Sipgate und Cisco 7962 bzw. 7975! Geht das? VOIP
Hallo!
Weiss jemand ob man ein Cisco IP Telefon auch ohne den Cisco Callmanager betreiben kann, also ich meine ... kann man seine z.B. Sipgate.de Daten einhacken und damit telefonieren?
Ich würde mir nämlich von der Optiker her, bzw. verarbeitung gerne so ein Telefon besorgen.
Gruß Trip
Weiss jemand ob man ein Cisco IP Telefon auch ohne den Cisco Callmanager betreiben kann, also ich meine ... kann man seine z.B. Sipgate.de Daten einhacken und damit telefonieren?
Ich würde mir nämlich von der Optiker her, bzw. verarbeitung gerne so ein Telefon besorgen.
Gruß Trip
Bitte markiere auch die Kommentare, die zur Lösung des Beitrags beigetragen haben
Content-ID: 102821
Url: https://administrator.de/forum/sipgate-und-cisco-7962-bzw-7975-geht-das-voip-102821.html
Ausgedruckt am: 22.12.2024 um 14:12 Uhr
33 Kommentare
Neuester Kommentar
Richtig, und die gibt es nur in einem Router, denn ohne Call Manager funktionieren die Telefone nur mit einem SIP Image das du vorher von der Cisco Support Seite laden musst:
http://greenwirecommunications.com/phone-systems/how-to-reflash-a-7945g ...
bzw.
Cisco Telefone für All IP Anschluss, FritzBox und andere VoIP Anlagen fit machen
http://greenwirecommunications.com/phone-systems/how-to-reflash-a-7945g ...
bzw.
Cisco Telefone für All IP Anschluss, FritzBox und andere VoIP Anlagen fit machen
Alex!
Da würden mich aber mal ein paar Details interessieren - für mich kommt nämlich deine Antwort genau richtig.
Ich bin absolut kein VoIP Profi. Das Telefon steht seit einem Jahr hier tot rum, gestern habe ich versucht mich ein bisschen mit der Materie auseinanderzusetzen, aber es gibt so viel verwirrende Infos im Netz, dass ich eher dümmer bin als vorher.
Vorhanden ist:
. 0815 Router (Linksys)
. Cisco 7970G
. "vermeintlich erfolgreiches" Update der Cisco Firmware auf SIP 8.0.3
. Sipgate Account
Hast Du ein HowTo oder irgendeine Anleitung Beispiel xml-Dateien oder kannst eine kurze Übersicht geben, was wie eingestellt werden muss?
Schöne Grüße!
Adi
Da würden mich aber mal ein paar Details interessieren - für mich kommt nämlich deine Antwort genau richtig.
Ich bin absolut kein VoIP Profi. Das Telefon steht seit einem Jahr hier tot rum, gestern habe ich versucht mich ein bisschen mit der Materie auseinanderzusetzen, aber es gibt so viel verwirrende Infos im Netz, dass ich eher dümmer bin als vorher.
Vorhanden ist:
. 0815 Router (Linksys)
. Cisco 7970G
. "vermeintlich erfolgreiches" Update der Cisco Firmware auf SIP 8.0.3
. Sipgate Account
Hast Du ein HowTo oder irgendeine Anleitung Beispiel xml-Dateien oder kannst eine kurze Übersicht geben, was wie eingestellt werden muss?
Schöne Grüße!
Adi
Mir ist zwar klar, dass hier seit 12 Jahren nichts mehr geschrieben wurde, aber ich werde diesen Beitrag einfach mal wieder beginnen. Ich kenne mich mit den Geräten ganz gut aus, hab ein 8851, 7912 und 7960 erfolgreich mit Sipgate und Telekom zum laufen bekommen.
Interessanterweise nimmt das 7961 die Konfigurationsdatei des 8851, welches ja das gleiche Format verwendet nicht an, also es kommt zu keiner Registrierung, sondern das Gerät bleibt am Registrierungsprozess hängen. So habe ich aucdh ein 7911, 7962, 7942, 7970 und ein 7961 versucht, aber keins will.
Meine Frage: Hat jemand eine funktionierende Konfiguration für ein Telefon der 79-Serie und nicht die 88-Serie, da die ja anders sind und könnte diese hier posten?
Der User drpain2006 hatte zwar angeblich eine funktionierende, hat diese aber leider nie gepostet...
Vielen Dank, falls dies hier jemand sehen sollte
Interessanterweise nimmt das 7961 die Konfigurationsdatei des 8851, welches ja das gleiche Format verwendet nicht an, also es kommt zu keiner Registrierung, sondern das Gerät bleibt am Registrierungsprozess hängen. So habe ich aucdh ein 7911, 7962, 7942, 7970 und ein 7961 versucht, aber keins will.
Meine Frage: Hat jemand eine funktionierende Konfiguration für ein Telefon der 79-Serie und nicht die 88-Serie, da die ja anders sind und könnte diese hier posten?
Der User drpain2006 hatte zwar angeblich eine funktionierende, hat diese aber leider nie gepostet...
Vielen Dank, falls dies hier jemand sehen sollte
Das hier sollte dir weiterhelfen:
Cisco Telefone für All IP Anschluss, FritzBox und andere VoIP Anlagen fit machen
Besonders auch die Kommentare im Thread Verlauf. 7962 und 7970 laufen wie alle anderen 79er Modelle damit vollkommen fehlerlos ! Sehr verwunderlich das du als "Experte" an dem einfachen Setup scheiterst. 😉
Cisco Telefone für All IP Anschluss, FritzBox und andere VoIP Anlagen fit machen
Besonders auch die Kommentare im Thread Verlauf. 7962 und 7970 laufen wie alle anderen 79er Modelle damit vollkommen fehlerlos ! Sehr verwunderlich das du als "Experte" an dem einfachen Setup scheiterst. 😉
Die 79er laufen alle fehlerlos.
Wenn man eine FritzBox als VoIP Anlage betreibt muss man nur drauf achten TCP bei SIP zu verwenden:
Die FritzBox supportet seit längerem nur noch TCP als SIP Protocol und kein UDP mehr.
<transportLayerProtocol>1</transportLayerProtocol>
1 = TCP
2 = UDP
Bei den Providern ist das egal aber wenn man generell mit TCP arbeitet macht man nicht falsch.
Wenn man eine FritzBox als VoIP Anlage betreibt muss man nur drauf achten TCP bei SIP zu verwenden:
Die FritzBox supportet seit längerem nur noch TCP als SIP Protocol und kein UDP mehr.
<transportLayerProtocol>1</transportLayerProtocol>
1 = TCP
2 = UDP
Bei den Providern ist das egal aber wenn man generell mit TCP arbeitet macht man nicht falsch.
Bei mir ist das aber nicht der Fall...
Ich möchte mich direkt bei Sipgate anmelden, da ich keine FritzBox, sonder ein TP-Link Modem verwende, welches diese Funktion aber nicht unterstützt.
Das mit dem <transportLayerProtocol>1</transportLayerProtocol>, kenne ich schon und habe ich auch mit rumgespielt, aber hat nicht wirklich weitergeholfen...
Ich möchte mich direkt bei Sipgate anmelden, da ich keine FritzBox, sonder ein TP-Link Modem verwende, welches diese Funktion aber nicht unterstützt.
Das mit dem <transportLayerProtocol>1</transportLayerProtocol>, kenne ich schon und habe ich auch mit rumgespielt, aber hat nicht wirklich weitergeholfen...
sonder ein TP-Link Modem verwende,
Ein reines NUR Modem ?? Wenn ja, was ist denn für ein Router dahinter ?Oder hast du jetzt leider mal wieder laienhaft den Begriff "Modem" und "Router" verwechselt ? Technisch bekanntlich ja ein himmelweiter Unterschied ! Siehe dazu auch hier.
Aber letztlich völlig egal und tut, bezogen auf das Thema hier auch rein gar nix zur Sache wenn du direkt eine SIPgate Connection machen willst. Da ist es egal ob UDP oder TCP und du kannst direkt die im Tutorial geposteten XML Dateien verwenden. OK; angepasst auf deine SIP und IP Crednetials natürlich.
Also ich bekomme leider keine Registrierung hin...
Eventuell habe ich ja einen Fehler, den ich übersehe, weil das Telefon nur auf "Registering" hängen bleibt.
<?xml version="1.0" encoding="UTF-8"?>
<device>
<deviceProtocol>SIP</deviceProtocol>
<sshUserId>admin</sshUserId>
<sshPassword>admin</sshPassword>
<tzdata>
<tzolsonversion>2015a</tzolsonversion>
<tzupdater>tzupdater.jar</tzupdater>
</tzdata>
<devicePool>
<dateTimeSetting>
<name>CMLocal</name>
<dateTemplate>D/M/YY</dateTemplate>
<timeZone>Central Europe Standard/Daylight Time</timeZone>
<olsonTimeZone>Europe/Berlin</olsonTimeZone>
<ntps>
<ntp>
<name>129.6.15.28</name>
<ntpMode>Unicast</ntpMode>
</ntp>
</ntps>
</dateTimeSetting>
<callManagerGroup>
<members>
<member priority="0">
<callManager>
<ports>
<ethernetPhonePort>2000</ethernetPhonePort>
<sipPort>5060</sipPort>
<securedSipPort>5061</securedSipPort>
</ports>
<processNodeName>sipgate.de</processNodeName>
</callManager>
</member>
</members>
</callManagerGroup>
</devicePool>
<commonProfile>
<phonePassword></phonePassword>
<backgroundImageAccess>true</backgroundImageAccess>
<callLogBlfEnabled>2</callLogBlfEnabled>
</commonProfile>
<loadInformation>term06.default</loadInformation>
<vendorConfig>
<disableSpeaker>false</disableSpeaker>
<disableSpeakerAndHeadset>false</disableSpeakerAndHeadset>
<pcPort>0</pcPort>
<settingsAccess>1</settingsAccess>
<garp>0</garp>
<voiceVlanAccess>0</voiceVlanAccess>
<ciscoCamera>1</ciscoCamera>
<videoCapability>1</videoCapability>
<usbClasses>0,1,2</usbClasses>
<sdio>1</sdio>
<wifi>0</wifi>
<bluetoothProfile>0,1</bluetoothProfile>
<powerNegotiation>0</powerNegotiation>
<autoSelectLineEnable>0</autoSelectLineEnable>
<webAccess>0</webAccess>
<sshAccess>0</sshAccess>
<sshPort>22</sshPort>
<g722CodecSupport>2</g722CodecSupport>
<daysDisplayNotActive>1,2,3,4,5,6,7</daysDisplayNotActive>
<displayOnTime>07:00</displayOnTime>
<displayOnDuration>00:15</displayOnDuration>
<displayIdleTimeout>00:15</displayIdleTimeout>
<displayOnWhenIncomingCall>1</displayOnWhenIncomingCall>
<spanToPCPort>1</spanToPCPort>
<loggingDisplay>1</loggingDisplay>
<loadServer></loadServer>
</vendorConfig>
<commonConfig>
<usb1>1</usb1>
<usb2>1</usb2>
<ciscoCamera>1</ciscoCamera>
<usbClasses>0,1,2</usbClasses>
<sdio>1</sdio>
<bluetooth>1</bluetooth>
<wifi>0</wifi>
<bluetoothProfile>0,1</bluetoothProfile>
<joinAndDirectTransferPolicy>0</joinAndDirectTransferPolicy>
</commonConfig>
<enterpriseConfig>
<usb1>1</usb1>
<usb2>1</usb2>
<ciscoCamera>1</ciscoCamera>
<usbClasses>0,1,2</usbClasses>
<sdio>1</sdio>
<bluetooth>1</bluetooth>
<wifi>0</wifi>
<bluetoothProfile>0,1</bluetoothProfile>
<joinAndDirectTransferPolicy>0</joinAndDirectTransferPolicy>
<videoCapability>0</videoCapability>
<webAccess>0</webAccess>
<eapAuthentication>2</eapAuthentication>
<webProtocol>0</webProtocol>
</enterpriseConfig>
<advertiseG722Codec>1</advertiseG722Codec>
<userLocale>
<name>english_united_kingdom</name>
<langCode>en</langCode>
</userLocale>
<networkLocale>Germany</networkLocale>
<networkLocaleInfo>
<name>Germany</name>
<uid>64</uid>
<version>1.0.0.0-1</version>
</networkLocaleInfo>
<deviceSecurityMode>1</deviceSecurityMode>
<idleTimeout>0</idleTimeout>
<authenticationURL></authenticationURL>
<directoryURL></directoryURL>
<idleURL></idleURL>
<informationURL></informationURL>
<messagesNumber></messagesNumber>
<messagesURL></messagesURL>
<proxyServerURL></proxyServerURL>
<servicesURL></servicesURL>
<dscpForSCCPPhoneConfig>96</dscpForSCCPPhoneConfig>
<dscpForSCCPPhoneServices>0</dscpForSCCPPhoneServices>
<dscpForCm2Dvce>96</dscpForCm2Dvce>
<transportLayerProtocol>1</transportLayerProtocol>
<dndCallAlert>5</dndCallAlert>
<phonePersonalization>1</phonePersonalization>
<rollover>0</rollover>
<singleButtonBarge>0</singleButtonBarge>
<joinAcrossLines>1</joinAcrossLines>
<autoCallPickupEnable>false</autoCallPickupEnable>
<blfAudibleAlertSettingOfIdleStation>0</blfAudibleAlertSettingOfIdleStation>
<blfAudibleAlertSettingOfBusyStation>0</blfAudibleAlertSettingOfBusyStation>
<capfAuthMode>0</capfAuthMode>
<capfList>
<capf>
<phonePort>3804</phonePort>
</capf>
</capfList>
<certHash></certHash>
<encrConfig>false</encrConfig>
<sipProfile>
<sipProxies>
<backupProxy>USECALLMANAGER</backupProxy>
<backupProxyPort>5060</backupProxyPort>
<emergencyProxy>USECALLMANAGER</emergencyProxy>
<emergencyProxyPort>5060</emergencyProxyPort>
<outboundProxy></outboundProxy>
<outboundProxyPort></outboundProxyPort>
<registerWithProxy>true</registerWithProxy>
</sipProxies>
<sipCallFeatures>
<cnfJoinEnabled>true</cnfJoinEnabled>
<callForwardURI>x-cisco-serviceuri-cfwdall</callForwardURI>
<callPickupURI>x-cisco-serviceuri-pickup</callPickupURI>
<callPickupListURI>x-cisco-serviceuri-opickup</callPickupListURI>
<callPickupGroupURI>x-cisco-serviceuri-gpickup</callPickupGroupURI>
<meetMeServiceURI>x-cisco-serviceuri-meetme</meetMeServiceURI>
<abbreviatedDialURI>x-cisco-serviceuri-abbrdial</abbreviatedDialURI>
<rfc2543Hold>false</rfc2543Hold>
<callHoldRingback>2</callHoldRingback>
<localCfwdEnable>true</localCfwdEnable>
<semiAttendedTransfer>true</semiAttendedTransfer>
<anonymousCallBlock>2</anonymousCallBlock>
<callerIdBlocking>2</callerIdBlocking>
<dndControl>1</dndControl>
<remoteCcEnable>true</remoteCcEnable>
<retainForwardInformation>true</retainForwardInformation>
</sipCallFeatures>
<sipStack>
<sipInviteRetx>6</sipInviteRetx>
<sipRetx>10</sipRetx>
<timerInviteExpires>180</timerInviteExpires>
<timerRegisterExpires>7200</timerRegisterExpires>
<timerRegisterDelta>5</timerRegisterDelta>
<timerKeepAliveExpires>120</timerKeepAliveExpires>
<timerSubscribeExpires>120</timerSubscribeExpires>
<timerSubscribeDelta>5</timerSubscribeDelta>
<timerT1>500</timerT1>
<timerT2>4000</timerT2>
<maxRedirects>70</maxRedirects>
<remotePartyID>false</remotePartyID>
<userInfo>None</userInfo>
</sipStack>
<autoAnswerTimer>0</autoAnswerTimer>
<autoAnswerAltBehavior>false</autoAnswerAltBehavior>
<autoAnswerOverride>true</autoAnswerOverride>
<transferOnhookEnabled>false</transferOnhookEnabled>
<enableVad>false</enableVad>
<preferredCodec>none</preferredCodec>
<dtmfAvtPayload>101</dtmfAvtPayload>
<dtmfDbLevel>3</dtmfDbLevel>
<dtmfOutofBand>avt</dtmfOutofBand>
<alwaysUsePrimeLine>false</alwaysUsePrimeLine>
<alwaysUsePrimeLineVoiceMail>false</alwaysUsePrimeLineVoiceMail>
<kpml>3</kpml>
<natEnabled>false</natEnabled>
<natAddress></natAddress>
<stutterMsgWaiting>2</stutterMsgWaiting>
<callStats>false</callStats>
<silentPeriodBetweenCallWaitingBursts>10</silentPeriodBetweenCallWaitingBursts>
<disableLocalSpeedDialConfig>false</disableLocalSpeedDialConfig>
<startMediaPort>10000</startMediaPort>
<stopMediaPort>20000</stopMediaPort>
<voipControlPort>5060</voipControlPort>
<dscpForAudio>184</dscpForAudio>
<dscpVideo>136</dscpVideo>
<dscpForTelepresence>128</dscpForTelepresence>
<ringSettingBusyStationPolicy>0</ringSettingBusyStationPolicy>
<softKeyFile>AppDialRules.xml</softKeyFile>
<dialTemplate>dialplan.xml</dialTemplate>
<phoneLabel>Urosevic</phoneLabel>
<sipLines>
<line button="1" lineIndex="1">
<featureID>9</featureID>
<featureLabel></featureLabel>
<name></name>
<displayName></displayName>
<contact></contact>
<proxy>USECALLMANAGER</proxy>
<port>5060</port>
<autoAnswer>
<autoAnswerEnabled>2</autoAnswerEnabled>
</autoAnswer>
<callWaiting>3</callWaiting>
<authName></authName>
<authPassword></authPassword>
<sharedLine>false</sharedLine>
<messageWaitingLampPolicy>3</messageWaitingLampPolicy>
<messageWaitingAMWI>1</messageWaitingAMWI>
<messagesNumber></messagesNumber>
<ringSettingIdle>4</ringSettingIdle>
<ringSettingActive>5</ringSettingActive>
<forwardCallInfoDisplay>
<callerName>true</callerName>
<callerNumber>false</callerNumber>
<redirectedNumber>false</redirectedNumber>
<dialedNumber>true</dialedNumber>
</forwardCallInfoDisplay>
<maxNumCalls>4</maxNumCalls>
<busyTrigger>2</busyTrigger>
</line>
</sipLines>
</sipProfile>
<phoneServices>
<provisioning>0</provisioning>
<phoneService type="1" category="0">
<name>Missed Calls</name>
<url>Application:Cisco/MissedCalls</url>
<vendor></vendor>
<version></version>
</phoneService>
<phoneService type="2" category="0">
<name>Voicemail</name>
<url>Application:Cisco/Voicemail</url>
<vendor></vendor>
<version></version>
</phoneService>
<phoneService type="1" category="0">
<name>Received Calls</name>
<url>Application:Cisco/ReceivedCalls</url>
<vendor></vendor>
<version></version>
</phoneService>
<phoneService type="1" category="0">
<name>Placed Calls</name>
<url>Application:Cisco/PlacedCalls</url>
<vendor></vendor>
<version></version>
</phoneService>
<phoneService type="0" category="0">
<name>Telefonbuch</name>
<url></url>
<vendor></vendor>
<version></version>
</phoneService>
<phoneService type="0" category="0">
<name>Australian Cisco Services</name>
<url>http://cisco.internect.net</url>
<vendor></vendor>
<version></version>
</phoneService>
<phoneService type="0" category="0">
<name>Google</name>
<url>http://google.de</url>
<vendor></vendor>
<version></version>
</phoneService>
</phoneServices>
</device>
Eventuell habe ich ja einen Fehler, den ich übersehe, weil das Telefon nur auf "Registering" hängen bleibt.
