a [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 853] [Bytes sent since last PSH flag: 853] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 848 Encrypted Application Data: 68ec2191bcfdb03f51e6c419e04c6d43d887cd4ba861587f... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: fe08534a-8ef6-424c-9d15-ec30a9cc3ac7\r\n Set-Cookie: CurrentServiceId=0; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:02 GMT\r\n Content-Length: 433\r\n [Content length: 433] \r\n [HTTP response 4/4] [Time since request: 0.356698015 seconds] [Prev request in frame: 159] [Prev response in frame: 165] [Request in frame: 174] Content-encoded entity body (gzip): 433 bytes -> 546 bytes File Data: 546 bytes Line-based text data: text/html \r\n \r\n \r\n \r\n
\r\n
Ultra MAX3 M
\r\n \t\t\t\t\t\tTelefonski broj\342\200\24201 6602633
\r\n \t\t\t\t\t\t\tInternet korisni\304\215ko ime\342\200\242rovismi1

\r\n \t\t\t\t\t\t\tMAXtv korisni\304\215ki ra\304\215un\342\200\24226082837
\r\n \t\t\t\t\t\r\n \t\t\t\t\t\tPreostalo je \r\n \t\t\t\t\t\t1094\r\n \t\t\t\t\t\tbesplatnih minuta\t\r\n \t\t\t\t\t\t
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n Frame 300: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.059598853 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.059598853 seconds [Time delta from previous captured frame: 0.003124931 seconds] [Time delta from previous displayed frame: 0.040180602 seconds] [Time since reference or first frame: 13.262030000 seconds] Frame Number: 300 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd343 (54083) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4da3 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 5326, Ack: 15382, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 5326 (relative sequence number) Acknowledgment number: 15382 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 284] [The RTT to ACK the segment was: 0.040180602 seconds] [iRTT: 0.003305578 seconds] Frame 406: 1437 bytes on wire (11496 bits), 1437 bytes captured (11496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.528735916 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.528735916 seconds [Time delta from previous captured frame: 0.000019430 seconds] [Time delta from previous displayed frame: 0.469137063 seconds] [Time since reference or first frame: 13.731167063 seconds] Frame Number: 406 Frame Length: 1437 bytes (11496 bits) Capture Length: 1437 bytes (11496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1421 Identification: 0xd344 (54084) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x483d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 5326, Ack: 15382, Len: 1381 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1381] Sequence number: 5326 (relative sequence number) [Next sequence number: 6707 (relative sequence number)] Acknowledgment number: 15382 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f69 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1381] [Bytes sent since last PSH flag: 1381] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1376 Encrypted Application Data: b5b64e98370cc23a60567b1a0ea413e911a0c5cbc3f3fa4e... Hypertext Transfer Protocol POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n [Expert Info (Chat/Sequence): POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n] [POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: POST Request URI: /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: application/json, text/javascript, */*; q=0.01\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Content-Type: application/json; charset=utf-8\r\n X-AjaxRequest: true\r\n X-Requested-With: XMLHttpRequest\r\n Referer: https://moj.hrvatskitelekom.hr/\r\n Content-Length: 2\r\n [Content length: 2] [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmhn; _ceg.u=ogzmhn; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhn Cookie pair: _ceg.u=ogzmhn Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages] [HTTP request 5/5] [Prev request in frame: 174] File Data: 2 bytes JavaScript Object Notation: application/json Object Frame 408: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.532234016 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.532234016 seconds [Time delta from previous captured frame: 0.001881562 seconds] [Time delta from previous displayed frame: 0.003498100 seconds] [Time since reference or first frame: 13.734665163 seconds] Frame Number: 408 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 4cbe5751 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6f58 (28504) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x758e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 15382, Ack: 6707, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15382 (relative sequence number) Acknowledgment number: 6707 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7f27 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 406] [The RTT to ACK the segment was: 0.003498100 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 35961 Src Port: 35961 Frame 413: 397 bytes on wire (3176 bits), 397 bytes captured (3176 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.554469448 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.554469448 seconds [Time delta from previous captured frame: 0.013813848 seconds] [Time delta from previous displayed frame: 0.022235432 seconds] [Time since reference or first frame: 13.756900595 seconds] Frame Number: 413 Frame Length: 397 bytes (3176 bits) Capture Length: 397 bytes (3176 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 381 Identification: 0x6f59 (28505) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7438 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 15382, Ack: 6707, Len: 341 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 341] Sequence number: 15382 (relative sequence number) [Next sequence number: 15723 (relative sequence number)] Acknowledgment number: 6707 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdc7d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 341] [Bytes sent since last PSH flag: 341] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 336 Encrypted Application Data: 17078cf350a936cb644ab81691b67d6016cea685d8ff4290... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private, max-age=0\r\n Content-Type: application/json; charset=utf-8\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: e88b4e94-94de-4451-ab84-f686ed01dd64\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:03 GMT\r\n Content-Length: 8\r\n [Content length: 8] \r\n [HTTP response 5/5] [Time since request: 0.025733532 seconds] [Prev request in frame: 174] [Prev response in frame: 284] [Request in frame: 406] File Data: 8 bytes JavaScript Object Notation: application/json Object Member Key: d Array Key: d Frame 414: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:48.554547537 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724188.554547537 seconds [Time delta from previous captured frame: 0.000078089 seconds] [Time delta from previous displayed frame: 0.000078089 seconds] [Time since reference or first frame: 13.756978684 seconds] Frame Number: 414 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd346 (54086) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4da0 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 6707, Ack: 15723, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 6707 (relative sequence number) Acknowledgment number: 15723 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 413] [The RTT to ACK the segment was: 0.000078089 seconds] [iRTT: 0.003305578 seconds] Frame 488: 1229 bytes on wire (9832 bits), 1229 bytes captured (9832 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:55.670255613 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724195.670255613 seconds [Time delta from previous captured frame: 0.151190962 seconds] [Time delta from previous displayed frame: 7.115708076 seconds] [Time since reference or first frame: 20.872686760 seconds] Frame Number: 488 Frame Length: 1229 bytes (9832 bits) Capture Length: 1229 bytes (9832 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1213 Identification: 0xd347 (54087) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x490a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 6707, Ack: 15723, Len: 1173 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1173] Sequence number: 6707 (relative sequence number) [Next sequence number: 7880 (relative sequence number)] Acknowledgment number: 15723 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1e99 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1173] [Bytes sent since last PSH flag: 1173] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1168 Encrypted Application Data: a6c22abef98757e5691dc0265b5e3fd06734cab83dff15b5... Hypertext Transfer Protocol GET /racuni?serviceid=12018216 HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni?serviceid=12018216 HTTP/1.1\r\n] [GET /racuni?serviceid=12018216 HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni?serviceid=12018216 Request URI Path: /racuni Request URI Query: serviceid=12018216 Request URI Query Parameter: serviceid=12018216 Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmhn; _ceg.u=ogzmhn; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhn Cookie pair: _ceg.u=ogzmhn Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216] [HTTP request 6/6] [Prev request in frame: 406] Frame 489: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:55.729382721 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724195.729382721 seconds [Time delta from previous captured frame: 0.059127108 seconds] [Time delta from previous displayed frame: 0.059127108 seconds] [Time since reference or first frame: 20.931813868 seconds] Frame Number: 489 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 2be8dcea Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6f8c (28556) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x755a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 15723, Ack: 7880, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15723 (relative sequence number) Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7dd2 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 488] [The RTT to ACK the segment was: 0.059127108 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 23822 Src Port: 23822 Frame 493: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.068599275 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.068599275 seconds [Time delta from previous captured frame: 0.279046434 seconds] [Time delta from previous displayed frame: 2.339216554 seconds] [Time since reference or first frame: 23.271030422 seconds] Frame Number: 493 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x6f8d (28557) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6a91 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 15723, Ack: 7880, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 15723 (relative sequence number) [Next sequence number: 18483 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 2760] TCP segment data (2760 bytes) Secure Sockets Layer Frame 494: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.068735286 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.068735286 seconds [Time delta from previous captured frame: 0.000136011 seconds] [Time delta from previous displayed frame: 0.000136011 seconds] [Time since reference or first frame: 23.271166433 seconds] Frame Number: 494 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd348 (54088) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d9e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 18483, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 18483 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 493] [The RTT to ACK the segment was: 0.000136011 seconds] [iRTT: 0.003305578 seconds] Frame 495: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.068848199 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.068848199 seconds [Time delta from previous captured frame: 0.000112913 seconds] [Time delta from previous displayed frame: 0.000112913 seconds] [Time since reference or first frame: 23.271279346 seconds] Frame Number: 495 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x6f8f (28559) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6a8f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 18483, Ack: 7880, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 18483 (relative sequence number) [Next sequence number: 21243 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 5520] TCP segment data (2760 bytes) Frame 496: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.068900629 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.068900629 seconds [Time delta from previous captured frame: 0.000052430 seconds] [Time delta from previous displayed frame: 0.000052430 seconds] [Time since reference or first frame: 23.271331776 seconds] Frame Number: 496 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd349 (54089) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d9d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 21243, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 21243 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 495] [The RTT to ACK the segment was: 0.000052430 seconds] [iRTT: 0.003305578 seconds] Frame 497: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069043267 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069043267 seconds [Time delta from previous captured frame: 0.000142638 seconds] [Time delta from previous displayed frame: 0.000142638 seconds] [Time since reference or first frame: 23.271474414 seconds] Frame Number: 497 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f91 (28561) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6ff1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 21243, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 21243 (relative sequence number) [Next sequence number: 22623 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xa86c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 498: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069090433 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069090433 seconds [Time delta from previous captured frame: 0.000047166 seconds] [Time delta from previous displayed frame: 0.000047166 seconds] [Time since reference or first frame: 23.271521580 seconds] Frame Number: 498 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34a (54090) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d9c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 22623, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 22623 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 497] [The RTT to ACK the segment was: 0.000047166 seconds] [iRTT: 0.003305578 seconds] Frame 499: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069119431 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069119431 seconds [Time delta from previous captured frame: 0.000028998 seconds] [Time delta from previous displayed frame: 0.000028998 seconds] [Time since reference or first frame: 23.271550578 seconds] Frame Number: 499 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f92 (28562) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6ff0 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 22623, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 22623 (relative sequence number) [Next sequence number: 24003 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7d5d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 500: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069161761 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069161761 seconds [Time delta from previous captured frame: 0.000042330 seconds] [Time delta from previous displayed frame: 0.000042330 seconds] [Time since reference or first frame: 23.271592908 seconds] Frame Number: 500 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34b (54091) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d9b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 24003, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 24003 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 499] [The RTT to ACK the segment was: 0.000042330 seconds] [iRTT: 0.003305578 seconds] Frame 501: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069274698 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069274698 seconds [Time delta from previous captured frame: 0.000112937 seconds] [Time delta from previous displayed frame: 0.000112937 seconds] [Time since reference or first frame: 23.271705845 seconds] Frame Number: 501 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f93 (28563) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fef [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 24003, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 24003 (relative sequence number) [Next sequence number: 25383 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc261 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 502: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069318397 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069318397 seconds [Time delta from previous captured frame: 0.000043699 seconds] [Time delta from previous displayed frame: 0.000043699 seconds] [Time since reference or first frame: 23.271749544 seconds] Frame Number: 502 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34c (54092) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d9a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 25383, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 25383 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 501] [The RTT to ACK the segment was: 0.000043699 seconds] [iRTT: 0.003305578 seconds] Frame 503: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069375310 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069375310 seconds [Time delta from previous captured frame: 0.000056913 seconds] [Time delta from previous displayed frame: 0.000056913 seconds] [Time since reference or first frame: 23.271806457 seconds] Frame Number: 503 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f94 (28564) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fee [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 25383, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 25383 (relative sequence number) [Next sequence number: 26763 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x04be [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 504: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069415131 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069415131 seconds [Time delta from previous captured frame: 0.000039821 seconds] [Time delta from previous displayed frame: 0.000039821 seconds] [Time since reference or first frame: 23.271846278 seconds] Frame Number: 504 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34d (54093) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d99 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 26763, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 26763 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 503] [The RTT to ACK the segment was: 0.000039821 seconds] [iRTT: 0.003305578 seconds] Frame 505: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069508598 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069508598 seconds [Time delta from previous captured frame: 0.000093467 seconds] [Time delta from previous displayed frame: 0.000093467 seconds] [Time since reference or first frame: 23.271939745 seconds] Frame Number: 505 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f95 (28565) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fed [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 26763, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 26763 (relative sequence number) [Next sequence number: 28143 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd246 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 12420] TCP segment data (1380 bytes) Frame 506: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069568369 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069568369 seconds [Time delta from previous captured frame: 0.000059771 seconds] [Time delta from previous displayed frame: 0.000059771 seconds] [Time since reference or first frame: 23.271999516 seconds] Frame Number: 506 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34e (54094) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d98 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 28143, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 28143 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 505] [The RTT to ACK the segment was: 0.000059771 seconds] [iRTT: 0.003305578 seconds] Frame 507: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069596985 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069596985 seconds [Time delta from previous captured frame: 0.000028616 seconds] [Time delta from previous displayed frame: 0.000028616 seconds] [Time since reference or first frame: 23.272028132 seconds] Frame Number: 507 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f96 (28566) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fec [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 28143, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 28143 (relative sequence number) [Next sequence number: 29523 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xee6c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 13800] TCP segment data (1380 bytes) Frame 508: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069638826 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069638826 seconds [Time delta from previous captured frame: 0.000041841 seconds] [Time delta from previous displayed frame: 0.000041841 seconds] [Time since reference or first frame: 23.272069973 seconds] Frame Number: 508 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd34f (54095) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d97 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 29523, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 29523 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 507] [The RTT to ACK the segment was: 0.000041841 seconds] [iRTT: 0.003305578 seconds] Frame 509: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069740394 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069740394 seconds [Time delta from previous captured frame: 0.000101568 seconds] [Time delta from previous displayed frame: 0.000101568 seconds] [Time since reference or first frame: 23.272171541 seconds] Frame Number: 509 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f97 (28567) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6feb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 29523, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 29523 (relative sequence number) [Next sequence number: 30903 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xeea5 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 15180] TCP segment data (1380 bytes) Frame 510: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069785035 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069785035 seconds [Time delta from previous captured frame: 0.000044641 seconds] [Time delta from previous displayed frame: 0.000044641 seconds] [Time since reference or first frame: 23.272216182 seconds] Frame Number: 510 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd350 (54096) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d96 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 30903, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 30903 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 509] [The RTT to ACK the segment was: 0.000044641 seconds] [iRTT: 0.003305578 seconds] Frame 511: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069812417 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069812417 seconds [Time delta from previous captured frame: 0.000027382 seconds] [Time delta from previous displayed frame: 0.000027382 seconds] [Time since reference or first frame: 23.272243564 seconds] Frame Number: 511 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f98 (28568) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fea [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 30903, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 30903 (relative sequence number) [Next sequence number: 32283 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x60de [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 16560] TCP segment data (1257 bytes) TCP segment data (123 bytes) [10 Reassembled TCP Segments (16437 bytes): #493(2760), #495(2760), #497(1380), #499(1380), #501(1380), #503(1380), #505(1380), #507(1380), #509(1380), #511(1257)] [Frame: 493, payload: 0-2759 (2760 bytes)] [Frame: 495, payload: 2760-5519 (2760 bytes)] [Frame: 497, payload: 5520-6899 (1380 bytes)] [Frame: 499, payload: 6900-8279 (1380 bytes)] [Frame: 501, payload: 8280-9659 (1380 bytes)] [Frame: 503, payload: 9660-11039 (1380 bytes)] [Frame: 505, payload: 11040-12419 (1380 bytes)] [Frame: 507, payload: 12420-13799 (1380 bytes)] [Frame: 509, payload: 13800-15179 (1380 bytes)] [Frame: 511, payload: 15180-16436 (1257 bytes)] [Segment count: 10] [Reassembled TCP length: 16437] [Reassembled TCP Data: 1703034030a7feb79ac9ab19b859ccee9773a8c387ffa7c7...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: a7feb79ac9ab19b859ccee9773a8c387ffa7c799e6d0ebe8... SSL segment data (16384 bytes) Secure Sockets Layer Frame 512: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069853108 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069853108 seconds [Time delta from previous captured frame: 0.000040691 seconds] [Time delta from previous displayed frame: 0.000040691 seconds] [Time since reference or first frame: 23.272284255 seconds] Frame Number: 512 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd351 (54097) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d95 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 32283, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 32283 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 511] [The RTT to ACK the segment was: 0.000040691 seconds] [iRTT: 0.003305578 seconds] Frame 513: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.069973888 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.069973888 seconds [Time delta from previous captured frame: 0.000120780 seconds] [Time delta from previous displayed frame: 0.000120780 seconds] [Time since reference or first frame: 23.272405035 seconds] Frame Number: 513 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f99 (28569) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fe9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 32283, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 32283 (relative sequence number) [Next sequence number: 33663 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdc70 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 17940] TCP segment data (1380 bytes) Frame 514: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.070031707 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.070031707 seconds [Time delta from previous captured frame: 0.000057819 seconds] [Time delta from previous displayed frame: 0.000057819 seconds] [Time since reference or first frame: 23.272462854 seconds] Frame Number: 514 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd352 (54098) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d94 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 33663, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 33663 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 513] [The RTT to ACK the segment was: 0.000057819 seconds] [iRTT: 0.003305578 seconds] Frame 515: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.070054888 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.070054888 seconds [Time delta from previous captured frame: 0.000023181 seconds] [Time delta from previous displayed frame: 0.000023181 seconds] [Time since reference or first frame: 23.272486035 seconds] Frame Number: 515 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6f9a (28570) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fe8 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 33663, Ack: 7880, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 33663 (relative sequence number) [Next sequence number: 35043 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc8c7 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 19320] TCP segment data (1380 bytes) Frame 516: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.070094279 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.070094279 seconds [Time delta from previous captured frame: 0.000039391 seconds] [Time delta from previous displayed frame: 0.000039391 seconds] [Time since reference or first frame: 23.272525426 seconds] Frame Number: 516 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd353 (54099) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d93 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 35043, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 35043 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 515] [The RTT to ACK the segment was: 0.000039391 seconds] [iRTT: 0.003305578 seconds] Frame 517: 234 bytes on wire (1872 bits), 234 bytes captured (1872 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.070115122 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.070115122 seconds [Time delta from previous captured frame: 0.000020843 seconds] [Time delta from previous displayed frame: 0.000020843 seconds] [Time since reference or first frame: 23.272546269 seconds] Frame Number: 517 Frame Length: 234 bytes (1872 bits) Capture Length: 234 bytes (1872 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 218 Identification: 0x6f9b (28571) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7499 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35043, Ack: 7880, Len: 178 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 178] Sequence number: 35043 (relative sequence number) [Next sequence number: 35221 (relative sequence number)] Acknowledgment number: 7880 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63687 [Calculated window size: 63687] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb8c1 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 178] [Bytes sent since last PSH flag: 19498] TCP segment data (178 bytes) [4 Reassembled TCP Segments (3061 bytes): #511(123), #513(1380), #515(1380), #517(178)] [Frame: 511, payload: 0-122 (123 bytes)] [Frame: 513, payload: 123-1502 (1380 bytes)] [Frame: 515, payload: 1503-2882 (1380 bytes)] [Frame: 517, payload: 2883-3060 (178 bytes)] [Segment count: 4] [Reassembled TCP length: 3061] [Reassembled TCP Data: 1703030bf0e3d4c973466c42eda1c4370f4d42744e391a6a...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 3056 Encrypted Application Data: e3d4c973466c42eda1c4370f4d42744e391a6a946b6caef2... SSL segment data (3015 bytes) [2 Reassembled SSL segments (19399 bytes): #511(16384), #517(3015)] [Frame: 511, payload: 0-16383 (16384 bytes)] [Frame: 517, payload: 16384-19398 (3015 bytes)] [Segment count: 2] [Reassembled PDU length: 19399] [Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...] Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: fe09aeee-bc0a-4f51-8920-db2b072851a4\r\n Set-Cookie: CurrentServiceId=12018216; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:12 GMT\r\n Content-Length: 19022\r\n [Content length: 19022] \r\n [HTTP response 6/6] [Time since request: 2.399859509 seconds] [Prev request in frame: 406] [Prev response in frame: 413] [Request in frame: 488] Content-encoded entity body (gzip): 19022 bytes -> 59104 bytes File Data: 59104 bytes Line-based text data: text/html \n \n \n \tHT fiksni ra\304\215un br. 5019102951 \342\200\242 Moj Telekom\n \t\r\n \r\n \r\n \r\n \r\n \r\n \n \t\r\n \r\n \r\n \r\n \r\n \r\n \t\r\n \r\n \r\n \r\n \r\n \r\n \t\r\n \t\r\n \t\n \t\n \t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \n \t\t\n \t\t\t\n \t\n \t\n \t\n \t\n \t\n \t\n \t\n \t\n \n \n
\r\n
\r\n \r\n \r\n [truncated]\r\n //\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n [truncated]\r\n \r\n [truncated]\r\n \n \t\n \t\r\n \r\n \r\n
\r\n
\r\n

\r\n \r\n \r\n \r\n [truncated] \r\n \r\n \r\n
\r\n
\r\n \r\n \r\n \r\n \r\n
\r\n \r\n
\r\n
\r\n

Novo na MojT portalu

\r\n
\r\n

Od sada mo\305\276ete platiti HT ra\304\215une kreditnim i debitnim karticama direktno preko MojT portala.

\r\n

\r\n Nove uvjete kori\305\241tenja MojT portala mo\305\276ete pro\304\215itati ovdje\r\n

\r\n
\r\n
\r\n
\r\n \r\n U redu\r\n \r\n \r\n
\r\n
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \t
\n \t\t
\n \t\t\t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \t\t\t
\n \t\t\t\t\n \t\t\t\t\n \t\t\t\t
\n \t\t\t\t\n \n \t\t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\t
\r\n

\r\n \t\t\t\t\t\tRA\304\214UN ZA FIKSNE USLUGE BR. 5019102951

\r\n
\r\n
\r\n
\r\n
\r\n

\r\n \t\t\t\t\t\t\tVa\305\241i ra\304\215uni za prethodni mjesec su u pripremi i bit \304\207e Vam dostupni na Moj Telekom Portalu od
\r\n \t\t\t\t\t\t\tHvala Vam \305\241to koristite E-ra\304\215un i poma\305\276ete nam o\304\215uvati prirodu!\r\n \t\t\t\t\t\t\t

\r\n
\r\n
\r\n
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \302\240\r\n \t\t\t\t\t\t\r\n \r\n \r\n [truncated] \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n
RazdobljeDatum
dospije\304\207a
IznosPreostalo
za platiti
Status
pla\304\207anja Preuzimanja
10/201616.11.2016.369,49 kn\r\n \t\t\t\t\t\t\t\t\t291,25 kn\r\n \t\t\t\t\t\t\t\t\tDjelomi\304\215no podmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24009/201617.10.2016.449,23 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24008/201616.9.2016.417,32 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24007/201616.8.2016.394,90 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24006/201618.7.2016.405,38 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24005/201616.6.2016.365,59 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24004/201616.5.2016.345,37 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24003/201615.4.2016.329,72 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24002/201615.3.2016.340,82 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24001/201615.2.2016.351,05 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24012/201515.1.2016.356,21 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24011/201515.12.2015.416,35 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n
\r\n
UKUPNO ZA PLATITI:
\r\n
\r\n \r\n
\r\n
\r\n