Ja da ist mit Sicherheit ein Syntax Fehler drin. Sowas wie <olsonTimeZone> ist ein NoGo für 79er Modelle denn es ist fraglich ob sie das verstehen. Ist in dem Beispiel Konfigs des Tutorials auch nicht drin.
Deine NTP Server IP 129.6.15.28 ist inexistent im Internet. Besser man nimmt offizielle NTP Server: https://www.heise.de/ct/hotline/Oeffentliche-Zeitquellen-322978.html
Das gravierenste ist aber der Load Information Tag <loadInformation>term06.default</loadInformation> der kann so niemals richtig sein, denn dort müsste ein Eintrag rein der zu deiner geladenen SIP Firmware Version passt. Sowas wie <loadInformation7 model="IP Phone 7960">P0S3-8-12-00</loadInformation7>
Das hiesige Cisco Tutorial weist explizit auf diesen Fakt hin !!!
So ein gravierender Syntax Error bewirkt das das Laden der XML Konfig Datei abgebrochen wird.
Was für ein Modell hast du da genau am Start ?
Deine NTP Server IP 129.6.15.28 ist inexistent im Internet. Besser man nimmt offizielle NTP Server: https://www.heise.de/ct/hotline/Oeffentliche-Zeitquellen-322978.html
Das gravierenste ist aber der Load Information Tag <loadInformation>term06.default</loadInformation> der kann so niemals richtig sein, denn dort müsste ein Eintrag rein der zu deiner geladenen SIP Firmware Version passt. Sowas wie <loadInformation7 model="IP Phone 7960">P0S3-8-12-00</loadInformation7>
Das hiesige Cisco Tutorial weist explizit auf diesen Fakt hin !!!
So ein gravierender Syntax Error bewirkt das das Laden der XML Konfig Datei abgebrochen wird.
Was für ein Modell hast du da genau am Start ?
So,
ich habe jetzt erstmal alle angesprochenen Fehler ausgebessert - auch das mit der load information, aber leider noch kein Erfolg.
Die Datei liest es auch ein, hat es aber auch schon vorher...
Das Modell welches ich verwende, ist ein 7911. Ich hätte ansonsten auch noch andere Modelle wie vorher genannt zur Verfügung...
Vielen Dank!
ich habe jetzt erstmal alle angesprochenen Fehler ausgebessert - auch das mit der load information, aber leider noch kein Erfolg.
Die Datei liest es auch ein, hat es aber auch schon vorher...
Das Modell welches ich verwende, ist ein 7911. Ich hätte ansonsten auch noch andere Modelle wie vorher genannt zur Verfügung...
Vielen Dank!
Schmeiss mal einen Wireshark an und sieh dir mal an was das Telefon für SIP Requests sendet und was da von SIPgate zurückkommt wenn der File gebootet ist. Wenn er in der "Registering...." Loop hängt stimmt irgendwa smit der SIP Anmeldung nicht.
Normal funktionieren die 79er Modelle völlig problemlos und auf Anhieb mit SIPgate.
Normal funktionieren die 79er Modelle völlig problemlos und auf Anhieb mit SIPgate.
So ich habe mal aufgezeichnet, aber es kommt leider nicht einmal zu einer SIP-Registrierung...
Es werden nur IP-Adressen zugewiesen, die das Telefon dann auch bekommt, was aber nichts zur Sache bei tut.
Ich werde hier mal den Log posten, den Wireshark erstellt hat.
Vielen Dank schonmal...
Es werden nur IP-Adressen zugewiesen, die das Telefon dann auch bekommt, was aber nichts zur Sache bei tut.
Ich werde hier mal den Log posten, den Wireshark erstellt hat.
1 0.000000 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2 0.000425 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1441 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
3 0.000512 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=2881 Win=1029 Len=0
4 0.000893 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=2881 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
5 0.001395 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=4321 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
6 0.001395 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
7 0.001472 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=5975 Win=1029 Len=0
8 0.339398 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
9 0.400481 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=5975 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
10 0.400657 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=7415 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
11 0.400738 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=8855 Win=1029 Len=0
12 0.401145 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=8855 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
13 0.401648 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=10295 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
14 0.401648 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
15 0.401734 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=12691 Win=1029 Len=0
16 0.800024 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=12691 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
17 0.800024 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=14131 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
18 0.800196 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=15571 Win=1029 Len=0
19 0.800536 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=15571 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
20 0.800922 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=17011 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
21 0.800922 51.195.5.70 192.168.1.123 TLSv1.2 300 Application Data
22 0.801012 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=18697 Win=1029 Len=0
23 1.201786 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=18697 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
24 1.202208 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=20137 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
25 1.202295 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=21577 Win=1029 Len=0
26 1.202485 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=21577 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
27 1.202917 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=23017 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
28 1.202917 51.195.5.70 192.168.1.123 TLSv1.2 989 Application Data
29 1.203010 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=25392 Win=1029 Len=0
30 1.599024 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=25392 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
31 1.599408 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=26832 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
32 1.599494 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=28272 Win=1029 Len=0
33 1.599684 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=28272 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
34 1.600177 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=29712 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
35 1.600177 51.195.5.70 192.168.1.123 TLSv1.2 999 Application Data
36 1.600260 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=32097 Win=1029 Len=0
37 1.998787 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=32097 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
38 1.999160 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=33537 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
39 1.999209 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=34977 Win=1029 Len=0
40 1.999658 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=34977 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
41 2.000158 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=36417 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
42 2.000158 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
43 2.000199 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=38071 Win=1029 Len=0
44 2.403088 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=38071 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
45 2.403088 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=39511 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
46 2.403088 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=40951 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
47 2.403088 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=42391 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
48 2.403088 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
49 2.403296 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=44787 Win=1029 Len=0
50 2.527458 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
51 2.529198 192.168.1.110 224.0.0.251 MDNS 81 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
52 2.529750 fe80::55d5:a9d:8bfd:889e ff02::fb MDNS 101 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
53 2.530349 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0xf6e2 A BRN001BA9933B17
54 2.530349 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0xf6e2 A BRN001BA9933B17
55 2.795290 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=44787 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
56 2.795722 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=46227 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
57 2.795809 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=47667 Win=1029 Len=0
58 2.796057 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=47667 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
59 2.796697 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=49107 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
60 2.796697 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
61 2.796819 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=50760 Win=1029 Len=0
62 2.962826 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0xf6e2 A BRN001BA9933B17
63 2.962826 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0xf6e2 A BRN001BA9933B17
64 2.962826 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
65 3.196246 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=50760 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
66 3.196463 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=52200 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
67 3.196550 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=53640 Win=1029 Len=0
68 3.197153 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=53640 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
69 3.197497 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=55080 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
70 3.197497 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
71 3.197582 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=57476 Win=1029 Len=0
72 3.283442 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
73 3.285144 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
74 3.414748 192.168.1.123 54.38.152.153 TCP 55 64506 → 443 [ACK] Seq=1 Ack=1 Win=1025 Len=1 [TCP segment of a reassembled PDU]
75 3.425964 54.38.152.153 192.168.1.123 TCP 60 443 → 64506 [ACK] Seq=1 Ack=2 Win=260 Len=0
76 3.542934 192.168.1.110 224.0.0.251 MDNS 81 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
77 3.542934 fe80::55d5:a9d:8bfd:889e ff02::fb MDNS 101 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
78 3.591252 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=57476 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
79 3.591465 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=58916 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
80 3.591502 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=60356 Win=1029 Len=0
81 3.591952 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=60356 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
82 3.592455 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=61796 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
83 3.592455 51.195.5.70 192.168.1.123 TLSv1.2 1109 Application Data
84 3.592542 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=64291 Win=1029 Len=0
85 3.995525 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=64291 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
86 3.995525 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=65731 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
87 3.995616 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=67171 Win=1029 Len=0
88 3.995699 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=67171 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
89 3.996164 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=68611 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
90 3.996164 51.195.5.70 192.168.1.123 TLSv1.2 169 Application Data
91 3.996204 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=70166 Win=1029 Len=0
92 4.030512 93.184.220.29 192.168.1.123 TCP 60 80 → 64536 [ACK] Seq=1 Ack=1 Win=131 Len=0
93 4.030574 192.168.1.123 93.184.220.29 TCP 54 [TCP ACKed unseen segment] 64536 → 80 [ACK] Seq=1 Ack=2 Win=1026 Len=0
94 4.046211 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
95 4.395055 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=70166 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
96 4.395466 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=71606 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
97 4.395552 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=73046 Win=1029 Len=0
98 4.395961 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=73046 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
99 4.396462 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=74486 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
100 4.396462 51.195.5.70 192.168.1.123 TLSv1.2 1110 Application Data
101 4.396543 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=76982 Win=1029 Len=0
102 4.645015 HuaweiTe_49:c9:15 Broadcast ARP 60 Who has 192.168.1.1? Tell 192.168.1.116
103 4.795060 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=76982 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
104 4.795475 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=78422 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
105 4.795564 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=79862 Win=1029 Len=0
106 4.795756 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=79862 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
107 4.796228 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=81302 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
108 4.796228 51.195.5.70 192.168.1.123 TLSv1.2 910 Application Data
109 4.796311 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=83598 Win=1029 Len=0
110 4.806250 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
111 4.806757 192.168.1.110 224.0.0.251 MDNS 81 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
112 4.807142 fe80::55d5:a9d:8bfd:889e ff02::fb MDNS 101 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
113 4.808254 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0x05f3 A BRN001BA9933B17
114 4.808254 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0x05f3 A BRN001BA9933B17
115 5.118698 192.168.1.2 239.255.255.250 SSDP 171 M-SEARCH * HTTP/1.1
116 5.194566 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=83598 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
117 5.194738 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=85038 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
118 5.194816 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=86478 Win=1029 Len=0
119 5.195216 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=86478 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
120 5.196364 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=87918 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
121 5.196364 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
122 5.196461 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=89572 Win=1029 Len=0
123 5.230970 192.168.1.2 239.255.255.250 SSDP 171 M-SEARCH * HTTP/1.1
124 5.233685 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0x05f3 A BRN001BA9933B17
125 5.233937 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0x05f3 A BRN001BA9933B17
126 5.338171 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
127 5.567541 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
128 5.588977 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=89572 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
129 5.589448 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=91012 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
130 5.589491 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=92452 Win=1029 Len=0
131 5.589944 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=92452 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
132 5.590181 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=93892 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
133 5.590181 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
134 5.590216 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=96289 Win=1029 Len=0
135 5.966726 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
136 5.994522 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=96289 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
137 5.994992 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=97729 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
138 5.995077 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=99169 Win=1029 Len=0
139 5.995485 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=99169 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
140 5.995987 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=100609 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
141 5.995987 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
142 5.996065 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=102262 Win=1029 Len=0
143 6.323964 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
144 6.392111 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=102262 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
145 6.392592 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=103702 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
146 6.392675 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=105142 Win=1029 Len=0
147 6.392895 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=105142 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
148 6.394236 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=106582 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
149 6.394236 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
150 6.394341 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=108978 Win=1029 Len=0
151 6.792926 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=108978 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
152 6.793442 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=110418 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
153 6.793525 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=111858 Win=1029 Len=0
154 6.793748 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=111858 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
155 6.794236 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=113298 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
156 6.794236 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
157 6.794316 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=115695 Win=1029 Len=0
158 7.122930 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
159 7.188091 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=115695 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
160 7.188533 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=117135 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
161 7.188623 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=118575 Win=1029 Len=0
162 7.188901 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=118575 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
163 7.189226 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=120015 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
164 7.189226 51.195.5.70 192.168.1.123 TLSv1.2 266 Application Data
165 7.189273 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=121667 Win=1029 Len=0
166 7.603083 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=121667 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
167 7.603083 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=123107 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
168 7.603083 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=124547 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
169 7.603083 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=125987 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
170 7.603083 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
171 7.603288 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=128384 Win=1029 Len=0
172 7.991092 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=128384 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
173 7.991794 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=129824 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
174 7.991794 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=131264 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
175 7.991892 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=132704 Win=1029 Len=0
176 7.992220 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=132704 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
177 7.992220 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
178 7.992298 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=134358 Win=1029 Len=0
179 8.391853 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=134358 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
180 8.392030 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=135798 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
181 8.392109 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=137238 Win=1029 Len=0
182 8.392514 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=137238 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
183 8.393506 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=138678 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
184 8.393506 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
185 8.393613 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=141074 Win=1029 Len=0
186 8.803144 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=141074 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
187 8.803144 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=142514 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
188 8.803144 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=143954 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
189 8.803144 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=145394 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
190 8.803144 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
191 8.803345 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=147790 Win=1029 Len=0
192 8.971589 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
193 9.189373 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=147790 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
194 9.189794 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=149230 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
195 9.189877 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=150670 Win=1029 Len=0
196 9.190070 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=150670 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
197 9.190521 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=152110 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
198 9.190521 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
199 9.190601 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=153764 Win=1029 Len=0
200 9.597204 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=153764 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
201 9.597204 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=155204 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
202 9.597204 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=156644 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
203 9.597204 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=158084 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
204 9.597204 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
205 9.597342 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=160480 Win=1029 Len=0
206 9.988141 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=160480 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
207 9.988320 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=161920 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
208 9.988395 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=163360 Win=1029 Len=0
209 9.988792 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=163360 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
210 9.989296 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=164800 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
211 9.989296 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
212 9.989373 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=166453 Win=1029 Len=0
213 10.339104 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
214 10.388397 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=166453 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
215 10.388814 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=167893 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
216 10.388897 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=169333 Win=1029 Len=0
217 10.389086 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=169333 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
218 10.389548 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=170773 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
219 10.389548 51.195.5.70 192.168.1.123 TLSv1.2 1047 Application Data
220 10.389628 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=173206 Win=1029 Len=0
221 10.660682 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
222 10.789149 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=173206 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
223 10.789558 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=174646 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
224 10.789641 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=176086 Win=1029 Len=0
225 10.789832 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=176086 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
226 10.790295 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=177526 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
227 10.790295 51.195.5.70 192.168.1.123 TLSv1.2 973 Application Data
228 10.790374 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=179885 Win=1029 Len=0
229 11.188906 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=179885 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
230 11.189322 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=181325 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
231 11.189407 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=182765 Win=1029 Len=0
232 11.189656 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=182765 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
233 11.190309 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=184205 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
234 11.190309 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
235 11.190387 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=185859 Win=1029 Len=0
236 11.587027 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=185859 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
237 11.587027 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=187299 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
238 11.587027 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=188739 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
239 11.587137 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=190179 Win=1029 Len=0
240 11.587792 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=190179 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
241 11.587792 51.195.5.70 192.168.1.123 TLSv1.2 1049 Application Data
242 11.587834 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=192614 Win=1029 Len=0
243 11.985914 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=192614 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
244 11.986336 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=194054 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
245 11.986420 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=195494 Win=1029 Len=0
246 11.986668 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=195494 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
247 11.987045 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=196934 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
248 11.987045 51.195.5.70 192.168.1.123 TLSv1.2 325 Application Data
249 11.987124 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=198645 Win=1029 Len=0
250 12.385919 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=198645 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
251 12.386266 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=200085 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
252 12.386347 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=201525 Win=1029 Len=0
253 12.386592 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=201525 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
254 12.387074 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=202965 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
255 12.387074 51.195.5.70 192.168.1.123 TLSv1.2 915 Application Data
256 12.387152 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=205266 Win=1029 Len=0
257 12.785671 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=205266 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
258 12.786094 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=206706 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
259 12.786230 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=208146 Win=1029 Len=0
260 12.786447 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=208146 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
261 12.786820 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=209586 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
262 12.786820 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
263 12.786900 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=211982 Win=1029 Len=0
264 13.026391 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
265 13.187427 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=211982 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
266 13.187598 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=213422 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
267 13.187672 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=214862 Win=1029 Len=0
268 13.188084 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=214862 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
269 13.188596 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=216302 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
270 13.188596 51.195.5.70 192.168.1.123 TLSv1.2 266 Application Data
271 13.188679 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=217954 Win=1029 Len=0
272 13.196561 192.168.1.123 51.195.113.37 TCP 66 64551 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
273 13.208424 51.195.113.37 192.168.1.123 TCP 62 443 → 64551 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
274 13.208686 192.168.1.123 51.195.113.37 TCP 54 64551 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
275 13.209818 192.168.1.123 51.195.113.37 TLSv1.3 641 Client Hello
276 13.222186 51.195.113.37 192.168.1.123 TLSv1.3 288 Server Hello, Change Cipher Spec, Application Data, Application Data
277 13.228894 192.168.1.123 51.195.113.37 TLSv1.3 118 Change Cipher Spec, Application Data
278 13.229435 192.168.1.123 51.195.113.37 TLSv1.3 146 Application Data
279 13.230486 192.168.1.123 51.195.113.37 TLSv1.3 1136 Application Data
280 13.240361 51.195.113.37 192.168.1.123 TLSv1.3 325 Application Data
281 13.241032 51.195.113.37 192.168.1.123 TLSv1.3 100 Application Data
282 13.241151 192.168.1.123 51.195.113.37 TCP 54 64551 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
283 13.241523 192.168.1.123 51.195.113.37 TLSv1.3 85 Application Data
284 13.243012 51.195.113.37 192.168.1.123 TLSv1.3 391 Application Data
285 13.295140 51.195.113.37 192.168.1.123 TCP 60 443 → 64551 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
286 13.295748 192.168.1.123 51.195.113.37 TCP 54 64551 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
287 13.590984 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=217954 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
288 13.590984 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=219394 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
289 13.590984 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=220834 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
290 13.590984 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=222274 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
291 13.590984 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
292 13.591102 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=224671 Win=1029 Len=0
293 13.984689 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=224671 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
294 13.985087 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=226111 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
295 13.985170 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=227551 Win=1029 Len=0
296 13.985593 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=227551 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
297 13.985819 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=228991 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
298 13.985819 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
299 13.985894 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=230644 Win=1029 Len=0
300 14.384683 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=230644 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
301 14.385110 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=232084 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
302 14.385196 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=233524 Win=1029 Len=0
303 14.385389 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=233524 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
304 14.385896 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=234964 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
305 14.385896 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
306 14.385981 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=237361 Win=1029 Len=0
307 14.784454 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=237361 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
308 14.784917 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=238801 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
309 14.785001 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=240241 Win=1029 Len=0
310 14.785354 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=240241 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
311 14.785584 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=241681 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
312 14.785584 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
313 14.785660 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=244077 Win=1029 Len=0
314 14.840401 Cisco_0b:7c:cd Nearest-non-TPMR-bridge EAPOL 60 Start
315 14.914944 93.184.220.29 192.168.1.123 TCP 60 80 → 64540 [ACK] Seq=1 Ack=1 Win=133 Len=0
316 14.915065 192.168.1.123 93.184.220.29 TCP 54 [TCP ACKed unseen segment] 64540 → 80 [ACK] Seq=1 Ack=2 Win=1027 Len=0
317 15.183977 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=244077 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
318 15.184394 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=245517 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
319 15.184480 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=246957 Win=1029 Len=0
320 15.184673 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=246957 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
321 15.185149 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=248397 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
322 15.185149 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
323 15.185227 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=250051 Win=1029 Len=0
324 15.340454 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
325 15.584922 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=250051 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
326 15.585345 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=251491 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
327 15.585382 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=252931 Win=1029 Len=0
328 15.585568 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=252931 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
329 15.586092 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=254371 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
330 15.586092 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
331 15.586122 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=256767 Win=1029 Len=0
332 15.983056 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=256767 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
333 15.983415 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=258207 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
334 15.983500 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=259647 Win=1029 Len=0
335 15.983969 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=259647 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
336 15.984376 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=261087 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
337 15.984376 51.195.5.70 192.168.1.123 TLSv1.2 270 Application Data
338 15.984455 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=262743 Win=1029 Len=0
339 16.033342 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
340 16.382958 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=262743 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
341 16.383396 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=264183 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
342 16.383480 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=265623 Win=1029 Len=0
343 16.383693 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=265623 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
344 16.384132 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=267063 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
345 16.384132 51.195.5.70 192.168.1.123 TLSv1.2 1007 Application Data
346 16.384210 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=269456 Win=1029 Len=0
347 16.782424 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=269456 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
348 16.792564 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=270896 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
349 16.792564 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=272336 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
350 16.792564 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=273776 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
351 16.792564 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
352 16.792667 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=276173 Win=1029 Len=0
353 17.182103 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=276173 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
354 17.182368 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=277613 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
355 17.182418 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=279053 Win=1029 Len=0
356 17.192326 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=279053 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
357 17.192326 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=280493 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
358 17.192326 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
359 17.192420 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=282146 Win=1029 Len=0
360 17.579728 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=282146 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
361 17.580248 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=283586 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
362 17.580332 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=285026 Win=1029 Len=0
363 17.580544 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=285026 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
364 17.580868 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=286466 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
365 17.580868 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
366 17.580948 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=288862 Win=1029 Len=0
367 17.602053 192.168.1.114 224.0.0.251 MDNS 181 Standard query 0x0000 PTR _companion-link._tcp.local, "QU" question PTR _homekit._tcp.local, "QU" question PTR _airplay._tcp.local, "QU" question PTR _raop._tcp.local, "QU" question PTR _sleep-proxy._udp.local, "QU" question OPT
368 17.602053 fe80::10e9:7cd0:1d94:7816 ff02::fb MDNS 201 Standard query 0x0000 PTR _companion-link._tcp.local, "QU" question PTR _homekit._tcp.local, "QU" question PTR _airplay._tcp.local, "QU" question PTR _raop._tcp.local, "QU" question PTR _sleep-proxy._udp.local, "QU" question OPT
369 17.983494 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=288862 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
370 17.983938 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=290302 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
371 17.984021 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=291742 Win=1029 Len=0
372 17.984270 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=291742 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
373 17.984634 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=293182 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
374 17.984634 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
375 17.984714 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=295579 Win=1029 Len=0
376 18.218753 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
377 18.218784 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
378 18.380745 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=295579 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
379 18.381157 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=297019 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
380 18.381240 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=298459 Win=1029 Len=0
381 18.381647 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=298459 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
382 18.381889 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=299899 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
383 18.381889 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
384 18.381964 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=301552 Win=1029 Len=0
385 18.482384 fe80::10e9:7cd0:1d94:7816 ff02::16 ICMPv6 90 Multicast Listener Report Message v2
386 18.578698 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
387 18.609426 192.168.1.114 224.0.0.251 MDNS 181 Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question OPT
388 18.609426 fe80::10e9:7cd0:1d94:7816 ff02::fb MDNS 201 Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question OPT
389 18.783048 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=301552 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
390 18.783048 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=302992 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
391 18.783048 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=304432 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
392 18.783048 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=305872 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
393 18.783048 51.195.5.70 192.168.1.123 TLSv1.2 1093 Application Data
394 18.783310 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=308351 Win=1029 Len=0
395 19.011214 192.168.1.123 51.195.113.37 TCP 54 64551 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
396 19.023827 51.195.113.37 192.168.1.123 TCP 60 443 → 64551 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
397 19.023991 192.168.1.123 51.195.113.37 TCP 54 64551 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
398 19.036260 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
399 19.182240 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=308351 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
400 19.182240 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=309791 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
401 19.182240 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=311231 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
402 19.182240 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=312671 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
403 19.182240 51.195.5.70 192.168.1.123 TLSv1.2 185 Application Data
404 19.182436 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=314242 Win=1029 Len=0
405 19.281900 192.168.1.117 239.255.255.250 SSDP 333 NOTIFY * HTTP/1.1
406 19.298074 192.168.1.117 239.255.255.250 SSDP 351 NOTIFY * HTTP/1.1
407 19.314966 192.168.1.117 239.255.255.250 SSDP 405 NOTIFY * HTTP/1.1
408 19.331596 192.168.1.117 239.255.255.250 SSDP 397 NOTIFY * HTTP/1.1
409 19.348317 192.168.1.117 239.255.255.250 SSDP 327 NOTIFY * HTTP/1.1
410 19.364767 192.168.1.117 239.255.255.250 SSDP 369 NOTIFY * HTTP/1.1
411 19.382624 192.168.1.117 239.255.255.250 SSDP 401 NOTIFY * HTTP/1.1
412 19.398618 192.168.1.117 239.255.255.250 SSDP 347 NOTIFY * HTTP/1.1
413 19.414724 192.168.1.117 239.255.255.250 SSDP 399 NOTIFY * HTTP/1.1
414 19.431715 192.168.1.117 239.255.255.250 SSDP 393 NOTIFY * HTTP/1.1
415 19.490181 fe80::10e9:7cd0:1d94:7816 ff02::16 ICMPv6 90 Multicast Listener Report Message v2
416 19.579253 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=314242 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
417 19.579709 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=315682 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
418 19.579793 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=317122 Win=1029 Len=0
419 19.580029 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=317122 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
420 19.580662 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=318562 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
421 19.580662 51.195.5.70 192.168.1.123 TLSv1.2 1037 Application Data
422 19.580742 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=320985 Win=1029 Len=0
423 19.929317 192.168.1.128 224.0.0.251 MDNS 247 Standard query 0x0000 PTR _companion-link._tcp.local, "QU" question PTR _homekit._tcp.local, "QU" question PTR _raop._tcp.local, "QU" question PTR _airplay._tcp.local, "QU" question PTR _sleep-proxy._udp.local, "QU" question ANY iPad von Aleksandar._companion-link._tcp.local, "QU" question SRV 0 0 50658 iPad-von-Aleksandar.local OPT
424 19.929840 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 267 Standard query 0x0000 PTR _companion-link._tcp.local, "QU" question PTR _homekit._tcp.local, "QU" question PTR _raop._tcp.local, "QU" question PTR _airplay._tcp.local, "QU" question PTR _sleep-proxy._udp.local, "QU" question ANY iPad von Aleksandar._companion-link._tcp.local, "QU" question SRV 0 0 50658 iPad-von-Aleksandar.local OPT
425 19.929840 192.168.1.128 224.0.0.251 MDNS 382 Standard query response 0x0000 PTR _companion-link._tcp.local TXT PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
426 19.929840 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 402 Standard query response 0x0000 PTR _companion-link._tcp.local TXT PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
427 19.979764 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=320985 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
428 19.979938 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=322425 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
429 19.980012 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=323865 Win=1029 Len=0
430 19.980427 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=323865 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
431 19.980914 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=325305 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
432 19.980914 51.195.5.70 192.168.1.123 TLSv1.2 240 Application Data
433 19.980992 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=326931 Win=1029 Len=0
434 20.182470 192.168.1.128 224.0.0.251 MDNS 175 Standard query 0x0000 ANY iPad von Aleksandar._companion-link._tcp.local, "QM" question SRV 0 0 50658 iPad-von-Aleksandar.local OPT
435 20.182470 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 195 Standard query 0x0000 ANY iPad von Aleksandar._companion-link._tcp.local, "QM" question SRV 0 0 50658 iPad-von-Aleksandar.local OPT
436 20.340903 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
437 20.380114 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=326931 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
438 20.381130 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=328371 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
439 20.381130 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=329811 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
440 20.381246 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=331251 Win=1029 Len=0
441 20.381492 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=331251 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
442 20.381492 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
443 20.381572 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=333648 Win=1029 Len=0
444 20.523367 192.168.1.128 224.0.0.251 MDNS 225 Standard query 0x0000 ANY iPad von Aleksandar._companion-link._tcp.local, "QM" question ANY iPad-von-Aleksandar.local, "QU" question SRV 0 0 50658 iPad-von-Aleksandar.local AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT
445 20.523367 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 245 Standard query 0x0000 ANY iPad von Aleksandar._companion-link._tcp.local, "QM" question ANY iPad-von-Aleksandar.local, "QU" question SRV 0 0 50658 iPad-von-Aleksandar.local AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT
446 20.777111 192.168.1.128 224.0.0.251 MDNS 158 Standard query 0x0000 ANY iPad-von-Aleksandar.local, "QM" question AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT
447 20.777604 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 178 Standard query 0x0000 ANY iPad-von-Aleksandar.local, "QM" question AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT
448 20.778246 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=333648 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
449 20.778246 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=335088 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
450 20.778368 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=336528 Win=1029 Len=0
451 20.778636 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=336528 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
452 20.779189 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=337968 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
453 20.779189 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
454 20.779267 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=340364 Win=1029 Len=0
455 20.779640 192.168.1.128 224.0.0.251 MDNS 396 Standard query response 0x0000 TXT, cache flush PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local OPT
456 20.779975 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 416 Standard query response 0x0000 TXT, cache flush PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local OPT
457 20.844363 fe80::4e9:f5bf:61c4:5dbd ff02::16 ICMPv6 90 Multicast Listener Report Message v2
458 20.969292 192.168.1.123 8.241.53.126 TCP 54 64541 → 80 [FIN, ACK] Seq=1 Ack=1 Win=1028 Len=0
459 20.981290 8.241.53.126 192.168.1.123 TCP 60 80 → 64541 [FIN, ACK] Seq=1 Ack=2 Win=501 Len=0
460 20.981363 192.168.1.123 8.241.53.126 TCP 54 64541 → 80 [ACK] Seq=2 Ack=2 Win=1028 Len=0
461 21.042996 192.168.1.128 224.0.0.251 MDNS 285 Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question ANY iPad-von-Aleksandar.local, "QM" question PTR iPad von Aleksandar._companion-link._tcp.local AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT
462 21.042996 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 305 Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question ANY iPad-von-Aleksandar.local, "QM" question PTR iPad von Aleksandar._companion-link._tcp.local AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT
463 21.042996 192.168.1.128 224.0.0.251 MDNS 324 Standard query response 0x0000 PTR _companion-link._tcp.local PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
464 21.042996 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 344 Standard query response 0x0000 PTR _companion-link._tcp.local PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
465 21.178285 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=340364 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
466 21.178699 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=341804 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
467 21.178783 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=343244 Win=1029 Len=0
468 21.178975 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=343244 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
469 21.179443 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=344684 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
470 21.179443 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
471 21.179522 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=346337 Win=1029 Len=0
472 21.291054 192.168.1.128 224.0.0.251 MDNS 172 Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
473 21.291753 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 192 Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
474 21.578047 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=346337 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
475 21.578434 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=347777 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
476 21.578517 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=349217 Win=1029 Len=0
477 21.578947 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=349217 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
478 21.579445 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=350657 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
479 21.579445 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
480 21.579522 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=353054 Win=1029 Len=0
481 21.822619 192.168.1.128 224.0.0.251 MDNS 396 Standard query response 0x0000 TXT, cache flush PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local OPT
482 21.822619 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 416 Standard query response 0x0000 TXT, cache flush PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local OPT
483 21.978043 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=353054 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
484 21.978462 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=354494 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
485 21.978546 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=355934 Win=1029 Len=0
486 21.978698 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=355934 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
487 21.979397 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=357374 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
488 21.979397 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
489 21.979484 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=359770 Win=1029 Len=0
490 22.296110 192.168.1.128 224.0.0.251 MDNS 172 Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
491 22.296755 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 192 Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
492 22.377053 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=359770 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
493 22.377439 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=361210 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
494 22.377522 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=362650 Win=1029 Len=0
495 22.377713 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=362650 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
496 22.378213 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=364090 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
497 22.378213 51.195.5.70 192.168.1.123 TLSv1.2 297 Application Data
498 22.378292 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=365773 Win=1029 Len=0
499 22.778560 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=365773 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
500 22.778730 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=367213 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
501 22.778806 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=368653 Win=1029 Len=0
502 22.779216 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=368653 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
503 22.779715 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=370093 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
504 22.779715 51.195.5.70 192.168.1.123 TLSv1.2 981 Application Data
505 22.779795 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=372460 Win=1029 Len=0
506 23.042253 192.168.1.128 224.0.0.251 MDNS 591 Standard query response 0x0000 TXT, cache flush PTR _companion-link._tcp.local PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
507 23.046094 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 611 Standard query response 0x0000 TXT, cache flush PTR _companion-link._tcp.local PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
508 23.096725 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
509 23.176297 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=372460 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
510 23.176717 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=373900 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
511 23.176807 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=375340 Win=1029 Len=0
512 23.177481 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=375340 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
513 23.177481 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=376780 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
514 23.177481 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
515 23.177578 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=378433 Win=1029 Len=0
516 23.576522 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=378433 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
517 23.576730 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=379873 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
518 23.576767 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=381313 Win=1029 Len=0
519 23.577195 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=381313 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
520 23.577706 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=382753 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
521 23.577706 51.195.5.70 192.168.1.123 TLSv1.2 1044 Application Data
522 23.577741 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=385183 Win=1029 Len=0
523 23.854163 fe80::4e9:f5bf:61c4:5dbd ff02::16 ICMPv6 90 Multicast Listener Report Message v2
524 23.973799 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=385183 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
525 23.973977 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=386623 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
526 23.974050 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=388063 Win=1029 Len=0
527 23.974487 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=388063 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
528 23.974984 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=389503 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
529 23.974984 51.195.5.70 192.168.1.123 TLSv1.2 233 Application Data
530 23.975062 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=391122 Win=1029 Len=0
531 24.051398 192.168.1.128 224.0.0.251 MDNS 215 Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question PTR iPad von Aleksandar._companion-link._tcp.local OPT
532 24.051398 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 235 Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question PTR iPad von Aleksandar._companion-link._tcp.local OPT
533 24.305153 192.168.1.128 224.0.0.251 MDNS 172 Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
534 24.305648 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 192 Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
535 24.376072 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=391122 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
536 24.376495 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=392562 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
537 24.376579 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=394002 Win=1029 Len=0
538 24.376771 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=394002 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
539 24.377225 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=395442 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
540 24.377225 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
541 24.377304 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=397839 Win=1029 Len=0
542 24.775832 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=397839 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
543 24.776253 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=399279 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
544 24.776337 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=400719 Win=1029 Len=0
545 24.776739 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=400719 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
546 24.777242 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=402159 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
547 24.777242 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
548 24.777317 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=404555 Win=1029 Len=0
549 24.872175 192.168.1.128 224.0.0.251 MDNS 201 Standard query response 0x0000 PTR iPad von Aleksandar._companion-link._tcp.local TXT OPT
550 24.873504 fe80::4e9:f5bf:61c4:5dbd ff02::fb MDNS 221 Standard query response 0x0000 PTR iPad von Aleksandar._companion-link._tcp.local TXT OPT
551 25.179835 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=404555 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
552 25.180014 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=405995 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
553 25.180090 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=407435 Win=1029 Len=0
554 25.180492 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=407435 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
555 25.180988 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=408875 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
556 25.180988 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
557 25.181113 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=410529 Win=1029 Len=0
558 25.343123 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
559 25.492601 fe80::211:32ff:fe3b:5ade ff02::1:2 DHCPv6 132 Solicit XID: 0x50d385 CID: 000300010011323b5ade
560 25.495030 fe80::e80:63ff:fe26:d10 ff02::1:ff3b:5ade ICMPv6 86 Neighbor Solicitation for fe80::211:32ff:fe3b:5ade from 0c:80:63:26:0d:10
561 25.575341 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=410529 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
562 25.575517 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=411969 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
563 25.575592 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=413409 Win=1029 Len=0
564 25.576005 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=413409 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