Powered by Svi ra\304\215uni

\r\n
\r\n
\r\n
\r\n
\n \t\t\t\t
\t\n \n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\n \t\t\t
\n \t\t\t
\r\n \t\r\n \t\r\n \r\n \t\r\n \t\r\n \t\r\n \r\n \t\r\n \r\n \t\r\n \r\n \r\n \t\r\n \t\r\n \t\r\n \t\r\n \t\r\n
\n \t\t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \t
\t\n \r\n
\r\n \r\n \t\r\n
\n \n \n \n \t\r\n \r\n \n \t
\r\n \t\r\n \t\t
\r\n \t\t\t
\r\n \t\t\t
\r\n \t\t
\r\n \t
\r\n \t\r\n \t\t\n \t\t\n \n \r\n \r\n \r\n \r\n \r\n \r\n Frame 518: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:58.070153956 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724198.070153956 seconds [Time delta from previous captured frame: 0.000038834 seconds] [Time delta from previous displayed frame: 0.000038834 seconds] [Time since reference or first frame: 23.272585103 seconds] Frame Number: 518 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd354 (54100) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d92 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 35221, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 7880 (relative sequence number) Acknowledgment number: 35221 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 517] [The RTT to ACK the segment was: 0.000038834 seconds] [iRTT: 0.003305578 seconds] Frame 627: 1469 bytes on wire (11752 bits), 1469 bytes captured (11752 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:59.303562869 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724199.303562869 seconds [Time delta from previous captured frame: 0.000050828 seconds] [Time delta from previous displayed frame: 1.233408913 seconds] [Time since reference or first frame: 24.505994016 seconds] Frame Number: 627 Frame Length: 1469 bytes (11752 bits) Capture Length: 1469 bytes (11752 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1453 Identification: 0xd355 (54101) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x480c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 7880, Ack: 35221, Len: 1413 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1413] Sequence number: 7880 (relative sequence number) [Next sequence number: 9293 (relative sequence number)] Acknowledgment number: 35221 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f89 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1413] [Bytes sent since last PSH flag: 1413] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1408 Encrypted Application Data: 1249deb9e6b04b549d14378a7d30585b10577763627b185f... Hypertext Transfer Protocol POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n [Expert Info (Chat/Sequence): POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n] [POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: POST Request URI: /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: application/json, text/javascript, */*; q=0.01\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Content-Type: application/json; charset=utf-8\r\n X-AjaxRequest: true\r\n X-Requested-With: XMLHttpRequest\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n Content-Length: 2\r\n [Content length: 2] [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages] [HTTP request 7/7] [Prev request in frame: 488] File Data: 2 bytes JavaScript Object Notation: application/json Object Frame 628: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:59.307025553 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724199.307025553 seconds [Time delta from previous captured frame: 0.003462684 seconds] [Time delta from previous displayed frame: 0.003462684 seconds] [Time since reference or first frame: 24.509456700 seconds] Frame Number: 628 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 993434ae Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6f9c (28572) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x754a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35221, Ack: 9293, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 35221 (relative sequence number) Acknowledgment number: 9293 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x278e [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 627] [The RTT to ACK the segment was: 0.003462684 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 40423 Src Port: 40423 Frame 629: 397 bytes on wire (3176 bits), 397 bytes captured (3176 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:59.325039412 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724199.325039412 seconds [Time delta from previous captured frame: 0.018013859 seconds] [Time delta from previous displayed frame: 0.018013859 seconds] [Time since reference or first frame: 24.527470559 seconds] Frame Number: 629 Frame Length: 397 bytes (3176 bits) Capture Length: 397 bytes (3176 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 381 Identification: 0x6f9d (28573) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x73f4 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35221, Ack: 9293, Len: 341 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 341] Sequence number: 35221 (relative sequence number) [Next sequence number: 35562 (relative sequence number)] Acknowledgment number: 9293 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1300 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 341] [Bytes sent since last PSH flag: 341] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 336 Encrypted Application Data: a15e6918dd0e1356e43574481e3c7d8327b820ea14717559... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private, max-age=0\r\n Content-Type: application/json; charset=utf-8\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 13607d00-bbb8-4d0c-87b5-0e39146b8cf0\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:13 GMT\r\n Content-Length: 8\r\n [Content length: 8] \r\n [HTTP response 7/7] [Time since request: 0.021476543 seconds] [Prev request in frame: 488] [Prev response in frame: 517] [Request in frame: 627] File Data: 8 bytes JavaScript Object Notation: application/json Object Member Key: d Array Key: d Frame 630: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:29:59.325103632 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724199.325103632 seconds [Time delta from previous captured frame: 0.000064220 seconds] [Time delta from previous displayed frame: 0.000064220 seconds] [Time since reference or first frame: 24.527534779 seconds] Frame Number: 630 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd357 (54103) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d8f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 9293, Ack: 35562, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 9293 (relative sequence number) Acknowledgment number: 35562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 629] [The RTT to ACK the segment was: 0.000064220 seconds] [iRTT: 0.003305578 seconds] Frame 869: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:09.369604934 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724209.369604934 seconds [Time delta from previous captured frame: 0.111978467 seconds] [Time delta from previous displayed frame: 10.044501302 seconds] [Time since reference or first frame: 34.572036081 seconds] Frame Number: 869 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd358 (54104) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d8e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 9292, Ack: 35562, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 9292 (relative sequence number) Acknowledgment number: 35562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 870: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:09.372292267 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724209.372292267 seconds [Time delta from previous captured frame: 0.002687333 seconds] [Time delta from previous displayed frame: 0.002687333 seconds] [Time since reference or first frame: 34.574723414 seconds] Frame Number: 870 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 39334383 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fa1 (28577) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7545 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35562, Ack: 9293, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 35562 (relative sequence number) Acknowledgment number: 9293 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2639 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 32639 Src Port: 32639 Frame 885: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:11.838115129 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724211.838115129 seconds [Time delta from previous captured frame: 1.298059611 seconds] [Time delta from previous displayed frame: 2.465822862 seconds] [Time since reference or first frame: 37.040546276 seconds] Frame Number: 885 Frame Length: 1325 bytes (10600 bits) Capture Length: 1325 bytes (10600 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1309 Identification: 0xd359 (54105) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4898 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 9293, Ack: 35562, Len: 1269 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1269] Sequence number: 9293 (relative sequence number) [Next sequence number: 10562 (relative sequence number)] Acknowledgment number: 35562 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1ef9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1269] [Bytes sent since last PSH flag: 1269] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1264 Encrypted Application Data: 756ebf596c39fc2f84b0f1e0112995f8f0298631925f6ab8... Hypertext Transfer Protocol GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf HTTP/1.1\r\n] [GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf Request URI Path: /racuni/pregled-racuna-pdf Request URI Query: serviceid=12018216&metaid=418703738&filename=418703738.pdf Request URI Query Parameter: serviceid=12018216 Request URI Query Parameter: metaid=418703738 Request URI Query Parameter: filename=418703738.pdf Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=418703738&filename=418703738.pdf] [HTTP request 8/8] [Prev request in frame: 627] Frame 886: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:11.901656340 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724211.901656340 seconds [Time delta from previous captured frame: 0.063541211 seconds] [Time delta from previous displayed frame: 0.063541211 seconds] [Time since reference or first frame: 37.104087487 seconds] Frame Number: 886 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: e73d9efc Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fa2 (28578) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7544 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35562, Ack: 10562, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 35562 (relative sequence number) Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2639 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 885] [The RTT to ACK the segment was: 0.063541211 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 45980 Src Port: 45980 Frame 887: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273147864 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273147864 seconds [Time delta from previous captured frame: 0.371491524 seconds] [Time delta from previous displayed frame: 0.371491524 seconds] [Time since reference or first frame: 37.475579011 seconds] Frame Number: 887 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa3 (28579) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fdf [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 35562, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 35562 (relative sequence number) [Next sequence number: 36942 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x36fa [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 1380] TCP segment data (1380 bytes) Secure Sockets Layer Frame 888: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273220123 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273220123 seconds [Time delta from previous captured frame: 0.000072259 seconds] [Time delta from previous displayed frame: 0.000072259 seconds] [Time since reference or first frame: 37.475651270 seconds] Frame Number: 888 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35a (54106) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d8c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 36942, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 36942 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 887] [The RTT to ACK the segment was: 0.000072259 seconds] [iRTT: 0.003305578 seconds] Frame 889: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273304294 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273304294 seconds [Time delta from previous captured frame: 0.000084171 seconds] [Time delta from previous displayed frame: 0.000084171 seconds] [Time since reference or first frame: 37.475735441 seconds] Frame Number: 889 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa4 (28580) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fde [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 36942, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 36942 (relative sequence number) [Next sequence number: 38322 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9987 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 2760] TCP segment data (1380 bytes) Frame 890: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273333170 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273333170 seconds [Time delta from previous captured frame: 0.000028876 seconds] [Time delta from previous displayed frame: 0.000028876 seconds] [Time since reference or first frame: 37.475764317 seconds] Frame Number: 890 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35b (54107) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d8b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 38322, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 38322 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 889] [The RTT to ACK the segment was: 0.000028876 seconds] [iRTT: 0.003305578 seconds] Frame 891: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273364391 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273364391 seconds [Time delta from previous captured frame: 0.000031221 seconds] [Time delta from previous displayed frame: 0.000031221 seconds] [Time since reference or first frame: 37.475795538 seconds] Frame Number: 891 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa5 (28581) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fdd [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 38322, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 38322 (relative sequence number) [Next sequence number: 39702 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x8550 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 4140] TCP segment data (1380 bytes) Frame 892: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273382943 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273382943 seconds [Time delta from previous captured frame: 0.000018552 seconds] [Time delta from previous displayed frame: 0.000018552 seconds] [Time since reference or first frame: 37.475814090 seconds] Frame Number: 892 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35c (54108) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d8a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 39702, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 39702 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 891] [The RTT to ACK the segment was: 0.000018552 seconds] [iRTT: 0.003305578 seconds] Frame 893: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273395924 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273395924 seconds [Time delta from previous captured frame: 0.000012981 seconds] [Time delta from previous displayed frame: 0.000012981 seconds] [Time since reference or first frame: 37.475827071 seconds] Frame Number: 893 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa6 (28582) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fdc [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 39702, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 39702 (relative sequence number) [Next sequence number: 41082 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0b88 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 5520] TCP segment data (1380 bytes) Frame 894: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273412063 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273412063 seconds [Time delta from previous captured frame: 0.000016139 seconds] [Time delta from previous displayed frame: 0.000016139 seconds] [Time since reference or first frame: 37.475843210 seconds] Frame Number: 894 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35d (54109) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d89 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 41082, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 41082 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 893] [The RTT to ACK the segment was: 0.000016139 seconds] [iRTT: 0.003305578 seconds] Frame 895: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273597893 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273597893 seconds [Time delta from previous captured frame: 0.000185830 seconds] [Time delta from previous displayed frame: 0.000185830 seconds] [Time since reference or first frame: 37.476029040 seconds] Frame Number: 895 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa7 (28583) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fdb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 41082, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 41082 (relative sequence number) [Next sequence number: 42462 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd626 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 896: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.273618317 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.273618317 seconds [Time delta from previous captured frame: 0.000020424 seconds] [Time delta from previous displayed frame: 0.000020424 seconds] [Time since reference or first frame: 37.476049464 seconds] Frame Number: 896 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35e (54110) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d88 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 42462, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 42462 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 895] [The RTT to ACK the segment was: 0.000020424 seconds] [iRTT: 0.003305578 seconds] Frame 897: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274673995 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274673995 seconds [Time delta from previous captured frame: 0.001055678 seconds] [Time delta from previous displayed frame: 0.001055678 seconds] [Time since reference or first frame: 37.477105142 seconds] Frame Number: 897 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa8 (28584) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fda [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 42462, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 42462 (relative sequence number) [Next sequence number: 43842 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb810 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 898: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274708967 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274708967 seconds [Time delta from previous captured frame: 0.000034972 seconds] [Time delta from previous displayed frame: 0.000034972 seconds] [Time since reference or first frame: 37.477140114 seconds] Frame Number: 898 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd35f (54111) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d87 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 43842, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 43842 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 897] [The RTT to ACK the segment was: 0.000034972 seconds] [iRTT: 0.003305578 seconds] Frame 899: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274805431 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274805431 seconds [Time delta from previous captured frame: 0.000096464 seconds] [Time delta from previous displayed frame: 0.000096464 seconds] [Time since reference or first frame: 37.477236578 seconds] Frame Number: 899 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fa9 (28585) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 43842, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 43842 (relative sequence number) [Next sequence number: 45222 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f9b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 900: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274824017 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274824017 seconds [Time delta from previous captured frame: 0.000018586 seconds] [Time delta from previous displayed frame: 0.000018586 seconds] [Time since reference or first frame: 37.477255164 seconds] Frame Number: 900 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd360 (54112) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d86 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 45222, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 45222 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 899] [The RTT to ACK the segment was: 0.000018586 seconds] [iRTT: 0.003305578 seconds] Frame 901: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274839691 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274839691 seconds [Time delta from previous captured frame: 0.000015674 seconds] [Time delta from previous displayed frame: 0.000015674 seconds] [Time since reference or first frame: 37.477270838 seconds] Frame Number: 901 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6faa (28586) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd8 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 45222, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 45222 (relative sequence number) [Next sequence number: 46602 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x62bb [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 902: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.274856304 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.274856304 seconds [Time delta from previous captured frame: 0.000016613 seconds] [Time delta from previous displayed frame: 0.000016613 seconds] [Time since reference or first frame: 37.477287451 seconds] Frame Number: 902 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd361 (54113) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d85 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 46602, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 46602 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 901] [The RTT to ACK the segment was: 0.000016613 seconds] [iRTT: 0.003305578 seconds] Frame 903: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275038858 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275038858 seconds [Time delta from previous captured frame: 0.000182554 seconds] [Time delta from previous displayed frame: 0.000182554 seconds] [Time since reference or first frame: 37.477470005 seconds] Frame Number: 903 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fab (28587) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd7 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 46602, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 46602 (relative sequence number) [Next sequence number: 47982 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf253 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 12420] TCP segment data (1380 bytes) Frame 904: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275057736 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275057736 seconds [Time delta from previous captured frame: 0.000018878 seconds] [Time delta from previous displayed frame: 0.000018878 seconds] [Time since reference or first frame: 37.477488883 seconds] Frame Number: 904 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd362 (54114) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d84 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 47982, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 47982 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 903] [The RTT to ACK the segment was: 0.000018878 seconds] [iRTT: 0.003305578 seconds] Frame 905: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275076429 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275076429 seconds [Time delta from previous captured frame: 0.000018693 seconds] [Time delta from previous displayed frame: 0.000018693 seconds] [Time since reference or first frame: 37.477507576 seconds] Frame Number: 905 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fac (28588) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 47982, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 47982 (relative sequence number) [Next sequence number: 49362 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a15 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 13800] TCP segment data (1380 bytes) Frame 906: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275094371 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275094371 seconds [Time delta from previous captured frame: 0.000017942 seconds] [Time delta from previous displayed frame: 0.000017942 seconds] [Time since reference or first frame: 37.477525518 seconds] Frame Number: 906 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd363 (54115) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d83 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 49362, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 49362 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 905] [The RTT to ACK the segment was: 0.000017942 seconds] [iRTT: 0.003305578 seconds] Frame 907: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275282844 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275282844 seconds [Time delta from previous captured frame: 0.000188473 seconds] [Time delta from previous displayed frame: 0.000188473 seconds] [Time since reference or first frame: 37.477713991 seconds] Frame Number: 907 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fad (28589) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd5 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 49362, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 49362 (relative sequence number) [Next sequence number: 50742 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2137 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 15180] TCP segment data (1380 bytes) Frame 908: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275301936 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275301936 seconds [Time delta from previous captured frame: 0.000019092 seconds] [Time delta from previous displayed frame: 0.000019092 seconds] [Time since reference or first frame: 37.477733083 seconds] Frame Number: 908 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd364 (54116) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d82 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 50742, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 50742 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 907] [The RTT to ACK the segment was: 0.000019092 seconds] [iRTT: 0.003305578 seconds] Frame 909: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275317114 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275317114 seconds [Time delta from previous captured frame: 0.000015178 seconds] [Time delta from previous displayed frame: 0.000015178 seconds] [Time since reference or first frame: 37.477748261 seconds] Frame Number: 909 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fae (28590) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd4 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 50742, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 50742 (relative sequence number) [Next sequence number: 52122 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x498d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 16560] TCP segment data (1257 bytes) TCP segment data (123 bytes) [12 Reassembled TCP Segments (16437 bytes): #887(1380), #889(1380), #891(1380), #893(1380), #895(1380), #897(1380), #899(1380), #901(1380), #903(1380), #905(1380), #907(1380), #909(1257)] [Frame: 887, payload: 0-1379 (1380 bytes)] [Frame: 889, payload: 1380-2759 (1380 bytes)] [Frame: 891, payload: 2760-4139 (1380 bytes)] [Frame: 893, payload: 4140-5519 (1380 bytes)] [Frame: 895, payload: 5520-6899 (1380 bytes)] [Frame: 897, payload: 6900-8279 (1380 bytes)] [Frame: 899, payload: 8280-9659 (1380 bytes)] [Frame: 901, payload: 9660-11039 (1380 bytes)] [Frame: 903, payload: 11040-12419 (1380 bytes)] [Frame: 905, payload: 12420-13799 (1380 bytes)] [Frame: 907, payload: 13800-15179 (1380 bytes)] [Frame: 909, payload: 15180-16436 (1257 bytes)] [Segment count: 12] [Reassembled TCP length: 16437] [Reassembled TCP Data: 170303403014557c934686ee7242142494d27291c51a7b10...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: 14557c934686ee7242142494d27291c51a7b10e25ae837d3... SSL segment data (16384 bytes) Secure Sockets Layer Frame 910: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275336529 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275336529 seconds [Time delta from previous captured frame: 0.000019415 seconds] [Time delta from previous displayed frame: 0.000019415 seconds] [Time since reference or first frame: 37.477767676 seconds] Frame Number: 910 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd365 (54117) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d81 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 52122, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 52122 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 909] [The RTT to ACK the segment was: 0.000019415 seconds] [iRTT: 0.003305578 seconds] Frame 911: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275504652 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275504652 seconds [Time delta from previous captured frame: 0.000168123 seconds] [Time delta from previous displayed frame: 0.000168123 seconds] [Time since reference or first frame: 37.477935799 seconds] Frame Number: 911 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6faf (28591) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd3 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 52122, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 52122 (relative sequence number) [Next sequence number: 53502 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd1dd [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 17940] TCP segment data (1380 bytes) Frame 912: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275522920 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275522920 seconds [Time delta from previous captured frame: 0.000018268 seconds] [Time delta from previous displayed frame: 0.000018268 seconds] [Time since reference or first frame: 37.477954067 seconds] Frame Number: 912 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd366 (54118) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d80 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 53502, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 53502 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 911] [The RTT to ACK the segment was: 0.000018268 seconds] [iRTT: 0.003305578 seconds] Frame 913: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275541636 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275541636 seconds [Time delta from previous captured frame: 0.000018716 seconds] [Time delta from previous displayed frame: 0.000018716 seconds] [Time since reference or first frame: 37.477972783 seconds] Frame Number: 913 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb0 (28592) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd2 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 53502, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 53502 (relative sequence number) [Next sequence number: 54882 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7495 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 19320] TCP segment data (1380 bytes) Frame 914: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275557964 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275557964 seconds [Time delta from previous captured frame: 0.000016328 seconds] [Time delta from previous displayed frame: 0.000016328 seconds] [Time since reference or first frame: 37.477989111 seconds] Frame Number: 914 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd367 (54119) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 54882, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 54882 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 913] [The RTT to ACK the segment was: 0.000016328 seconds] [iRTT: 0.003305578 seconds] Frame 915: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275737155 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275737155 seconds [Time delta from previous captured frame: 0.000179191 seconds] [Time delta from previous displayed frame: 0.000179191 seconds] [Time since reference or first frame: 37.478168302 seconds] Frame Number: 915 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb1 (28593) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 54882, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 54882 (relative sequence number) [Next sequence number: 56262 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x621d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 20700] TCP segment data (1380 bytes) Frame 916: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275756070 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275756070 seconds [Time delta from previous captured frame: 0.000018915 seconds] [Time delta from previous displayed frame: 0.000018915 seconds] [Time since reference or first frame: 37.478187217 seconds] Frame Number: 916 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd368 (54120) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 56262, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 56262 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 915] [The RTT to ACK the segment was: 0.000018915 seconds] [iRTT: 0.003305578 seconds] Frame 917: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275769682 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275769682 seconds [Time delta from previous captured frame: 0.000013612 seconds] [Time delta from previous displayed frame: 0.000013612 seconds] [Time since reference or first frame: 37.478200829 seconds] Frame Number: 917 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb2 (28594) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fd0 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 56262, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 56262 (relative sequence number) [Next sequence number: 57642 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd8c6 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 22080] TCP segment data (1380 bytes) Frame 918: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275784729 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275784729 seconds [Time delta from previous captured frame: 0.000015047 seconds] [Time delta from previous displayed frame: 0.000015047 seconds] [Time since reference or first frame: 37.478215876 seconds] Frame Number: 918 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd369 (54121) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 57642, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 57642 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 917] [The RTT to ACK the segment was: 0.000015047 seconds] [iRTT: 0.003305578 seconds] Frame 919: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275971140 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275971140 seconds [Time delta from previous captured frame: 0.000186411 seconds] [Time delta from previous displayed frame: 0.000186411 seconds] [Time since reference or first frame: 37.478402287 seconds] Frame Number: 919 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb3 (28595) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fcf [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 57642, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 57642 (relative sequence number) [Next sequence number: 59022 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb902 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 23460] TCP segment data (1380 bytes) Frame 920: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.275994185 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.275994185 seconds [Time delta from previous captured frame: 0.000023045 seconds] [Time delta from previous displayed frame: 0.000023045 seconds] [Time since reference or first frame: 37.478425332 seconds] Frame Number: 920 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb4 (28596) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fce [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 59022, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 59022 (relative sequence number) [Next sequence number: 60402 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x4921 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 24840] TCP segment data (1380 bytes) Frame 921: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276010551 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276010551 seconds [Time delta from previous captured frame: 0.000016366 seconds] [Time delta from previous displayed frame: 0.000016366 seconds] [Time since reference or first frame: 37.478441698 seconds] Frame Number: 921 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36a (54122) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 60402, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 60402 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 920] [The RTT to ACK the segment was: 0.000016366 seconds] [iRTT: 0.003305578 seconds] Frame 922: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276205562 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276205562 seconds [Time delta from previous captured frame: 0.000195011 seconds] [Time delta from previous displayed frame: 0.000195011 seconds] [Time since reference or first frame: 37.478636709 seconds] Frame Number: 922 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb5 (28597) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fcd [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 60402, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 60402 (relative sequence number) [Next sequence number: 61782 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0a79 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 26220] TCP segment data (1380 bytes) Frame 923: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276231579 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276231579 seconds [Time delta from previous captured frame: 0.000026017 seconds] [Time delta from previous displayed frame: 0.000026017 seconds] [Time since reference or first frame: 37.478662726 seconds] Frame Number: 923 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb6 (28598) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fcc [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 61782, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 61782 (relative sequence number) [Next sequence number: 63162 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x74f0 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 27600] TCP segment data (1380 bytes) Frame 924: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276248734 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276248734 seconds [Time delta from previous captured frame: 0.000017155 seconds] [Time delta from previous displayed frame: 0.000017155 seconds] [Time since reference or first frame: 37.478679881 seconds] Frame Number: 924 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36b (54123) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 63162, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 63162 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 923] [The RTT to ACK the segment was: 0.000017155 seconds] [iRTT: 0.003305578 seconds] Frame 925: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276438772 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276438772 seconds [Time delta from previous captured frame: 0.000190038 seconds] [Time delta from previous displayed frame: 0.000190038 seconds] [Time since reference or first frame: 37.478869919 seconds] Frame Number: 925 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb7 (28599) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fcb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 63162, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 63162 (relative sequence number) [Next sequence number: 64542 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x6b9c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 28980] TCP segment data (1380 bytes) Frame 926: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276462555 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276462555 seconds [Time delta from previous captured frame: 0.000023783 seconds] [Time delta from previous displayed frame: 0.000023783 seconds] [Time since reference or first frame: 37.478893702 seconds] Frame Number: 926 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb8 (28600) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fca [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 64542, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 64542 (relative sequence number) [Next sequence number: 65922 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc1f8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 30360] TCP segment data (1380 bytes) Frame 927: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276478322 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276478322 seconds [Time delta from previous captured frame: 0.000015767 seconds] [Time delta from previous displayed frame: 0.000015767 seconds] [Time since reference or first frame: 37.478909469 seconds] Frame Number: 927 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36c (54124) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d7a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 65922, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 65922 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 926] [The RTT to ACK the segment was: 0.000015767 seconds] [iRTT: 0.003305578 seconds] Frame 928: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276671555 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276671555 seconds [Time delta from previous captured frame: 0.000193233 seconds] [Time delta from previous displayed frame: 0.000193233 seconds] [Time since reference or first frame: 37.479102702 seconds] Frame Number: 928 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fb9 (28601) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 65922, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 65922 (relative sequence number) [Next sequence number: 67302 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x65c5 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 31740] TCP segment data (1380 bytes) Frame 929: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276697261 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276697261 seconds [Time delta from previous captured frame: 0.000025706 seconds] [Time delta from previous displayed frame: 0.000025706 seconds] [Time since reference or first frame: 37.479128408 seconds] Frame Number: 929 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fba (28602) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc8 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 67302, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 67302 (relative sequence number) [Next sequence number: 68682 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2b02 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 33120] TCP segment data (1134 bytes) TCP segment data (246 bytes) [13 Reassembled TCP Segments (16437 bytes): #909(123), #911(1380), #913(1380), #915(1380), #917(1380), #919(1380), #920(1380), #922(1380), #923(1380), #925(1380), #926(1380), #928(1380), #929(1134)] [Frame: 909, payload: 0-122 (123 bytes)] [Frame: 911, payload: 123-1502 (1380 bytes)] [Frame: 913, payload: 1503-2882 (1380 bytes)] [Frame: 915, payload: 2883-4262 (1380 bytes)] [Frame: 917, payload: 4263-5642 (1380 bytes)] [Frame: 919, payload: 5643-7022 (1380 bytes)] [Frame: 920, payload: 7023-8402 (1380 bytes)] [Frame: 922, payload: 8403-9782 (1380 bytes)] [Frame: 923, payload: 9783-11162 (1380 bytes)] [Frame: 925, payload: 11163-12542 (1380 bytes)] [Frame: 926, payload: 12543-13922 (1380 bytes)] [Frame: 928, payload: 13923-15302 (1380 bytes)] [Frame: 929, payload: 15303-16436 (1134 bytes)] [Segment count: 13] [Reassembled TCP length: 16437] [Reassembled TCP Data: 170303403069241bf220aa029a12a8b3257d45de84f2b7b5...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: 69241bf220aa029a12a8b3257d45de84f2b7b5e67ae8ca4d... SSL segment data (16384 bytes) Secure Sockets Layer Frame 930: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276713960 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276713960 seconds [Time delta from previous captured frame: 0.000016699 seconds] [Time delta from previous displayed frame: 0.000016699 seconds] [Time since reference or first frame: 37.479145107 seconds] Frame Number: 930 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36d (54125) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d79 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 68682, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 68682 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 929] [The RTT to ACK the segment was: 0.000016699 seconds] [iRTT: 0.003305578 seconds] Frame 931: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276904277 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276904277 seconds [Time delta from previous captured frame: 0.000190317 seconds] [Time delta from previous displayed frame: 0.000190317 seconds] [Time since reference or first frame: 37.479335424 seconds] Frame Number: 931 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fbb (28603) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc7 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 68682, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 68682 (relative sequence number) [Next sequence number: 70062 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x15d8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 34500] TCP segment data (1380 bytes) Frame 932: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276926774 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276926774 seconds [Time delta from previous captured frame: 0.000022497 seconds] [Time delta from previous displayed frame: 0.000022497 seconds] [Time since reference or first frame: 37.479357921 seconds] Frame Number: 932 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fbc (28604) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 70062, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 70062 (relative sequence number) [Next sequence number: 71442 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xddda [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 35880] TCP segment data (1380 bytes) Frame 933: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.276943166 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.276943166 seconds [Time delta from previous captured frame: 0.000016392 seconds] [Time delta from previous displayed frame: 0.000016392 seconds] [Time since reference or first frame: 37.479374313 seconds] Frame Number: 933 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36e (54126) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d78 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 71442, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 71442 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 932] [The RTT to ACK the segment was: 0.000016392 seconds] [iRTT: 0.003305578 seconds] Frame 934: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.277137938 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.277137938 seconds [Time delta from previous captured frame: 0.000194772 seconds] [Time delta from previous displayed frame: 0.000194772 seconds] [Time since reference or first frame: 37.479569085 seconds] Frame Number: 934 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fbd (28605) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc5 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 71442, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 71442 (relative sequence number) [Next sequence number: 72822 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x680c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 37260] TCP segment data (1380 bytes) Frame 935: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.277171198 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.277171198 seconds [Time delta from previous captured frame: 0.000033260 seconds] [Time delta from previous displayed frame: 0.000033260 seconds] [Time since reference or first frame: 37.479602345 seconds] Frame Number: 935 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fbe (28606) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc4 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 72822, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 72822 (relative sequence number) [Next sequence number: 74202 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x6978 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 38640] TCP segment data (1380 bytes) Frame 936: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.277192791 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.277192791 seconds [Time delta from previous captured frame: 0.000021593 seconds] [Time delta from previous displayed frame: 0.000021593 seconds] [Time since reference or first frame: 37.479623938 seconds] Frame Number: 936 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd36f (54127) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d77 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 74202, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 74202 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 935] [The RTT to ACK the segment was: 0.000021593 seconds] [iRTT: 0.003305578 seconds] Frame 937: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.277372220 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.277372220 seconds [Time delta from previous captured frame: 0.000179429 seconds] [Time delta from previous displayed frame: 0.000179429 seconds] [Time since reference or first frame: 37.479803367 seconds] Frame Number: 937 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fbf (28607) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc3 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 74202, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 74202 (relative sequence number) [Next sequence number: 75582 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x20c0 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 40020] TCP segment data (1380 bytes) Frame 938: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278269066 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278269066 seconds [Time delta from previous captured frame: 0.000896846 seconds] [Time delta from previous displayed frame: 0.000896846 seconds] [Time since reference or first frame: 37.480700213 seconds] Frame Number: 938 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc0 (28608) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc2 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 75582, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 75582 (relative sequence number) [Next sequence number: 76962 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9a06 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 41400] TCP segment data (1380 bytes) Frame 939: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278302192 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278302192 seconds [Time delta from previous captured frame: 0.000033126 seconds] [Time delta from previous displayed frame: 0.000033126 seconds] [Time since reference or first frame: 37.480733339 seconds] Frame Number: 939 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd370 (54128) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d76 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 76962, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 76962 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 938] [The RTT to ACK the segment was: 0.000033126 seconds] [iRTT: 0.003305578 seconds] Frame 940: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278358645 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278358645 seconds [Time delta from previous captured frame: 0.000056453 seconds] [Time delta from previous displayed frame: 0.000056453 seconds] [Time since reference or first frame: 37.480789792 seconds] Frame Number: 940 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc1 (28609) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 76962, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 76962 (relative sequence number) [Next sequence number: 78342 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfb02 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 42780] TCP segment data (1380 bytes) Frame 941: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278490195 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278490195 seconds [Time delta from previous captured frame: 0.000131550 seconds] [Time delta from previous displayed frame: 0.000131550 seconds] [Time since reference or first frame: 37.480921342 seconds] Frame Number: 941 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc2 (28610) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fc0 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 78342, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 78342 (relative sequence number) [Next sequence number: 79722 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xea01 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 44160] TCP segment data (1380 bytes) Frame 942: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278508197 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278508197 seconds [Time delta from previous captured frame: 0.000018002 seconds] [Time delta from previous displayed frame: 0.000018002 seconds] [Time since reference or first frame: 37.480939344 seconds] Frame Number: 942 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd371 (54129) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d75 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 79722, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 79722 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 941] [The RTT to ACK the segment was: 0.000018002 seconds] [iRTT: 0.003305578 seconds] Frame 943: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.278526633 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.278526633 seconds [Time delta from previous captured frame: 0.000018436 seconds] [Time delta from previous displayed frame: 0.000018436 seconds] [Time since reference or first frame: 37.480957780 seconds] Frame Number: 943 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc3 (28611) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fbf [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 79722, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 79722 (relative sequence number) [Next sequence number: 81102 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc892 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 45540] TCP segment data (1380 bytes) Frame 944: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.279730869 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.279730869 seconds [Time delta from previous captured frame: 0.001204236 seconds] [Time delta from previous displayed frame: 0.001204236 seconds] [Time since reference or first frame: 37.482162016 seconds] Frame Number: 944 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc4 (28612) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fbe [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 81102, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 81102 (relative sequence number) [Next sequence number: 82482 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x8028 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 46920] TCP segment data (1380 bytes) Frame 945: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.279763233 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.279763233 seconds [Time delta from previous captured frame: 0.000032364 seconds] [Time delta from previous displayed frame: 0.000032364 seconds] [Time since reference or first frame: 37.482194380 seconds] Frame Number: 945 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd372 (54130) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d74 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 82482, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 82482 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 944] [The RTT to ACK the segment was: 0.000032364 seconds] [iRTT: 0.003305578 seconds] Frame 946: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.279790407 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.279790407 seconds [Time delta from previous captured frame: 0.000027174 seconds] [Time delta from previous displayed frame: 0.000027174 seconds] [Time since reference or first frame: 37.482221554 seconds] Frame Number: 946 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fc5 (28613) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fbd [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 82482, Ack: 10562, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 82482 (relative sequence number) [Next sequence number: 83862 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd0b8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 48300] TCP segment data (1380 bytes) Frame 947: 731 bytes on wire (5848 bits), 731 bytes captured (5848 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.279810679 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.279810679 seconds [Time delta from previous captured frame: 0.000020272 seconds] [Time delta from previous displayed frame: 0.000020272 seconds] [Time since reference or first frame: 37.482241826 seconds] Frame Number: 947 Frame Length: 731 bytes (5848 bits) Capture Length: 731 bytes (5848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:media] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 715 Identification: 0x6fc6 (28614) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x727d [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 83862, Ack: 10562, Len: 675 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 675] Sequence number: 83862 (relative sequence number) [Next sequence number: 84537 (relative sequence number)] Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x89c3 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2055] [Bytes sent since last PSH flag: 48975] TCP segment data (675 bytes) [13 Reassembled TCP Segments (16101 bytes): #929(246), #931(1380), #932(1380), #934(1380), #935(1380), #937(1380), #938(1380), #940(1380), #941(1380), #943(1380), #944(1380), #946(1380), #947(675)] [Frame: 929, payload: 0-245 (246 bytes)] [Frame: 931, payload: 246-1625 (1380 bytes)] [Frame: 932, payload: 1626-3005 (1380 bytes)] [Frame: 934, payload: 3006-4385 (1380 bytes)] [Frame: 935, payload: 4386-5765 (1380 bytes)] [Frame: 937, payload: 5766-7145 (1380 bytes)] [Frame: 938, payload: 7146-8525 (1380 bytes)] [Frame: 940, payload: 8526-9905 (1380 bytes)] [Frame: 941, payload: 9906-11285 (1380 bytes)] [Frame: 943, payload: 11286-12665 (1380 bytes)] [Frame: 944, payload: 12666-14045 (1380 bytes)] [Frame: 946, payload: 14046-15425 (1380 bytes)] [Frame: 947, payload: 15426-16100 (675 bytes)] [Segment count: 13] [Reassembled TCP length: 16101] [Reassembled TCP Data: 1703033ee045c15dd5081d88d3cc41252f42a1e04e40e7db...