565 25.576503 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=414849 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
566 25.576503 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
567 25.576580 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=417245 Win=1029 Len=0
568 25.680717 Cisco_0b:7c:cd CDP/VTP/DTP/PAgP/UDLD CDP 140 Device ID: SEP0024C40B7CCD Port ID: Port 1
569 25.844905 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
570 25.909698 192.168.1.109 224.0.0.251 MDNS 119 Standard query 0x0001 PTR _674A0243._sub._googlecast._tcp.local, "QU" question PTR _8E6C866D._sub._googlecast._tcp.local, "QU" question PTR _googlecast._tcp.local, "QU" question
571 25.974644 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=417245 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
572 25.975059 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=418685 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
573 25.975142 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=420125 Win=1029 Len=0
574 25.976365 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=420125 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
575 25.976365 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=421565 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
576 25.976365 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
577 25.976470 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=423961 Win=1029 Len=0
578 26.106082 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
579 26.371861 192.168.1.2 192.168.1.255 BROWSER 243 Host Announcement UROSEVIC_DS215J, Workstation, Server, Print Queue Server, Xenix Server, NT Workstation, NT Server, DFS server
580 26.373772 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=423961 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
581 26.374268 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=425401 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
582 26.374347 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=426841 Win=1029 Len=0
583 26.374759 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=426841 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
584 26.375262 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=428281 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
585 26.375262 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
586 26.375338 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=429934 Win=1029 Len=0
587 26.683097 Cisco_0b:7c:cd CDP/VTP/DTP/PAgP/UDLD CDP 140 Device ID: SEP0024C40B7CCD Port ID: Port 1
588 26.772810 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=429934 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
589 26.773249 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=431374 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
590 26.773292 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=432814 Win=1029 Len=0
591 26.773744 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=432814 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
592 26.774244 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=434254 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
593 26.774244 51.195.5.70 192.168.1.123 TLSv1.2 1043 Application Data
594 26.774273 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=436683 Win=1029 Len=0
595 26.898241 192.168.1.109 224.0.0.251 MDNS 119 Standard query 0x0002 PTR _674A0243._sub._googlecast._tcp.local, "QM" question PTR _8E6C866D._sub._googlecast._tcp.local, "QM" question PTR _googlecast._tcp.local, "QM" question
596 27.171825 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=436683 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
597 27.172246 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=438123 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
598 27.172282 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=439563 Win=1029 Len=0
599 27.172776 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=439563 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
600 27.173247 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=441003 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
601 27.173247 51.195.5.70 192.168.1.123 TLSv1.2 312 Application Data
602 27.173277 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=442701 Win=1029 Len=0
603 27.573640 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=442701 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
604 27.574200 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=444141 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
605 27.574293 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=445581 Win=1029 Len=0
606 27.574513 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=445581 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
607 27.574877 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=447021 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
608 27.574877 51.195.5.70 192.168.1.123 TLSv1.2 934 Application Data
609 27.574956 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=449341 Win=1029 Len=0
610 27.674357 Cisco_0b:7c:cd CDP/VTP/DTP/PAgP/UDLD CDP 140 Device ID: SEP0024C40B7CCD Port ID: Port 1
611 27.896376 192.168.1.109 224.0.0.251 MDNS 119 Standard query 0x0003 PTR _674A0243._sub._googlecast._tcp.local, "QM" question PTR _8E6C866D._sub._googlecast._tcp.local, "QM" question PTR _googlecast._tcp.local, "QM" question
612 27.970857 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=449341 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
613 27.971034 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=450781 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
614 27.971112 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=452221 Win=1029 Len=0
615 27.971789 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=452221 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
616 27.972298 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=453661 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
617 27.972298 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
618 27.972377 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=456057 Win=1029 Len=0
619 28.205208 192.168.1.123 51.195.113.37 TCP 66 64552 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
620 28.217145 51.195.113.37 192.168.1.123 TCP 62 443 → 64552 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
621 28.217412 192.168.1.123 51.195.113.37 TCP 54 64552 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
622 28.218600 192.168.1.123 51.195.113.37 TLSv1.3 641 Client Hello
623 28.231103 51.195.113.37 192.168.1.123 TLSv1.3 288 Server Hello, Change Cipher Spec, Application Data, Application Data
624 28.237785 192.168.1.123 51.195.113.37 TLSv1.3 118 Change Cipher Spec, Application Data
625 28.238363 192.168.1.123 51.195.113.37 TLSv1.3 146 Application Data
626 28.239386 192.168.1.123 51.195.113.37 TLSv1.3 1136 Application Data
627 28.249624 51.195.113.37 192.168.1.123 TLSv1.3 325 Application Data
628 28.250090 51.195.113.37 192.168.1.123 TLSv1.3 100 Application Data
629 28.250208 192.168.1.123 51.195.113.37 TCP 54 64552 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
630 28.250558 192.168.1.123 51.195.113.37 TLSv1.3 85 Application Data
631 28.253018 51.195.113.37 192.168.1.123 TLSv1.3 391 Application Data
632 28.305792 192.168.1.123 51.195.113.37 TCP 54 64552 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
633 28.307057 51.195.113.37 192.168.1.123 TCP 60 443 → 64552 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
634 28.371376 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=456057 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
635 28.371787 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=457497 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
636 28.371869 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=458937 Win=1029 Len=0
637 28.372071 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=458937 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
638 28.372544 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=460377 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
639 28.372544 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
640 28.372635 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=462030 Win=1029 Len=0
641 28.673597 Cisco_0b:7c:cd CDP/VTP/DTP/PAgP/UDLD CDP 140 Device ID: SEP0024C40B7CCD Port ID: Port 1
642 28.769080 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=462030 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
643 28.769286 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=463470 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
644 28.769323 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=464910 Win=1029 Len=0
645 28.769747 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=464910 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
646 28.770245 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=466350 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
647 28.770245 51.195.5.70 192.168.1.123 TLSv1.2 1021 Application Data
648 28.770276 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=468757 Win=1029 Len=0
649 29.036252 192.168.1.123 51.195.113.37 TCP 54 64552 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
650 29.048471 51.195.113.37 192.168.1.123 TCP 60 443 → 64552 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
651 29.048620 192.168.1.123 51.195.113.37 TCP 54 64552 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
652 29.109297 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
653 29.168164 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=468757 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
654 29.168537 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=470197 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
655 29.168621 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=471637 Win=1029 Len=0
656 29.168812 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=471637 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
657 29.169322 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=473077 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
658 29.169322 51.195.5.70 192.168.1.123 TLSv1.2 257 Application Data
659 29.169401 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=474720 Win=1029 Len=0
660 29.567157 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=474720 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
661 29.567332 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=476160 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
662 29.567406 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=477600 Win=1029 Len=0
663 29.567773 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=477600 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
664 29.568309 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=479040 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
665 29.568309 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
666 29.568389 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=481436 Win=1029 Len=0
667 29.674264 Cisco_0b:7c:cd CDP/VTP/DTP/PAgP/UDLD CDP 140 Device ID: SEP0024C40B7CCD Port ID: Port 1
668 29.968157 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=481436 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
669 29.968552 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=482876 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
670 29.968637 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=484316 Win=1029 Len=0
671 29.968827 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=484316 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
672 29.969320 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=485756 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
673 29.969320 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
674 29.969400 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=488153 Win=1029 Len=0
675 30.346888 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
676 30.369574 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=488153 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
677 30.369574 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=489593 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
678 30.369574 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=491033 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
679 30.369574 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=492473 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
680 30.369574 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
681 30.369700 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=494126 Win=1029 Len=0
682 30.674145 Cisco_0b:7c:cd CDP/VTP/DTP/PAgP/UDLD CDP 140 Device ID: SEP0024C40B7CCD Port ID: Port 1
683 30.766360 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=494126 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
684 30.766360 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=495566 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
685 30.766360 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=497006 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
686 30.766535 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=498446 Win=1029 Len=0
687 30.767114 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=498446 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
688 30.767114 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
689 30.767204 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=500842 Win=1029 Len=0
690 31.165425 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=500842 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
691 31.165836 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=502282 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
692 31.165919 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=503722 Win=1029 Len=0
693 31.166323 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=503722 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
694 31.166828 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=505162 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
695 31.166828 51.195.5.70 192.168.1.123 TLSv1.2 425 Application Data
696 31.166901 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=506973 Win=1029 Len=0
697 31.564931 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=506973 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
698 31.565342 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=508413 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
699 31.565425 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=509853 Win=1029 Len=0
700 31.565830 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=509853 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
701 31.566057 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=511293 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
702 31.566057 51.195.5.70 192.168.1.123 TLSv1.2 853 Application Data
703 31.566132 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=513532 Win=1029 Len=0
704 31.685447 Cisco_0b:7c:cd CDP/VTP/DTP/PAgP/UDLD CDP 140 Device ID: SEP0024C40B7CCD Port ID: Port 1
705 31.973566 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=513532 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
706 31.973566 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=514972 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
707 31.973566 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=516412 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
708 31.973566 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=517852 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
709 31.973566 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
710 31.973679 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=520248 Win=1029 Len=0
711 32.365476 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=520248 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
712 32.366037 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=521688 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
713 32.366037 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=523128 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
714 32.366151 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=524568 Win=1029 Len=0
715 32.366586 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=524568 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
716 32.366586 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
717 32.366678 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=526222 Win=1029 Len=0
718 32.684031 Cisco_0b:7c:cd CDP/VTP/DTP/PAgP/UDLD CDP 140 Device ID: SEP0024C40B7CCD Port ID: Port 1
719 32.763436 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=526222 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
720 32.763848 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=527662 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
721 32.763933 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=529102 Win=1029 Len=0
722 32.764349 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=529102 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
723 32.764854 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=530542 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
724 32.764854 51.195.5.70 192.168.1.123 TLSv1.2 1115 Application Data
725 32.764930 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=533043 Win=1029 Len=0
726 33.160387 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
727 33.163359 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=533043 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
728 33.163857 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=534483 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
729 33.163938 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=535923 Win=1029 Len=0
730 33.164132 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=535923 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
731 33.164605 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=537363 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
732 33.164605 51.195.5.70 192.168.1.123 TLSv1.2 163 Application Data
733 33.164681 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=538912 Win=1029 Len=0
734 33.563015 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=538912 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
735 33.563200 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=540352 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
736 33.563200 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=541792 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
737 33.563290 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=543232 Win=1029 Len=0
738 33.563862 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=543232 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
739 33.563862 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
740 33.563936 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=545628 Win=1029 Len=0
741 33.684351 Cisco_0b:7c:cd CDP/VTP/DTP/PAgP/UDLD CDP 140 Device ID: SEP0024C40B7CCD Port ID: Port 1
742 33.798339 192.168.1.1 224.0.0.1 IGMPv3 60 Membership Query, general
743 33.962459 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=545628 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
744 33.963069 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=547068 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
745 33.963155 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=548508 Win=1029 Len=0
746 33.963359 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=548508 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
747 33.963869 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=549948 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
748 33.963869 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
749 33.963948 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=552344 Win=1029 Len=0
750 34.332356 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
751 34.332413 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
752 34.361392 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=552344 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
753 34.361887 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=553784 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
754 34.361968 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=555224 Win=1029 Len=0
755 34.362374 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=555224 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
756 34.362921 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=556664 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
757 34.362921 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
758 34.363001 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=558317 Win=1029 Len=0
759 34.480517 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
760 34.537487 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
761 34.762223 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=558317 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
762 34.762666 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=559757 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
763 34.762755 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=561197 Win=1029 Len=0
764 34.763131 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=561197 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
765 34.763633 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=562637 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
766 34.763633 51.195.5.70 192.168.1.123 TLSv1.2 1055 Application Data
767 34.763711 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=565078 Win=1029 Len=0
768 34.788044 192.168.1.123 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.252 for any sources
769 34.796659 Cisco_0b:7c:cd LLDP_Multicast LLDP 277 NA/0.0.0.0 LA/0024C40B7CCD:P1 180 SysN=SEP0024C40B7CCD SysD=Cisco IP Phone 7911G,V7, SIP11.9-2-1S
770 34.817501 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
771 34.820488 HuaweiTe_49:c9:15 Broadcast ARP 60 Who has 192.168.1.1? Tell 192.168.1.116
772 34.873490 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
773 34.929441 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
774 35.061052 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
775 35.123082 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
776 35.160922 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=565078 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
777 35.161167 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=566518 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
778 35.161216 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=567958 Win=1029 Len=0
779 35.161625 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=567958 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
780 35.162127 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=569398 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
781 35.162127 51.195.5.70 192.168.1.123 TLSv1.2 223 Application Data
782 35.162169 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=571007 Win=1029 Len=0
783 35.173404 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
784 35.226152 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
785 35.282501 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
786 35.338456 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
787 35.343860 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
788 35.363611 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
789 35.392403 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
790 35.560487 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=571007 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
791 35.560908 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=572447 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
792 35.560993 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=573887 Win=1029 Len=0
793 35.561373 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=573887 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
794 35.561875 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=575327 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
795 35.561875 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
796 35.561951 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=577723 Win=1029 Len=0
797 35.795103 Cisco_0b:7c:cd LLDP_Multicast LLDP 277 NA/0.0.0.0 LA/0024C40B7CCD:P1 180 SysN=SEP0024C40B7CCD SysD=Cisco IP Phone 7911G,V7, SIP11.9-2-1S
798 35.959989 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=577723 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
799 35.960412 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=579163 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
800 35.960496 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=580603 Win=1029 Len=0
801 35.960877 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=580603 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
802 35.961175 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=582043 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
803 35.961175 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
804 35.961253 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=584439 Win=1029 Len=0
805 36.083881 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
806 36.083912 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
807 36.164090 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
808 36.236227 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
809 36.291903 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
810 36.359493 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=584439 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
811 36.359909 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=585879 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
812 36.359995 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=587319 Win=1029 Len=0
813 36.360186 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=587319 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
814 36.360641 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=588759 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
815 36.360641 51.195.5.70 192.168.1.123 TLSv1.2 385 Application Data
816 36.360719 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=590530 Win=1029 Len=0
817 36.567614 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
818 36.624240 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
819 36.678421 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
820 36.759208 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=590530 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
821 36.759626 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=591970 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
822 36.759709 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=593410 Win=1029 Len=0
823 36.760251 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=593410 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
824 36.760732 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=594850 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
825 36.760732 51.195.5.70 192.168.1.123 TLSv1.2 893 Application Data
826 36.760817 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=597129 Win=1029 Len=0
827 36.795121 Cisco_0b:7c:cd LLDP_Multicast LLDP 277 NA/0.0.0.0 LA/0024C40B7CCD:P1 180 SysN=SEP0024C40B7CCD SysD=Cisco IP Phone 7911G,V7, SIP11.9-2-1S
828 36.798429 192.168.1.30 239.255.255.250 IGMPv2 60 Membership Report group 239.255.255.250
829 36.816128 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
830 36.873436 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
831 36.929474 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
832 36.985674 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
833 37.041569 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
834 37.096323 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
835 37.096323 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
836 37.096937 192.168.1.110 224.0.0.251 MDNS 81 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
837 37.097336 fe80::55d5:a9d:8bfd:889e ff02::fb MDNS 101 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
838 37.097929 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0x0328 A BRN001BA9933B17
839 37.097929 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0x0328 A BRN001BA9933B17
840 37.154050 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
841 37.160516 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=597129 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
842 37.161197 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=598569 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
843 37.161197 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=600009 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
844 37.161367 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=601449 Win=1029 Len=0
845 37.161664 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=601449 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
846 37.161664 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
847 37.161741 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=603103 Win=1029 Len=0
848 37.510554 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0x0328 A BRN001BA9933B17
849 37.510554 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0x0328 A BRN001BA9933B17
850 37.558449 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=603103 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
851 37.559004 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=604543 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
852 37.559092 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=605983 Win=1029 Len=0
853 37.559308 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=605983 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
854 37.559659 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=607423 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
855 37.559659 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
856 37.559738 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=609819 Win=1029 Len=0
857 37.798454 192.168.1.123 224.0.0.22 IGMPv3 54 Membership Report / Join group 239.255.255.250 for any sources
858 37.822534 :: ff02::1:ff0b:7ccd ICMPv6 78 Neighbor Solicitation for fe80::224:c4ff:fe0b:7ccd
859 37.829195 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
860 37.829224 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
861 37.853256 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
862 37.958285 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=609819 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
863 37.958761 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=611259 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
864 37.958846 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=612699 Win=1029 Len=0
865 37.959100 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=612699 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
866 37.959398 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=614139 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
867 37.959398 51.195.5.70 192.168.1.123 TLSv1.2 1107 Application Data
868 37.959477 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=616632 Win=1029 Len=0
869 37.978288 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
870 38.032966 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
871 38.102067 192.168.1.110 224.0.0.251 MDNS 81 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
872 38.102067 fe80::55d5:a9d:8bfd:889e ff02::fb MDNS 101 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
873 38.316651 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
874 38.358233 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=616632 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
875 38.358433 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=618072 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
876 38.358481 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=619512 Win=1029 Len=0
877 38.358905 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=619512 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
878 38.359451 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=620952 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
879 38.359451 51.195.5.70 192.168.1.123 TLSv1.2 171 Application Data
880 38.359530 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=622509 Win=1029 Len=0
881 38.369570 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
882 38.423937 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
883 38.550281 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
884 38.606136 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
885 38.613815 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
886 38.651737 Cisco_09:6d:ea CDP/VTP/DTP/PAgP/UDLD CDP 160 Device ID: SEP84B517096DEA Port ID: Port 1
887 38.659731 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
888 38.714351 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
889 38.754985 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=622509 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
890 38.755428 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=623949 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
891 38.755483 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=625389 Win=1029 Len=0
892 38.755893 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=625389 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
893 38.756147 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=626829 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
894 38.756147 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
895 38.756179 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=629225 Win=1029 Len=0
896 38.769392 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
897 38.824483 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
898 38.879723 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
899 39.157289 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=629225 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
900 39.157677 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=630665 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
901 39.157761 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=632105 Win=1029 Len=0
902 39.158186 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=632105 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
903 39.158414 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=633545 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
904 39.158414 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
905 39.158490 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=635198 Win=1029 Len=0
906 39.175648 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
907 39.287498 192.168.1.117 239.255.255.250 SSDP 333 NOTIFY * HTTP/1.1
908 39.287629 192.168.1.123 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.251 for any sources
909 39.298133 192.168.1.117 239.255.255.250 SSDP 351 NOTIFY * HTTP/1.1
910 39.314817 192.168.1.117 239.255.255.250 SSDP 405 NOTIFY * HTTP/1.1
911 39.331658 192.168.1.117 239.255.255.250 SSDP 397 NOTIFY * HTTP/1.1
912 39.348362 192.168.1.117 239.255.255.250 SSDP 327 NOTIFY * HTTP/1.1
913 39.365076 192.168.1.117 239.255.255.250 SSDP 369 NOTIFY * HTTP/1.1
914 39.365325 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
915 39.366050 192.168.1.110 224.0.0.251 MDNS 81 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
916 39.366623 fe80::55d5:a9d:8bfd:889e ff02::fb MDNS 101 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
917 39.367142 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0x66b6 A BRN001BA9933B17
918 39.367142 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0x66b6 A BRN001BA9933B17
919 39.381909 192.168.1.117 239.255.255.250 SSDP 401 NOTIFY * HTTP/1.1
920 39.398379 192.168.1.117 239.255.255.250 SSDP 347 NOTIFY * HTTP/1.1
921 39.414839 192.168.1.117 239.255.255.250 SSDP 399 NOTIFY * HTTP/1.1
922 39.423525 Cisco_0b:7c:cd Broadcast ARP 60 ARP Announcement for 192.168.1.125
923 39.423525 Cisco_0b:7c:cd Broadcast ARP 60 Who has 192.168.1.1? Tell 192.168.1.125
924 39.431617 192.168.1.117 239.255.255.250 SSDP 393 NOTIFY * HTTP/1.1
925 39.434091 192.168.1.125 255.255.255.255 DHCP 590 DHCP Request - Transaction ID 0x763e
926 39.440108 192.168.1.1 255.255.255.255 DHCP 590 DHCP ACK - Transaction ID 0x763e
927 39.482033 Cisco_0b:7c:cd Broadcast ARP 60 ARP Announcement for 192.168.1.125
928 39.482033 Cisco_0b:7c:cd Broadcast ARP 60 Who has 192.168.1.1? Tell 192.168.1.125
929 39.525909 fe80::224:c4ff:fe0b:7ccd ff02::2 ICMPv6 70 Router Solicitation from 00:24:c4:0b:7c:cd
930 39.526598 fe80::224:c4ff:fe0b:7ccd ff02::2 ICMPv6 70 Router Solicitation from 00:24:c4:0b:7c:cd
931 39.527967 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
932 39.531031 fe80::224:c4ff:fe0b:7ccd ff02::1:2 DHCPv6 140 Solicit XID: 0x0041c6 CID: 000300010024c40b7ccd IAA: ::
933 39.558974 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=635198 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
934 39.559405 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=636638 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
935 39.559489 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=638078 Win=1029 Len=0
936 39.559681 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=638078 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
937 39.560195 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=639518 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
938 39.560195 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
939 39.560272 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=641914 Win=1029 Len=0
940 39.580397 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
941 39.580444 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
942 39.731905 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
943 39.787571 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
944 39.787571 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0x66b6 A BRN001BA9933B17
945 39.787571 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0x66b6 A BRN001BA9933B17
946 39.956484 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=641914 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
947 39.957036 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=643354 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
948 39.957085 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=644794 Win=1029 Len=0
949 39.957407 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=644794 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
950 39.957903 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=646234 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
951 39.957903 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
952 39.957944 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=648631 Win=1029 Len=0
953 40.075380 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
954 40.115353 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
955 40.129949 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
956 40.185480 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
957 40.322832 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
958 40.344913 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
959 40.356446 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=648631 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
960 40.356924 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=650071 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
961 40.356959 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=651511 Win=1029 Len=0
962 40.357143 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=651511 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
963 40.357667 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=652951 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
964 40.357667 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
965 40.357696 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=654604 Win=1029 Len=0
966 40.370325 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
967 40.380460 192.168.1.110 224.0.0.251 MDNS 81 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
968 40.381139 fe80::55d5:a9d:8bfd:889e ff02::fb MDNS 101 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
969 40.425305 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
970 40.480411 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
971 40.535254 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
972 40.590964 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
973 40.645371 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
974 40.756300 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=654604 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
975 40.756713 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=656044 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
976 40.756797 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=657484 Win=1029 Len=0
977 40.757461 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=657484 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
978 40.757968 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=658924 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
979 40.757968 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
980 40.758044 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=661320 Win=1029 Len=0
981 40.870479 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
982 41.156562 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=661320 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
983 41.156978 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=662760 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
984 41.157063 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=664200 Win=1029 Len=0
985 41.157204 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=664200 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
986 41.157718 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=665640 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
987 41.157718 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
988 41.157797 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=667294 Win=1029 Len=0
989 41.316039 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
990 41.316100 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
991 41.465208 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
992 41.519732 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
993 41.556308 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=667294 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
994 41.556735 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=668734 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
995 41.556817 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=670174 Win=1029 Len=0
996 41.557207 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=670174 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
997 41.557711 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=671614 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
998 41.557711 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
999 41.557788 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=674010 Win=1029 Len=0
1000 41.796159 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1001 41.852427 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1002 41.906111 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1003 41.958075 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=674010 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1004 41.958452 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=675450 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1005 41.958501 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=676890 Win=1029 Len=0
1006 41.958695 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=676890 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1007 41.959204 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=678330 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1008 41.959204 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1009 41.959247 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=680727 Win=1029 Len=0
1010 42.040695 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1011 42.088904 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1012 42.142998 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1013 42.198162 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1014 42.253473 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1015 42.320837 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1016 42.355768 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=680727 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1017 42.356034 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=682167 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1018 42.356084 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=683607 Win=1029 Len=0
1019 42.356433 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=683607 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1020 42.356934 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=685047 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1021 42.356934 51.195.5.70 192.168.1.123 TLSv1.2 351 Application Data
1022 42.356980 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=686784 Win=1029 Len=0
1023 42.367147 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1024 42.754541 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=686784 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1025 42.754977 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=688224 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1026 42.755068 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=689664 Win=1029 Len=0
1027 42.755231 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=689664 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1028 42.755737 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=691104 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1029 42.755737 51.195.5.70 192.168.1.123 TLSv1.2 926 Application Data
1030 42.755817 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=693416 Win=1029 Len=0
1031 42.787754 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
1032 42.819801 192.168.1.123 192.168.1.1 DNS 91 Standard query 0xe0ef A browser.pipe.aria.microsoft.com
1033 42.830247 fe80::224:c4ff:fe0b:7ccd ff02::1:2 DHCPv6 140 Solicit XID: 0x0041c6 CID: 000300010024c40b7ccd IAA: ::
1034 42.831096 192.168.1.1 192.168.1.123 DNS 203 Standard query response 0xe0ef A browser.pipe.aria.microsoft.com CNAME browser.events.data.trafficmanager.net CNAME skypedataprdcolneu04.cloudapp.net A 52.114.77.33
1035 42.832661 192.168.1.123 52.114.77.33 TCP 66 64553 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
1036 42.864413 52.114.77.33 192.168.1.123 TCP 66 443 → 64553 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1440 WS=256 SACK_PERM=1
1037 42.864692 192.168.1.123 52.114.77.33 TCP 54 64553 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
1038 42.865701 192.168.1.123 52.114.77.33 TLSv1.2 571 Client Hello
1039 42.906189 52.114.77.33 192.168.1.123 TCP 1494 443 → 64553 [ACK] Seq=1 Ack=518 Win=525056 Len=1440 [TCP segment of a reassembled PDU]
1040 42.906822 52.114.77.33 192.168.1.123 TCP 1494 443 → 64553 [ACK] Seq=1441 Ack=518 Win=525056 Len=1440 [TCP segment of a reassembled PDU]
1041 42.906822 52.114.77.33 192.168.1.123 TCP 1494 443 → 64553 [ACK] Seq=2881 Ack=518 Win=525056 Len=1440 [TCP segment of a reassembled PDU]
1042 42.906957 192.168.1.123 52.114.77.33 TCP 54 64553 → 443 [ACK] Seq=518 Ack=4321 Win=263424 Len=0
1043 42.907187 52.114.77.33 192.168.1.123 TCP 1494 443 → 64553 [ACK] Seq=4321 Ack=518 Win=525056 Len=1440 [TCP segment of a reassembled PDU]
1044 42.907278 192.168.1.123 52.114.77.33 TCP 54 64553 → 443 [ACK] Seq=518 Ack=5761 Win=263424 Len=0
1045 42.907380 52.114.77.33 192.168.1.123 TLSv1.2 602 Server Hello, Certificate, Certificate Status, Server Key Exchange, Server Hello Done
1046 42.945499 192.168.1.123 52.114.77.33 TLSv1.2 212 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
1047 42.987826 52.114.77.33 192.168.1.123 TLSv1.2 105 Change Cipher Spec, Encrypted Handshake Message
1048 42.990314 192.168.1.123 52.114.77.33 TLSv1.2 850 Application Data
1049 42.990385 192.168.1.123 52.114.77.33 TLSv1.2 733 Application Data
1050 43.003797 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1051 43.003835 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1052 43.023516 52.114.77.33 192.168.1.123 TCP 60 443 → 64553 [ACK] Seq=6360 Ack=2151 Win=525568 Len=0
1053 43.024211 52.114.77.33 192.168.1.123 TLSv1.2 480 Application Data
1054 43.065126 192.168.1.123 52.114.77.33 TCP 54 64553 → 443 [ACK] Seq=2151 Ack=6786 Win=262400 Len=0
1055 43.152899 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1056 43.154000 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=693416 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1057 43.154418 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=694856 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1058 43.154502 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=696296 Win=1029 Len=0
1059 43.154754 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=696296 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1060 43.155289 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=697736 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1061 43.155289 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1062 43.155369 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=700132 Win=1029 Len=0
1063 43.194249 192.168.1.123 51.195.113.37 TCP 66 64554 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
1064 43.207845 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1065 43.220155 51.195.113.37 192.168.1.123 TCP 62 443 → 64554 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
1066 43.220443 192.168.1.123 51.195.113.37 TCP 54 64554 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
1067 43.221533 192.168.1.123 51.195.113.37 TLSv1.3 641 Client Hello
1068 43.233841 51.195.113.37 192.168.1.123 TLSv1.3 288 Server Hello, Change Cipher Spec, Application Data, Application Data
1069 43.236817 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
1070 43.240316 192.168.1.123 51.195.113.37 TLSv1.3 118 Change Cipher Spec, Application Data
1071 43.240828 192.168.1.123 51.195.113.37 TLSv1.3 146 Application Data
1072 43.241861 192.168.1.123 51.195.113.37 TLSv1.3 1136 Application Data
1073 43.252058 51.195.113.37 192.168.1.123 TLSv1.3 325 Application Data
1074 43.252058 51.195.113.37 192.168.1.123 TLSv1.3 100 Application Data
1075 43.252274 192.168.1.123 51.195.113.37 TCP 54 64554 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
1076 43.252830 192.168.1.123 51.195.113.37 TLSv1.3 85 Application Data
1077 43.254000 51.195.113.37 192.168.1.123 TLSv1.3 391 Application Data
1078 43.295413 192.168.1.123 51.195.113.37 TCP 54 64554 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
1079 43.307051 51.195.113.37 192.168.1.123 TCP 60 443 → 64554 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
1080 43.501399 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1081 43.557171 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1082 43.558992 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=700132 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1083 43.559489 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=701572 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1084 43.559573 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=703012 Win=1029 Len=0
1085 43.560194 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=703012 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1086 43.560194 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=704452 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1087 43.560194 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
1088 43.560293 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=706106 Win=1029 Len=0
1089 43.611021 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1090 43.740689 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1091 43.794816 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1092 43.849630 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1093 43.905095 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1094 43.960740 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1095 43.975518 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=706106 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1096 43.975518 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=707546 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1097 43.975518 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=708986 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1098 43.975518 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=710426 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1099 43.975518 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1100 43.975647 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=712822 Win=1029 Len=0
1101 44.015306 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1102 44.070402 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1103 44.372615 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=712822 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1104 44.373815 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=714262 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1105 44.373815 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=715702 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1106 44.373815 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=717142 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1107 44.373815 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
1108 44.373961 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=718796 Win=1029 Len=0
1109 44.385731 Cisco_0b:7c:cd Nearest-non-TPMR-bridge EAPOL 60 Start
1110 44.743732 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1111 44.743794 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1112 44.752011 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=718796 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1113 44.752404 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=720236 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1114 44.752481 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=721676 Win=1029 Len=0
1115 44.752707 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=721676 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1116 44.754101 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=723116 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1117 44.754101 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1118 44.754206 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=725512 Win=1029 Len=0
1119 44.898293 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1120 44.953331 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1121 45.184110 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=725512 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1122 45.184557 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=726952 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1123 45.184643 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=728392 Win=1029 Len=0
1124 45.185016 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=728392 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1125 45.185245 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=729832 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1126 45.185245 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1127 45.185321 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=732228 Win=1029 Len=0
1128 45.232430 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1129 45.287054 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1130 45.339807 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1131 45.352229 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
1132 45.469048 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1133 45.523532 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1134 45.560845 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=732228 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1135 45.561246 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=733668 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1136 45.561330 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=735108 Win=1029 Len=0
1137 45.561765 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=735108 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1138 45.561995 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=736548 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1139 45.561995 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
1140 45.562071 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=738202 Win=1029 Len=0
1141 45.581722 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1142 45.634713 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1143 45.691100 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1144 45.744574 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1145 45.799352 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1146 45.948619 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=738202 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1147 45.948619 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=739642 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1148 45.948784 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=741082 Win=1029 Len=0
1149 45.949232 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=741082 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1150 45.949232 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=742522 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1151 45.949307 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=743962 Win=1029 Len=0
1152 45.949746 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1153 46.000848 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=744918 Win=1025 Len=0
1154 46.111825 fe80::224:c4ff:fe0b:7ccd ff02::1:2 DHCPv6 140 Solicit XID: 0x0041c6 CID: 000300010024c40b7ccd IAA: ::
1155 46.132624 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
1156 46.250981 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
1157 46.349578 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=744918 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1158 46.350040 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=746358 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1159 46.350123 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=747798 Win=1029 Len=0
1160 46.350319 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=747798 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1161 46.350778 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=749238 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1162 46.350778 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1163 46.350855 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=750891 Win=1029 Len=0
1164 46.459384 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1165 46.459442 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1166 46.622277 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1167 46.661013 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1168 46.750361 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=750891 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1169 46.750783 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=752331 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1170 46.750867 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=753771 Win=1029 Len=0
1171 46.751060 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=753771 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1172 46.751536 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=755211 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1173 46.751536 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1174 46.751615 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=757608 Win=1029 Len=0
1175 46.951051 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1176 47.005812 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1177 47.028990 Cisco_09:41:44 LLDP_Multicast LLDP 310 NA/192.168.1.113 LA/84B517094144:P1 180 SysN=SEP84B517094144 SysD=Cisco IP Phone 8851, V1, sip88xx.12-8-1-0001-455.loads
1178 47.059414 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1179 47.148131 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=757608 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1180 47.148310 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=759048 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1181 47.148384 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=760488 Win=1029 Len=0
1182 47.148785 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=760488 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1183 47.149313 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=761928 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1184 47.149313 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1185 47.149401 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=763581 Win=1029 Len=0
1186 47.184462 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1187 47.238791 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1188 47.293306 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1189 47.347864 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1190 47.401412 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1191 47.454483 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1192 47.510456 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1193 47.547314 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=763581 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1194 47.547802 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=765021 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1195 47.547886 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=766461 Win=1029 Len=0
1196 47.548298 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=766461 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1197 47.548801 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=767901 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1198 47.548801 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1199 47.548876 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=770297 Win=1029 Len=0
1200 47.908372 192.168.1.109 224.0.0.251 MDNS 119 Standard query 0x0004 PTR _674A0243._sub._googlecast._tcp.local, "QM" question PTR _8E6C866D._sub._googlecast._tcp.local, "QM" question PTR _googlecast._tcp.local, "QM" question
1201 47.946347 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=770297 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1202 47.946815 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=771737 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1203 47.946899 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=773177 Win=1029 Len=0
1204 47.947307 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=773177 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1205 47.947807 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=774617 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1206 47.947807 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1207 47.947883 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=777014 Win=1029 Len=0
1208 48.164349 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1209 48.164408 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1210 48.314746 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1211 48.354387 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=777014 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1212 48.354387 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=778454 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1213 48.354548 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=779894 Win=1029 Len=0
1214 48.354748 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=779894 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1215 48.355296 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=781334 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1216 48.355296 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1217 48.355371 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=782987 Win=1029 Len=0
1218 48.369566 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1219 48.438063 192.168.1.123 54.38.152.153 TCP 55 [TCP Keep-Alive] 64506 → 443 [ACK] Seq=1 Ack=1 Win=1025 Len=1