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16096 Encrypted Application Data: 45c15dd5081d88d3cc41252f42a1e04e40e7dbabeee1fc16... SSL segment data (16054 bytes) [3 Reassembled SSL segments (48822 bytes): #909(16384), #929(16384), #947(16054)] [Frame: 909, payload: 0-16383 (16384 bytes)] [Frame: 929, payload: 16384-32767 (16384 bytes)] [Frame: 947, payload: 32768-48821 (16054 bytes)] [Segment count: 3] [Reassembled PDU length: 48822] [Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...] Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: application/pdf\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: bf608971-bdaa-4a1e-b538-272f446f0f2d\r\n Content-Disposition: attachment; filename="418703738.pdf"\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:30:26 GMT\r\n Content-Length: 48499\r\n [Content length: 48499] \r\n [HTTP response 8/8] [Time since request: 0.441695550 seconds] [Prev request in frame: 627] [Prev response in frame: 629] [Request in frame: 885] File Data: 48499 bytes Media Type Media type: application/pdf (48499 bytes) Frame 948: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:12.279826527 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724212.279826527 seconds [Time delta from previous captured frame: 0.000015848 seconds] [Time delta from previous displayed frame: 0.000015848 seconds] [Time since reference or first frame: 37.482257674 seconds] Frame Number: 948 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd373 (54131) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d73 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 84537, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10562 (relative sequence number) Acknowledgment number: 84537 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 947] [The RTT to ACK the segment was: 0.000015848 seconds] [iRTT: 0.003305578 seconds] Frame 975: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:22.297628804 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724222.297628804 seconds [Time delta from previous captured frame: 0.207420895 seconds] [Time delta from previous displayed frame: 10.017802277 seconds] [Time since reference or first frame: 47.500059951 seconds] Frame Number: 975 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd374 (54132) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d72 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10561, Ack: 84537, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10561 (relative sequence number) Acknowledgment number: 84537 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 976: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:22.300302930 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724222.300302930 seconds [Time delta from previous captured frame: 0.002674126 seconds] [Time delta from previous displayed frame: 0.002674126 seconds] [Time since reference or first frame: 47.502734077 seconds] Frame Number: 976 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: ef34d8c7 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fca (28618) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x751c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 10562, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 84537 (relative sequence number) Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x66e9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 167 Src Port: 167 Frame 1020: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:32.601580209 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724232.601580209 seconds [Time delta from previous captured frame: 0.188020291 seconds] [Time delta from previous displayed frame: 10.301277279 seconds] [Time since reference or first frame: 57.804011356 seconds] Frame Number: 1020 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd375 (54133) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d71 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10561, Ack: 84537, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10561 (relative sequence number) Acknowledgment number: 84537 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1021: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:32.604565936 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724232.604565936 seconds [Time delta from previous captured frame: 0.002985727 seconds] [Time delta from previous displayed frame: 0.002985727 seconds] [Time since reference or first frame: 57.806997083 seconds] Frame Number: 1021 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 03fa416b Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fcb (28619) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x751b [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 10562, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 84537 (relative sequence number) Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x66e9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 8241 Src Port: 8241 Frame 1043: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:42.841633834 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724242.841633834 seconds [Time delta from previous captured frame: 0.827989146 seconds] [Time delta from previous displayed frame: 10.237067898 seconds] [Time since reference or first frame: 68.044064981 seconds] Frame Number: 1043 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd376 (54134) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d70 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10561, Ack: 84537, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 10561 (relative sequence number) Acknowledgment number: 84537 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1044: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:42.844588589 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724242.844588589 seconds [Time delta from previous captured frame: 0.002954755 seconds] [Time delta from previous displayed frame: 0.002954755 seconds] [Time since reference or first frame: 68.047019736 seconds] Frame Number: 1044 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: d4fc00cd Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fcc (28620) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x751a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 10562, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 84537 (relative sequence number) Acknowledgment number: 10562 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x66e9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 17966 Src Port: 17966 Frame 1073: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.474256372 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.474256372 seconds [Time delta from previous captured frame: 0.654638443 seconds] [Time delta from previous displayed frame: 8.629667783 seconds] [Time since reference or first frame: 76.676687519 seconds] Frame Number: 1073 Frame Length: 1325 bytes (10600 bits) Capture Length: 1325 bytes (10600 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1309 Identification: 0xd377 (54135) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x487a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 10562, Ack: 84537, Len: 1269 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1269] Sequence number: 10562 (relative sequence number) [Next sequence number: 11831 (relative sequence number)] Acknowledgment number: 84537 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1ef9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1269] [Bytes sent since last PSH flag: 1269] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1264 Encrypted Application Data: d8ee3489432e319933ad92a02442fe08698b65f920c0a828... Hypertext Transfer Protocol GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf HTTP/1.1\r\n] [GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf Request URI Path: /racuni/pregled-racuna-pdf Request URI Query: serviceid=12018216&metaid=424888813&filename=424888813.pdf Request URI Query Parameter: serviceid=12018216 Request URI Query Parameter: metaid=424888813 Request URI Query Parameter: filename=424888813.pdf Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=424888813&filename=424888813.pdf] [HTTP request 9/9] [Prev request in frame: 885] Frame 1074: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.528297844 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.528297844 seconds [Time delta from previous captured frame: 0.054041472 seconds] [Time delta from previous displayed frame: 0.054041472 seconds] [Time since reference or first frame: 76.730728991 seconds] Frame Number: 1074 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 2325ae5a Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x6fdd (28637) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x7509 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 11831, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 84537 (relative sequence number) Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5cff [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1073] [The RTT to ACK the segment was: 0.054041472 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 63780 Src Port: 63780 Frame 1075: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795401933 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795401933 seconds [Time delta from previous captured frame: 0.267104089 seconds] [Time delta from previous displayed frame: 0.267104089 seconds] [Time since reference or first frame: 76.997833080 seconds] Frame Number: 1075 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fde (28638) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fa4 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 84537, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 84537 (relative sequence number) [Next sequence number: 85917 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1e34 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 1380] TCP segment data (1380 bytes) Secure Sockets Layer Frame 1076: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795476707 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795476707 seconds [Time delta from previous captured frame: 0.000074774 seconds] [Time delta from previous displayed frame: 0.000074774 seconds] [Time since reference or first frame: 76.997907854 seconds] Frame Number: 1076 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd378 (54136) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d6e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 85917, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 85917 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1075] [The RTT to ACK the segment was: 0.000074774 seconds] [iRTT: 0.003305578 seconds] Frame 1077: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795606976 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795606976 seconds [Time delta from previous captured frame: 0.000130269 seconds] [Time delta from previous displayed frame: 0.000130269 seconds] [Time since reference or first frame: 76.998038123 seconds] Frame Number: 1077 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fdf (28639) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fa3 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 85917, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 85917 (relative sequence number) [Next sequence number: 87297 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xaa15 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 2760] TCP segment data (1380 bytes) Frame 1078: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795628550 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795628550 seconds [Time delta from previous captured frame: 0.000021574 seconds] [Time delta from previous displayed frame: 0.000021574 seconds] [Time since reference or first frame: 76.998059697 seconds] Frame Number: 1078 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd379 (54137) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d6d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 87297, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 87297 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1077] [The RTT to ACK the segment was: 0.000021574 seconds] [iRTT: 0.003305578 seconds] Frame 1079: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795860217 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795860217 seconds [Time delta from previous captured frame: 0.000231667 seconds] [Time delta from previous displayed frame: 0.000231667 seconds] [Time since reference or first frame: 76.998291364 seconds] Frame Number: 1079 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe0 (28640) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fa2 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 87297, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 87297 (relative sequence number) [Next sequence number: 88677 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x017f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 4140] TCP segment data (1380 bytes) Frame 1080: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795881876 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795881876 seconds [Time delta from previous captured frame: 0.000021659 seconds] [Time delta from previous displayed frame: 0.000021659 seconds] [Time since reference or first frame: 76.998313023 seconds] Frame Number: 1080 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37a (54138) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d6c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 88677, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 88677 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1079] [The RTT to ACK the segment was: 0.000021659 seconds] [iRTT: 0.003305578 seconds] Frame 1081: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795900605 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795900605 seconds [Time delta from previous captured frame: 0.000018729 seconds] [Time delta from previous displayed frame: 0.000018729 seconds] [Time since reference or first frame: 76.998331752 seconds] Frame Number: 1081 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe1 (28641) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fa1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 88677, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 88677 (relative sequence number) [Next sequence number: 90057 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfbaa [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 5520] TCP segment data (1380 bytes) Frame 1082: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.795921817 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.795921817 seconds [Time delta from previous captured frame: 0.000021212 seconds] [Time delta from previous displayed frame: 0.000021212 seconds] [Time since reference or first frame: 76.998352964 seconds] Frame Number: 1082 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37b (54139) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d6b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 90057, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 90057 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1081] [The RTT to ACK the segment was: 0.000021212 seconds] [iRTT: 0.003305578 seconds] Frame 1083: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796119255 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796119255 seconds [Time delta from previous captured frame: 0.000197438 seconds] [Time delta from previous displayed frame: 0.000197438 seconds] [Time since reference or first frame: 76.998550402 seconds] Frame Number: 1083 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe2 (28642) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6fa0 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 90057, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 90057 (relative sequence number) [Next sequence number: 91437 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdbc3 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 1084: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796138206 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796138206 seconds [Time delta from previous captured frame: 0.000018951 seconds] [Time delta from previous displayed frame: 0.000018951 seconds] [Time since reference or first frame: 76.998569353 seconds] Frame Number: 1084 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37c (54140) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d6a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 91437, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 91437 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1083] [The RTT to ACK the segment was: 0.000018951 seconds] [iRTT: 0.003305578 seconds] Frame 1085: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796155170 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796155170 seconds [Time delta from previous captured frame: 0.000016964 seconds] [Time delta from previous displayed frame: 0.000016964 seconds] [Time since reference or first frame: 76.998586317 seconds] Frame Number: 1085 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe3 (28643) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 91437, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 91437 (relative sequence number) [Next sequence number: 92817 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xebe0 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 1086: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796172963 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796172963 seconds [Time delta from previous captured frame: 0.000017793 seconds] [Time delta from previous displayed frame: 0.000017793 seconds] [Time since reference or first frame: 76.998604110 seconds] Frame Number: 1086 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37d (54141) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d69 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 92817, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 92817 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1085] [The RTT to ACK the segment was: 0.000017793 seconds] [iRTT: 0.003305578 seconds] Frame 1087: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796325738 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796325738 seconds [Time delta from previous captured frame: 0.000152775 seconds] [Time delta from previous displayed frame: 0.000152775 seconds] [Time since reference or first frame: 76.998756885 seconds] Frame Number: 1087 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe4 (28644) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 92817, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 92817 (relative sequence number) [Next sequence number: 94197 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x73fb [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 1088: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796343874 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796343874 seconds [Time delta from previous captured frame: 0.000018136 seconds] [Time delta from previous displayed frame: 0.000018136 seconds] [Time since reference or first frame: 76.998775021 seconds] Frame Number: 1088 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37e (54142) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d68 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 94197, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 94197 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1087] [The RTT to ACK the segment was: 0.000018136 seconds] [iRTT: 0.003305578 seconds] Frame 1089: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796359750 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796359750 seconds [Time delta from previous captured frame: 0.000015876 seconds] [Time delta from previous displayed frame: 0.000015876 seconds] [Time since reference or first frame: 76.998790897 seconds] Frame Number: 1089 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe5 (28645) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9d [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 94197, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 94197 (relative sequence number) [Next sequence number: 95577 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x01fa [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 1090: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796382162 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796382162 seconds [Time delta from previous captured frame: 0.000022412 seconds] [Time delta from previous displayed frame: 0.000022412 seconds] [Time since reference or first frame: 76.998813309 seconds] Frame Number: 1090 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd37f (54143) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d67 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 95577, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 95577 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1089] [The RTT to ACK the segment was: 0.000022412 seconds] [iRTT: 0.003305578 seconds] Frame 1091: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796558970 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796558970 seconds [Time delta from previous captured frame: 0.000176808 seconds] [Time delta from previous displayed frame: 0.000176808 seconds] [Time since reference or first frame: 76.998990117 seconds] Frame Number: 1091 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe6 (28646) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 95577, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 95577 (relative sequence number) [Next sequence number: 96957 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xde0c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 12420] TCP segment data (1380 bytes) Frame 1092: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796578822 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796578822 seconds [Time delta from previous captured frame: 0.000019852 seconds] [Time delta from previous displayed frame: 0.000019852 seconds] [Time since reference or first frame: 76.999009969 seconds] Frame Number: 1092 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd380 (54144) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d66 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 96957, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 96957 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1091] [The RTT to ACK the segment was: 0.000019852 seconds] [iRTT: 0.003305578 seconds] Frame 1093: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796594133 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796594133 seconds [Time delta from previous captured frame: 0.000015311 seconds] [Time delta from previous displayed frame: 0.000015311 seconds] [Time since reference or first frame: 76.999025280 seconds] Frame Number: 1093 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe7 (28647) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9b [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 96957, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 96957 (relative sequence number) [Next sequence number: 98337 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd828 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 13800] TCP segment data (1380 bytes) Frame 1094: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796610437 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796610437 seconds [Time delta from previous captured frame: 0.000016304 seconds] [Time delta from previous displayed frame: 0.000016304 seconds] [Time since reference or first frame: 76.999041584 seconds] Frame Number: 1094 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd381 (54145) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d65 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 98337, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 98337 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1093] [The RTT to ACK the segment was: 0.000016304 seconds] [iRTT: 0.003305578 seconds] Frame 1095: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796791504 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796791504 seconds [Time delta from previous captured frame: 0.000181067 seconds] [Time delta from previous displayed frame: 0.000181067 seconds] [Time since reference or first frame: 76.999222651 seconds] Frame Number: 1095 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe8 (28648) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f9a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 98337, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 98337 (relative sequence number) [Next sequence number: 99717 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x72d6 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 15180] TCP segment data (1380 bytes) Frame 1096: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796809665 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796809665 seconds [Time delta from previous captured frame: 0.000018161 seconds] [Time delta from previous displayed frame: 0.000018161 seconds] [Time since reference or first frame: 76.999240812 seconds] Frame Number: 1096 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd382 (54146) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d64 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 99717, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 99717 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1095] [The RTT to ACK the segment was: 0.000018161 seconds] [iRTT: 0.003305578 seconds] Frame 1097: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796825214 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796825214 seconds [Time delta from previous captured frame: 0.000015549 seconds] [Time delta from previous displayed frame: 0.000015549 seconds] [Time since reference or first frame: 76.999256361 seconds] Frame Number: 1097 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fe9 (28649) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f99 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 99717, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 99717 (relative sequence number) [Next sequence number: 101097 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9664 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 16560] TCP segment data (1257 bytes) TCP segment data (123 bytes) [12 Reassembled TCP Segments (16437 bytes): #1075(1380), #1077(1380), #1079(1380), #1081(1380), #1083(1380), #1085(1380), #1087(1380), #1089(1380), #1091(1380), #1093(1380), #1095(1380), #1097(1257)] [Frame: 1075, payload: 0-1379 (1380 bytes)] [Frame: 1077, payload: 1380-2759 (1380 bytes)] [Frame: 1079, payload: 2760-4139 (1380 bytes)] [Frame: 1081, payload: 4140-5519 (1380 bytes)] [Frame: 1083, payload: 5520-6899 (1380 bytes)] [Frame: 1085, payload: 6900-8279 (1380 bytes)] [Frame: 1087, payload: 8280-9659 (1380 bytes)] [Frame: 1089, payload: 9660-11039 (1380 bytes)] [Frame: 1091, payload: 11040-12419 (1380 bytes)] [Frame: 1093, payload: 12420-13799 (1380 bytes)] [Frame: 1095, payload: 13800-15179 (1380 bytes)] [Frame: 1097, payload: 15180-16436 (1257 bytes)] [Segment count: 12] [Reassembled TCP length: 16437] [Reassembled TCP Data: 17030340309fc39c4545203b859de5347d032ba13da1735d...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: 9fc39c4545203b859de5347d032ba13da1735d2b4e6a83dd... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1098: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.796841966 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.796841966 seconds [Time delta from previous captured frame: 0.000016752 seconds] [Time delta from previous displayed frame: 0.000016752 seconds] [Time since reference or first frame: 76.999273113 seconds] Frame Number: 1098 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd383 (54147) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d63 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 101097, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 101097 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1097] [The RTT to ACK the segment was: 0.000016752 seconds] [iRTT: 0.003305578 seconds] Frame 1099: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797024246 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797024246 seconds [Time delta from previous captured frame: 0.000182280 seconds] [Time delta from previous displayed frame: 0.000182280 seconds] [Time since reference or first frame: 76.999455393 seconds] Frame Number: 1099 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fea (28650) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f98 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 101097, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 101097 (relative sequence number) [Next sequence number: 102477 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x4ba9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 17940] TCP segment data (1380 bytes) Frame 1100: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797042621 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797042621 seconds [Time delta from previous captured frame: 0.000018375 seconds] [Time delta from previous displayed frame: 0.000018375 seconds] [Time since reference or first frame: 76.999473768 seconds] Frame Number: 1100 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd384 (54148) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d62 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 102477, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 102477 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1099] [The RTT to ACK the segment was: 0.000018375 seconds] [iRTT: 0.003305578 seconds] Frame 1101: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797055180 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797055180 seconds [Time delta from previous captured frame: 0.000012559 seconds] [Time delta from previous displayed frame: 0.000012559 seconds] [Time since reference or first frame: 76.999486327 seconds] Frame Number: 1101 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6feb (28651) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f97 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 102477, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 102477 (relative sequence number) [Next sequence number: 103857 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdaf6 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 19320] TCP segment data (1380 bytes) Frame 1102: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797071899 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797071899 seconds [Time delta from previous captured frame: 0.000016719 seconds] [Time delta from previous displayed frame: 0.000016719 seconds] [Time since reference or first frame: 76.999503046 seconds] Frame Number: 1102 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd385 (54149) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d61 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 103857, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 103857 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1101] [The RTT to ACK the segment was: 0.000016719 seconds] [iRTT: 0.003305578 seconds] Frame 1103: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797295717 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797295717 seconds [Time delta from previous captured frame: 0.000223818 seconds] [Time delta from previous displayed frame: 0.000223818 seconds] [Time since reference or first frame: 76.999726864 seconds] Frame Number: 1103 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x6fec (28652) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6a32 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 103857, Ack: 11831, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 103857 (relative sequence number) [Next sequence number: 106617 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 22080] TCP segment data (2760 bytes) Frame 1104: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797415274 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797415274 seconds [Time delta from previous captured frame: 0.000119557 seconds] [Time delta from previous displayed frame: 0.000119557 seconds] [Time since reference or first frame: 76.999846421 seconds] Frame Number: 1104 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd386 (54150) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d60 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 106617, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 106617 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1103] [The RTT to ACK the segment was: 0.000119557 seconds] [iRTT: 0.003305578 seconds] Frame 1105: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797495359 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797495359 seconds [Time delta from previous captured frame: 0.000080085 seconds] [Time delta from previous displayed frame: 0.000080085 seconds] [Time since reference or first frame: 76.999926506 seconds] Frame Number: 1105 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fee (28654) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f94 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 106617, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 106617 (relative sequence number) [Next sequence number: 107997 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc8ad [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 23460] TCP segment data (1380 bytes) Frame 1106: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797520067 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797520067 seconds [Time delta from previous captured frame: 0.000024708 seconds] [Time delta from previous displayed frame: 0.000024708 seconds] [Time since reference or first frame: 76.999951214 seconds] Frame Number: 1106 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd387 (54151) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 107997, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 107997 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1105] [The RTT to ACK the segment was: 0.000024708 seconds] [iRTT: 0.003305578 seconds] Frame 1107: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797545618 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797545618 seconds [Time delta from previous captured frame: 0.000025551 seconds] [Time delta from previous displayed frame: 0.000025551 seconds] [Time since reference or first frame: 76.999976765 seconds] Frame Number: 1107 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6fef (28655) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f93 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 107997, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 107997 (relative sequence number) [Next sequence number: 109377 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x79f4 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 24840] TCP segment data (1380 bytes) Frame 1108: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797563357 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797563357 seconds [Time delta from previous captured frame: 0.000017739 seconds] [Time delta from previous displayed frame: 0.000017739 seconds] [Time since reference or first frame: 76.999994504 seconds] Frame Number: 1108 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd388 (54152) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 109377, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 109377 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1107] [The RTT to ACK the segment was: 0.000017739 seconds] [iRTT: 0.003305578 seconds] Frame 1109: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797737298 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797737298 seconds [Time delta from previous captured frame: 0.000173941 seconds] [Time delta from previous displayed frame: 0.000173941 seconds] [Time since reference or first frame: 77.000168445 seconds] Frame Number: 1109 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff0 (28656) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f92 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 109377, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 109377 (relative sequence number) [Next sequence number: 110757 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x8c79 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 26220] TCP segment data (1380 bytes) Frame 1110: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797756075 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797756075 seconds [Time delta from previous captured frame: 0.000018777 seconds] [Time delta from previous displayed frame: 0.000018777 seconds] [Time since reference or first frame: 77.000187222 seconds] Frame Number: 1110 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd389 (54153) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 110757, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 110757 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1109] [The RTT to ACK the segment was: 0.000018777 seconds] [iRTT: 0.003305578 seconds] Frame 1111: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797771511 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797771511 seconds [Time delta from previous captured frame: 0.000015436 seconds] [Time delta from previous displayed frame: 0.000015436 seconds] [Time since reference or first frame: 77.000202658 seconds] Frame Number: 1111 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff1 (28657) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f91 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 110757, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 110757 (relative sequence number) [Next sequence number: 112137 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x23f2 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 27600] TCP segment data (1380 bytes) Frame 1112: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797788111 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797788111 seconds [Time delta from previous captured frame: 0.000016600 seconds] [Time delta from previous displayed frame: 0.000016600 seconds] [Time since reference or first frame: 77.000219258 seconds] Frame Number: 1112 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38a (54154) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 112137, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 112137 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1111] [The RTT to ACK the segment was: 0.000016600 seconds] [iRTT: 0.003305578 seconds] Frame 1113: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797957438 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797957438 seconds [Time delta from previous captured frame: 0.000169327 seconds] [Time delta from previous displayed frame: 0.000169327 seconds] [Time since reference or first frame: 77.000388585 seconds] Frame Number: 1113 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff2 (28658) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f90 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 112137, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 112137 (relative sequence number) [Next sequence number: 113517 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9e7a [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 28980] TCP segment data (1380 bytes) Frame 1114: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797974586 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797974586 seconds [Time delta from previous captured frame: 0.000017148 seconds] [Time delta from previous displayed frame: 0.000017148 seconds] [Time since reference or first frame: 77.000405733 seconds] Frame Number: 1114 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38b (54155) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 113517, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 113517 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1113] [The RTT to ACK the segment was: 0.000017148 seconds] [iRTT: 0.003305578 seconds] Frame 1115: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.797990072 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.797990072 seconds [Time delta from previous captured frame: 0.000015486 seconds] [Time delta from previous displayed frame: 0.000015486 seconds] [Time since reference or first frame: 77.000421219 seconds] Frame Number: 1115 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff3 (28659) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 113517, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 113517 (relative sequence number) [Next sequence number: 114897 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xff06 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 30360] TCP segment data (1380 bytes) Frame 1116: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798005270 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798005270 seconds [Time delta from previous captured frame: 0.000015198 seconds] [Time delta from previous displayed frame: 0.000015198 seconds] [Time since reference or first frame: 77.000436417 seconds] Frame Number: 1116 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38c (54156) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d5a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 114897, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 114897 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1115] [The RTT to ACK the segment was: 0.000015198 seconds] [iRTT: 0.003305578 seconds] Frame 1117: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798190808 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798190808 seconds [Time delta from previous captured frame: 0.000185538 seconds] [Time delta from previous displayed frame: 0.000185538 seconds] [Time since reference or first frame: 77.000621955 seconds] Frame Number: 1117 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff4 (28660) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 114897, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 114897 (relative sequence number) [Next sequence number: 116277 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0639 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 31740] TCP segment data (1380 bytes) Frame 1118: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798208870 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798208870 seconds [Time delta from previous captured frame: 0.000018062 seconds] [Time delta from previous displayed frame: 0.000018062 seconds] [Time since reference or first frame: 77.000640017 seconds] Frame Number: 1118 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38d (54157) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d59 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 116277, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 116277 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1117] [The RTT to ACK the segment was: 0.000018062 seconds] [iRTT: 0.003305578 seconds] Frame 1119: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798223662 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798223662 seconds [Time delta from previous captured frame: 0.000014792 seconds] [Time delta from previous displayed frame: 0.000014792 seconds] [Time since reference or first frame: 77.000654809 seconds] Frame Number: 1119 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff5 (28661) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8d [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 116277, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 116277 (relative sequence number) [Next sequence number: 117657 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x089d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 33120] TCP segment data (1134 bytes) TCP segment data (246 bytes) [12 Reassembled TCP Segments (16437 bytes): #1097(123), #1099(1380), #1101(1380), #1103(2760), #1105(1380), #1107(1380), #1109(1380), #1111(1380), #1113(1380), #1115(1380), #1117(1380), #1119(1134)] [Frame: 1097, payload: 0-122 (123 bytes)] [Frame: 1099, payload: 123-1502 (1380 bytes)] [Frame: 1101, payload: 1503-2882 (1380 bytes)] [Frame: 1103, payload: 2883-5642 (2760 bytes)] [Frame: 1105, payload: 5643-7022 (1380 bytes)] [Frame: 1107, payload: 7023-8402 (1380 bytes)] [Frame: 1109, payload: 8403-9782 (1380 bytes)] [Frame: 1111, payload: 9783-11162 (1380 bytes)] [Frame: 1113, payload: 11163-12542 (1380 bytes)] [Frame: 1115, payload: 12543-13922 (1380 bytes)] [Frame: 1117, payload: 13923-15302 (1380 bytes)] [Frame: 1119, payload: 15303-16436 (1134 bytes)] [Segment count: 12] [Reassembled TCP length: 16437] [Reassembled TCP Data: 1703034030a18aced9ba8f1d387d083af5aca53d4261a88d...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: a18aced9ba8f1d387d083af5aca53d4261a88d5d77dc519c... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1120: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798261836 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798261836 seconds [Time delta from previous captured frame: 0.000038174 seconds] [Time delta from previous displayed frame: 0.000038174 seconds] [Time since reference or first frame: 77.000692983 seconds] Frame Number: 1120 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38e (54158) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d58 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 117657, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 117657 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1119] [The RTT to ACK the segment was: 0.000038174 seconds] [iRTT: 0.003305578 seconds] Frame 1121: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798426570 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798426570 seconds [Time delta from previous captured frame: 0.000164734 seconds] [Time delta from previous displayed frame: 0.000164734 seconds] [Time since reference or first frame: 77.000857717 seconds] Frame Number: 1121 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff6 (28662) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 117657, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 117657 (relative sequence number) [Next sequence number: 119037 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc572 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 34500] TCP segment data (1380 bytes) Frame 1122: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798446025 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798446025 seconds [Time delta from previous captured frame: 0.000019455 seconds] [Time delta from previous displayed frame: 0.000019455 seconds] [Time since reference or first frame: 77.000877172 seconds] Frame Number: 1122 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd38f (54159) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d57 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 119037, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 119037 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1121] [The RTT to ACK the segment was: 0.000019455 seconds] [iRTT: 0.003305578 seconds] Frame 1123: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798457889 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798457889 seconds [Time delta from previous captured frame: 0.000011864 seconds] [Time delta from previous displayed frame: 0.000011864 seconds] [Time since reference or first frame: 77.000889036 seconds] Frame Number: 1123 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff7 (28663) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8b [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 119037, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 119037 (relative sequence number) [Next sequence number: 120417 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe6cb [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 35880] TCP segment data (1380 bytes) Frame 1124: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798473534 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798473534 seconds [Time delta from previous captured frame: 0.000015645 seconds] [Time delta from previous displayed frame: 0.000015645 seconds] [Time since reference or first frame: 77.000904681 seconds] Frame Number: 1124 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd390 (54160) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d56 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 120417, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 120417 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1123] [The RTT to ACK the segment was: 0.000015645 seconds] [iRTT: 0.003305578 seconds] Frame 1125: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798659822 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798659822 seconds [Time delta from previous captured frame: 0.000186288 seconds] [Time delta from previous displayed frame: 0.000186288 seconds] [Time since reference or first frame: 77.001090969 seconds] Frame Number: 1125 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff8 (28664) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f8a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 120417, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 120417 (relative sequence number) [Next sequence number: 121797 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdeb4 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 37260] TCP segment data (1380 bytes) Frame 1126: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798679159 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798679159 seconds [Time delta from previous captured frame: 0.000019337 seconds] [Time delta from previous displayed frame: 0.000019337 seconds] [Time since reference or first frame: 77.001110306 seconds] Frame Number: 1126 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd391 (54161) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d55 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 121797, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 121797 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1125] [The RTT to ACK the segment was: 0.000019337 seconds] [iRTT: 0.003305578 seconds] Frame 1127: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798843496 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798843496 seconds [Time delta from previous captured frame: 0.000164337 seconds] [Time delta from previous displayed frame: 0.000164337 seconds] [Time since reference or first frame: 77.001274643 seconds] Frame Number: 1127 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ff9 (28665) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f89 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 121797, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 121797 (relative sequence number) [Next sequence number: 123177 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x80a8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 38640] TCP segment data (1380 bytes) Frame 1128: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798860828 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798860828 seconds [Time delta from previous captured frame: 0.000017332 seconds] [Time delta from previous displayed frame: 0.000017332 seconds] [Time since reference or first frame: 77.001291975 seconds] Frame Number: 1128 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd392 (54162) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d54 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 123177, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 123177 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1127] [The RTT to ACK the segment was: 0.000017332 seconds] [iRTT: 0.003305578 seconds] Frame 1129: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798877043 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798877043 seconds [Time delta from previous captured frame: 0.000016215 seconds] [Time delta from previous displayed frame: 0.000016215 seconds] [Time since reference or first frame: 77.001308190 seconds] Frame Number: 1129 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ffa (28666) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f88 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 123177, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 123177 (relative sequence number) [Next sequence number: 124557 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfe44 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 40020] TCP segment data (1380 bytes) Frame 1130: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.798894141 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.798894141 seconds [Time delta from previous captured frame: 0.000017098 seconds] [Time delta from previous displayed frame: 0.000017098 seconds] [Time since reference or first frame: 77.001325288 seconds] Frame Number: 1130 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd393 (54163) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d53 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 124557, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 124557 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1129] [The RTT to ACK the segment was: 0.000017098 seconds] [iRTT: 0.003305578 seconds] Frame 1131: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799076480 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799076480 seconds [Time delta from previous captured frame: 0.000182339 seconds] [Time delta from previous displayed frame: 0.000182339 seconds] [Time since reference or first frame: 77.001507627 seconds] Frame Number: 1131 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ffb (28667) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f87 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 124557, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 124557 (relative sequence number) [Next sequence number: 125937 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0f66 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 41400] TCP segment data (1380 bytes) Frame 1132: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799094131 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799094131 seconds [Time delta from previous captured frame: 0.000017651 seconds] [Time delta from previous displayed frame: 0.000017651 seconds] [Time since reference or first frame: 77.001525278 seconds] Frame Number: 1132 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd394 (54164) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d52 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 125937, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 125937 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1131] [The RTT to ACK the segment was: 0.000017651 seconds] [iRTT: 0.003305578 seconds] Frame 1133: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799108683 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799108683 seconds [Time delta from previous captured frame: 0.000014552 seconds] [Time delta from previous displayed frame: 0.000014552 seconds] [Time since reference or first frame: 77.001539830 seconds] Frame Number: 1133 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x6ffc (28668) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x6f86 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 125937, Ack: 11831, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 125937 (relative sequence number) [Next sequence number: 127317 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x3484 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 42780] TCP segment data (1380 bytes) Frame 1134: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799123904 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799123904 seconds [Time delta from previous captured frame: 0.000015221 seconds] [Time delta from previous displayed frame: 0.000015221 seconds] [Time since reference or first frame: 77.001555051 seconds] Frame Number: 1134 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd395 (54165) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d51 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 127317, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 127317 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1133] [The RTT to ACK the segment was: 0.000015221 seconds] [iRTT: 0.003305578 seconds] Frame 1135: 1115 bytes on wire (8920 bits), 1115 bytes captured (8920 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799281231 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799281231 seconds [Time delta from previous captured frame: 0.000157327 seconds] [Time delta from previous displayed frame: 0.000157327 seconds] [Time since reference or first frame: 77.001712378 seconds] Frame Number: 1135 Frame Length: 1115 bytes (8920 bits) Capture Length: 1115 bytes (8920 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:media] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1099 Identification: 0x6ffd (28669) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x70c6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 127317, Ack: 11831, Len: 1059 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1059] Sequence number: 127317 (relative sequence number) [Next sequence number: 128376 (relative sequence number)] Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf75d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1059] [Bytes sent since last PSH flag: 43839] TCP segment data (1059 bytes) [9 Reassembled TCP Segments (10965 bytes): #1119(246), #1121(1380), #1123(1380), #1125(1380), #1127(1380), #1129(1380), #1131(1380), #1133(1380), #1135(1059)] [Frame: 1119, payload: 0-245 (246 bytes)] [Frame: 1121, payload: 246-1625 (1380 bytes)] [Frame: 1123, payload: 1626-3005 (1380 bytes)] [Frame: 1125, payload: 3006-4385 (1380 bytes)] [Frame: 1127, payload: 4386-5765 (1380 bytes)] [Frame: 1129, payload: 5766-7145 (1380 bytes)] [Frame: 1131, payload: 7146-8525 (1380 bytes)] [Frame: 1133, payload: 8526-9905 (1380 bytes)] [Frame: 1135, payload: 9906-10964 (1059 bytes)] [Segment count: 9] [Reassembled TCP length: 10965] [Reassembled TCP Data: 1703032ad075e40b4579457524cae5dc22efa7faeb827eb7...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 10960 Encrypted Application Data: 75e40b4579457524cae5dc22efa7faeb827eb749dcf126d2... SSL segment data (10913 bytes) [3 Reassembled SSL segments (43681 bytes): #1097(16384), #1119(16384), #1135(10913)] [Frame: 1097, payload: 0-16383 (16384 bytes)] [Frame: 1119, payload: 16384-32767 (16384 bytes)] [Frame: 1135, payload: 32768-43680 (10913 bytes)] [Segment count: 3] [Reassembled PDU length: 43681] [Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...] Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: application/pdf\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: f952686a-3930-41c0-afcb-438f579bc8eb\r\n Content-Disposition: attachment; filename="424888813.pdf"\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:31:06 GMT\r\n Content-Length: 43358\r\n [Content length: 43358] \r\n [HTTP response 9/9] [Time since request: 0.325024859 seconds] [Prev request in frame: 885] [Prev response in frame: 947] [Request in frame: 1073] File Data: 43358 bytes Media Type Media type: application/pdf (43358 bytes) Frame 1136: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:30:51.799298304 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724251.799298304 seconds [Time delta from previous captured frame: 0.000017073 seconds] [Time delta from previous displayed frame: 0.000017073 seconds] [Time since reference or first frame: 77.001729451 seconds] Frame Number: 1136 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd396 (54166) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d50 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 128376, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11831 (relative sequence number) Acknowledgment number: 128376 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1135] [The RTT to ACK the segment was: 0.000017073 seconds] [iRTT: 0.003305578 seconds] Frame 1180: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:02.297672802 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724262.297672802 seconds [Time delta from previous captured frame: 0.171309183 seconds] [Time delta from previous displayed frame: 10.498374498 seconds] [Time since reference or first frame: 87.500103949 seconds] Frame Number: 1180 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd397 (54167) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d4f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11830, Ack: 128376, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11830 (relative sequence number) Acknowledgment number: 128376 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1181: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:02.300563451 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724262.300563451 seconds [Time delta from previous captured frame: 0.002890649 seconds] [Time delta from previous displayed frame: 0.002890649 seconds] [Time since reference or first frame: 87.502994598 seconds] Frame Number: 1181 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 15dfee11 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x71ed (29165) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0x72f9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 11831, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 128376 (relative sequence number) Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb1bf [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 63243 Src Port: 63243 Frame 1202: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:12.537643566 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724272.537643566 seconds [Time delta from previous captured frame: 0.611686018 seconds] [Time delta from previous displayed frame: 10.237080115 seconds] [Time since reference or first frame: 97.740074713 seconds] Frame Number: 1202 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd398 (54168) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d4e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11830, Ack: 128376, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 11830 (relative sequence number) Acknowledgment number: 128376 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1203: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:12.540331065 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724272.540331065 seconds [Time delta from previous captured frame: 0.002687499 seconds] [Time delta from previous displayed frame: 0.002687499 seconds] [Time since reference or first frame: 97.742762212 seconds] Frame Number: 1203 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: f0246e88 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x03e1 (993) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xe105 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 11831, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 128376 (relative sequence number) Acknowledgment number: 11831 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb1bf [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 55395 Src Port: 55395 Frame 1223: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:17.957213066 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724277.957213066 seconds [Time delta from previous captured frame: 0.000280947 seconds] [Time delta from previous displayed frame: 5.416882001 seconds] [Time since reference or first frame: 103.159644213 seconds] Frame Number: 1223 Frame Length: 1325 bytes (10600 bits) Capture Length: 1325 bytes (10600 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1309 Identification: 0xd399 (54169) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4858 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 11831, Ack: 128376, Len: 1269 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1269] Sequence number: 11831 (relative sequence number) [Next sequence number: 13100 (relative sequence number)] Acknowledgment number: 128376 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1ef9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1269] [Bytes sent since last PSH flag: 1269] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1264 Encrypted Application Data: 1de03765c5bc93dfc7e28d4e1ce4323f692db0504dd09fd2... Hypertext Transfer Protocol GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf HTTP/1.1\r\n] [GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf Request URI Path: /racuni/pregled-racuna-pdf Request URI Query: serviceid=12018216&metaid=431372012&filename=431372012.pdf Request URI Query Parameter: serviceid=12018216 Request URI Query Parameter: metaid=431372012 Request URI Query Parameter: filename=431372012.pdf Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=431372012&filename=431372012.pdf] [HTTP request 10/10] [Prev request in frame: 1073] Frame 1226: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.018995769 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.018995769 seconds [Time delta from previous captured frame: 0.032120897 seconds] [Time delta from previous displayed frame: 0.061782703 seconds] [Time since reference or first frame: 103.221426916 seconds] Frame Number: 1226 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 9d0aae13 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x1761 (5985) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xcd85 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 13100, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 128376 (relative sequence number) Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb1bf [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1223] [The RTT to ACK the segment was: 0.061782703 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 33769 Src Port: 33769 Frame 1229: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.357946505 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.357946505 seconds [Time delta from previous captured frame: 0.116225971 seconds] [Time delta from previous displayed frame: 0.338950736 seconds] [Time since reference or first frame: 103.560377652 seconds] Frame Number: 1229 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x1767 (5991) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc2b7 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 128376, Ack: 13100, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 128376 (relative sequence number) [Next sequence number: 131136 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 2760] TCP segment data (2760 bytes) Secure Sockets Layer Frame 1230: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358118225 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358118225 seconds [Time delta from previous captured frame: 0.000171720 seconds] [Time delta from previous displayed frame: 0.000171720 seconds] [Time since reference or first frame: 103.560549372 seconds] Frame Number: 1230 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39a (54170) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d4c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 131136, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 131136 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1229] [The RTT to ACK the segment was: 0.000171720 seconds] [iRTT: 0.003305578 seconds] Frame 1231: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358303779 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358303779 seconds [Time delta from previous captured frame: 0.000185554 seconds] [Time delta from previous displayed frame: 0.000185554 seconds] [Time since reference or first frame: 103.560734926 seconds] Frame Number: 1231 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x1769 (5993) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc2b5 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 131136, Ack: 13100, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 131136 (relative sequence number) [Next sequence number: 133896 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 5520] TCP segment data (2760 bytes) Frame 1232: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358376562 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358376562 seconds [Time delta from previous captured frame: 0.000072783 seconds] [Time delta from previous displayed frame: 0.000072783 seconds] [Time since reference or first frame: 103.560807709 seconds] Frame Number: 1232 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x176b (5995) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc817 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 133896, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 133896 (relative sequence number) [Next sequence number: 135276 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc653 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 4140] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 1233: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358415527 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358415527 seconds [Time delta from previous captured frame: 0.000038965 seconds] [Time delta from previous displayed frame: 0.000038965 seconds] [Time since reference or first frame: 103.560846674 seconds] Frame Number: 1233 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x176c (5996) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc816 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 135276, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 135276 (relative sequence number) [Next sequence number: 136656 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x717f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 5520] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 1234: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358452577 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358452577 seconds [Time delta from previous captured frame: 0.000037050 seconds] [Time delta from previous displayed frame: 0.000037050 seconds] [Time since reference or first frame: 103.560883724 seconds] Frame Number: 1234 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39b (54171) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d4b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 133896, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 133896 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1231] [The RTT to ACK the segment was: 0.000148798 seconds] [iRTT: 0.003305578 seconds] Frame 1235: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358478392 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358478392 seconds [Time delta from previous captured frame: 0.000025815 seconds] [Time delta from previous displayed frame: 0.000025815 seconds] [Time since reference or first frame: 103.560909539 seconds] Frame Number: 1235 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39c (54172) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d4a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 135276, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 135276 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1232] [The RTT to ACK the segment was: 0.000101830 seconds] [iRTT: 0.003305578 seconds] Frame 1236: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358499028 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358499028 seconds [Time delta from previous captured frame: 0.000020636 seconds] [Time delta from previous displayed frame: 0.000020636 seconds] [Time since reference or first frame: 103.560930175 seconds] Frame Number: 1236 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39d (54173) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d49 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 136656, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 136656 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1233] [The RTT to ACK the segment was: 0.000083501 seconds] [iRTT: 0.003305578 seconds] Frame 1237: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358632941 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358632941 seconds [Time delta from previous captured frame: 0.000133913 seconds] [Time delta from previous displayed frame: 0.000133913 seconds] [Time since reference or first frame: 103.561064088 seconds] Frame Number: 1237 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x176d (5997) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc815 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 136656, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 136656 (relative sequence number) [Next sequence number: 138036 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x27e8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 1238: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358681401 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358681401 seconds [Time delta from previous captured frame: 0.000048460 seconds] [Time delta from previous displayed frame: 0.000048460 seconds] [Time since reference or first frame: 103.561112548 seconds] Frame Number: 1238 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39e (54174) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d48 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 138036, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 138036 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1237] [The RTT to ACK the segment was: 0.000048460 seconds] [iRTT: 0.003305578 seconds] Frame 1239: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358705064 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358705064 seconds [Time delta from previous captured frame: 0.000023663 seconds] [Time delta from previous displayed frame: 0.000023663 seconds] [Time since reference or first frame: 103.561136211 seconds] Frame Number: 1239 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x176e (5998) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc814 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 138036, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 138036 (relative sequence number) [Next sequence number: 139416 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x73be [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 1240: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358766554 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358766554 seconds [Time delta from previous captured frame: 0.000061490 seconds] [Time delta from previous displayed frame: 0.000061490 seconds] [Time since reference or first frame: 103.561197701 seconds] Frame Number: 1240 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd39f (54175) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d47 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 139416, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 139416 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1239] [The RTT to ACK the segment was: 0.000061490 seconds] [iRTT: 0.003305578 seconds] Frame 1241: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358871028 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358871028 seconds [Time delta from previous captured frame: 0.000104474 seconds] [Time delta from previous displayed frame: 0.000104474 seconds] [Time since reference or first frame: 103.561302175 seconds] Frame Number: 1241 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x176f (5999) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc813 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 139416, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 139416 (relative sequence number) [Next sequence number: 140796 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb98f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 12420] TCP segment data (1380 bytes) Frame 1242: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358919180 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358919180 seconds [Time delta from previous captured frame: 0.000048152 seconds] [Time delta from previous displayed frame: 0.000048152 seconds] [Time since reference or first frame: 103.561350327 seconds] Frame Number: 1242 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a0 (54176) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d46 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 140796, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 140796 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1241] [The RTT to ACK the segment was: 0.000048152 seconds] [iRTT: 0.003305578 seconds] Frame 1243: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358947529 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358947529 seconds [Time delta from previous captured frame: 0.000028349 seconds] [Time delta from previous displayed frame: 0.000028349 seconds] [Time since reference or first frame: 103.561378676 seconds] Frame Number: 1243 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1770 (6000) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc812 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 140796, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 140796 (relative sequence number) [Next sequence number: 142176 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x666f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 13800] TCP segment data (1380 bytes) Frame 1244: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.358989051 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.358989051 seconds [Time delta from previous captured frame: 0.000041522 seconds] [Time delta from previous displayed frame: 0.000041522 seconds] [Time since reference or first frame: 103.561420198 seconds] Frame Number: 1244 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a1 (54177) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d45 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 142176, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 142176 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1243] [The RTT to ACK the segment was: 0.000041522 seconds] [iRTT: 0.003305578 seconds] Frame 1245: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359101219 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359101219 seconds [Time delta from previous captured frame: 0.000112168 seconds] [Time delta from previous displayed frame: 0.000112168 seconds] [Time since reference or first frame: 103.561532366 seconds] Frame Number: 1245 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1771 (6001) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc811 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 142176, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 142176 (relative sequence number) [Next sequence number: 143556 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfd4c [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 15180] TCP segment data (1380 bytes) Frame 1246: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359146935 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359146935 seconds [Time delta from previous captured frame: 0.000045716 seconds] [Time delta from previous displayed frame: 0.000045716 seconds] [Time since reference or first frame: 103.561578082 seconds] Frame Number: 1246 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a2 (54178) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d44 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 143556, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 143556 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1245] [The RTT to ACK the segment was: 0.000045716 seconds] [iRTT: 0.003305578 seconds] Frame 1247: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359168912 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359168912 seconds [Time delta from previous captured frame: 0.000021977 seconds] [Time delta from previous displayed frame: 0.000021977 seconds] [Time since reference or first frame: 103.561600059 seconds] Frame Number: 1247 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1772 (6002) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc810 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 143556, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 143556 (relative sequence number) [Next sequence number: 144936 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xef26 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 16560] TCP segment data (1257 bytes) TCP segment data (123 bytes) [10 Reassembled TCP Segments (16437 bytes): #1229(2760), #1231(2760), #1232(1380), #1233(1380), #1237(1380), #1239(1380), #1241(1380), #1243(1380), #1245(1380), #1247(1257)] [Frame: 1229, payload: 0-2759 (2760 bytes)] [Frame: 1231, payload: 2760-5519 (2760 bytes)] [Frame: 1232, payload: 5520-6899 (1380 bytes)] [Frame: 1233, payload: 6900-8279 (1380 bytes)] [Frame: 1237, payload: 8280-9659 (1380 bytes)] [Frame: 1239, payload: 9660-11039 (1380 bytes)] [Frame: 1241, payload: 11040-12419 (1380 bytes)] [Frame: 1243, payload: 12420-13799 (1380 bytes)] [Frame: 1245, payload: 13800-15179 (1380 bytes)] [Frame: 1247, payload: 15180-16436 (1257 bytes)] [Segment count: 10] [Reassembled TCP length: 16437] [Reassembled TCP Data: 1703034030297e6a7edbc823c45e3a18b19f70eb4ac5e9f1...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: 297e6a7edbc823c45e3a18b19f70eb4ac5e9f17c98fd687e... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1248: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359209307 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359209307 seconds [Time delta from previous captured frame: 0.000040395 seconds] [Time delta from previous displayed frame: 0.000040395 seconds] [Time since reference or first frame: 103.561640454 seconds] Frame Number: 1248 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a3 (54179) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d43 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 144936, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 144936 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1247] [The RTT to ACK the segment was: 0.000040395 seconds] [iRTT: 0.003305578 seconds] Frame 1249: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359335068 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359335068 seconds [Time delta from previous captured frame: 0.000125761 seconds] [Time delta from previous displayed frame: 0.000125761 seconds] [Time since reference or first frame: 103.561766215 seconds] Frame Number: 1249 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1773 (6003) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 144936, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 144936 (relative sequence number) [Next sequence number: 146316 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc92e [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 17940] TCP segment data (1380 bytes) Frame 1250: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359379526 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359379526 seconds [Time delta from previous captured frame: 0.000044458 seconds] [Time delta from previous displayed frame: 0.000044458 seconds] [Time since reference or first frame: 103.561810673 seconds] Frame Number: 1250 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a4 (54180) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d42 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 146316, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 146316 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1249] [The RTT to ACK the segment was: 0.000044458 seconds] [iRTT: 0.003305578 seconds] Frame 1251: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359522449 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359522449 seconds [Time delta from previous captured frame: 0.000142923 seconds] [Time delta from previous displayed frame: 0.000142923 seconds] [Time since reference or first frame: 103.561953596 seconds] Frame Number: 1251 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1774 (6004) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 146316, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 146316 (relative sequence number) [Next sequence number: 147696 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x06d5 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 19320] TCP segment data (1380 bytes) Frame 1252: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359581317 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359581317 seconds [Time delta from previous captured frame: 0.000058868 seconds] [Time delta from previous displayed frame: 0.000058868 seconds] [Time since reference or first frame: 103.562012464 seconds] Frame Number: 1252 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a5 (54181) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d41 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 147696, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 147696 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1251] [The RTT to ACK the segment was: 0.000058868 seconds] [iRTT: 0.003305578 seconds] Frame 1253: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359604601 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359604601 seconds [Time delta from previous captured frame: 0.000023284 seconds] [Time delta from previous displayed frame: 0.000023284 seconds] [Time since reference or first frame: 103.562035748 seconds] Frame Number: 1253 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1775 (6005) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80d [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 147696, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 147696 (relative sequence number) [Next sequence number: 149076 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5979 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 20700] TCP segment data (1380 bytes) Frame 1254: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359642051 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359642051 seconds [Time delta from previous captured frame: 0.000037450 seconds] [Time delta from previous displayed frame: 0.000037450 seconds] [Time since reference or first frame: 103.562073198 seconds] Frame Number: 1254 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a6 (54182) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d40 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 149076, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 149076 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1253] [The RTT to ACK the segment was: 0.000037450 seconds] [iRTT: 0.003305578 seconds] Frame 1255: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359754254 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359754254 seconds [Time delta from previous captured frame: 0.000112203 seconds] [Time delta from previous displayed frame: 0.000112203 seconds] [Time since reference or first frame: 103.562185401 seconds] Frame Number: 1255 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1776 (6006) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 149076, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 149076 (relative sequence number) [Next sequence number: 150456 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe3c1 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 22080] TCP segment data (1380 bytes) Frame 1256: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359793184 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359793184 seconds [Time delta from previous captured frame: 0.000038930 seconds] [Time delta from previous displayed frame: 0.000038930 seconds] [Time since reference or first frame: 103.562224331 seconds] Frame Number: 1256 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a7 (54183) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 150456, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 150456 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1255] [The RTT to ACK the segment was: 0.000038930 seconds] [iRTT: 0.003305578 seconds] Frame 1257: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359838241 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359838241 seconds [Time delta from previous captured frame: 0.000045057 seconds] [Time delta from previous displayed frame: 0.000045057 seconds] [Time since reference or first frame: 103.562269388 seconds] Frame Number: 1257 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1777 (6007) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80b [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 150456, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 150456 (relative sequence number) [Next sequence number: 151836 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xcddd [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 23460] TCP segment data (1380 bytes) Frame 1258: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359881949 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359881949 seconds [Time delta from previous captured frame: 0.000043708 seconds] [Time delta from previous displayed frame: 0.000043708 seconds] [Time since reference or first frame: 103.562313096 seconds] Frame Number: 1258 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a8 (54184) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 151836, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 151836 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1257] [The RTT to ACK the segment was: 0.000043708 seconds] [iRTT: 0.003305578 seconds] Frame 1259: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.359990309 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.359990309 seconds [Time delta from previous captured frame: 0.000108360 seconds] [Time delta from previous displayed frame: 0.000108360 seconds] [Time since reference or first frame: 103.562421456 seconds] Frame Number: 1259 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1778 (6008) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc80a [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 151836, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 151836 (relative sequence number) [Next sequence number: 153216 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5658 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 24840] TCP segment data (1380 bytes) Frame 1260: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360029759 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360029759 seconds [Time delta from previous captured frame: 0.000039450 seconds] [Time delta from previous displayed frame: 0.000039450 seconds] [Time since reference or first frame: 103.562460906 seconds] Frame Number: 1260 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3a9 (54185) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 153216, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 153216 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1259] [The RTT to ACK the segment was: 0.000039450 seconds] [iRTT: 0.003305578 seconds] Frame 1261: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360051302 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360051302 seconds [Time delta from previous captured frame: 0.000021543 seconds] [Time delta from previous displayed frame: 0.000021543 seconds] [Time since reference or first frame: 103.562482449 seconds] Frame Number: 1261 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1779 (6009) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc809 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 153216, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 153216 (relative sequence number) [Next sequence number: 154596 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xccb8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 26220] TCP segment data (1380 bytes) Frame 1262: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360091357 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360091357 seconds [Time delta from previous captured frame: 0.000040055 seconds] [Time delta from previous displayed frame: 0.000040055 seconds] [Time since reference or first frame: 103.562522504 seconds] Frame Number: 1262 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3aa (54186) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 154596, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 154596 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1261] [The RTT to ACK the segment was: 0.000040055 seconds] [iRTT: 0.003305578 seconds] Frame 1263: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360221434 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360221434 seconds [Time delta from previous captured frame: 0.000130077 seconds] [Time delta from previous displayed frame: 0.000130077 seconds] [Time since reference or first frame: 103.562652581 seconds] Frame Number: 1263 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177a (6010) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc808 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 154596, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 154596 (relative sequence number) [Next sequence number: 155976 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x98ed [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 27600] TCP segment data (1380 bytes) Frame 1264: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360259969 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360259969 seconds [Time delta from previous captured frame: 0.000038535 seconds] [Time delta from previous displayed frame: 0.000038535 seconds] [Time since reference or first frame: 103.562691116 seconds] Frame Number: 1264 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ab (54187) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 155976, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 155976 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1263] [The RTT to ACK the segment was: 0.000038535 seconds] [iRTT: 0.003305578 seconds] Frame 1265: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360280665 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360280665 seconds [Time delta from previous captured frame: 0.000020696 seconds] [Time delta from previous displayed frame: 0.000020696 seconds] [Time since reference or first frame: 103.562711812 seconds] Frame Number: 1265 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177b (6011) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc807 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 155976, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 155976 (relative sequence number) [Next sequence number: 157356 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xecd1 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 28980] TCP segment data (1380 bytes) Frame 1266: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360321613 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360321613 seconds [Time delta from previous captured frame: 0.000040948 seconds] [Time delta from previous displayed frame: 0.000040948 seconds] [Time since reference or first frame: 103.562752760 seconds] Frame Number: 1266 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ac (54188) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d3a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 157356, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 157356 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1265] [The RTT to ACK the segment was: 0.000040948 seconds] [iRTT: 0.003305578 seconds] Frame 1267: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360454444 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360454444 seconds [Time delta from previous captured frame: 0.000132831 seconds] [Time delta from previous displayed frame: 0.000132831 seconds] [Time since reference or first frame: 103.562885591 seconds] Frame Number: 1267 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177c (6012) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc806 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 157356, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 157356 (relative sequence number) [Next sequence number: 158736 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc23e [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 30360] TCP segment data (1380 bytes) Frame 1268: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360492845 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360492845 seconds [Time delta from previous captured frame: 0.000038401 seconds] [Time delta from previous displayed frame: 0.000038401 seconds] [Time since reference or first frame: 103.562923992 seconds] Frame Number: 1268 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ad (54189) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d39 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 158736, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 158736 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1267] [The RTT to ACK the segment was: 0.000038401 seconds] [iRTT: 0.003305578 seconds] Frame 1269: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360513840 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360513840 seconds [Time delta from previous captured frame: 0.000020995 seconds] [Time delta from previous displayed frame: 0.000020995 seconds] [Time since reference or first frame: 103.562944987 seconds] Frame Number: 1269 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177d (6013) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc805 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 158736, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 158736 (relative sequence number) [Next sequence number: 160116 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x088a [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 31740] TCP segment data (1380 bytes) Frame 1270: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360573950 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360573950 seconds [Time delta from previous captured frame: 0.000060110 seconds] [Time delta from previous displayed frame: 0.000060110 seconds] [Time since reference or first frame: 103.563005097 seconds] Frame Number: 1270 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ae (54190) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d38 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 160116, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 160116 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1269] [The RTT to ACK the segment was: 0.000060110 seconds] [iRTT: 0.003305578 seconds] Frame 1271: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360625180 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360625180 seconds [Time delta from previous captured frame: 0.000051230 seconds] [Time delta from previous displayed frame: 0.000051230 seconds] [Time since reference or first frame: 103.563056327 seconds] Frame Number: 1271 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177e (6014) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc804 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 160116, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 160116 (relative sequence number) [Next sequence number: 161496 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xaf00 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 33120] TCP segment data (1134 bytes) TCP segment data (246 bytes) [13 Reassembled TCP Segments (16437 bytes): #1247(123), #1249(1380), #1251(1380), #1253(1380), #1255(1380), #1257(1380), #1259(1380), #1261(1380), #1263(1380), #1265(1380), #1267(1380), #1269(1380), #1271(1134)] [Frame: 1247, payload: 0-122 (123 bytes)] [Frame: 1249, payload: 123-1502 (1380 bytes)] [Frame: 1251, payload: 1503-2882 (1380 bytes)] [Frame: 1253, payload: 2883-4262 (1380 bytes)] [Frame: 1255, payload: 4263-5642 (1380 bytes)] [Frame: 1257, payload: 5643-7022 (1380 bytes)] [Frame: 1259, payload: 7023-8402 (1380 bytes)] [Frame: 1261, payload: 8403-9782 (1380 bytes)] [Frame: 1263, payload: 9783-11162 (1380 bytes)] [Frame: 1265, payload: 11163-12542 (1380 bytes)] [Frame: 1267, payload: 12543-13922 (1380 bytes)] [Frame: 1269, payload: 13923-15302 (1380 bytes)] [Frame: 1271, payload: 15303-16436 (1134 bytes)] [Segment count: 13] [Reassembled TCP length: 16437] [Reassembled TCP Data: 1703034030add682fee4293188f3d84adcc0f8190a0e1f55...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: add682fee4293188f3d84adcc0f8190a0e1f55eedad6189c... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1272: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360663646 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360663646 seconds [Time delta from previous captured frame: 0.000038466 seconds] [Time delta from previous displayed frame: 0.000038466 seconds] [Time since reference or first frame: 103.563094793 seconds] Frame Number: 1272 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3af (54191) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d37 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 161496, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 161496 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1271] [The RTT to ACK the segment was: 0.000038466 seconds] [iRTT: 0.003305578 seconds] Frame 1273: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360805699 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360805699 seconds [Time delta from previous captured frame: 0.000142053 seconds] [Time delta from previous displayed frame: 0.000142053 seconds] [Time since reference or first frame: 103.563236846 seconds] Frame Number: 1273 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x177f (6015) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc803 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 161496, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 161496 (relative sequence number) [Next sequence number: 162876 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe813 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 34500] TCP segment data (1380 bytes) Frame 1274: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360845997 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360845997 seconds [Time delta from previous captured frame: 0.000040298 seconds] [Time delta from previous displayed frame: 0.000040298 seconds] [Time since reference or first frame: 103.563277144 seconds] Frame Number: 1274 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b0 (54192) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d36 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 162876, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 162876 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1273] [The RTT to ACK the segment was: 0.000040298 seconds] [iRTT: 0.003305578 seconds] Frame 1275: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360867369 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360867369 seconds [Time delta from previous captured frame: 0.000021372 seconds] [Time delta from previous displayed frame: 0.000021372 seconds] [Time since reference or first frame: 103.563298516 seconds] Frame Number: 1275 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1780 (6016) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc802 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 162876, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 162876 (relative sequence number) [Next sequence number: 164256 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x940b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 35880] TCP segment data (1380 bytes) Frame 1276: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.360907698 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.360907698 seconds [Time delta from previous captured frame: 0.000040329 seconds] [Time delta from previous displayed frame: 0.000040329 seconds] [Time since reference or first frame: 103.563338845 seconds] Frame Number: 1276 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b1 (54193) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d35 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 164256, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 164256 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1275] [The RTT to ACK the segment was: 0.000040329 seconds] [iRTT: 0.003305578 seconds] Frame 1277: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361037731 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361037731 seconds [Time delta from previous captured frame: 0.000130033 seconds] [Time delta from previous displayed frame: 0.000130033 seconds] [Time since reference or first frame: 103.563468878 seconds] Frame Number: 1277 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1781 (6017) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc801 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 164256, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 164256 (relative sequence number) [Next sequence number: 165636 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc7a7 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 37260] TCP segment data (1380 bytes) Frame 1278: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361080384 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361080384 seconds [Time delta from previous captured frame: 0.000042653 seconds] [Time delta from previous displayed frame: 0.000042653 seconds] [Time since reference or first frame: 103.563511531 seconds] Frame Number: 1278 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b2 (54194) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d34 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 165636, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 165636 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1277] [The RTT to ACK the segment was: 0.000042653 seconds] [iRTT: 0.003305578 seconds] Frame 1279: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361101975 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361101975 seconds [Time delta from previous captured frame: 0.000021591 seconds] [Time delta from previous displayed frame: 0.000021591 seconds] [Time since reference or first frame: 103.563533122 seconds] Frame Number: 1279 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1782 (6018) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc800 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 165636, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 165636 (relative sequence number) [Next sequence number: 167016 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1518 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 38640] TCP segment data (1380 bytes) Frame 1280: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361142049 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361142049 seconds [Time delta from previous captured frame: 0.000040074 seconds] [Time delta from previous displayed frame: 0.000040074 seconds] [Time since reference or first frame: 103.563573196 seconds] Frame Number: 1280 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b3 (54195) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d33 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 167016, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 167016 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1279] [The RTT to ACK the segment was: 0.000040074 seconds] [iRTT: 0.003305578 seconds] Frame 1281: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361272537 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361272537 seconds [Time delta from previous captured frame: 0.000130488 seconds] [Time delta from previous displayed frame: 0.000130488 seconds] [Time since reference or first frame: 103.563703684 seconds] Frame Number: 1281 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1783 (6019) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7ff [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 167016, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 167016 (relative sequence number) [Next sequence number: 168396 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdada [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 40020] TCP segment data (1380 bytes) Frame 1282: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361314548 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361314548 seconds [Time delta from previous captured frame: 0.000042011 seconds] [Time delta from previous displayed frame: 0.000042011 seconds] [Time since reference or first frame: 103.563745695 seconds] Frame Number: 1282 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b4 (54196) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d32 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 168396, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 168396 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1281] [The RTT to ACK the segment was: 0.000042011 seconds] [iRTT: 0.003305578 seconds] Frame 1283: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361335258 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361335258 seconds [Time delta from previous captured frame: 0.000020710 seconds] [Time delta from previous displayed frame: 0.000020710 seconds] [Time since reference or first frame: 103.563766405 seconds] Frame Number: 1283 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1784 (6020) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7fe [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 168396, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 168396 (relative sequence number) [Next sequence number: 169776 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xdf24 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 41400] TCP segment data (1380 bytes) Frame 1284: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361374741 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361374741 seconds [Time delta from previous captured frame: 0.000039483 seconds] [Time delta from previous displayed frame: 0.000039483 seconds] [Time since reference or first frame: 103.563805888 seconds] Frame Number: 1284 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b5 (54197) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d31 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 169776, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 169776 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1283] [The RTT to ACK the segment was: 0.000039483 seconds] [iRTT: 0.003305578 seconds] Frame 1285: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361504019 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361504019 seconds [Time delta from previous captured frame: 0.000129278 seconds] [Time delta from previous displayed frame: 0.000129278 seconds] [Time since reference or first frame: 103.563935166 seconds] Frame Number: 1285 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1785 (6021) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7fd [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 169776, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 169776 (relative sequence number) [Next sequence number: 171156 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x167b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 42780] TCP segment data (1380 bytes) Frame 1286: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361572157 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361572157 seconds [Time delta from previous captured frame: 0.000068138 seconds] [Time delta from previous displayed frame: 0.000068138 seconds] [Time since reference or first frame: 103.564003304 seconds] Frame Number: 1286 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b6 (54198) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d30 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 171156, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 171156 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1285] [The RTT to ACK the segment was: 0.000068138 seconds] [iRTT: 0.003305578 seconds] Frame 1287: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361594618 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361594618 seconds [Time delta from previous captured frame: 0.000022461 seconds] [Time delta from previous displayed frame: 0.000022461 seconds] [Time since reference or first frame: 103.564025765 seconds] Frame Number: 1287 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1786 (6022) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7fc [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 171156, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 171156 (relative sequence number) [Next sequence number: 172536 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x88ce [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 44160] TCP segment data (1380 bytes) Frame 1288: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361636037 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361636037 seconds [Time delta from previous captured frame: 0.000041419 seconds] [Time delta from previous displayed frame: 0.000041419 seconds] [Time since reference or first frame: 103.564067184 seconds] Frame Number: 1288 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b7 (54199) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 172536, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 172536 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1287] [The RTT to ACK the segment was: 0.000041419 seconds] [iRTT: 0.003305578 seconds] Frame 1289: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361737904 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361737904 seconds [Time delta from previous captured frame: 0.000101867 seconds] [Time delta from previous displayed frame: 0.000101867 seconds] [Time since reference or first frame: 103.564169051 seconds] Frame Number: 1289 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1787 (6023) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7fb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 172536, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 172536 (relative sequence number) [Next sequence number: 173916 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x03e6 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 45540] TCP segment data (1380 bytes) Frame 1290: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361778931 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361778931 seconds [Time delta from previous captured frame: 0.000041027 seconds] [Time delta from previous displayed frame: 0.000041027 seconds] [Time since reference or first frame: 103.564210078 seconds] Frame Number: 1290 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b8 (54200) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 173916, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 173916 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1289] [The RTT to ACK the segment was: 0.000041027 seconds] [iRTT: 0.003305578 seconds] Frame 1291: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361845526 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361845526 seconds [Time delta from previous captured frame: 0.000066595 seconds] [Time delta from previous displayed frame: 0.000066595 seconds] [Time since reference or first frame: 103.564276673 seconds] Frame Number: 1291 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x1788 (6024) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc7fa [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 173916, Ack: 13100, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 173916 (relative sequence number) [Next sequence number: 175296 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1d7f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 46920] TCP segment data (1380 bytes) Frame 1292: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361917629 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361917629 seconds [Time delta from previous captured frame: 0.000072103 seconds] [Time delta from previous displayed frame: 0.000072103 seconds] [Time since reference or first frame: 103.564348776 seconds] Frame Number: 1292 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3b9 (54201) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 175296, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 175296 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1291] [The RTT to ACK the segment was: 0.000072103 seconds] [iRTT: 0.003305578 seconds] Frame 1293: 2207 bytes on wire (17656 bits), 2207 bytes captured (17656 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.361973608 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.361973608 seconds [Time delta from previous captured frame: 0.000055979 seconds] [Time delta from previous displayed frame: 0.000055979 seconds] [Time since reference or first frame: 103.564404755 seconds] Frame Number: 1293 Frame Length: 2207 bytes (17656 bits) Capture Length: 2207 bytes (17656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:media] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2191 Identification: 0x1789 (6025) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xc4f6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 175296, Ack: 13100, Len: 2151 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2151] Sequence number: 175296 (relative sequence number) [Next sequence number: 177447 (relative sequence number)] Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x226b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2151] [Bytes sent since last PSH flag: 49071] TCP segment data (2151 bytes) [12 Reassembled TCP Segments (16197 bytes): #1271(246), #1273(1380), #1275(1380), #1277(1380), #1279(1380), #1281(1380), #1283(1380), #1285(1380), #1287(1380), #1289(1380), #1291(1380), #1293(2151)] [Frame: 1271, payload: 0-245 (246 bytes)] [Frame: 1273, payload: 246-1625 (1380 bytes)] [Frame: 1275, payload: 1626-3005 (1380 bytes)] [Frame: 1277, payload: 3006-4385 (1380 bytes)] [Frame: 1279, payload: 4386-5765 (1380 bytes)] [Frame: 1281, payload: 5766-7145 (1380 bytes)] [Frame: 1283, payload: 7146-8525 (1380 bytes)] [Frame: 1285, payload: 8526-9905 (1380 bytes)] [Frame: 1287, payload: 9906-11285 (1380 bytes)] [Frame: 1289, payload: 11286-12665 (1380 bytes)] [Frame: 1291, payload: 12666-14045 (1380 bytes)] [Frame: 1293, payload: 14046-16196 (2151 bytes)] [Segment count: 12] [Reassembled TCP length: 16197] [Reassembled TCP Data: 1703033f4021b2022279ba0f518472eb936f474c8b2d22db...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16192 Encrypted Application Data: 21b2022279ba0f518472eb936f474c8b2d22db61d05aca31... SSL segment data (16140 bytes) [3 Reassembled SSL segments (48908 bytes): #1247(16384), #1271(16384), #1293(16140)] [Frame: 1247, payload: 0-16383 (16384 bytes)] [Frame: 1271, payload: 16384-32767 (16384 bytes)] [Frame: 1293, payload: 32768-48907 (16140 bytes)] [Segment count: 3] [Reassembled PDU length: 48908] [Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...] Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: application/pdf\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 91bf3b3d-07c6-412e-a6f0-300e6a3a2702\r\n Content-Disposition: attachment; filename="431372012.pdf"\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:31:32 GMT\r\n Content-Length: 48585\r\n [Content length: 48585] \r\n [HTTP response 10/10] [Time since request: 0.404760542 seconds] [Prev request in frame: 1073] [Prev response in frame: 1135] [Request in frame: 1223] File Data: 48585 bytes Media Type Media type: application/pdf (48585 bytes) Frame 1294: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:18.362019309 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724278.362019309 seconds [Time delta from previous captured frame: 0.000045701 seconds] [Time delta from previous displayed frame: 0.000045701 seconds] [Time since reference or first frame: 103.564450456 seconds] Frame Number: 1294 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ba (54202) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 177447, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13100 (relative sequence number) Acknowledgment number: 177447 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1293] [The RTT to ACK the segment was: 0.000045701 seconds] [iRTT: 0.003305578 seconds] Frame 1319: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:28.409632426 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724288.409632426 seconds [Time delta from previous captured frame: 0.017567978 seconds] [Time delta from previous displayed frame: 10.047613117 seconds] [Time since reference or first frame: 113.612063573 seconds] Frame Number: 1319 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3bb (54203) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13099, Ack: 177447, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13099 (relative sequence number) Acknowledgment number: 177447 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1320: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:28.412355101 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724288.412355101 seconds [Time delta from previous captured frame: 0.002722675 seconds] [Time delta from previous displayed frame: 0.002722675 seconds] [Time since reference or first frame: 113.614786248 seconds] Frame Number: 1320 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: fb47cbf5 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3068 (12392) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb47e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 13100, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 177447 (relative sequence number) Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf20f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 64193 Src Port: 64193 Frame 1354: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:38.649640447 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724298.649640447 seconds [Time delta from previous captured frame: 0.468298115 seconds] [Time delta from previous displayed frame: 10.237285346 seconds] [Time since reference or first frame: 123.852071594 seconds] Frame Number: 1354 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3bc (54204) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d2a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13099, Ack: 177447, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 13099 (relative sequence number) Acknowledgment number: 177447 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1355: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:38.652724908 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724298.652724908 seconds [Time delta from previous captured frame: 0.003084461 seconds] [Time delta from previous displayed frame: 0.003084461 seconds] [Time since reference or first frame: 123.855156055 seconds] Frame Number: 1355 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 5576ce1d Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3077 (12407) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb46f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 13100, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 177447 (relative sequence number) Acknowledgment number: 13100 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63591 [Calculated window size: 63591] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf20f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 22493 Src Port: 22493 Frame 1358: 1325 bytes on wire (10600 bits), 1325 bytes captured (10600 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.217500075 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.217500075 seconds [Time delta from previous captured frame: 0.236751841 seconds] [Time delta from previous displayed frame: 1.564775167 seconds] [Time since reference or first frame: 125.419931222 seconds] Frame Number: 1358 Frame Length: 1325 bytes (10600 bits) Capture Length: 1325 bytes (10600 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1309 Identification: 0xd3bd (54205) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4834 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 13100, Ack: 177447, Len: 1269 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1269] Sequence number: 13100 (relative sequence number) [Next sequence number: 14369 (relative sequence number)] Acknowledgment number: 177447 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1ef9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1269] [Bytes sent since last PSH flag: 1269] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1264 Encrypted Application Data: f1d1eb837385f8e09eb785d2a5446264602af9695d26248c... Hypertext Transfer Protocol GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf HTTP/1.1\r\n] [GET /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf Request URI Path: /racuni/pregled-racuna-pdf Request URI Query: serviceid=12018216&metaid=435518423&filename=435518423.pdf Request URI Query Parameter: serviceid=12018216 Request URI Query Parameter: metaid=435518423 Request URI Query Parameter: filename=435518423.pdf Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni/pregled-racuna-pdf?serviceid=12018216&metaid=435518423&filename=435518423.pdf] [HTTP request 11/11] [Prev request in frame: 1223] Frame 1359: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.269378822 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.269378822 seconds [Time delta from previous captured frame: 0.051878747 seconds] [Time delta from previous displayed frame: 0.051878747 seconds] [Time since reference or first frame: 125.471809969 seconds] Frame Number: 1359 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: a034ae88 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3078 (12408) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb46e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 14369, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 177447 (relative sequence number) Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe825 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1358] [The RTT to ACK the segment was: 0.051878747 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 157 Src Port: 157 Frame 1364: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548307411 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548307411 seconds [Time delta from previous captured frame: 0.198776111 seconds] [Time delta from previous displayed frame: 0.278928589 seconds] [Time since reference or first frame: 125.750738558 seconds] Frame Number: 1364 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x307a (12410) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf08 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 177447, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 177447 (relative sequence number) [Next sequence number: 178827 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x59b2 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 1380] TCP segment data (1380 bytes) Secure Sockets Layer Frame 1365: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548378690 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548378690 seconds [Time delta from previous captured frame: 0.000071279 seconds] [Time delta from previous displayed frame: 0.000071279 seconds] [Time since reference or first frame: 125.750809837 seconds] Frame Number: 1365 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3be (54206) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d28 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 178827, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 178827 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1364] [The RTT to ACK the segment was: 0.000071279 seconds] [iRTT: 0.003305578 seconds] Frame 1366: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548397692 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548397692 seconds [Time delta from previous captured frame: 0.000019002 seconds] [Time delta from previous displayed frame: 0.000019002 seconds] [Time since reference or first frame: 125.750828839 seconds] Frame Number: 1366 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x307b (12411) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf07 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 178827, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 178827 (relative sequence number) [Next sequence number: 180207 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7626 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 2760] TCP segment data (1380 bytes) Frame 1367: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548418583 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548418583 seconds [Time delta from previous captured frame: 0.000020891 seconds] [Time delta from previous displayed frame: 0.000020891 seconds] [Time since reference or first frame: 125.750849730 seconds] Frame Number: 1367 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3bf (54207) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d27 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 180207, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 180207 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1366] [The RTT to ACK the segment was: 0.000020891 seconds] [iRTT: 0.003305578 seconds] Frame 1368: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548533294 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548533294 seconds [Time delta from previous captured frame: 0.000114711 seconds] [Time delta from previous displayed frame: 0.000114711 seconds] [Time since reference or first frame: 125.750964441 seconds] Frame Number: 1368 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x307c (12412) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf06 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 180207, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 180207 (relative sequence number) [Next sequence number: 181587 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x49c3 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 4140] TCP segment data (1380 bytes) Frame 1369: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548555788 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548555788 seconds [Time delta from previous captured frame: 0.000022494 seconds] [Time delta from previous displayed frame: 0.000022494 seconds] [Time since reference or first frame: 125.750986935 seconds] Frame Number: 1369 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3c0 (54208) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d26 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 181587, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 181587 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1368] [The RTT to ACK the segment was: 0.000022494 seconds] [iRTT: 0.003305578 seconds] Frame 1370: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548571955 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548571955 seconds [Time delta from previous captured frame: 0.000016167 seconds] [Time delta from previous displayed frame: 0.000016167 seconds] [Time since reference or first frame: 125.751003102 seconds] Frame Number: 1370 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x307d (12413) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf05 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 181587, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 181587 (relative sequence number) [Next sequence number: 182967 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x7511 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 5520] TCP segment data (1380 bytes) Frame 1371: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548589330 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548589330 seconds [Time delta from previous captured frame: 0.000017375 seconds] [Time delta from previous displayed frame: 0.000017375 seconds] [Time since reference or first frame: 125.751020477 seconds] Frame Number: 1371 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3c1 (54209) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d25 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 182967, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 182967 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1370] [The RTT to ACK the segment was: 0.000017375 seconds] [iRTT: 0.003305578 seconds] Frame 1372: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548764433 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548764433 seconds [Time delta from previous captured frame: 0.000175103 seconds] [Time delta from previous displayed frame: 0.000175103 seconds] [Time since reference or first frame: 125.751195580 seconds] Frame Number: 1372 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x307e (12414) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf04 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 182967, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 182967 (relative sequence number) [Next sequence number: 184347 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfbd5 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 6900] TCP segment data (1380 bytes) Frame 1373: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.548783031 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.548783031 seconds [Time delta from previous captured frame: 0.000018598 seconds] [Time delta from previous displayed frame: 0.000018598 seconds] [Time since reference or first frame: 125.751214178 seconds] Frame Number: 1373 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3c2 (54210) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d24 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 184347, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 184347 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1372] [The RTT to ACK the segment was: 0.000018598 seconds] [iRTT: 0.003305578 seconds] Frame 1374: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550003209 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550003209 seconds [Time delta from previous captured frame: 0.001220178 seconds] [Time delta from previous displayed frame: 0.001220178 seconds] [Time since reference or first frame: 125.752434356 seconds] Frame Number: 1374 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x307f (12415) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf03 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 184347, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 184347 (relative sequence number) [Next sequence number: 185727 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9296 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 8280] TCP segment data (1380 bytes) Frame 1375: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550037736 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550037736 seconds [Time delta from previous captured frame: 0.000034527 seconds] [Time delta from previous displayed frame: 0.000034527 seconds] [Time since reference or first frame: 125.752468883 seconds] Frame Number: 1375 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3c3 (54211) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d23 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 185727, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 185727 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1374] [The RTT to ACK the segment was: 0.000034527 seconds] [iRTT: 0.003305578 seconds] Frame 1376: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550060337 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550060337 seconds [Time delta from previous captured frame: 0.000022601 seconds] [Time delta from previous displayed frame: 0.000022601 seconds] [Time since reference or first frame: 125.752491484 seconds] Frame Number: 1376 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3080 (12416) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf02 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 185727, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 185727 (relative sequence number) [Next sequence number: 187107 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5b3d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 1377: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550077773 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550077773 seconds [Time delta from previous captured frame: 0.000017436 seconds] [Time delta from previous displayed frame: 0.000017436 seconds] [Time since reference or first frame: 125.752508920 seconds] Frame Number: 1377 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3c4 (54212) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d22 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 187107, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 187107 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1376] [The RTT to ACK the segment was: 0.000017436 seconds] [iRTT: 0.003305578 seconds] Frame 1378: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550234803 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550234803 seconds [Time delta from previous captured frame: 0.000157030 seconds] [Time delta from previous displayed frame: 0.000157030 seconds] [Time since reference or first frame: 125.752665950 seconds] Frame Number: 1378 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3081 (12417) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf01 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 187107, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 187107 (relative sequence number) [Next sequence number: 188487 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9446 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 1379: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550252904 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550252904 seconds [Time delta from previous captured frame: 0.000018101 seconds] [Time delta from previous displayed frame: 0.000018101 seconds] [Time since reference or first frame: 125.752684051 seconds] Frame Number: 1379 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3c5 (54213) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d21 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 188487, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 188487 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1378] [The RTT to ACK the segment was: 0.000018101 seconds] [iRTT: 0.003305578 seconds] Frame 1380: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550268587 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550268587 seconds [Time delta from previous captured frame: 0.000015683 seconds] [Time delta from previous displayed frame: 0.000015683 seconds] [Time since reference or first frame: 125.752699734 seconds] Frame Number: 1380 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3082 (12418) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaf00 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 188487, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 188487 (relative sequence number) [Next sequence number: 189867 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x97f5 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 12420] TCP segment data (1380 bytes) Frame 1381: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550285207 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550285207 seconds [Time delta from previous captured frame: 0.000016620 seconds] [Time delta from previous displayed frame: 0.000016620 seconds] [Time since reference or first frame: 125.752716354 seconds] Frame Number: 1381 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3c6 (54214) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d20 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 189867, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 189867 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1380] [The RTT to ACK the segment was: 0.000016620 seconds] [iRTT: 0.003305578 seconds] Frame 1382: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550468459 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550468459 seconds [Time delta from previous captured frame: 0.000183252 seconds] [Time delta from previous displayed frame: 0.000183252 seconds] [Time since reference or first frame: 125.752899606 seconds] Frame Number: 1382 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3083 (12419) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaeff [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 189867, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 189867 (relative sequence number) [Next sequence number: 191247 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0713 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 13800] TCP segment data (1380 bytes) Frame 1383: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550484352 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550484352 seconds [Time delta from previous captured frame: 0.000015893 seconds] [Time delta from previous displayed frame: 0.000015893 seconds] [Time since reference or first frame: 125.752915499 seconds] Frame Number: 1383 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3c7 (54215) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d1f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 191247, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 191247 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1382] [The RTT to ACK the segment was: 0.000015893 seconds] [iRTT: 0.003305578 seconds] Frame 1384: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550501512 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550501512 seconds [Time delta from previous captured frame: 0.000017160 seconds] [Time delta from previous displayed frame: 0.000017160 seconds] [Time since reference or first frame: 125.752932659 seconds] Frame Number: 1384 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3084 (12420) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaefe [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 191247, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 191247 (relative sequence number) [Next sequence number: 192627 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1557 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 15180] TCP segment data (1380 bytes) Frame 1385: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550522244 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550522244 seconds [Time delta from previous captured frame: 0.000020732 seconds] [Time delta from previous displayed frame: 0.000020732 seconds] [Time since reference or first frame: 125.752953391 seconds] Frame Number: 1385 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3c8 (54216) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d1e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 192627, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 192627 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1384] [The RTT to ACK the segment was: 0.000020732 seconds] [iRTT: 0.003305578 seconds] Frame 1386: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550702633 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550702633 seconds [Time delta from previous captured frame: 0.000180389 seconds] [Time delta from previous displayed frame: 0.000180389 seconds] [Time since reference or first frame: 125.753133780 seconds] Frame Number: 1386 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3085 (12421) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaefd [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 192627, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 192627 (relative sequence number) [Next sequence number: 194007 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x931b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 16560] TCP segment data (1257 bytes) TCP segment data (123 bytes) [12 Reassembled TCP Segments (16437 bytes): #1364(1380), #1366(1380), #1368(1380), #1370(1380), #1372(1380), #1374(1380), #1376(1380), #1378(1380), #1380(1380), #1382(1380), #1384(1380), #1386(1257)] [Frame: 1364, payload: 0-1379 (1380 bytes)] [Frame: 1366, payload: 1380-2759 (1380 bytes)] [Frame: 1368, payload: 2760-4139 (1380 bytes)] [Frame: 1370, payload: 4140-5519 (1380 bytes)] [Frame: 1372, payload: 5520-6899 (1380 bytes)] [Frame: 1374, payload: 6900-8279 (1380 bytes)] [Frame: 1376, payload: 8280-9659 (1380 bytes)] [Frame: 1378, payload: 9660-11039 (1380 bytes)] [Frame: 1380, payload: 11040-12419 (1380 bytes)] [Frame: 1382, payload: 12420-13799 (1380 bytes)] [Frame: 1384, payload: 13800-15179 (1380 bytes)] [Frame: 1386, payload: 15180-16436 (1257 bytes)] [Segment count: 12] [Reassembled TCP length: 16437] [Reassembled TCP Data: 1703034030e3aeb244098d76b46527b3dbf04a245f1954c9...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: e3aeb244098d76b46527b3dbf04a245f1954c9dec1a842e1... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1387: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550722691 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550722691 seconds [Time delta from previous captured frame: 0.000020058 seconds] [Time delta from previous displayed frame: 0.000020058 seconds] [Time since reference or first frame: 125.753153838 seconds] Frame Number: 1387 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3c9 (54217) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d1d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 194007, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 194007 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1386] [The RTT to ACK the segment was: 0.000020058 seconds] [iRTT: 0.003305578 seconds] Frame 1388: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550738791 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550738791 seconds [Time delta from previous captured frame: 0.000016100 seconds] [Time delta from previous displayed frame: 0.000016100 seconds] [Time since reference or first frame: 125.753169938 seconds] Frame Number: 1388 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3086 (12422) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaefc [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 194007, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 194007 (relative sequence number) [Next sequence number: 195387 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x488a [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 17940] TCP segment data (1380 bytes) Frame 1389: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550755306 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550755306 seconds [Time delta from previous captured frame: 0.000016515 seconds] [Time delta from previous displayed frame: 0.000016515 seconds] [Time since reference or first frame: 125.753186453 seconds] Frame Number: 1389 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ca (54218) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d1c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 195387, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 195387 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1388] [The RTT to ACK the segment was: 0.000016515 seconds] [iRTT: 0.003305578 seconds] Frame 1390: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550933928 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550933928 seconds [Time delta from previous captured frame: 0.000178622 seconds] [Time delta from previous displayed frame: 0.000178622 seconds] [Time since reference or first frame: 125.753365075 seconds] Frame Number: 1390 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3087 (12423) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaefb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 195387, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 195387 (relative sequence number) [Next sequence number: 196767 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xa463 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 19320] TCP segment data (1380 bytes) Frame 1391: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550950394 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550950394 seconds [Time delta from previous captured frame: 0.000016466 seconds] [Time delta from previous displayed frame: 0.000016466 seconds] [Time since reference or first frame: 125.753381541 seconds] Frame Number: 1391 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3cb (54219) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d1b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 196767, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 196767 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1390] [The RTT to ACK the segment was: 0.000016466 seconds] [iRTT: 0.003305578 seconds] Frame 1392: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550963839 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550963839 seconds [Time delta from previous captured frame: 0.000013445 seconds] [Time delta from previous displayed frame: 0.000013445 seconds] [Time since reference or first frame: 125.753394986 seconds] Frame Number: 1392 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3088 (12424) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaefa [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 196767, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 196767 (relative sequence number) [Next sequence number: 198147 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x40a4 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 20700] TCP segment data (1380 bytes) Frame 1393: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.550980951 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.550980951 seconds [Time delta from previous captured frame: 0.000017112 seconds] [Time delta from previous displayed frame: 0.000017112 seconds] [Time since reference or first frame: 125.753412098 seconds] Frame Number: 1393 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3cc (54220) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d1a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 198147, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 198147 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1392] [The RTT to ACK the segment was: 0.000017112 seconds] [iRTT: 0.003305578 seconds] Frame 1394: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551179977 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551179977 seconds [Time delta from previous captured frame: 0.000199026 seconds] [Time delta from previous displayed frame: 0.000199026 seconds] [Time since reference or first frame: 125.753611124 seconds] Frame Number: 1394 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3089 (12425) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaef9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 198147, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 198147 (relative sequence number) [Next sequence number: 199527 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x93b9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 22080] TCP segment data (1380 bytes) Frame 1395: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551199365 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551199365 seconds [Time delta from previous captured frame: 0.000019388 seconds] [Time delta from previous displayed frame: 0.000019388 seconds] [Time since reference or first frame: 125.753630512 seconds] Frame Number: 1395 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3cd (54221) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d19 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 199527, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 199527 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1394] [The RTT to ACK the segment was: 0.000019388 seconds] [iRTT: 0.003305578 seconds] Frame 1396: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551212938 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551212938 seconds [Time delta from previous captured frame: 0.000013573 seconds] [Time delta from previous displayed frame: 0.000013573 seconds] [Time since reference or first frame: 125.753644085 seconds] Frame Number: 1396 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x308a (12426) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaef8 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 199527, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 199527 (relative sequence number) [Next sequence number: 200907 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb90e [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 23460] TCP segment data (1380 bytes) Frame 1397: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551229108 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551229108 seconds [Time delta from previous captured frame: 0.000016170 seconds] [Time delta from previous displayed frame: 0.000016170 seconds] [Time since reference or first frame: 125.753660255 seconds] Frame Number: 1397 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ce (54222) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d18 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 200907, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 200907 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1396] [The RTT to ACK the segment was: 0.000016170 seconds] [iRTT: 0.003305578 seconds] Frame 1398: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551403013 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551403013 seconds [Time delta from previous captured frame: 0.000173905 seconds] [Time delta from previous displayed frame: 0.000173905 seconds] [Time since reference or first frame: 125.753834160 seconds] Frame Number: 1398 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x308b (12427) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaef7 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 200907, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 200907 (relative sequence number) [Next sequence number: 202287 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x08f1 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 24840] TCP segment data (1380 bytes) Frame 1399: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551425737 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551425737 seconds [Time delta from previous captured frame: 0.000022724 seconds] [Time delta from previous displayed frame: 0.000022724 seconds] [Time since reference or first frame: 125.753856884 seconds] Frame Number: 1399 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3cf (54223) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d17 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 202287, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 202287 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1398] [The RTT to ACK the segment was: 0.000022724 seconds] [iRTT: 0.003305578 seconds] Frame 1400: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551438894 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551438894 seconds [Time delta from previous captured frame: 0.000013157 seconds] [Time delta from previous displayed frame: 0.000013157 seconds] [Time since reference or first frame: 125.753870041 seconds] Frame Number: 1400 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x308c (12428) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaef6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 202287, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 202287 (relative sequence number) [Next sequence number: 203667 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xc2c9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 26220] TCP segment data (1380 bytes) Frame 1401: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551458308 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551458308 seconds [Time delta from previous captured frame: 0.000019414 seconds] [Time delta from previous displayed frame: 0.000019414 seconds] [Time since reference or first frame: 125.753889455 seconds] Frame Number: 1401 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3d0 (54224) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d16 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 203667, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 203667 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1400] [The RTT to ACK the segment was: 0.000019414 seconds] [iRTT: 0.003305578 seconds] Frame 1402: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551636164 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551636164 seconds [Time delta from previous captured frame: 0.000177856 seconds] [Time delta from previous displayed frame: 0.000177856 seconds] [Time since reference or first frame: 125.754067311 seconds] Frame Number: 1402 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x308d (12429) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaef5 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 203667, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 203667 (relative sequence number) [Next sequence number: 205047 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xaf3f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 27600] TCP segment data (1380 bytes) Frame 1403: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551659326 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551659326 seconds [Time delta from previous captured frame: 0.000023162 seconds] [Time delta from previous displayed frame: 0.000023162 seconds] [Time since reference or first frame: 125.754090473 seconds] Frame Number: 1403 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3d1 (54225) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d15 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 205047, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 205047 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1402] [The RTT to ACK the segment was: 0.000023162 seconds] [iRTT: 0.003305578 seconds] Frame 1404: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551673847 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551673847 seconds [Time delta from previous captured frame: 0.000014521 seconds] [Time delta from previous displayed frame: 0.000014521 seconds] [Time since reference or first frame: 125.754104994 seconds] Frame Number: 1404 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x308e (12430) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaef4 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 205047, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 205047 (relative sequence number) [Next sequence number: 206427 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2edb [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 28980] TCP segment data (1380 bytes) Frame 1405: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551866203 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551866203 seconds [Time delta from previous captured frame: 0.000192356 seconds] [Time delta from previous displayed frame: 0.000192356 seconds] [Time since reference or first frame: 125.754297350 seconds] Frame Number: 1405 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x308f (12431) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaef3 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 206427, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 206427 (relative sequence number) [Next sequence number: 207807 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x3216 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 30360] TCP segment data (1380 bytes) Frame 1406: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.551984892 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.551984892 seconds [Time delta from previous captured frame: 0.000118689 seconds] [Time delta from previous displayed frame: 0.000118689 seconds] [Time since reference or first frame: 125.754416039 seconds] Frame Number: 1406 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3090 (12432) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaef2 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 207807, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 207807 (relative sequence number) [Next sequence number: 209187 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xbcce [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 4140] [Bytes sent since last PSH flag: 31740] TCP segment data (1380 bytes) Frame 1407: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552032592 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552032592 seconds [Time delta from previous captured frame: 0.000047700 seconds] [Time delta from previous displayed frame: 0.000047700 seconds] [Time since reference or first frame: 125.754463739 seconds] Frame Number: 1407 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3d2 (54226) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d14 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 207807, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 207807 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1405] [The RTT to ACK the segment was: 0.000166389 seconds] [iRTT: 0.003305578 seconds] Frame 1408: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552104587 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552104587 seconds [Time delta from previous captured frame: 0.000071995 seconds] [Time delta from previous displayed frame: 0.000071995 seconds] [Time since reference or first frame: 125.754535734 seconds] Frame Number: 1408 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3091 (12433) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaef1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 209187, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 209187 (relative sequence number) [Next sequence number: 210567 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0f90 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 33120] TCP segment data (1134 bytes) TCP segment data (246 bytes) [13 Reassembled TCP Segments (16437 bytes): #1386(123), #1388(1380), #1390(1380), #1392(1380), #1394(1380), #1396(1380), #1398(1380), #1400(1380), #1402(1380), #1404(1380), #1405(1380), #1406(1380), #1408(1134)] [Frame: 1386, payload: 0-122 (123 bytes)] [Frame: 1388, payload: 123-1502 (1380 bytes)] [Frame: 1390, payload: 1503-2882 (1380 bytes)] [Frame: 1392, payload: 2883-4262 (1380 bytes)] [Frame: 1394, payload: 4263-5642 (1380 bytes)] [Frame: 1396, payload: 5643-7022 (1380 bytes)] [Frame: 1398, payload: 7023-8402 (1380 bytes)] [Frame: 1400, payload: 8403-9782 (1380 bytes)] [Frame: 1402, payload: 9783-11162 (1380 bytes)] [Frame: 1404, payload: 11163-12542 (1380 bytes)] [Frame: 1405, payload: 12543-13922 (1380 bytes)] [Frame: 1406, payload: 13923-15302 (1380 bytes)] [Frame: 1408, payload: 15303-16436 (1134 bytes)] [Segment count: 13] [Reassembled TCP length: 16437] [Reassembled TCP Data: 17030340304ff5aa0d1dbb02b4a9a22278461e82e65b572c...