1220 48.449328 54.38.152.153 192.168.1.123 TCP 60 [TCP Keep-Alive ACK] 443 → 64506 [ACK] Seq=1 Ack=2 Win=260 Len=0
1221 48.658750 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1222 48.713141 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1223 48.745906 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=782987 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1224 48.746381 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=784427 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1225 48.746464 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=785867 Win=1029 Len=0
1226 48.746817 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=785867 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1227 48.747320 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=787307 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1228 48.747320 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1229 48.747396 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=789703 Win=1029 Len=0
1230 48.767812 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1231 48.896631 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1232 48.951896 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1233 49.007462 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1234 49.061844 192.168.1.123 52.114.77.33 TCP 54 64553 → 443 [FIN, ACK] Seq=2151 Ack=6786 Win=262400 Len=0
1235 49.062181 192.168.1.123 51.195.113.37 TCP 54 64554 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
1236 49.062977 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1237 49.074159 51.195.113.37 192.168.1.123 TCP 60 443 → 64554 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
1238 49.074320 192.168.1.123 51.195.113.37 TCP 54 64554 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
1239 49.093656 52.114.77.33 192.168.1.123 TCP 60 443 → 64553 [FIN, ACK] Seq=6786 Ack=2152 Win=525568 Len=0
1240 49.093859 192.168.1.123 52.114.77.33 TCP 54 64553 → 443 [ACK] Seq=2152 Ack=6787 Win=262400 Len=0
1241 49.117584 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1242 49.146595 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=789703 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1243 49.147070 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=791143 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1244 49.147155 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=792583 Win=1029 Len=0
1245 49.147574 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=792583 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1246 49.148077 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=794023 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1247 49.148077 51.195.5.70 192.168.1.123 TLSv1.2 1034 Application Data
1248 49.148152 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=796443 Win=1029 Len=0
1249 49.172449 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1250 49.227555 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1251 49.264259 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
1252 49.545348 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=796443 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1253 49.545748 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=797883 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1254 49.545833 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=799323 Win=1029 Len=0
1255 49.546106 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=799323 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1256 49.546740 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=800763 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1257 49.546740 51.195.5.70 192.168.1.123 TLSv1.2 243 Application Data
1258 49.546824 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=802392 Win=1029 Len=0
1259 49.917706 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1260 49.917737 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1261 49.944633 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=802392 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1262 49.945336 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=803832 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1263 49.945420 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=805272 Win=1029 Len=0
1264 49.945844 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=805272 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1265 49.946344 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=806712 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1266 49.946344 51.195.5.70 192.168.1.123 TLSv1.2 1094 Application Data
1267 49.946423 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=809192 Win=1029 Len=0
1268 50.068281 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1269 50.122100 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1270 50.187183 Cisco_09:41:44 CDP/VTP/DTP/PAgP/UDLD CDP 166 Device ID: SEP84B517094144 Port ID: Port 1
1271 50.343896 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=809192 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1272 50.344325 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=810632 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1273 50.344361 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=812072 Win=1029 Len=0
1274 50.344820 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=812072 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1275 50.345318 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=813512 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1276 50.345318 51.195.5.70 192.168.1.123 TLSv1.2 185 Application Data
1277 50.345344 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=815083 Win=1029 Len=0
1278 50.347333 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
1279 50.410416 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1280 50.465015 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1281 50.519893 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1282 50.648951 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1283 50.703581 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1284 50.745675 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=815083 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1285 50.746135 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=816523 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1286 50.746220 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=817963 Win=1029 Len=0
1287 50.746411 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=817963 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1288 50.746846 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=819403 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1289 50.746846 51.195.5.70 192.168.1.123 TLSv1.2 1009 Application Data
1290 50.746925 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=821798 Win=1029 Len=0
1291 50.758485 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1292 50.813289 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1293 50.881119 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1294 50.924234 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1295 50.978287 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1296 51.144696 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=821798 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1297 51.145143 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=823238 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1298 51.145228 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=824678 Win=1029 Len=0
1299 51.145433 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=824678 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1300 51.145841 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=826118 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1301 51.145841 51.195.5.70 192.168.1.123 TLSv1.2 1012 Application Data
1302 51.145921 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=828516 Win=1029 Len=0
1303 51.310689 fe80::224:c4ff:fe0b:7ccd ff02::1:2 DHCPv6 140 Solicit XID: 0x0041c6 CID: 000300010024c40b7ccd IAA: ::
1304 51.546163 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=828516 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1305 51.546605 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=829956 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1306 51.546689 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=831396 Win=1029 Len=0
1307 51.547123 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=831396 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1308 51.547604 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=832836 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1309 51.547604 51.195.5.70 192.168.1.123 TLSv1.2 266 Application Data
1310 51.547679 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=834488 Win=1029 Len=0
1311 51.597377 192.168.1.123 143.204.94.100 TCP 54 64533 → 443 [FIN, ACK] Seq=1 Ack=1 Win=1025 Len=0
1312 51.608275 143.204.94.100 192.168.1.123 TCP 60 443 → 64533 [FIN, ACK] Seq=1 Ack=2 Win=265 Len=0
1313 51.608398 192.168.1.123 143.204.94.100 TCP 54 64533 → 443 [ACK] Seq=2 Ack=2 Win=1025 Len=0
1314 51.636434 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1315 51.636486 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1316 51.782939 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1317 51.837834 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1318 51.944660 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=834488 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1319 51.945069 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=835928 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1320 51.945105 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=837368 Win=1029 Len=0
1321 51.945272 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=837368 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1322 51.945830 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=838808 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1323 51.945830 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1324 51.945860 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=841205 Win=1029 Len=0
1325 52.115391 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1326 52.169483 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1327 52.223471 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1328 52.343207 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=841205 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1329 52.343618 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=842645 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1330 52.343702 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=844085 Win=1029 Len=0
1331 52.344115 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=844085 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1332 52.344340 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=845525 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1333 52.344340 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1334 52.344415 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=847178 Win=1029 Len=0
1335 52.351069 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1336 52.408089 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1337 52.462068 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1338 52.531578 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1339 52.573191 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1340 52.628689 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1341 52.682117 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1342 52.743157 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=847178 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1343 52.743380 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=848618 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1344 52.743421 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=850058 Win=1029 Len=0
1345 52.747078 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=850058 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1346 52.747078 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=851498 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1347 52.747078 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1348 52.747168 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=853895 Win=1029 Len=0
1349 53.146169 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=853895 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1350 53.146169 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=855335 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1351 53.146169 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=856775 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1352 53.146169 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=858215 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1353 53.146169 51.195.5.70 192.168.1.123 TLSv1.2 1009 Application Data
1354 53.146294 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=860610 Win=1029 Len=0
1355 53.204255 192.168.1.123 93.184.220.29 TCP 54 [TCP ACKed unseen segment] 64536 → 80 [FIN, ACK] Seq=1 Ack=2 Win=1026 Len=0
1356 53.221951 93.184.220.29 192.168.1.123 TCP 60 [TCP Previous segment not captured] 80 → 64536 [FIN, ACK] Seq=2 Ack=2 Win=131 Len=0
1357 53.222023 192.168.1.123 93.184.220.29 TCP 54 [TCP ACKed unseen segment] 64536 → 80 [ACK] Seq=2 Ack=3 Win=1026 Len=0
1358 53.331797 Cisco_b3:76:2e CDP/VTP/DTP/PAgP/UDLD CDP 130 Device ID: SIP000BBEB3762E Port ID: Port 1
1359 53.334000 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
1360 53.343121 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1361 53.343159 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1362 53.489979 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1363 53.544593 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=860610 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1364 53.544593 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=862050 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1365 53.544593 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=863490 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1366 53.544593 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=864930 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1367 53.544593 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
1368 53.544816 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=866584 Win=1029 Len=0
1369 53.545615 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1370 53.819685 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1371 53.874414 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1372 53.928255 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1373 53.943415 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=866584 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1374 53.943880 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=868024 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1375 53.943964 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=869464 Win=1029 Len=0
1376 53.944425 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=869464 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1377 53.944669 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=870904 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1378 53.944669 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1379 53.944747 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=873301 Win=1029 Len=0
1380 54.057631 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1381 54.112900 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1382 54.167475 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1383 54.222615 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1384 54.240383 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
1385 54.277970 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1386 54.333617 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1387 54.341923 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=873301 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1388 54.349588 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=874741 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1389 54.349588 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=876181 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1390 54.349588 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=877621 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1391 54.349588 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1392 54.349700 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=879274 Win=1029 Len=0
1393 54.395564 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1394 54.742779 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=879274 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1395 54.742779 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=880714 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1396 54.742779 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=882154 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1397 54.742779 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=883594 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1398 54.742779 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1399 54.743012 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=885991 Win=1029 Len=0
1400 55.026138 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1401 55.026196 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1402 55.139997 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=885991 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1403 55.140380 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=887431 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1404 55.140463 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=888871 Win=1029 Len=0
1405 55.140888 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=888871 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1406 55.141136 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=890311 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1407 55.141136 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1408 55.141212 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=892707 Win=1029 Len=0
1409 55.174546 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1410 55.228847 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1411 55.350038 Cisco_0b:7c:cd Broadcast ARP 60 Who has 192.168.1.2? Tell 192.168.1.125
1412 55.350038 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
1413 55.505420 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1414 55.553571 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=892707 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1415 55.553571 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=894147 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1416 55.553571 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=895587 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1417 55.553571 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=897027 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1418 55.553571 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1419 55.553676 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=898680 Win=1029 Len=0
1420 55.560476 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1421 55.615547 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1422 55.743160 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1423 55.800964 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1424 55.850537 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1425 55.902311 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1426 55.940486 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=898680 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1427 55.940906 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=900120 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1428 55.940992 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=901560 Win=1029 Len=0
1429 55.941187 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=901560 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1430 55.941956 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=903000 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1431 55.941956 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1432 55.942052 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=905396 Win=1029 Len=0
1433 55.956915 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1434 56.011994 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1435 56.067007 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1436 56.334433 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
1437 56.341692 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=905396 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1438 56.342067 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=906836 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1439 56.342148 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=908276 Win=1029 Len=0
1440 56.342369 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=908276 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1441 56.342914 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=909716 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1442 56.342914 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
1443 56.342995 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=911370 Win=1029 Len=0
1444 56.701994 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1445 56.702052 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1446 56.739278 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=911370 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1447 56.739701 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=912810 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1448 56.739786 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=914250 Win=1029 Len=0
1449 56.740031 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=914250 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1450 56.740672 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=915690 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1451 56.740672 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1452 56.740752 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=918086 Win=1029 Len=0
1453 56.849820 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1454 56.904539 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1455 56.995821 192.168.1.124 239.255.255.250 SSDP 216 M-SEARCH * HTTP/1.1
1456 57.138271 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=918086 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1457 57.138698 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=919526 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1458 57.138782 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=920966 Win=1029 Len=0
1459 57.139184 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=920966 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1460 57.139683 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=922406 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1461 57.139683 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1462 57.139759 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=924802 Win=1029 Len=0
1463 57.176854 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1464 57.231822 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1465 57.286746 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1466 57.414855 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1467 57.469816 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1468 57.523193 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1469 57.538458 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=924802 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1470 57.538835 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=926242 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1471 57.538918 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=927682 Win=1029 Len=0
1472 57.539116 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=927682 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1473 57.539675 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=929122 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1474 57.539675 51.195.5.70 192.168.1.123 TLSv1.2 303 Application Data
1475 57.539753 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=930811 Win=1029 Len=0
1476 57.578331 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1477 57.633050 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1478 57.688262 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1479 57.743065 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1480 57.936480 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=930811 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1481 57.936910 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=932251 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1482 57.936950 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=933691 Win=1029 Len=0
1483 57.937412 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=933691 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1484 57.937652 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=935131 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1485 57.937652 51.195.5.70 192.168.1.123 TLSv1.2 975 Application Data
1486 57.937686 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=937492 Win=1029 Len=0
1487 58.004155 192.168.1.124 239.255.255.250 SSDP 216 M-SEARCH * HTTP/1.1
1488 58.208782 192.168.1.123 51.195.113.37 TCP 66 64555 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
1489 58.220783 51.195.113.37 192.168.1.123 TCP 62 443 → 64555 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
1490 58.221045 192.168.1.123 51.195.113.37 TCP 54 64555 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
1491 58.222280 192.168.1.123 51.195.113.37 TLSv1.3 641 Client Hello
1492 58.234026 51.195.113.37 192.168.1.123 TLSv1.3 288 Server Hello, Change Cipher Spec, Application Data, Application Data
1493 58.240559 192.168.1.123 51.195.113.37 TLSv1.3 118 Change Cipher Spec, Application Data
1494 58.241059 192.168.1.123 51.195.113.37 TLSv1.3 146 Application Data
1495 58.242088 192.168.1.123 51.195.113.37 TLSv1.3 1136 Application Data
1496 58.252487 51.195.113.37 192.168.1.123 TLSv1.3 325 Application Data
1497 58.253134 51.195.113.37 192.168.1.123 TLSv1.3 100 Application Data
1498 58.253253 192.168.1.123 51.195.113.37 TCP 54 64555 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
1499 58.253643 192.168.1.123 51.195.113.37 TLSv1.3 85 Application Data
1500 58.254451 51.195.113.37 192.168.1.123 TLSv1.3 391 Application Data
1501 58.307280 51.195.113.37 192.168.1.123 TCP 60 443 → 64555 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
1502 58.309603 192.168.1.123 51.195.113.37 TCP 54 64555 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
1503 58.336004 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=937492 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1504 58.336476 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=938932 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1505 58.336557 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=940372 Win=1029 Len=0
1506 58.336752 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=940372 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1507 58.337197 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=941812 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1508 58.337197 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
1509 58.337273 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=943466 Win=1029 Len=0
1510 58.382938 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1511 58.382992 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1512 58.528067 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1513 58.549996 192.168.1.1 239.255.255.250 SSDP 464 NOTIFY * HTTP/1.1
1514 58.549996 192.168.1.1 239.255.255.250 SSDP 473 NOTIFY * HTTP/1.1
1515 58.550433 192.168.1.1 239.255.255.250 SSDP 536 NOTIFY * HTTP/1.1
1516 58.550433 192.168.1.1 239.255.255.250 SSDP 528 NOTIFY * HTTP/1.1
1517 58.550766 192.168.1.1 239.255.255.250 SSDP 473 NOTIFY * HTTP/1.1
1518 58.550766 192.168.1.1 239.255.255.250 SSDP 512 NOTIFY * HTTP/1.1
1519 58.550766 192.168.1.1 239.255.255.250 SSDP 544 NOTIFY * HTTP/1.1
1520 58.551216 192.168.1.1 239.255.255.250 SSDP 473 NOTIFY * HTTP/1.1
1521 58.551216 192.168.1.1 239.255.255.250 SSDP 532 NOTIFY * HTTP/1.1
1522 58.551492 192.168.1.1 239.255.255.250 SSDP 526 NOTIFY * HTTP/1.1
1523 58.583360 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1524 58.653741 192.168.1.1 239.255.255.250 SSDP 464 NOTIFY * HTTP/1.1
1525 58.653741 192.168.1.1 239.255.255.250 SSDP 473 NOTIFY * HTTP/1.1
1526 58.653741 192.168.1.1 239.255.255.250 SSDP 536 NOTIFY * HTTP/1.1
1527 58.653741 192.168.1.1 239.255.255.250 SSDP 528 NOTIFY * HTTP/1.1
1528 58.653741 192.168.1.1 239.255.255.250 SSDP 473 NOTIFY * HTTP/1.1
1529 58.653741 192.168.1.1 239.255.255.250 SSDP 512 NOTIFY * HTTP/1.1
1530 58.653741 192.168.1.1 239.255.255.250 SSDP 544 NOTIFY * HTTP/1.1
1531 58.654738 192.168.1.1 239.255.255.250 SSDP 473 NOTIFY * HTTP/1.1
1532 58.654738 192.168.1.1 239.255.255.250 SSDP 532 NOTIFY * HTTP/1.1
1533 58.654738 192.168.1.1 239.255.255.250 SSDP 526 NOTIFY * HTTP/1.1
1534 58.736795 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=943466 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1535 58.737211 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=944906 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1536 58.737296 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=946346 Win=1029 Len=0
1537 58.737490 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=946346 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1538 58.737956 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=947786 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1539 58.737956 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1540 58.738037 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=950182 Win=1029 Len=0
1541 58.861924 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1542 58.917506 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1543 58.971720 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1544 59.009357 192.168.1.124 239.255.255.250 SSDP 216 M-SEARCH * HTTP/1.1
1545 59.069982 192.168.1.123 51.195.113.37 TCP 54 64555 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
1546 59.082140 51.195.113.37 192.168.1.123 TCP 60 443 → 64555 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
1547 59.082244 192.168.1.123 51.195.113.37 TCP 54 64555 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
1548 59.100388 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1549 59.134802 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=950182 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1550 59.134976 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=951622 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1551 59.135050 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=953062 Win=1029 Len=0
1552 59.135459 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=953062 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1553 59.135965 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=954502 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1554 59.135965 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1555 59.136043 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=956898 Win=1029 Len=0
1556 59.153786 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1557 59.211890 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1558 59.263791 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1559 59.281987 192.168.1.117 239.255.255.250 SSDP 333 NOTIFY * HTTP/1.1
1560 59.298241 192.168.1.117 239.255.255.250 SSDP 351 NOTIFY * HTTP/1.1
1561 59.314895 192.168.1.117 239.255.255.250 SSDP 405 NOTIFY * HTTP/1.1
1562 59.319197 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1563 59.331967 192.168.1.117 239.255.255.250 SSDP 397 NOTIFY * HTTP/1.1
1564 59.338611 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
1565 59.348484 192.168.1.117 239.255.255.250 SSDP 327 NOTIFY * HTTP/1.1
1566 59.364886 192.168.1.117 239.255.255.250 SSDP 369 NOTIFY * HTTP/1.1