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: 4ff5aa0d1dbb02b4a9a22278461e82e65b572cd7e0ce503b... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1409: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552130087 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552130087 seconds [Time delta from previous captured frame: 0.000025500 seconds] [Time delta from previous displayed frame: 0.000025500 seconds] [Time since reference or first frame: 125.754561234 seconds] Frame Number: 1409 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3092 (12434) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaef0 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 210567, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 210567 (relative sequence number) [Next sequence number: 211947 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x6511 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 4140] [Bytes sent since last PSH flag: 34500] TCP segment data (1380 bytes) Frame 1410: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552162044 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552162044 seconds [Time delta from previous captured frame: 0.000031957 seconds] [Time delta from previous displayed frame: 0.000031957 seconds] [Time since reference or first frame: 125.754593191 seconds] Frame Number: 1410 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3d3 (54227) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d13 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 210567, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 210567 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1408] [The RTT to ACK the segment was: 0.000057457 seconds] [iRTT: 0.003305578 seconds] Frame 1411: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552335930 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552335930 seconds [Time delta from previous captured frame: 0.000173886 seconds] [Time delta from previous displayed frame: 0.000173886 seconds] [Time since reference or first frame: 125.754767077 seconds] Frame Number: 1411 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3093 (12435) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaeef [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 211947, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 211947 (relative sequence number) [Next sequence number: 213327 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x205b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 35880] TCP segment data (1380 bytes) Frame 1412: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552355400 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552355400 seconds [Time delta from previous captured frame: 0.000019470 seconds] [Time delta from previous displayed frame: 0.000019470 seconds] [Time since reference or first frame: 125.754786547 seconds] Frame Number: 1412 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3d4 (54228) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d12 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 213327, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 213327 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1411] [The RTT to ACK the segment was: 0.000019470 seconds] [iRTT: 0.003305578 seconds] Frame 1413: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552369575 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552369575 seconds [Time delta from previous captured frame: 0.000014175 seconds] [Time delta from previous displayed frame: 0.000014175 seconds] [Time since reference or first frame: 125.754800722 seconds] Frame Number: 1413 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3094 (12436) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaeee [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 213327, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 213327 (relative sequence number) [Next sequence number: 214707 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfb46 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 37260] TCP segment data (1380 bytes) Frame 1414: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552568097 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552568097 seconds [Time delta from previous captured frame: 0.000198522 seconds] [Time delta from previous displayed frame: 0.000198522 seconds] [Time since reference or first frame: 125.754999244 seconds] Frame Number: 1414 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3095 (12437) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaeed [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 214707, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 214707 (relative sequence number) [Next sequence number: 216087 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9b3a [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 38640] TCP segment data (1380 bytes) Frame 1415: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552584965 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552584965 seconds [Time delta from previous captured frame: 0.000016868 seconds] [Time delta from previous displayed frame: 0.000016868 seconds] [Time since reference or first frame: 125.755016112 seconds] Frame Number: 1415 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3d5 (54229) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d11 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 216087, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 216087 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1414] [The RTT to ACK the segment was: 0.000016868 seconds] [iRTT: 0.003305578 seconds] Frame 1416: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552599118 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552599118 seconds [Time delta from previous captured frame: 0.000014153 seconds] [Time delta from previous displayed frame: 0.000014153 seconds] [Time since reference or first frame: 125.755030265 seconds] Frame Number: 1416 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3096 (12438) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaeec [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 216087, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 216087 (relative sequence number) [Next sequence number: 217467 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xfe15 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 40020] TCP segment data (1380 bytes) Frame 1417: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552801572 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552801572 seconds [Time delta from previous captured frame: 0.000202454 seconds] [Time delta from previous displayed frame: 0.000202454 seconds] [Time since reference or first frame: 125.755232719 seconds] Frame Number: 1417 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3097 (12439) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaeeb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 217467, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 217467 (relative sequence number) [Next sequence number: 218847 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x0131 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 41400] TCP segment data (1380 bytes) Frame 1418: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552817609 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552817609 seconds [Time delta from previous captured frame: 0.000016037 seconds] [Time delta from previous displayed frame: 0.000016037 seconds] [Time since reference or first frame: 125.755248756 seconds] Frame Number: 1418 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3d6 (54230) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d10 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 218847, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 218847 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1417] [The RTT to ACK the segment was: 0.000016037 seconds] [iRTT: 0.003305578 seconds] Frame 1419: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.552852569 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.552852569 seconds [Time delta from previous captured frame: 0.000034960 seconds] [Time delta from previous displayed frame: 0.000034960 seconds] [Time since reference or first frame: 125.755283716 seconds] Frame Number: 1419 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3098 (12440) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaeea [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 218847, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 218847 (relative sequence number) [Next sequence number: 220227 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x507f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 42780] TCP segment data (1380 bytes) Frame 1420: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.553034771 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.553034771 seconds [Time delta from previous captured frame: 0.000182202 seconds] [Time delta from previous displayed frame: 0.000182202 seconds] [Time since reference or first frame: 125.755465918 seconds] Frame Number: 1420 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x3099 (12441) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaee9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 220227, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 220227 (relative sequence number) [Next sequence number: 221607 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xe58d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 44160] TCP segment data (1380 bytes) Frame 1421: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.553151879 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.553151879 seconds [Time delta from previous captured frame: 0.000117108 seconds] [Time delta from previous displayed frame: 0.000117108 seconds] [Time since reference or first frame: 125.755583026 seconds] Frame Number: 1421 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x309a (12442) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaee8 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 221607, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 221607 (relative sequence number) [Next sequence number: 222987 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x3340 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 4140] [Bytes sent since last PSH flag: 45540] TCP segment data (1380 bytes) Frame 1422: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.553230222 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.553230222 seconds [Time delta from previous captured frame: 0.000078343 seconds] [Time delta from previous displayed frame: 0.000078343 seconds] [Time since reference or first frame: 125.755661369 seconds] Frame Number: 1422 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3d7 (54231) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d0f [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 222987, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 222987 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1421] [The RTT to ACK the segment was: 0.000078343 seconds] [iRTT: 0.003305578 seconds] Frame 1423: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.553270611 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.553270611 seconds [Time delta from previous captured frame: 0.000040389 seconds] [Time delta from previous displayed frame: 0.000040389 seconds] [Time since reference or first frame: 125.755701758 seconds] Frame Number: 1423 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x309b (12443) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaee7 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 222987, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 222987 (relative sequence number) [Next sequence number: 224367 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x906f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 46920] TCP segment data (1380 bytes) Frame 1424: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.553294958 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.553294958 seconds [Time delta from previous captured frame: 0.000024347 seconds] [Time delta from previous displayed frame: 0.000024347 seconds] [Time since reference or first frame: 125.755726105 seconds] Frame Number: 1424 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x309c (12444) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xaee6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 224367, Ack: 14369, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 224367 (relative sequence number) [Next sequence number: 225747 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x090b [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 48300] TCP segment data (1380 bytes) Frame 1425: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.553311974 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.553311974 seconds [Time delta from previous captured frame: 0.000017016 seconds] [Time delta from previous displayed frame: 0.000017016 seconds] [Time since reference or first frame: 125.755743121 seconds] Frame Number: 1425 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3d8 (54232) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d0e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 225747, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 225747 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1424] [The RTT to ACK the segment was: 0.000017016 seconds] [iRTT: 0.003305578 seconds] Frame 1426: 587 bytes on wire (4696 bits), 587 bytes captured (4696 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.553430772 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.553430772 seconds [Time delta from previous captured frame: 0.000118798 seconds] [Time delta from previous displayed frame: 0.000118798 seconds] [Time since reference or first frame: 125.755861919 seconds] Frame Number: 1426 Frame Length: 587 bytes (4696 bits) Capture Length: 587 bytes (4696 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:media] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 571 Identification: 0x309d (12445) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb236 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 225747, Ack: 14369, Len: 531 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 531] Sequence number: 225747 (relative sequence number) [Next sequence number: 226278 (relative sequence number)] Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd9da [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 531] [Bytes sent since last PSH flag: 48831] TCP segment data (531 bytes) [13 Reassembled TCP Segments (15957 bytes): #1408(246), #1409(1380), #1411(1380), #1413(1380), #1414(1380), #1416(1380), #1417(1380), #1419(1380), #1420(1380), #1421(1380), #1423(1380), #1424(1380), #1426(531)] [Frame: 1408, payload: 0-245 (246 bytes)] [Frame: 1409, payload: 246-1625 (1380 bytes)] [Frame: 1411, payload: 1626-3005 (1380 bytes)] [Frame: 1413, payload: 3006-4385 (1380 bytes)] [Frame: 1414, payload: 4386-5765 (1380 bytes)] [Frame: 1416, payload: 5766-7145 (1380 bytes)] [Frame: 1417, payload: 7146-8525 (1380 bytes)] [Frame: 1419, payload: 8526-9905 (1380 bytes)] [Frame: 1420, payload: 9906-11285 (1380 bytes)] [Frame: 1421, payload: 11286-12665 (1380 bytes)] [Frame: 1423, payload: 12666-14045 (1380 bytes)] [Frame: 1424, payload: 14046-15425 (1380 bytes)] [Frame: 1426, payload: 15426-15956 (531 bytes)] [Segment count: 13] [Reassembled TCP length: 15957] [Reassembled TCP Data: 1703033e501dbd404e5087da80208e345dcada1cc389b5a0...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 15952 Encrypted Application Data: 1dbd404e5087da80208e345dcada1cc389b5a05d710ceb90... SSL segment data (15902 bytes) [3 Reassembled SSL segments (48670 bytes): #1386(16384), #1408(16384), #1426(15902)] [Frame: 1386, payload: 0-16383 (16384 bytes)] [Frame: 1408, payload: 16384-32767 (16384 bytes)] [Frame: 1426, payload: 32768-48669 (15902 bytes)] [Segment count: 3] [Reassembled PDU length: 48670] [Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...] Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: application/pdf\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 4f997372-c2ac-4010-86be-2c8c76c1001b\r\n Content-Disposition: attachment; filename="435518423.pdf"\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:31:55 GMT\r\n Content-Length: 48347\r\n [Content length: 48347] \r\n [HTTP response 11/11] [Time since request: 0.335930697 seconds] [Prev request in frame: 1223] [Prev response in frame: 1293] [Request in frame: 1358] File Data: 48347 bytes Media Type Media type: application/pdf (48347 bytes) Frame 1427: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:40.553510363 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724300.553510363 seconds [Time delta from previous captured frame: 0.000079591 seconds] [Time delta from previous displayed frame: 0.000079591 seconds] [Time since reference or first frame: 125.755941510 seconds] Frame Number: 1427 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3d9 (54233) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d0d [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 226278, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14369 (relative sequence number) Acknowledgment number: 226278 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1426] [The RTT to ACK the segment was: 0.000079591 seconds] [iRTT: 0.003305578 seconds] Frame 1445: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:50.553610195 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724310.553610195 seconds [Time delta from previous captured frame: 0.148012594 seconds] [Time delta from previous displayed frame: 10.000099832 seconds] [Time since reference or first frame: 135.756041342 seconds] Frame Number: 1445 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3da (54234) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d0c [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14368, Ack: 226278, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14368 (relative sequence number) Acknowledgment number: 226278 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1446: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:31:50.556750177 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724310.556750177 seconds [Time delta from previous captured frame: 0.003139982 seconds] [Time delta from previous displayed frame: 0.003139982 seconds] [Time since reference or first frame: 135.759181324 seconds] Frame Number: 1446 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 912d5192 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x30bf (12479) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb427 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 226278, Ack: 14369, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 226278 (relative sequence number) Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2966 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 35549 Src Port: 35549 Frame 1479: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:00.665593152 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724320.665593152 seconds [Time delta from previous captured frame: 0.036336606 seconds] [Time delta from previous displayed frame: 10.108842975 seconds] [Time since reference or first frame: 145.868024299 seconds] Frame Number: 1479 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3db (54235) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d0b [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14368, Ack: 226278, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14368 (relative sequence number) Acknowledgment number: 226278 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1480: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:00.668289204 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724320.668289204 seconds [Time delta from previous captured frame: 0.002696052 seconds] [Time delta from previous displayed frame: 0.002696052 seconds] [Time since reference or first frame: 145.870720351 seconds] Frame Number: 1480 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 83a9765a Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x30ce (12494) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb418 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 226278, Ack: 14369, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 226278 (relative sequence number) Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2966 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 61401 Src Port: 61401 Frame 1501: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:10.905608513 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724330.905608513 seconds [Time delta from previous captured frame: 0.174467985 seconds] [Time delta from previous displayed frame: 10.237319309 seconds] [Time since reference or first frame: 156.108039660 seconds] Frame Number: 1501 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3dc (54236) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d0a [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14368, Ack: 226278, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14368 (relative sequence number) Acknowledgment number: 226278 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1502: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:10.908287951 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724330.908287951 seconds [Time delta from previous captured frame: 0.002679438 seconds] [Time delta from previous displayed frame: 0.002679438 seconds] [Time since reference or first frame: 156.110719098 seconds] Frame Number: 1502 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 94d94406 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3107 (12551) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb3df [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 226278, Ack: 14369, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 226278 (relative sequence number) Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2966 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 2786 Src Port: 2786 Frame 1530: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:21.145631648 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724341.145631648 seconds [Time delta from previous captured frame: 0.410762178 seconds] [Time delta from previous displayed frame: 10.237343697 seconds] [Time since reference or first frame: 166.348062795 seconds] Frame Number: 1530 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3dd (54237) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d09 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14368, Ack: 226278, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14368 (relative sequence number) Acknowledgment number: 226278 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1531: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:21.148714243 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724341.148714243 seconds [Time delta from previous captured frame: 0.003082595 seconds] [Time delta from previous displayed frame: 0.003082595 seconds] [Time since reference or first frame: 166.351145390 seconds] Frame Number: 1531 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 9bea5423 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3128 (12584) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb3be [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 226278, Ack: 14369, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 226278 (relative sequence number) Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2966 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 7659 Src Port: 7659 Frame 1562: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:31.385612633 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724351.385612633 seconds [Time delta from previous captured frame: 0.347971546 seconds] [Time delta from previous displayed frame: 10.236898390 seconds] [Time since reference or first frame: 176.588043780 seconds] Frame Number: 1562 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3de (54238) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d08 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14368, Ack: 226278, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 14368 (relative sequence number) Acknowledgment number: 226278 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1563: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:31.389847951 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724351.389847951 seconds [Time delta from previous captured frame: 0.004235318 seconds] [Time delta from previous displayed frame: 0.004235318 seconds] [Time since reference or first frame: 176.592279098 seconds] Frame Number: 1563 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 04595e55 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3132 (12594) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb3b4 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 226278, Ack: 14369, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 226278 (relative sequence number) Acknowledgment number: 14369 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2966 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 45373 Src Port: 45373 Frame 1574: 1261 bytes on wire (10088 bits), 1261 bytes captured (10088 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:37.527837238 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724357.527837238 seconds [Time delta from previous captured frame: 0.127820881 seconds] [Time delta from previous displayed frame: 6.137989287 seconds] [Time since reference or first frame: 182.730268385 seconds] Frame Number: 1574 Frame Length: 1261 bytes (10088 bits) Capture Length: 1261 bytes (10088 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1245 Identification: 0xd3df (54239) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4852 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 14369, Ack: 226278, Len: 1205 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1205] Sequence number: 14369 (relative sequence number) [Next sequence number: 15574 (relative sequence number)] Acknowledgment number: 226278 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1eb9 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1205] [Bytes sent since last PSH flag: 1205] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1200 Encrypted Application Data: 809f47ba239ef8ad06aed1b27cd3249ad75639a6e17f7a61... Hypertext Transfer Protocol GET /racuni?serviceid=12018216 HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni?serviceid=12018216 HTTP/1.1\r\n] [GET /racuni?serviceid=12018216 HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni?serviceid=12018216 Request URI Path: /racuni Request URI Query: serviceid=12018216 Request URI Query Parameter: serviceid=12018216 Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmhy; _ceg.u=ogzmhy; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmhy Cookie pair: _ceg.u=ogzmhy Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216] [HTTP request 12/12] [Prev request in frame: 1358] Frame 1575: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:37.588459793 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724357.588459793 seconds [Time delta from previous captured frame: 0.060622555 seconds] [Time delta from previous displayed frame: 0.060622555 seconds] [Time since reference or first frame: 182.790890940 seconds] Frame Number: 1575 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: c91f16a3 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3168 (12648) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb37e [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 226278, Ack: 15574, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 226278 (relative sequence number) Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2966 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1574] [The RTT to ACK the segment was: 0.060622555 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 53049 Src Port: 53049 Frame 1591: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140131035 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140131035 seconds [Time delta from previous captured frame: 0.003353945 seconds] [Time delta from previous displayed frame: 4.551671242 seconds] [Time since reference or first frame: 187.342562182 seconds] Frame Number: 1591 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x31ae (12718) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xa870 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 226278, Ack: 15574, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 226278 (relative sequence number) [Next sequence number: 229038 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 2760] TCP segment data (2760 bytes) Secure Sockets Layer Frame 1592: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140277843 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140277843 seconds [Time delta from previous captured frame: 0.000146808 seconds] [Time delta from previous displayed frame: 0.000146808 seconds] [Time since reference or first frame: 187.342708990 seconds] Frame Number: 1592 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3e0 (54240) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d06 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 229038, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 229038 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1591] [The RTT to ACK the segment was: 0.000146808 seconds] [iRTT: 0.003305578 seconds] Frame 1593: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140334325 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140334325 seconds [Time delta from previous captured frame: 0.000056482 seconds] [Time delta from previous displayed frame: 0.000056482 seconds] [Time since reference or first frame: 187.342765472 seconds] Frame Number: 1593 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x31b0 (12720) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xadd2 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 229038, Ack: 15574, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 229038 (relative sequence number) [Next sequence number: 230418 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2ef3 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 4140] TCP segment data (1380 bytes) Frame 1594: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140387210 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140387210 seconds [Time delta from previous captured frame: 0.000052885 seconds] [Time delta from previous displayed frame: 0.000052885 seconds] [Time since reference or first frame: 187.342818357 seconds] Frame Number: 1594 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3e1 (54241) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d05 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 230418, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 230418 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1593] [The RTT to ACK the segment was: 0.000052885 seconds] [iRTT: 0.003305578 seconds] Frame 1595: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140410265 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140410265 seconds [Time delta from previous captured frame: 0.000023055 seconds] [Time delta from previous displayed frame: 0.000023055 seconds] [Time since reference or first frame: 187.342841412 seconds] Frame Number: 1595 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x31b1 (12721) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xadd1 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 230418, Ack: 15574, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 230418 (relative sequence number) [Next sequence number: 231798 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x9e93 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 5520] TCP segment data (1380 bytes) Frame 1596: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140456058 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140456058 seconds [Time delta from previous captured frame: 0.000045793 seconds] [Time delta from previous displayed frame: 0.000045793 seconds] [Time since reference or first frame: 187.342887205 seconds] Frame Number: 1596 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3e2 (54242) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d04 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 231798, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 231798 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1595] [The RTT to ACK the segment was: 0.000045793 seconds] [iRTT: 0.003305578 seconds] Frame 1597: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140581506 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140581506 seconds [Time delta from previous captured frame: 0.000125448 seconds] [Time delta from previous displayed frame: 0.000125448 seconds] [Time since reference or first frame: 187.343012653 seconds] Frame Number: 1597 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x31b2 (12722) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xa86c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 231798, Ack: 15574, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 231798 (relative sequence number) [Next sequence number: 234558 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 8280] TCP segment data (2760 bytes) Frame 1598: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140635590 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140635590 seconds [Time delta from previous captured frame: 0.000054084 seconds] [Time delta from previous displayed frame: 0.000054084 seconds] [Time since reference or first frame: 187.343066737 seconds] Frame Number: 1598 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3e3 (54243) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d03 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 234558, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 234558 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1597] [The RTT to ACK the segment was: 0.000054084 seconds] [iRTT: 0.003305578 seconds] Frame 1599: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140801798 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140801798 seconds [Time delta from previous captured frame: 0.000166208 seconds] [Time delta from previous displayed frame: 0.000166208 seconds] [Time since reference or first frame: 187.343232945 seconds] Frame Number: 1599 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x31b4 (12724) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xadce [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 234558, Ack: 15574, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 234558 (relative sequence number) [Next sequence number: 235938 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x617d [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 9660] TCP segment data (1380 bytes) Frame 1600: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140853815 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140853815 seconds [Time delta from previous captured frame: 0.000052017 seconds] [Time delta from previous displayed frame: 0.000052017 seconds] [Time since reference or first frame: 187.343284962 seconds] Frame Number: 1600 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3e4 (54244) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d02 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 235938, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 235938 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1599] [The RTT to ACK the segment was: 0.000052017 seconds] [iRTT: 0.003305578 seconds] Frame 1601: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140899676 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140899676 seconds [Time delta from previous captured frame: 0.000045861 seconds] [Time delta from previous displayed frame: 0.000045861 seconds] [Time since reference or first frame: 187.343330823 seconds] Frame Number: 1601 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x31b5 (12725) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xadcd [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 235938, Ack: 15574, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 235938 (relative sequence number) [Next sequence number: 237318 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xa601 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 11040] TCP segment data (1380 bytes) Frame 1602: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.140945055 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.140945055 seconds [Time delta from previous captured frame: 0.000045379 seconds] [Time delta from previous displayed frame: 0.000045379 seconds] [Time since reference or first frame: 187.343376202 seconds] Frame Number: 1602 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3e5 (54245) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d01 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 237318, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 237318 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1601] [The RTT to ACK the segment was: 0.000045379 seconds] [iRTT: 0.003305578 seconds] Frame 1603: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141032302 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141032302 seconds [Time delta from previous captured frame: 0.000087247 seconds] [Time delta from previous displayed frame: 0.000087247 seconds] [Time since reference or first frame: 187.343463449 seconds] Frame Number: 1603 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x31b6 (12726) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xadcc [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 237318, Ack: 15574, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 237318 (relative sequence number) [Next sequence number: 238698 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd526 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 12420] TCP segment data (1380 bytes) Frame 1604: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141079846 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141079846 seconds [Time delta from previous captured frame: 0.000047544 seconds] [Time delta from previous displayed frame: 0.000047544 seconds] [Time since reference or first frame: 187.343510993 seconds] Frame Number: 1604 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3e6 (54246) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4d00 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 238698, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 238698 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1603] [The RTT to ACK the segment was: 0.000047544 seconds] [iRTT: 0.003305578 seconds] Frame 1605: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141131078 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141131078 seconds [Time delta from previous captured frame: 0.000051232 seconds] [Time delta from previous displayed frame: 0.000051232 seconds] [Time since reference or first frame: 187.343562225 seconds] Frame Number: 1605 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x31b7 (12727) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xadcb [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 238698, Ack: 15574, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 238698 (relative sequence number) [Next sequence number: 240078 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb939 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 13800] TCP segment data (1380 bytes) Frame 1606: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141175642 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141175642 seconds [Time delta from previous captured frame: 0.000044564 seconds] [Time delta from previous displayed frame: 0.000044564 seconds] [Time since reference or first frame: 187.343606789 seconds] Frame Number: 1606 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3e7 (54247) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cff [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 240078, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 240078 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1605] [The RTT to ACK the segment was: 0.000044564 seconds] [iRTT: 0.003305578 seconds] Frame 1607: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141268370 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141268370 seconds [Time delta from previous captured frame: 0.000092728 seconds] [Time delta from previous displayed frame: 0.000092728 seconds] [Time since reference or first frame: 187.343699517 seconds] Frame Number: 1607 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x31b8 (12728) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xadca [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 240078, Ack: 15574, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 240078 (relative sequence number) [Next sequence number: 241458 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x6782 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 15180] TCP segment data (1380 bytes) Frame 1608: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141317687 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141317687 seconds [Time delta from previous captured frame: 0.000049317 seconds] [Time delta from previous displayed frame: 0.000049317 seconds] [Time since reference or first frame: 187.343748834 seconds] Frame Number: 1608 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3e8 (54248) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cfe [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 241458, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 241458 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1607] [The RTT to ACK the segment was: 0.000049317 seconds] [iRTT: 0.003305578 seconds] Frame 1609: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141362102 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141362102 seconds [Time delta from previous captured frame: 0.000044415 seconds] [Time delta from previous displayed frame: 0.000044415 seconds] [Time since reference or first frame: 187.343793249 seconds] Frame Number: 1609 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x31b9 (12729) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xadc9 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 241458, Ack: 15574, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 241458 (relative sequence number) [Next sequence number: 242838 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x3fa3 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 16560] TCP segment data (1257 bytes) TCP segment data (123 bytes) [10 Reassembled TCP Segments (16437 bytes): #1591(2760), #1593(1380), #1595(1380), #1597(2760), #1599(1380), #1601(1380), #1603(1380), #1605(1380), #1607(1380), #1609(1257)] [Frame: 1591, payload: 0-2759 (2760 bytes)] [Frame: 1593, payload: 2760-4139 (1380 bytes)] [Frame: 1595, payload: 4140-5519 (1380 bytes)] [Frame: 1597, payload: 5520-8279 (2760 bytes)] [Frame: 1599, payload: 8280-9659 (1380 bytes)] [Frame: 1601, payload: 9660-11039 (1380 bytes)] [Frame: 1603, payload: 11040-12419 (1380 bytes)] [Frame: 1605, payload: 12420-13799 (1380 bytes)] [Frame: 1607, payload: 13800-15179 (1380 bytes)] [Frame: 1609, payload: 15180-16436 (1257 bytes)] [Segment count: 10] [Reassembled TCP length: 16437] [Reassembled TCP Data: 1703034030c193aa62b2348b374f9337dd0775d40ada27c3...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 16432 Encrypted Application Data: c193aa62b2348b374f9337dd0775d40ada27c3ca6b015309... SSL segment data (16384 bytes) Secure Sockets Layer Frame 1610: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141437801 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141437801 seconds [Time delta from previous captured frame: 0.000075699 seconds] [Time delta from previous displayed frame: 0.000075699 seconds] [Time since reference or first frame: 187.343868948 seconds] Frame Number: 1610 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3e9 (54249) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cfd [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 242838, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 242838 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1609] [The RTT to ACK the segment was: 0.000075699 seconds] [iRTT: 0.003305578 seconds] Frame 1611: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141498803 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141498803 seconds [Time delta from previous captured frame: 0.000061002 seconds] [Time delta from previous displayed frame: 0.000061002 seconds] [Time since reference or first frame: 187.343929950 seconds] Frame Number: 1611 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x31ba (12730) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xadc8 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 242838, Ack: 15574, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 242838 (relative sequence number) [Next sequence number: 244218 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x837f [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 17940] TCP segment data (1380 bytes) Frame 1612: 1614 bytes on wire (12912 bits), 1614 bytes captured (12912 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141558027 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141558027 seconds [Time delta from previous captured frame: 0.000059224 seconds] [Time delta from previous displayed frame: 0.000059224 seconds] [Time since reference or first frame: 187.343989174 seconds] Frame Number: 1612 Frame Length: 1614 bytes (12912 bits) Capture Length: 1614 bytes (12912 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1598 Identification: 0x31bb (12731) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xad15 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 244218, Ack: 15574, Len: 1558 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1558] Sequence number: 244218 (relative sequence number) [Next sequence number: 245776 (relative sequence number)] Acknowledgment number: 15574 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63655 [Calculated window size: 63655] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x201a [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2938] [Bytes sent since last PSH flag: 19498] TCP segment data (1558 bytes) [3 Reassembled TCP Segments (3061 bytes): #1609(123), #1611(1380), #1612(1558)] [Frame: 1609, payload: 0-122 (123 bytes)] [Frame: 1611, payload: 123-1502 (1380 bytes)] [Frame: 1612, payload: 1503-3060 (1558 bytes)] [Segment count: 3] [Reassembled TCP length: 3061] [Reassembled TCP Data: 1703030bf027f4a847b3546304b90075999f2ca5022326ba...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 3056 Encrypted Application Data: 27f4a847b3546304b90075999f2ca5022326ba9b03da67f7... SSL segment data (3019 bytes) [2 Reassembled SSL segments (19403 bytes): #1609(16384), #1612(3019)] [Frame: 1609, payload: 0-16383 (16384 bytes)] [Frame: 1612, payload: 16384-19402 (3019 bytes)] [Segment count: 2] [Reassembled PDU length: 19403] [Reassembled PDU data: 485454502f312e3120323030204f4b0d0a43616368652d43...] Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: dfe76b3c-8a93-416c-a990-3887ba173f2a\r\n Set-Cookie: CurrentServiceId=12018216; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:32:56 GMT\r\n Content-Length: 19026\r\n [Content length: 19026] \r\n [HTTP response 12/12] [Time since request: 4.613720789 seconds] [Prev request in frame: 1358] [Prev response in frame: 1426] [Request in frame: 1574] Content-encoded entity body (gzip): 19026 bytes -> 59104 bytes File Data: 59104 bytes Line-based text data: text/html \n \n \n \tHT fiksni ra\304\215un br. 5019102951 \342\200\242 Moj Telekom\n \t\r\n \r\n \r\n \r\n \r\n \r\n \n \t\r\n \r\n \r\n \r\n \r\n \r\n \t\r\n \r\n \r\n \r\n \r\n \r\n \t\r\n \t\r\n \t\n \t\n \t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \n \t\t\n \t\t\t\n \t\n \t\n \t\n \t\n \t\n \t\n \t\n \t\n \n \n
\r\n
\r\n \r\n \r\n [truncated]\r\n //\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n [truncated]\r\n \r\n [truncated]\r\n \n \t\n \t\r\n \r\n \r\n
\r\n
\r\n

\r\n \r\n \r\n \r\n [truncated] \r\n \r\n \r\n
\r\n
\r\n \r\n \r\n \r\n \r\n
\r\n \r\n
\r\n
\r\n

Novo na MojT portalu

\r\n
\r\n

Od sada mo\305\276ete platiti HT ra\304\215une kreditnim i debitnim karticama direktno preko MojT portala.

\r\n

\r\n Nove uvjete kori\305\241tenja MojT portala mo\305\276ete pro\304\215itati ovdje\r\n

\r\n
\r\n
\r\n
\r\n \r\n U redu\r\n \r\n \r\n
\r\n
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \t
\n \t\t
\n \t\t\t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \t\t\t
\n \t\t\t\t\n \t\t\t\t\n \t\t\t\t
\n \t\t\t\t\n \n \t\t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\t
\r\n

\r\n \t\t\t\t\t\tRA\304\214UN ZA FIKSNE USLUGE BR. 5019102951

\r\n
\r\n
\r\n
\r\n
\r\n

\r\n \t\t\t\t\t\t\tVa\305\241i ra\304\215uni za prethodni mjesec su u pripremi i bit \304\207e Vam dostupni na Moj Telekom Portalu od
\r\n \t\t\t\t\t\t\tHvala Vam \305\241to koristite E-ra\304\215un i poma\305\276ete nam o\304\215uvati prirodu!\r\n \t\t\t\t\t\t\t

\r\n
\r\n
\r\n
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \302\240\r\n \t\t\t\t\t\t\r\n \r\n \r\n [truncated] \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n
RazdobljeDatum
dospije\304\207a
IznosPreostalo
za platiti
Status
pla\304\207anja Preuzimanja
10/201616.11.2016.369,49 kn\r\n \t\t\t\t\t\t\t\t\t291,25 kn\r\n \t\t\t\t\t\t\t\t\tDjelomi\304\215no podmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24009/201617.10.2016.449,23 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24008/201616.9.2016.417,32 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24007/201616.8.2016.394,90 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24006/201618.7.2016.405,38 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24005/201616.6.2016.365,59 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24004/201616.5.2016.345,37 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24003/201615.4.2016.329,72 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24002/201615.3.2016.340,82 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24001/201615.2.2016.351,05 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24012/201515.1.2016.356,21 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t \302\24011/201515.12.2015.416,35 kn\r\n \t\t\t\t\t\t\t\t\t0,00 kn\r\n \t\t\t\t\t\t\t\t\tPodmiren\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRa\304\215un (PDF)\r\n \t\t\t\t\t\t\t\t\t\t\t\t\t
\r\n \t\t\t\t\t\t\t\t\t\t\tPodaci za pla\304\207anje\r\n \r\n \t\t\t\t\t\t\t\t\t\t\t
\r\n
\r\n
UKUPNO ZA PLATITI:
\r\n
\r\n \r\n
\r\n
\r\n

Powered by Svi ra\304\215uni

\r\n
\r\n
\r\n
\r\n
\n \t\t\t\t
\t\n \n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\t\n \t\t\t\t\n \t\t\t\t\n \t\t\t
\n \t\t\t
\r\n \t\r\n \t\r\n \r\n \t\r\n \t\r\n \t\r\n \r\n \t\r\n \r\n \t\r\n \r\n \r\n \t\r\n \t\r\n \t\r\n \t\r\n \t\r\n
\n \t\t\r\n \r\n \r\n \r\n \r\n \r\n \r\n \n \t
\t\n \r\n
\r\n \r\n \t\r\n
\n \n \n \n \t\r\n \r\n \n \t
\r\n \t\r\n \t\t
\r\n \t\t\t
\r\n \t\t\t
\r\n \t\t
\r\n \t
\r\n \t\r\n \t\t\n \t\t\n \n \r\n \r\n \r\n \r\n \r\n \r\n Frame 1613: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141625921 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141625921 seconds [Time delta from previous captured frame: 0.000067894 seconds] [Time delta from previous displayed frame: 0.000067894 seconds] [Time since reference or first frame: 187.344057068 seconds] Frame Number: 1613 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ea (54250) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cfc [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 244218, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 244218 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1611] [The RTT to ACK the segment was: 0.000127118 seconds] [iRTT: 0.003305578 seconds] Frame 1614: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:42.141649936 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724362.141649936 seconds [Time delta from previous captured frame: 0.000024015 seconds] [Time delta from previous displayed frame: 0.000024015 seconds] [Time since reference or first frame: 187.344081083 seconds] Frame Number: 1614 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3eb (54251) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cfb [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 245776, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 15574 (relative sequence number) Acknowledgment number: 245776 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1612] [The RTT to ACK the segment was: 0.000091909 seconds] [iRTT: 0.003305578 seconds] Frame 1894: 1469 bytes on wire (11752 bits), 1469 bytes captured (11752 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:43.325460078 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724363.325460078 seconds [Time delta from previous captured frame: 0.000015463 seconds] [Time delta from previous displayed frame: 1.183810142 seconds] [Time since reference or first frame: 188.527891225 seconds] Frame Number: 1894 Frame Length: 1469 bytes (11752 bits) Capture Length: 1469 bytes (11752 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1453 Identification: 0xd3ec (54252) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4775 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 15574, Ack: 245776, Len: 1413 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1413] Sequence number: 15574 (relative sequence number) [Next sequence number: 16987 (relative sequence number)] Acknowledgment number: 245776 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f89 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1413] [Bytes sent since last PSH flag: 1413] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1408 Encrypted Application Data: 7d4d86eb709571e4dd75ca4321f7f2d9e264f71c9c558fb9... Hypertext Transfer Protocol POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n [Expert Info (Chat/Sequence): POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n] [POST /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: POST Request URI: /App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: application/json, text/javascript, */*; q=0.01\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Content-Type: application/json; charset=utf-8\r\n X-AjaxRequest: true\r\n X-Requested-With: XMLHttpRequest\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n Content-Length: 2\r\n [Content length: 2] [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmmi; _ceg.u=ogzmmi; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmmi Cookie pair: _ceg.u=ogzmmi Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/App_Modules__SnT.THTCms.MW.Modules.Package__SnT.THTCms.MW.Modules.ProfileMessage.ProfileMessageService.asmx/GetInlineMessages] [HTTP request 13/13] [Prev request in frame: 1574] File Data: 2 bytes JavaScript Object Notation: application/json Object Frame 1896: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:43.330018458 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724363.330018458 seconds [Time delta from previous captured frame: 0.004549875 seconds] [Time delta from previous displayed frame: 0.004558380 seconds] [Time since reference or first frame: 188.532449605 seconds] Frame Number: 1896 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: ec72b66d Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x31bd (12733) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb329 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 245776, Ack: 16987, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 245776 (relative sequence number) Acknowledgment number: 16987 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd301 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1894] [The RTT to ACK the segment was: 0.004558380 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 20447 Src Port: 20447 Frame 1897: 397 bytes on wire (3176 bits), 397 bytes captured (3176 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:43.351421368 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724363.351421368 seconds [Time delta from previous captured frame: 0.021402910 seconds] [Time delta from previous displayed frame: 0.021402910 seconds] [Time since reference or first frame: 188.553852515 seconds] Frame Number: 1897 Frame Length: 397 bytes (3176 bits) Capture Length: 397 bytes (3176 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:json] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 381 Identification: 0x31be (12734) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb1d3 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 245776, Ack: 16987, Len: 341 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 341] Sequence number: 245776 (relative sequence number) [Next sequence number: 246117 (relative sequence number)] Acknowledgment number: 16987 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2d53 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 341] [Bytes sent since last PSH flag: 341] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 336 Encrypted Application Data: 11077a95c2a6dea9e1705422a8f01cab9ab5b0a3cbc634e5... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private, max-age=0\r\n Content-Type: application/json; charset=utf-8\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 154dd13d-c3a8-4b94-97cc-939e7a1182e1\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:32:58 GMT\r\n Content-Length: 8\r\n [Content length: 8] \r\n [HTTP response 13/13] [Time since request: 0.025961290 seconds] [Prev request in frame: 1574] [Prev response in frame: 1612] [Request in frame: 1894] File Data: 8 bytes JavaScript Object Notation: application/json Object Member Key: d Array Key: d Frame 1898: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:43.351570382 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724363.351570382 seconds [Time delta from previous captured frame: 0.000149014 seconds] [Time delta from previous displayed frame: 0.000149014 seconds] [Time since reference or first frame: 188.554001529 seconds] Frame Number: 1898 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ee (54254) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cf8 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 16987, Ack: 246117, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 16987 (relative sequence number) Acknowledgment number: 246117 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1897] [The RTT to ACK the segment was: 0.000149014 seconds] [iRTT: 0.003305578 seconds] Frame 1962: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:53.401593797 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724373.401593797 seconds [Time delta from previous captured frame: 0.000008342 seconds] [Time delta from previous displayed frame: 10.050023415 seconds] [Time since reference or first frame: 198.604024944 seconds] Frame Number: 1962 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3ef (54255) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cf7 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 16986, Ack: 246117, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 16986 (relative sequence number) Acknowledgment number: 246117 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 1963: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:53.405125712 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724373.405125712 seconds [Time delta from previous captured frame: 0.003531915 seconds] [Time delta from previous displayed frame: 0.003531915 seconds] [Time since reference or first frame: 198.607556859 seconds] Frame Number: 1963 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 6174ab3e Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x31fa (12794) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb2ec [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 246117, Ack: 16987, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 246117 (relative sequence number) Acknowledgment number: 16987 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd1ac [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 47101 Src Port: 47101 Frame 1968: 1373 bytes on wire (10984 bits), 1373 bytes captured (10984 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:54.854077654 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724374.854077654 seconds [Time delta from previous captured frame: 0.101892980 seconds] [Time delta from previous displayed frame: 1.448951942 seconds] [Time since reference or first frame: 200.056508801 seconds] Frame Number: 1968 Frame Length: 1373 bytes (10984 bits) Capture Length: 1373 bytes (10984 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1357 Identification: 0xd3f0 (54256) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x47d1 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 16987, Ack: 246117, Len: 1317 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1317] Sequence number: 16987 (relative sequence number) [Next sequence number: 18304 (relative sequence number)] Acknowledgment number: 246117 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f29 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1317] [Bytes sent since last PSH flag: 1317] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1312 Encrypted Application Data: 5b9bef0c61ca7b0eacbd9068b686d3c55f469199e22b822a... Hypertext Transfer Protocol GET /racuni/podaci-za-placanje-overlay?referenceNumber=5019102951-202-2&ajaxRequestId=1c6e7d00-5fe5-8843-2f90-4419638a12cf HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni/podaci-za-placanje-overlay?referenceNumber=5019102951-202-2&ajaxRequestId=1c6e7d00-5fe5-8843-2f90-4419638a12cf HTTP/1.1\r\n] [GET /racuni/podaci-za-placanje-overlay?referenceNumber=5019102951-202-2&ajaxRequestId=1c6e7d00-5fe5-8843-2f90-4419638a12cf HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni/podaci-za-placanje-overlay?referenceNumber=5019102951-202-2&ajaxRequestId=1c6e7d00-5fe5-8843-2f90-4419638a12cf Request URI Path: /racuni/podaci-za-placanje-overlay Request URI Query: referenceNumber=5019102951-202-2&ajaxRequestId=1c6e7d00-5fe5-8843-2f90-4419638a12cf Request URI Query Parameter: referenceNumber=5019102951-202-2 Request URI Query Parameter: ajaxRequestId=1c6e7d00-5fe5-8843-2f90-4419638a12cf Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n X-AjaxRequest: true\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=12018216; visited=1; _ceg.s=ogzmmi; _ceg.u=ogzmmi; 62370768-VID=172480676440713; 62370768-SKEY=5756825085 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=12018216 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmmi Cookie pair: _ceg.u=ogzmmi Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni/podaci-za-placanje-overlay?referenceNumber=5019102951-202-2&ajaxRequestId=1c6e7d00-5fe5-8843-2f90-4419638a12cf] [HTTP request 14/14] [Prev request in frame: 1894] Frame 1969: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:54.917501460 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724374.917501460 seconds [Time delta from previous captured frame: 0.063423806 seconds] [Time delta from previous displayed frame: 0.063423806 seconds] [Time since reference or first frame: 200.119932607 seconds] Frame Number: 1969 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 4831fa01 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3227 (12839) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb2bf [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 246117, Ack: 18304, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 246117 (relative sequence number) Acknowledgment number: 18304 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63543 [Calculated window size: 63543] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xd1ac [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1968] [The RTT to ACK the segment was: 0.063423806 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 9754 Src Port: 9754 Frame 1970: 2816 bytes on wire (22528 bits), 2816 bytes captured (22528 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:54.989497123 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724374.989497123 seconds [Time delta from previous captured frame: 0.071995663 seconds] [Time delta from previous displayed frame: 0.071995663 seconds] [Time since reference or first frame: 200.191928270 seconds] Frame Number: 1970 Frame Length: 2816 bytes (22528 bits) Capture Length: 2816 bytes (22528 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2800 Identification: 0x3228 (12840) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xa7f6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 246117, Ack: 18304, Len: 2760 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2760] Sequence number: 246117 (relative sequence number) [Next sequence number: 248877 (relative sequence number)] Acknowledgment number: 18304 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63543 [Calculated window size: 63543] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x24cc [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2760] [Bytes sent since last PSH flag: 2760] TCP segment data (2760 bytes) Secure Sockets Layer Frame 1971: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:54.989623695 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724374.989623695 seconds [Time delta from previous captured frame: 0.000126572 seconds] [Time delta from previous displayed frame: 0.000126572 seconds] [Time since reference or first frame: 200.192054842 seconds] Frame Number: 1971 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3f1 (54257) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cf5 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 18304, Ack: 248877, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 18304 (relative sequence number) Acknowledgment number: 248877 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1970] [The RTT to ACK the segment was: 0.000126572 seconds] [iRTT: 0.003305578 seconds] Frame 1972: 165 bytes on wire (1320 bits), 165 bytes captured (1320 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:54.989661096 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724374.989661096 seconds [Time delta from previous captured frame: 0.000037401 seconds] [Time delta from previous displayed frame: 0.000037401 seconds] [Time since reference or first frame: 200.192092243 seconds] Frame Number: 1972 Frame Length: 165 bytes (1320 bits) Capture Length: 165 bytes (1320 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 149 Identification: 0x322a (12842) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb24f [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 248877, Ack: 18304, Len: 109 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 109] Sequence number: 248877 (relative sequence number) [Next sequence number: 248986 (relative sequence number)] Acknowledgment number: 18304 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63543 [Calculated window size: 63543] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5537 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 109] [Bytes sent since last PSH flag: 2869] TCP segment data (109 bytes) [2 Reassembled TCP Segments (2869 bytes): #1970(2760), #1972(109)] [Frame: 1970, payload: 0-2759 (2760 bytes)] [Frame: 1972, payload: 2760-2868 (109 bytes)] [Segment count: 2] [Reassembled TCP length: 2869] [Reassembled TCP Data: 1703030b306d08c7bf035f51fe3d4dcca7eca8f161b85b5d...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 2864 Encrypted Application Data: 6d08c7bf035f51fe3d4dcca7eca8f161b85b5d9238cb9e35... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 9dd101c5-ac57-48ef-a18b-65412163e5bb\r\n Set-Cookie: CurrentServiceId=0; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:33:09 GMT\r\n Content-Length: 2445\r\n [Content length: 2445] \r\n [HTTP response 14/14] [Time since request: 0.135583442 seconds] [Prev request in frame: 1894] [Prev response in frame: 1897] [Request in frame: 1968] Content-encoded entity body (gzip): 2445 bytes -> 7164 bytes File Data: 7164 bytes Line-based text data: text/html
\r\n \t
\r\n \t\t
\r\n \t\t\t