1567 59.374293 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1568 59.383091 192.168.1.117 239.255.255.250 SSDP 401 NOTIFY * HTTP/1.1
1569 59.398463 192.168.1.117 239.255.255.250 SSDP 347 NOTIFY * HTTP/1.1
1570 59.414943 192.168.1.117 239.255.255.250 SSDP 399 NOTIFY * HTTP/1.1
1571 59.436105 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1572 59.436105 192.168.1.117 239.255.255.250 SSDP 393 NOTIFY * HTTP/1.1
1573 59.533755 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=956898 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1574 59.533963 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=958338 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1575 59.534001 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=959778 Win=1029 Len=0
1576 59.534429 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=959778 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1577 59.535093 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=961218 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1578 59.535093 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1579 59.535135 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=962871 Win=1029 Len=0
1580 59.798035 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
1581 59.933452 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=962871 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1582 59.933452 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=964311 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1583 59.933641 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=965751 Win=1029 Len=0
1584 59.934044 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=965751 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1585 59.934471 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=967191 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1586 59.934471 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1587 59.934552 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=969588 Win=1029 Len=0
1588 60.017397 192.168.1.124 239.255.255.250 SSDP 216 M-SEARCH * HTTP/1.1
1589 60.064267 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1590 60.064306 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1591 60.107223 fe80::224:c4ff:fe0b:7ccd ff02::1:2 DHCPv6 140 Solicit XID: 0x0041c6 CID: 000300010024c40b7ccd IAA: ::
1592 60.210694 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1593 60.265563 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1594 60.333300 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=969588 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1595 60.333477 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=971028 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1596 60.333556 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=972468 Win=1029 Len=0
1597 60.333718 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=972468 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1598 60.334221 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=973908 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1599 60.334221 51.195.5.70 192.168.1.123 TLSv1.2 266 Application Data
1600 60.334305 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=975560 Win=1029 Len=0
1601 60.350506 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
1602 60.543254 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1603 60.598403 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1604 60.653432 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1605 60.743069 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=975560 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1606 60.743069 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=977000 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1607 60.743069 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=978440 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1608 60.743069 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=979880 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1609 60.743069 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1610 60.743271 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=982277 Win=1029 Len=0
1611 60.795382 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1612 60.838262 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1613 60.892137 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1614 60.947932 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1615 61.003768 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1616 61.058314 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1617 61.114057 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1618 61.133502 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=982277 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1619 61.133752 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=983717 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1620 61.133795 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=985157 Win=1029 Len=0
1621 61.134215 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=985157 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1622 61.134691 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=986597 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1623 61.134691 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1624 61.134726 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=988994 Win=1029 Len=0
1625 61.531023 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=988994 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1626 61.531526 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=990434 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1627 61.531610 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=991874 Win=1029 Len=0
1628 61.532017 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=991874 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1629 61.532495 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=993314 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1630 61.532495 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1631 61.532569 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=994967 Win=1029 Len=0
1632 61.761289 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1633 61.761320 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1634 61.906611 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1635 61.931552 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=994967 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1636 61.931717 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=996407 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1637 61.931790 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=997847 Win=1029 Len=0
1638 61.932235 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=997847 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1639 61.932944 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=999287 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1640 61.932944 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1641 61.933034 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1001683 Win=1029 Len=0
1642 61.960968 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1643 62.234950 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1644 62.290667 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1645 62.337587 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1001683 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1646 62.337762 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1003123 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1647 62.337840 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1004563 Win=1029 Len=0
1648 62.338250 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1004563 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1649 62.338250 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1006003 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1650 62.338318 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1007443 Win=1029 Len=0
1651 62.338709 51.195.5.70 192.168.1.123 TLSv1.2 292 Application Data
1652 62.343721 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1653 62.380552 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1007681 Win=1028 Len=0
1654 62.471001 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1655 62.526340 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1656 62.581524 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1657 62.639950 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1658 62.691801 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1659 62.731802 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1007681 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1660 62.732221 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1009121 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1661 62.732264 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1010561 Win=1029 Len=0
1662 62.732771 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1010561 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1663 62.733534 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1012001 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1664 62.733534 51.195.5.70 192.168.1.123 TLSv1.2 986 Application Data
1665 62.733631 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1014373 Win=1029 Len=0
1666 62.745600 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1667 62.800871 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1668 63.130824 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1014373 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1669 63.131238 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1015813 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1670 63.131293 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1017253 Win=1029 Len=0
1671 63.131736 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1017253 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1672 63.132232 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1018693 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1673 63.132232 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1674 63.132278 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1021089 Win=1029 Len=0
1675 63.404771 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
1676 63.440864 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1677 63.440919 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1678 63.532623 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1021089 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1679 63.533057 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1022529 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1680 63.533150 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1023969 Win=1029 Len=0
1681 63.533581 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1023969 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1682 63.533821 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1025409 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1683 63.533821 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1684 63.533897 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1027062 Win=1029 Len=0
1685 63.588140 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1686 63.643271 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1687 63.920759 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1688 63.930528 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1027062 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1689 63.931017 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1028502 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1690 63.931100 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1029942 Win=1029 Len=0
1691 63.931544 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1029942 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1692 63.932025 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1031382 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1693 63.932025 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1694 63.932100 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1033778 Win=1029 Len=0
1695 63.975626 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1696 64.030398 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1697 64.160099 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1698 64.184689 192.168.1.123 172.67.75.39 TCP 54 64539 → 443 [FIN, ACK] Seq=1 Ack=1 Win=1021 Len=0
1699 64.215478 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1700 64.270545 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1701 64.336903 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1702 64.336903 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1033778 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1703 64.336903 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1035218 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1704 64.336903 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1036658 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1705 64.336903 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1038098 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1706 64.336903 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
1707 64.337060 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1039752 Win=1029 Len=0
1708 64.346846 172.67.75.39 192.168.1.123 TCP 60 443 → 64539 [FIN, ACK] Seq=1 Ack=2 Win=67 Len=0
1709 64.346955 192.168.1.123 172.67.75.39 TCP 54 64539 → 443 [ACK] Seq=2 Ack=2 Win=1021 Len=0
1710 64.380043 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1711 64.433643 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1712 64.488215 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1713 64.730349 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1039752 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1714 64.730615 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1041192 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1715 64.730663 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1042632 Win=1029 Len=0
1716 64.731006 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1042632 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1717 64.731509 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1044072 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1718 64.731509 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1719 64.731552 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1046468 Win=1029 Len=0
1720 64.755511 192.168.1.123 93.184.220.29 TCP 54 [TCP ACKed unseen segment] 64540 → 80 [FIN, ACK] Seq=1 Ack=2 Win=1027 Len=0
1721 64.775444 93.184.220.29 192.168.1.123 TCP 60 [TCP Previous segment not captured] 80 → 64540 [FIN, ACK] Seq=2 Ack=2 Win=133 Len=0
1722 64.775555 192.168.1.123 93.184.220.29 TCP 54 [TCP ACKed unseen segment] 64540 → 80 [ACK] Seq=2 Ack=3 Win=1027 Len=0
1723 64.998466 HuaweiTe_49:c9:15 Broadcast ARP 60 Who has 192.168.1.1? Tell 192.168.1.116
1724 65.129381 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1046468 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1725 65.129743 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1047908 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1726 65.129826 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1049348 Win=1029 Len=0
1727 65.130069 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1049348 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1728 65.130536 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1050788 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1729 65.130536 51.195.5.70 192.168.1.123 TLSv1.2 1110 Application Data
1730 65.130616 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1053284 Win=1029 Len=0
1731 65.131416 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1732 65.131449 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1733 65.279308 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1734 65.340873 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1735 65.356237 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
1736 65.528635 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1053284 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1737 65.529051 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1054724 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1738 65.529135 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1056164 Win=1029 Len=0
1739 65.529543 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1056164 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1740 65.530044 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1057604 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1741 65.530044 51.195.5.70 192.168.1.123 TLSv1.2 236 Application Data
1742 65.530117 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1059226 Win=1029 Len=0
1743 65.604842 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1744 65.658783 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1745 65.718698 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1746 65.837795 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
1747 65.843914 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1748 65.898553 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1749 65.930381 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1059226 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1750 65.930790 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1060666 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1751 65.930872 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1062106 Win=1029 Len=0
1752 65.931064 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1062106 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1753 65.931540 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1063546 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1754 65.931540 51.195.5.70 192.168.1.123 TLSv1.2 1026 Application Data
1755 65.931620 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1065958 Win=1029 Len=0
1756 65.953346 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1757 66.008650 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1758 66.063231 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1759 66.119068 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1760 66.173981 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1761 66.327645 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1065958 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1762 66.328092 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1067398 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1763 66.328185 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1068838 Win=1029 Len=0
1764 66.328402 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1068838 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1765 66.328798 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1070278 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1766 66.328798 51.195.5.70 192.168.1.123 TLSv1.2 927 Application Data
1767 66.328882 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1072591 Win=1029 Len=0
1768 66.413867 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
1769 66.727361 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1072591 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1770 66.727534 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1074031 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1771 66.727610 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1075471 Win=1029 Len=0
1772 66.728065 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1075471 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1773 66.728562 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1076911 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1774 66.728562 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
1775 66.728642 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1078565 Win=1029 Len=0
1776 66.817367 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1777 66.817428 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1778 66.973257 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1779 67.016470 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1780 67.104623 192.168.1.110 239.255.255.250 SSDP 215 M-SEARCH * HTTP/1.1
1781 67.126631 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1078565 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1782 67.128257 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1080005 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1783 67.128257 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1081445 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1784 67.128257 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1082885 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1785 67.128257 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1786 67.128384 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1085281 Win=1029 Len=0
1787 67.293392 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1788 67.362664 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1789 67.382515 204.79.197.222 192.168.1.123 TCP 60 443 → 64534 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1790 67.403523 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1791 67.526162 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1085281 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1792 67.526571 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1086721 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1793 67.526655 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1088161 Win=1029 Len=0
1794 67.527072 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1088161 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1795 67.527370 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1089601 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1796 67.527370 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1797 67.527446 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1091254 Win=1029 Len=0
1798 67.532315 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1799 67.587618 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1800 67.642511 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1801 67.697670 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1802 67.752049 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1803 67.807683 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1804 67.862452 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1805 67.917055 192.168.1.109 224.0.0.251 MDNS 119 Standard query 0x0005 PTR _674A0243._sub._googlecast._tcp.local, "QM" question PTR _8E6C866D._sub._googlecast._tcp.local, "QM" question PTR _googlecast._tcp.local, "QM" question
1806 67.925602 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1091254 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1807 67.926020 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1092694 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1808 67.926103 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1094134 Win=1029 Len=0
1809 67.926354 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1094134 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1810 67.926827 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1095574 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1811 67.926827 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1812 67.926906 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1097970 Win=1029 Len=0
1813 68.108235 192.168.1.110 239.255.255.250 SSDP 215 M-SEARCH * HTTP/1.1
1814 68.326681 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1097970 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1815 68.326852 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1099410 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1816 68.326927 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1100850 Win=1029 Len=0
1817 68.327333 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1100850 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1818 68.327836 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1102290 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1819 68.327836 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1820 68.327914 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1104686 Win=1029 Len=0
1821 68.507840 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1822 68.507900 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1823 68.653982 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1824 68.708851 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1825 68.725121 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1104686 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1826 68.725595 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1106126 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1827 68.725680 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1107566 Win=1029 Len=0
1828 68.725874 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1107566 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1829 68.726339 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1109006 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1830 68.726339 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
1831 68.726416 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1110660 Win=1029 Len=0
1832 68.983097 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1833 69.038225 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1834 69.093773 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1835 69.117698 192.168.1.110 239.255.255.250 SSDP 215 M-SEARCH * HTTP/1.1
1836 69.124857 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1110660 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1837 69.125353 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1112100 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1838 69.125434 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1113540 Win=1029 Len=0
1839 69.125864 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1113540 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1840 69.126342 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1114980 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1841 69.126342 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1842 69.126417 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1117376 Win=1029 Len=0
1843 69.223160 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1844 69.278315 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1845 69.333344 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1846 69.388239 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1847 69.414585 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
1848 69.443895 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1849 69.499556 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1850 69.523862 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1117376 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1851 69.524346 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1118816 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1852 69.524431 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1120256 Win=1029 Len=0
1853 69.525664 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1120256 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1854 69.525664 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1121696 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1855 69.525664 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1856 69.525770 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1123349 Win=1029 Len=0
1857 69.554184 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1858 69.923952 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1123349 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1859 69.924394 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1124789 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1860 69.924479 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1126229 Win=1029 Len=0
1861 69.924597 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1126229 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1862 69.925112 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1127669 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1863 69.925112 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1864 69.925190 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1130066 Win=1029 Len=0
1865 70.132393 192.168.1.110 239.255.255.250 SSDP 215 M-SEARCH * HTTP/1.1
1866 70.189563 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1867 70.189601 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1868 70.323702 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1130066 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1869 70.323893 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1131506 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1870 70.323972 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1132946 Win=1029 Len=0
1871 70.332559 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1132946 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1872 70.332559 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1134386 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1873 70.332559 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1874 70.332745 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1136782 Win=1029 Len=0
1875 70.339081 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1876 70.364188 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
1877 70.393717 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1878 70.686235 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1879 70.724701 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1136782 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1880 70.725113 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1138222 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1881 70.725196 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1139662 Win=1029 Len=0
1882 70.725615 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1139662 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1883 70.726116 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1141102 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1884 70.726116 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
1885 70.726192 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1142755 Win=1029 Len=0
1886 70.741153 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1887 70.796015 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1888 70.926219 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1889 70.981341 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1890 71.035944 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1891 71.091245 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1892 71.121960 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1142755 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1893 71.122439 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1144195 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1894 71.122542 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1145635 Win=1029 Len=0
1895 71.122777 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1145635 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1896 71.123374 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1147075 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1897 71.123374 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1898 71.123454 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1149471 Win=1029 Len=0
1899 71.145645 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1900 71.203062 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1901 71.262823 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1902 71.521966 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1149471 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1903 71.522381 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1150911 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1904 71.522465 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1152351 Win=1029 Len=0
1905 71.522679 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1152351 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1906 71.523129 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1153791 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1907 71.523129 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