Podaci za pla\304\207anje

\r\n \t\t\t\r\n \t\t\t\r\n \t\t\t\r\n \t\t\t
\r\n \t\t\t\t
\r\n \t\t\t\t\t

\r\n \t\t\t\t\t\tPrimatelj: HT-Hrvatski Telekom d.d.
\r\n \t\t\t\t\t\tAdresa primatelja: Ulica Roberta Frange\305\241a Mihanovi\304\207a 9
\r\n \t\t\t\t\t\tSjedi\305\241te primatelja: 10110 Zagreb\r\n \t\t\t\t\t

\r\n \t\t\t\t
\r\n \t\t\t\t
\r\n \t\t\t\t\t

\r\n \t\t\t\t\t\t\r\n \t\t\t\t\t\tRa\304\215un primatelja: HR8523600001500074255
\r\n \t\t\t\t\t\tModel pla\304\207anja:HR01
\r\n \t\t\t\t\t\tPoziv na broj: \r\n \t\t\t\t\t\t\r\n \t\t\t\t\t\t5019102951-202-2\r\n \t\t\t\t\t\t
\r\n \t\t\t\t\t\t\r\n \t\t\t\t\t\tIznos: kn\r\n \t\t\t\t\t\t\r\n \t\t\t\t\t

\r\n \t\t\t\t
\r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\t\t\t
\r\n \t\t\t\t\t

\r\n \t\t\t\t\t\tInternet bankarstvo:\r\n \t\t\t\t\t\tPodravska banka\r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tKarlova\304\215ka banka\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tZagreba\304\215ka banka\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tSplitska banka \r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tCentar banka \r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tPrivredna banka Zagreb za fizi\304\215ke osobe\r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tPrivredna banka Zagreb za pravne osobe\r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tOTP banka\r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tOTP banka (tokenom i smart karticom)\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tSberbank d.d.\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tHPB za fizi\304\215ke osobe \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tJadranska banka \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tMe\304\221imurska banka \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tPartner banka za Internet servise \r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tErste banka \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tIstarska kreditna banka za fizi\304\215ke osobe\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tHypo banka \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tKreditna banka Zagreb \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tBanco Popolare Croatia \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tCroatia banka \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tSlatinska banka\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tRaiffeisenbank Austria\r\n \t\t\t\t\t

\r\n \t\t\t\t
\r\n \t\t\t
\r\n \t\t
\r\n \t\t\r\n \t\t\r\n \t\t
\r\n \t

Slanje podataka SMS-om

\r\n \r\n \t
\r\n \t\t
\r\n \t\t\t

\r\n \t\t\t\tPostoje\304\207i kontakt mobilni broj
\r\n \t\t\t\t\r\n \t\t\t\t

\r\n \t\t\t\t\t\t\r\n \t\t\t\tUnesite broj mobilnog telefona\r\n \t\t\t\tNovi kontakt mobilni broj\r\n \t\t\t\t
\r\n \t\t\t\t

\r\n \t\t\t\tUpisani broj mobilnog telefona biti \304\207e spremljen u profil kao kontakt mobitel.\r\n \t\t\t

\r\n \t\t
\r\n \r\n \t\t
\r\n \t\t\t

\r\n \t\t\t\t

\r\n \t\t\t

\r\n \t\t
\r\n \t
\r\n
\r\n \r\n \r\n \t
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n Frame 1973: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:54.989711702 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724374.989711702 seconds [Time delta from previous captured frame: 0.000050606 seconds] [Time delta from previous displayed frame: 0.000050606 seconds] [Time since reference or first frame: 200.192142849 seconds] Frame Number: 1973 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3f2 (54258) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cf4 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 18304, Ack: 248986, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 18304 (relative sequence number) Acknowledgment number: 248986 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1972] [The RTT to ACK the segment was: 0.000050606 seconds] [iRTT: 0.003305578 seconds] Frame 1974: 1229 bytes on wire (9832 bits), 1229 bytes captured (9832 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:55.033779366 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724375.033779366 seconds [Time delta from previous captured frame: 0.044067664 seconds] [Time delta from previous displayed frame: 0.044067664 seconds] [Time since reference or first frame: 200.236210513 seconds] Frame Number: 1974 Frame Length: 1229 bytes (9832 bits) Capture Length: 1229 bytes (9832 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1213 Identification: 0xd3f3 (54259) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x485e [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 18304, Ack: 248986, Len: 1173 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1173] Sequence number: 18304 (relative sequence number) [Next sequence number: 19477 (relative sequence number)] Acknowledgment number: 248986 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1e99 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1173] [Bytes sent since last PSH flag: 1173] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1168 Encrypted Application Data: 1eb05f7b4af5693bdace5049333f1a4517402064685383c7... Hypertext Transfer Protocol GET /WebResources/css/i/close.png HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /WebResources/css/i/close.png HTTP/1.1\r\n] [GET /WebResources/css/i/close.png HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /WebResources/css/i/close.png Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: image/png,image/*;q=0.8,*/*;q=0.5\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n Referer: https://moj.hrvatskitelekom.hr/WebResources/css/mojt.css?v=8\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmmi; _ceg.u=ogzmmi; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmmi Cookie pair: _ceg.u=ogzmmi Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/WebResources/css/i/close.png] [HTTP request 15/15] [Prev request in frame: 1968] Frame 1984: 1436 bytes on wire (11488 bits), 1436 bytes captured (11488 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:55.052600103 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724375.052600103 seconds [Time delta from previous captured frame: 0.003966873 seconds] [Time delta from previous displayed frame: 0.018820737 seconds] [Time since reference or first frame: 200.255031250 seconds] Frame Number: 1984 Frame Length: 1436 bytes (11488 bits) Capture Length: 1436 bytes (11488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1420 Identification: 0x322e (12846) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xad54 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 248986, Ack: 19477, Len: 1380 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1380] Sequence number: 248986 (relative sequence number) [Next sequence number: 250366 (relative sequence number)] Acknowledgment number: 19477 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xf000 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1974] [The RTT to ACK the segment was: 0.018820737 seconds] [iRTT: 0.003305578 seconds] [Bytes in flight: 1380] [Bytes sent since last PSH flag: 1380] TCP segment data (1380 bytes) Secure Sockets Layer Frame 1985: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:55.052657364 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724375.052657364 seconds [Time delta from previous captured frame: 0.000057261 seconds] [Time delta from previous displayed frame: 0.000057261 seconds] [Time since reference or first frame: 200.255088511 seconds] Frame Number: 1985 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3f4 (54260) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cf2 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 19477, Ack: 250366, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 19477 (relative sequence number) Acknowledgment number: 250366 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1984] [The RTT to ACK the segment was: 0.000057261 seconds] [iRTT: 0.003305578 seconds] Frame 1986: 1753 bytes on wire (14024 bits), 1753 bytes captured (14024 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:55.052841806 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724375.052841806 seconds [Time delta from previous captured frame: 0.000184442 seconds] [Time delta from previous displayed frame: 0.000184442 seconds] [Time since reference or first frame: 200.255272953 seconds] Frame Number: 1986 Frame Length: 1753 bytes (14024 bits) Capture Length: 1753 bytes (14024 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:png] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1737 Identification: 0x322f (12847) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xac16 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 250366, Ack: 19477, Len: 1697 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 1697] Sequence number: 250366 (relative sequence number) [Next sequence number: 252063 (relative sequence number)] Acknowledgment number: 19477 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x20a5 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1697] [Bytes sent since last PSH flag: 3077] TCP segment data (1697 bytes) [2 Reassembled TCP Segments (3077 bytes): #1984(1380), #1986(1697)] [Frame: 1984, payload: 0-1379 (1380 bytes)] [Frame: 1986, payload: 1380-3076 (1697 bytes)] [Segment count: 2] [Reassembled TCP length: 3077] [Reassembled TCP Data: 1703030c004af7707e2369789d6038cac2b37542d4fac65b...] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 3072 Encrypted Application Data: 4af7707e2369789d6038cac2b37542d4fac65b28acad23fe... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: max-age=31536000\r\n Content-Type: image/png\r\n Last-Modified: Tue, 24 Jan 2012 08:06:22 GMT\r\n Accept-Ranges: bytes\r\n ETag: "7dc79cf6fdacc1:0"\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: 5999eb5e-2891-4548-b0a0-da5fb3e7d29d\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:33:09 GMT\r\n Content-Length: 2695\r\n [Content length: 2695] \r\n [HTTP response 15/15] [Time since request: 0.019062440 seconds] [Prev request in frame: 1968] [Prev response in frame: 1972] [Request in frame: 1974] File Data: 2695 bytes Portable Network Graphics PNG Signature: 89504e470d0a1a0a Image Header (IHDR) Len: 13 Chunk: IHDR ..0. .... .... .... .... .... .... .... = Ancillary: This is a CRITICAL chunk .... .... ..0. .... .... .... .... .... = Private: This is a PUBLIC chunk .... .... .... .... .... .... ..0. .... = Safe To Copy: This chunk is NOT safe to copy Width: 36 Height: 36 Bit Depth: 8 Colour Type: Truecolour with alpha (6) Compression Method: Deflate (0) Filter Method: Adaptive (0) Interlace Method: No interlace (0) CRC: 0xe1009898 Textual data (tEXt) Len: 25 Chunk: tEXt ..1. .... .... .... .... .... .... .... = Ancillary: This is an ANCILLARY chunk .... .... ..0. .... .... .... .... .... = Private: This is a PUBLIC chunk .... .... .... .... .... .... ..1. .... = Safe To Copy: This chunk is SAFE TO COPY Keyword: Software String: Adobe ImageReady CRC: 0x71c9653c International textual data (iTXt) Len: 800 Chunk: iTXt ..1. .... .... .... .... .... .... .... = Ancillary: This is an ANCILLARY chunk .... .... ..0. .... .... .... .... .... = Private: This is a PUBLIC chunk .... .... .... .... .... .... ..1. .... = Safe To Copy: This chunk is SAFE TO COPY Data CRC: 0x8920e66b Image data chunk (IDAT) Len: 1789 Chunk: IDAT ..0. .... .... .... .... .... .... .... = Ancillary: This is a CRITICAL chunk .... .... ..0. .... .... .... .... .... = Private: This is a PUBLIC chunk .... .... .... .... .... .... ..0. .... = Safe To Copy: This chunk is NOT safe to copy Data CRC: 0x4882d90a Image Trailer (IEND) Len: 0 Chunk: IEND ..0. .... .... .... .... .... .... .... = Ancillary: This is a CRITICAL chunk .... .... ..0. .... .... .... .... .... = Private: This is a PUBLIC chunk .... .... .... .... .... .... ..0. .... = Safe To Copy: This chunk is NOT safe to copy CRC: 0xae426082 Frame 1987: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:32:55.052862570 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724375.052862570 seconds [Time delta from previous captured frame: 0.000020764 seconds] [Time delta from previous displayed frame: 0.000020764 seconds] [Time since reference or first frame: 200.255293717 seconds] Frame Number: 1987 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3f5 (54261) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cf1 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 19477, Ack: 252063, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 19477 (relative sequence number) Acknowledgment number: 252063 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1986] [The RTT to ACK the segment was: 0.000020764 seconds] [iRTT: 0.003305578 seconds] Frame 2024: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:33:05.113649851 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724385.113649851 seconds [Time delta from previous captured frame: 0.460975748 seconds] [Time delta from previous displayed frame: 10.060787281 seconds] [Time since reference or first frame: 210.316080998 seconds] Frame Number: 2024 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3f6 (54262) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cf0 [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 19476, Ack: 252063, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 19476 (relative sequence number) Acknowledgment number: 252063 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 2025: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:33:05.120576844 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724385.120576844 seconds [Time delta from previous captured frame: 0.006926993 seconds] [Time delta from previous displayed frame: 0.006926993 seconds] [Time since reference or first frame: 210.323007991 seconds] Frame Number: 2025 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 8b1feb39 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3240 (12864) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb2a6 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 252063, Ack: 19477, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 252063 (relative sequence number) Acknowledgment number: 19477 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 64860 [Calculated window size: 64860] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb0b8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 57003 Src Port: 57003 Frame 2054: 1373 bytes on wire (10984 bits), 1373 bytes captured (10984 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:33:11.093964596 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724391.093964596 seconds [Time delta from previous captured frame: 0.225273703 seconds] [Time delta from previous displayed frame: 5.973387752 seconds] [Time since reference or first frame: 216.296395743 seconds] Frame Number: 2054 Frame Length: 1373 bytes (10984 bits) Capture Length: 1373 bytes (10984 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 1357 Identification: 0xd3f7 (54263) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x47ca [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 19477, Ack: 252063, Len: 1317 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 1317] Sequence number: 19477 (relative sequence number) [Next sequence number: 20794 (relative sequence number)] Acknowledgment number: 252063 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1f29 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 1317] [Bytes sent since last PSH flag: 1317] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 1312 Encrypted Application Data: dd1d20e0aa0b96bb1a57beed7e6fdeb12677a27cb36d50ec... Hypertext Transfer Protocol GET /racuni/podaci-za-placanje-overlay?referenceNumber=5019102951-203-0&ajaxRequestId=5f06ef7c-3ad1-9767-5e0e-bbcfe48aa31f HTTP/1.1\r\n [Expert Info (Chat/Sequence): GET /racuni/podaci-za-placanje-overlay?referenceNumber=5019102951-203-0&ajaxRequestId=5f06ef7c-3ad1-9767-5e0e-bbcfe48aa31f HTTP/1.1\r\n] [GET /racuni/podaci-za-placanje-overlay?referenceNumber=5019102951-203-0&ajaxRequestId=5f06ef7c-3ad1-9767-5e0e-bbcfe48aa31f HTTP/1.1\r\n] [Severity level: Chat] [Group: Sequence] Request Method: GET Request URI: /racuni/podaci-za-placanje-overlay?referenceNumber=5019102951-203-0&ajaxRequestId=5f06ef7c-3ad1-9767-5e0e-bbcfe48aa31f Request URI Path: /racuni/podaci-za-placanje-overlay Request URI Query: referenceNumber=5019102951-203-0&ajaxRequestId=5f06ef7c-3ad1-9767-5e0e-bbcfe48aa31f Request URI Query Parameter: referenceNumber=5019102951-203-0 Request URI Query Parameter: ajaxRequestId=5f06ef7c-3ad1-9767-5e0e-bbcfe48aa31f Request Version: HTTP/1.1 Host: moj.hrvatskitelekom.hr\r\n User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\r\n Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n Accept-Language: en-US,en;q=0.5\r\n Accept-Encoding: gzip, deflate\r\n X-AjaxRequest: true\r\n Referer: https://moj.hrvatskitelekom.hr/racuni?serviceid=12018216\r\n [truncated]Cookie: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8; ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc; CurrentServiceId=0; visited=1; _ceg.s=ogzmmi; _ceg.u=ogzmmi; 62370768-VID=172480676440713; 62370768-SKEY=57568250852744541 Cookie pair: UniqueTracking=bd2fa232-f4e6-44ef-a403-d7e24494fda8 Cookie pair: ASP.NET_SessionId=qlutfqwzfvlalxugfszjzeuc Cookie pair: CurrentServiceId=0 Cookie pair: visited=1 Cookie pair: _ceg.s=ogzmmi Cookie pair: _ceg.u=ogzmmi Cookie pair: 62370768-VID=172480676440713 Cookie pair: 62370768-SKEY=5756825085274454102 Cookie pair: HumanClickSiteContainerID_62370768=STANDALONE Cookie pair: CookieNotification=yes Cookie pair [truncated]: oAuthData=yZA1pvWTmXBQfSyylhj+mRpL0VrYpBsoQMdI7IhDkh1lyOV+gSeSymOg3H7pRVXia2TCjOlsKT/9Z7dDhR7gFkOzV49jD0zUBgpzZk2U4xD74iEdnsNWbozCl4wLAyflT4Etc/+lsTvrYDa3QTg67hhLGjjhycAnpZP6CmGf6eR7+uLTXwrCimWt91lY+2rGyb2TUC8/QI9I Cookie pair: front_ctck=KEbgveugedO4x0mDMyb3l0jsoXjqdTEZ9e2KtUnHMcWpgdlBV7Dq4mOLexbp9zXfoOFDiXeP2A+lyuJoRjhlcA== Cookie pair: AuthType=HWMamMq/3eNv8oek1ObOWmxq1IXzPLqr8uJ3ibU+sIo= Connection: keep-alive\r\n \r\n [Full request URI: https://moj.hrvatskitelekom.hr/racuni/podaci-za-placanje-overlay?referenceNumber=5019102951-203-0&ajaxRequestId=5f06ef7c-3ad1-9767-5e0e-bbcfe48aa31f] [HTTP request 16/16] [Prev request in frame: 1974] Frame 2055: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:33:11.152052334 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724391.152052334 seconds [Time delta from previous captured frame: 0.058087738 seconds] [Time delta from previous displayed frame: 0.058087738 seconds] [Time since reference or first frame: 216.354483481 seconds] Frame Number: 2055 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 01467d4f Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3249 (12873) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb29d [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 252063, Ack: 20794, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 252063 (relative sequence number) Acknowledgment number: 20794 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63543 [Calculated window size: 63543] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xb0b8 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 2054] [The RTT to ACK the segment was: 0.058087738 seconds] [iRTT: 0.003305578 seconds] VSS-Monitoring ethernet trailer, Source Port: 25775 Src Port: 25775 Frame 2056: 2925 bytes on wire (23400 bits), 2925 bytes captured (23400 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:33:11.226643914 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724391.226643914 seconds [Time delta from previous captured frame: 0.074591580 seconds] [Time delta from previous displayed frame: 0.074591580 seconds] [Time since reference or first frame: 216.429075061 seconds] Frame Number: 2056 Frame Length: 2925 bytes (23400 bits) Capture Length: 2925 bytes (23400 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:ssl:http:data-text-lines] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 2909 Identification: 0x324a (12874) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xa767 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 252063, Ack: 20794, Len: 2869 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 2869] Sequence number: 252063 (relative sequence number) [Next sequence number: 254932 (relative sequence number)] Acknowledgment number: 20794 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window size value: 63543 [Calculated window size: 63543] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x2539 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [Bytes in flight: 2869] [Bytes sent since last PSH flag: 2869] Secure Sockets Layer TLSv1.2 Record Layer: Application Data Protocol: http-over-tls Content Type: Application Data (23) Version: TLS 1.2 (0x0303) Length: 2864 Encrypted Application Data: 038bd2fce7a2308cb74962d02354a5d995e08ec990aea406... Hypertext Transfer Protocol HTTP/1.1 200 OK\r\n [Expert Info (Chat/Sequence): HTTP/1.1 200 OK\r\n] [HTTP/1.1 200 OK\r\n] [Severity level: Chat] [Group: Sequence] Request Version: HTTP/1.1 Status Code: 200 Response Phrase: OK Cache-Control: private\r\n Content-Type: text/html; charset=utf-8\r\n Content-Encoding: gzip\r\n Vary: Accept-Encoding\r\n Server: Microsoft-IIS/8.5\r\n X-RequestId: e7915502-5558-48c1-8332-3ee286ad33f9\r\n Set-Cookie: CurrentServiceId=0; path=/; HttpOnly\r\n X-AspNet-Version: 4.0.30319\r\n X-Powered-By: ASP.NET\r\n Date: Mon, 21 Nov 2016 10:33:25 GMT\r\n Content-Length: 2445\r\n [Content length: 2445] \r\n [HTTP response 16/16] [Time since request: 0.132679318 seconds] [Prev request in frame: 1974] [Prev response in frame: 1986] [Request in frame: 2054] Content-encoded entity body (gzip): 2445 bytes -> 7164 bytes File Data: 7164 bytes Line-based text data: text/html
\r\n \t
\r\n \t\t
\r\n \t\t\t

Podaci za pla\304\207anje

\r\n \t\t\t\r\n \t\t\t\r\n \t\t\t\r\n \t\t\t
\r\n \t\t\t\t
\r\n \t\t\t\t\t

\r\n \t\t\t\t\t\tPrimatelj: HT-Hrvatski Telekom d.d.
\r\n \t\t\t\t\t\tAdresa primatelja: Ulica Roberta Frange\305\241a Mihanovi\304\207a 9
\r\n \t\t\t\t\t\tSjedi\305\241te primatelja: 10110 Zagreb\r\n \t\t\t\t\t

\r\n \t\t\t\t
\r\n \t\t\t\t
\r\n \t\t\t\t\t

\r\n \t\t\t\t\t\t\r\n \t\t\t\t\t\tRa\304\215un primatelja: HR8523600001500074255
\r\n \t\t\t\t\t\tModel pla\304\207anja:HR01
\r\n \t\t\t\t\t\tPoziv na broj: \r\n \t\t\t\t\t\t\r\n \t\t\t\t\t\t5019102951-203-0\r\n \t\t\t\t\t\t
\r\n \t\t\t\t\t\t\r\n \t\t\t\t\t\tIznos: kn\r\n \t\t\t\t\t\t\r\n \t\t\t\t\t

\r\n \t\t\t\t
\r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\t\t\t\r\n \t\t\t\t
\r\n \t\t\t\t\t

\r\n \t\t\t\t\t\tInternet bankarstvo:\r\n \t\t\t\t\t\tPodravska banka\r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tKarlova\304\215ka banka\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tZagreba\304\215ka banka\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tSplitska banka \r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tCentar banka \r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tPrivredna banka Zagreb za fizi\304\215ke osobe\r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tPrivredna banka Zagreb za pravne osobe\r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tOTP banka\r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tOTP banka (tokenom i smart karticom)\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tSberbank d.d.\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tHPB za fizi\304\215ke osobe \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tJadranska banka \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tMe\304\221imurska banka \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tPartner banka za Internet servise \r\n \t\t\t\t\t\t|\r\n \t\t\t\t\t\tErste banka \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tIstarska kreditna banka za fizi\304\215ke osobe\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tHypo banka \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tKreditna banka Zagreb \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tBanco Popolare Croatia \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tCroatia banka \r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tSlatinska banka\r\n \t\t\t\t\t\t| \r\n \t\t\t\t\t\tRaiffeisenbank Austria\r\n \t\t\t\t\t

\r\n \t\t\t\t
\r\n \t\t\t
\r\n \t\t
\r\n \t\t\r\n \t\t\r\n \t\t
\r\n \t

Slanje podataka SMS-om

\r\n \r\n \t
\r\n \t\t
\r\n \t\t\t

\r\n \t\t\t\tPostoje\304\207i kontakt mobilni broj
\r\n \t\t\t\t\r\n \t\t\t\t

\r\n \t\t\t\t\t\t\r\n \t\t\t\tUnesite broj mobilnog telefona\r\n \t\t\t\tNovi kontakt mobilni broj\r\n \t\t\t\t
\r\n \t\t\t\t

\r\n \t\t\t\tUpisani broj mobilnog telefona biti \304\207e spremljen u profil kao kontakt mobitel.\r\n \t\t\t

\r\n \t\t
\r\n \r\n \t\t
\r\n \t\t\t

\r\n \t\t\t\t

\r\n \t\t\t

\r\n \t\t
\r\n \t
\r\n
\r\n \r\n \r\n \t
\r\n
\r\n \r\n \r\n \r\n \r\n \r\n Frame 2057: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:33:11.226787701 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724391.226787701 seconds [Time delta from previous captured frame: 0.000143787 seconds] [Time delta from previous displayed frame: 0.000143787 seconds] [Time since reference or first frame: 216.429218848 seconds] Frame Number: 2057 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3f8 (54264) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cee [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 20794, Ack: 254932, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 20794 (relative sequence number) Acknowledgment number: 254932 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [This is an ACK to the segment in frame: 2056] [The RTT to ACK the segment was: 0.000143787 seconds] [iRTT: 0.003305578 seconds] Frame 2089: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:33:21.561678966 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724401.561678966 seconds [Time delta from previous captured frame: 0.642498887 seconds] [Time delta from previous displayed frame: 10.334891265 seconds] [Time since reference or first frame: 226.764110113 seconds] Frame Number: 2089 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3f9 (54265) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4ced [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 20793, Ack: 254932, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 20793 (relative sequence number) Acknowledgment number: 254932 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 2090: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:33:21.564602835 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724401.564602835 seconds [Time delta from previous captured frame: 0.002923869 seconds] [Time delta from previous displayed frame: 0.002923869 seconds] [Time since reference or first frame: 226.767033982 seconds] Frame Number: 2090 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: 730cf715 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x3255 (12885) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb291 [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 254932, Ack: 20794, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 254932 (relative sequence number) Acknowledgment number: 20794 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63543 [Calculated window size: 63543] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xa583 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 52340 Src Port: 52340 Frame 2124: 56 bytes on wire (448 bits), 56 bytes captured (448 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:33:31.801581353 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724411.801581353 seconds [Time delta from previous captured frame: 0.342675442 seconds] [Time delta from previous displayed frame: 10.236978518 seconds] [Time since reference or first frame: 237.004012500 seconds] Frame Number: 2124 Frame Length: 56 bytes (448 bits) Capture Length: 56 bytes (448 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp] Linux cooked capture Packet type: Sent by us (4) Link-layer address type: 1 Link-layer address length: 6 Source: PlanetTe_8a:2c:05 (00:30:4f:8a:2c:05) Protocol: IPv4 (0x0800) Internet Protocol Version 4, Src: 192.168.1.2, Dst: 195.29.149.33 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xd3fa (54266) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 64 Protocol: TCP (6) Header checksum: 0x4cec [validation disabled] [Header checksum status: Unverified] Source: 192.168.1.2 Destination: 195.29.149.33 Transmission Control Protocol, Src Port: 56456 (56456), Dst Port: https (443), Seq: 20793, Ack: 254932, Len: 0 Source Port: 56456 (56456) Destination Port: https (443) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 20793 (relative sequence number) Acknowledgment number: 254932 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 65535 [Calculated window size: 65535] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0x1a04 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): TCP keep-alive segment] [TCP keep-alive segment] [Severity level: Note] [Group: Sequence] Frame 2125: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface 0 Interface id: 0 (any) Encapsulation type: Linux cooked-mode capture (25) Arrival Time: Nov 21, 2016 11:33:31.806289492 CET [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1479724411.806289492 seconds [Time delta from previous captured frame: 0.004708139 seconds] [Time delta from previous displayed frame: 0.004708139 seconds] [Time since reference or first frame: 237.008720639 seconds] Frame Number: 2125 Frame Length: 62 bytes (496 bits) Capture Length: 62 bytes (496 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: sll:ethertype:ip:tcp:vssmonitoring] Linux cooked capture Packet type: Unicast to us (0) Link-layer address type: 1 Link-layer address length: 6 Source: ZteCorpo_8b:44:87 (2c:95:7f:8b:44:87) Protocol: IPv4 (0x0800) Padding: c756dff5 Internet Protocol Version 4, Src: 195.29.149.33, Dst: 192.168.1.2 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0x328a (12938) Flags: 0x02 (Don't Fragment) 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set Fragment offset: 0 Time to live: 124 Protocol: TCP (6) Header checksum: 0xb25c [validation disabled] [Header checksum status: Unverified] Source: 195.29.149.33 Destination: 192.168.1.2 Transmission Control Protocol, Src Port: https (443), Dst Port: 56456 (56456), Seq: 254932, Ack: 20794, Len: 0 Source Port: https (443) Destination Port: 56456 (56456) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 254932 (relative sequence number) Acknowledgment number: 20794 (relative ack number) Header Length: 20 bytes Flags: 0x010 (ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A····] Window size value: 63543 [Calculated window size: 63543] [Window size scaling factor: -2 (no window scaling used)] Checksum: 0xa583 [unverified] [Checksum Status: Unverified] Urgent pointer: 0 [SEQ/ACK analysis] [iRTT: 0.003305578 seconds] [TCP Analysis Flags] [Expert Info (Note/Sequence): ACK to a TCP keep-alive segment] [ACK to a TCP keep-alive segment] [Severity level: Note] [Group: Sequence] VSS-Monitoring ethernet trailer, Source Port: 1831 Src Port: 1831