1908 71.523211 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1155445 Win=1029 Len=0
1909 71.643156 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
1910 71.643709 192.168.1.110 224.0.0.251 MDNS 81 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
1911 71.644104 fe80::55d5:a9d:8bfd:889e ff02::fb MDNS 101 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
1912 71.644833 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0x6424 A BRN001BA9933B17
1913 71.644833 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0x6424 A BRN001BA9933B17
1914 71.896394 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1915 71.896426 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1916 71.921894 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1155445 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1917 71.921894 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1156885 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1918 71.921996 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1158325 Win=1029 Len=0
1919 71.922359 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1158325 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1920 71.922901 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1159765 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1921 71.922901 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1922 71.922938 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1162162 Win=1029 Len=0
1923 72.042203 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1924 72.060442 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0x6424 A BRN001BA9933B17
1925 72.060442 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0x6424 A BRN001BA9933B17
1926 72.097047 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1927 72.321966 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1162162 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1928 72.322404 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1163602 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1929 72.322488 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1165042 Win=1029 Len=0
1930 72.323171 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1165042 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1931 72.323171 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1166482 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1932 72.323171 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
1933 72.323271 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1168878 Win=1029 Len=0
1934 72.379346 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
1935 72.409349 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
1936 72.435417 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
1937 72.490076 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
1938 72.619090 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
1939 72.651735 192.168.1.110 224.0.0.251 MDNS 81 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
1940 72.651735 fe80::55d5:a9d:8bfd:889e ff02::fb MDNS 101 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
1941 72.673948 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
1942 72.721507 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1168878 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1943 72.721879 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1170318 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1944 72.721963 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1171758 Win=1029 Len=0
1945 72.722155 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1171758 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1946 72.722957 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1173198 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1947 72.722957 51.195.5.70 192.168.1.123 TLSv1.2 329 Application Data
1948 72.723043 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1174913 Win=1029 Len=0
1949 72.728934 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
1950 72.784613 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
1951 72.841037 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
1952 72.899008 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
1953 72.951897 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
1954 73.122489 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1174913 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1955 73.122962 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1176353 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1956 73.123047 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1177793 Win=1029 Len=0
1957 73.123275 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1177793 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1958 73.123898 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1179233 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1959 73.123898 51.195.5.70 192.168.1.123 TLSv1.2 1024 Application Data
1960 73.123977 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1181643 Win=1029 Len=0
1961 73.163467 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
1962 73.200917 192.168.1.123 51.195.113.37 TCP 66 64556 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
1963 73.213118 13.107.21.200 192.168.1.123 TCP 60 443 → 64537 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1964 73.213815 51.195.113.37 192.168.1.123 TCP 62 443 → 64556 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
1965 73.214038 192.168.1.123 51.195.113.37 TCP 54 64556 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
1966 73.215179 192.168.1.123 51.195.113.37 TLSv1.3 641 Client Hello
1967 73.227388 51.195.113.37 192.168.1.123 TLSv1.3 288 Server Hello, Change Cipher Spec, Application Data, Application Data
1968 73.233987 192.168.1.123 51.195.113.37 TLSv1.3 118 Change Cipher Spec, Application Data
1969 73.234499 192.168.1.123 51.195.113.37 TLSv1.3 146 Application Data
1970 73.235531 192.168.1.123 51.195.113.37 TLSv1.3 1136 Application Data
1971 73.245669 51.195.113.37 192.168.1.123 TLSv1.3 325 Application Data
1972 73.246408 51.195.113.37 192.168.1.123 TLSv1.3 100 Application Data
1973 73.246522 192.168.1.123 51.195.113.37 TCP 54 64556 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
1974 73.246860 192.168.1.123 51.195.113.37 TLSv1.3 85 Application Data
1975 73.248134 51.195.113.37 192.168.1.123 TLSv1.3 391 Application Data
1976 73.299219 51.195.113.37 192.168.1.123 TCP 60 443 → 64556 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
1977 73.302696 192.168.1.123 51.195.113.37 TCP 54 64556 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
1978 73.460023 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
1979 73.520741 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1181643 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1980 73.521170 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1183083 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1981 73.521255 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1184523 Win=1029 Len=0
1982 73.521446 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1184523 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1983 73.521892 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1185963 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1984 73.521892 51.195.5.70 192.168.1.123 TLSv1.2 191 Application Data
1985 73.521967 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1187540 Win=1029 Len=0
1986 73.592897 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
1987 73.592955 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
1988 73.736255 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
1989 73.790952 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
1990 73.920000 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1187540 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1991 73.920414 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1188980 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1992 73.920499 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1190420 Win=1029 Len=0
1993 73.920649 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1190420 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1994 73.921147 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1191860 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1995 73.921147 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
1996 73.921226 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1194257 Win=1029 Len=0
1997 73.928581 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
1998 73.929349 192.168.1.110 224.0.0.251 MDNS 81 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
1999 73.929349 fe80::55d5:a9d:8bfd:889e ff02::fb MDNS 101 Standard query 0x0000 A BRN001BA9933B17.local, "QM" question
2000 73.930019 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0x005a A BRN001BA9933B17
2001 73.930019 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0x005a A BRN001BA9933B17
2002 74.087610 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2003 74.096748 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
2004 74.142611 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2005 74.198877 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2006 74.268173 Cisco_0b:7c:cd Nearest-non-TPMR-bridge EAPOL 60 Start
2007 74.322490 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1194257 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2008 74.323418 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1195697 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2009 74.323418 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1197137 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2010 74.323555 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1198577 Win=1029 Len=0
2011 74.323693 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1198577 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2012 74.323693 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2013 74.323762 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1200973 Win=1029 Len=0
2014 74.328851 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2015 74.354562 fe80::55d5:a9d:8bfd:889e ff02::1:3 LLMNR 95 Standard query 0x005a A BRN001BA9933B17
2016 74.354871 192.168.1.110 224.0.0.252 LLMNR 75 Standard query 0x005a A BRN001BA9933B17
2017 74.383669 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2018 74.439366 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2019 74.493367 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2020 74.548616 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2021 74.603742 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2022 74.658671 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2023 74.682383 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
2024 74.721999 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1200973 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2025 74.722166 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1202413 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2026 74.722245 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1203853 Win=1029 Len=0
2027 74.722922 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1203853 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2028 74.723183 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1205293 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2029 74.723183 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
2030 74.723259 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1206947 Win=1029 Len=0
2031 75.121012 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1206947 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2032 75.121185 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1208387 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2033 75.121259 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1209827 Win=1029 Len=0
2034 75.121660 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1209827 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2035 75.122177 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1211267 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2036 75.122177 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2037 75.122257 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1213663 Win=1029 Len=0
2038 75.330710 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
2039 75.330770 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
2040 75.352265 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
2041 75.437307 192.168.1.110 192.168.1.255 NBNS 92 Name query NB BRN001BA9933B17<00>
2042 75.481387 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
2043 75.522015 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1213663 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2044 75.522459 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1215103 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2045 75.522547 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1216543 Win=1029 Len=0
2046 75.531685 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1216543 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2047 75.531685 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1217983 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2048 75.531685 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
2049 75.531845 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1219637 Win=1029 Len=0
2050 75.543087 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
2051 75.821220 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2052 75.877183 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2053 75.920525 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1219637 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2054 75.920943 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1221077 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2055 75.921025 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1222517 Win=1029 Len=0
2056 75.921218 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1222517 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2057 75.921688 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1223957 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2058 75.921688 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2059 75.921767 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1226353 Win=1029 Len=0
2060 75.932896 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2061 76.069493 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2062 76.120907 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2063 76.177184 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2064 76.234176 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2065 76.289074 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2066 76.319511 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1226353 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2067 76.320051 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1227793 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2068 76.320141 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1229233 Win=1029 Len=0
2069 76.320261 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1229233 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2070 76.321044 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1230673 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2071 76.321044 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2072 76.321135 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1233069 Win=1029 Len=0
2073 76.343372 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2074 76.399020 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2075 76.464527 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
2076 76.719792 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1233069 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2077 76.720203 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1234509 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2078 76.720287 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1235949 Win=1029 Len=0
2079 76.720480 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1235949 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2080 76.720938 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1237389 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2081 76.720938 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
2082 76.721017 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1239043 Win=1029 Len=0
2083 77.000128 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
2084 77.000164 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
2085 77.119298 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1239043 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2086 77.119475 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1240483 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2087 77.119554 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1241923 Win=1029 Len=0
2088 77.119950 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1241923 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2089 77.120455 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1243363 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2090 77.120455 51.195.5.70 192.168.1.123 TLSv1.2 1009 Application Data
2091 77.120536 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1245758 Win=1029 Len=0
2092 77.152930 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
2093 77.209365 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
2094 77.501878 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2095 77.523025 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1245758 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2096 77.523025 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1247198 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2097 77.523025 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1248638 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2098 77.523025 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1250078 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2099 77.523025 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
2100 77.523219 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1252475 Win=1029 Len=0
2101 77.558127 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2102 77.614023 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2103 77.746035 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2104 77.802200 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2105 77.858283 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2106 77.914025 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2107 77.922857 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1252475 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2108 77.922857 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1253915 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2109 77.922857 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1255355 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2110 77.922857 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1256795 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2111 77.922857 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
2112 77.922956 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1258449 Win=1029 Len=0
2113 77.970083 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2114 78.029633 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2115 78.081968 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2116 78.318311 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1258449 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2117 78.318756 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1259889 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2118 78.318840 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1261329 Win=1029 Len=0
2119 78.319033 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1261329 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2120 78.319473 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1262769 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2121 78.319473 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2122 78.319553 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1265165 Win=1029 Len=0
2123 78.678276 54.38.152.153 192.168.1.123 TLSv1.2 85 Encrypted Alert
2124 78.678276 54.38.152.153 192.168.1.123 TCP 60 443 → 64506 [FIN, ACK] Seq=32 Ack=2 Win=260 Len=0
2125 78.678534 192.168.1.123 54.38.152.153 TCP 54 64506 → 443 [ACK] Seq=2 Ack=33 Win=1025 Len=0
2126 78.678967 192.168.1.123 54.38.152.153 TCP 54 64506 → 443 [FIN, ACK] Seq=2 Ack=33 Win=1025 Len=0
2127 78.690042 54.38.152.153 192.168.1.123 TCP 60 443 → 64506 [ACK] Seq=33 Ack=3 Win=260 Len=0
2128 78.719022 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1265165 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2129 78.719951 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1266605 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2130 78.719951 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1268045 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2131 78.720065 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1269485 Win=1029 Len=0
2132 78.720310 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1269485 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2133 78.720310 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
2134 78.720390 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1271138 Win=1029 Len=0
2135 78.777599 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
2136 78.777635 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
2137 78.929403 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
2138 78.984951 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
2139 79.104517 192.168.1.123 51.195.113.37 TCP 54 64556 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
2140 79.116654 51.195.113.37 192.168.1.123 TCP 60 443 → 64556 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
2141 79.116864 192.168.1.123 51.195.113.37 TCP 54 64556 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
2142 79.132603 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1271138 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2143 79.132603 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1272578 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2144 79.132603 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1274018 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2145 79.132603 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1275458 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2146 79.132603 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2147 79.132706 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1277854 Win=1029 Len=0
2148 79.262918 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2149 79.282286 192.168.1.117 239.255.255.250 SSDP 333 NOTIFY * HTTP/1.1
2150 79.298310 192.168.1.117 239.255.255.250 SSDP 351 NOTIFY * HTTP/1.1
2151 79.314992 192.168.1.117 239.255.255.250 SSDP 405 NOTIFY * HTTP/1.1
2152 79.319164 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2153 79.331796 192.168.1.117 239.255.255.250 SSDP 397 NOTIFY * HTTP/1.1
2154 79.348569 192.168.1.117 239.255.255.250 SSDP 327 NOTIFY * HTTP/1.1
2155 79.365714 192.168.1.117 239.255.255.250 SSDP 369 NOTIFY * HTTP/1.1
2156 79.375645 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2157 79.381806 192.168.1.117 239.255.255.250 SSDP 401 NOTIFY * HTTP/1.1
2158 79.398759 192.168.1.117 239.255.255.250 SSDP 347 NOTIFY * HTTP/1.1
2159 79.415229 192.168.1.117 239.255.255.250 SSDP 399 NOTIFY * HTTP/1.1
2160 79.431791 192.168.1.117 239.255.255.250 SSDP 393 NOTIFY * HTTP/1.1
2161 79.476896 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
2162 79.509031 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2163 79.516748 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1277854 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2164 79.517230 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1279294 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2165 79.517316 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1280734 Win=1029 Len=0
2166 79.517811 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1280734 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2167 79.518420 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1282174 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2168 79.518420 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
2169 79.518526 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1284571 Win=1029 Len=0
2170 79.565032 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2171 79.620884 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2172 79.677210 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2173 79.735554 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2174 79.790123 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2175 79.845228 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2176 79.912414 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1284571 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2177 79.912856 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1286011 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2178 79.912901 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1287451 Win=1029 Len=0
2179 79.913298 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1287451 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2180 79.913474 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1288891 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2181 79.913474 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
2182 79.913505 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1290544 Win=1029 Len=0
2183 80.318844 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1290544 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2184 80.319021 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1291984 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2185 80.319095 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1293424 Win=1029 Len=0
2186 80.319499 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1293424 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2187 80.319499 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1294864 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2188 80.319572 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1296304 Win=1029 Len=0
2189 80.319982 51.195.5.70 192.168.1.123 TLSv1.2 1123 Application Data
2190 80.353438 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
2191 80.370890 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1297373 Win=1025 Len=0
2192 80.519565 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
2193 80.519625 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
2194 80.668059 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
2195 80.713131 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
2196 80.714227 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1297373 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2197 80.714449 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1298813 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2198 80.714485 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1300253 Win=1029 Len=0
2199 80.714986 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1300253 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2200 80.715475 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1301693 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2201 80.715475 51.195.5.70 192.168.1.123 TLSv1.2 155 Application Data
2202 80.715505 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1303234 Win=1029 Len=0
2203 80.725445 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
2204 81.003210 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2205 81.059143 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2206 81.113586 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1303234 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2207 81.114039 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1304674 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2208 81.114124 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1306114 Win=1029 Len=0
2209 81.114317 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1306114 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2210 81.114317 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2211 81.114743 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1307554 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2212 81.114743 51.195.5.70 192.168.1.123 TLSv1.2 1094 Application Data
2213 81.114821 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1310034 Win=1029 Len=0
2214 81.245926 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2215 81.300857 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2216 81.361642 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2217 81.411036 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2218 81.466976 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2219 81.512605 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1310034 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2220 81.513136 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1311474 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2221 81.513226 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1312914 Win=1029 Len=0
2222 81.513440 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1312914 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2223 81.514124 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1314354 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2224 81.514124 51.195.5.70 192.168.1.123 TLSv1.2 184 Application Data
2225 81.514213 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1315924 Win=1029 Len=0
2226 81.521834 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2227 81.578098 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2228 81.700779 192.168.1.123 192.168.1.1 DNS 78 Standard query 0xdca2 A mp3.planetradio.de
2229 81.713907 192.168.1.1 192.168.1.123 DNS 190 Standard query response 0xdca2 A mp3.planetradio.de A 54.38.152.152 A 54.38.152.153 A 54.38.152.155 A 145.239.1.191 A 51.195.5.70 A 54.38.152.154 A 54.38.152.157
2230 81.715712 192.168.1.123 54.38.152.152 TCP 66 64557 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
2231 81.727191 54.38.152.152 192.168.1.123 TCP 62 443 → 64557 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1440 WS=128
2232 81.727420 192.168.1.123 54.38.152.152 TCP 54 64557 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
2233 81.728380 192.168.1.123 54.38.152.152 TLSv1.2 571 Client Hello
2234 81.740537 54.38.152.152 192.168.1.123 TCP 60 443 → 64557 [ACK] Seq=1 Ack=518 Win=30336 Len=0
2235 81.768321 54.38.152.152 192.168.1.123 TLSv1.2 1494 Server Hello
2236 81.768321 54.38.152.152 192.168.1.123 TCP 1494 443 → 64557 [ACK] Seq=1441 Ack=518 Win=30336 Len=1440 [TCP segment of a reassembled PDU]
2237 81.768563 192.168.1.123 54.38.152.152 TCP 54 64557 → 443 [ACK] Seq=518 Ack=2881 Win=263424 Len=0
2238 81.782886 54.38.152.152 192.168.1.123 TLSv1.2 475 Certificate, Server Key Exchange, Server Hello Done
2239 81.787739 192.168.1.123 54.38.152.152 TLSv1.2 180 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
2240 81.839305 54.38.152.152 192.168.1.123 TCP 60 443 → 64557 [ACK] Seq=3302 Ack=644 Win=30336 Len=0
2241 81.911852 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1315924 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2242 81.912563 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1317364 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2243 81.912668 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1318804 Win=1029 Len=0
2244 81.914206 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1318804 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2245 81.914206 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1320244 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2246 81.914206 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2247 81.914327 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1322640 Win=1029 Len=0
2248 82.162957 54.38.152.152 192.168.1.123 TLSv1.2 296 New Session Ticket, Change Cipher Spec, Encrypted Handshake Message
2249 82.164371 192.168.1.123 54.38.152.152 TCP 1494 64557 → 443 [ACK] Seq=644 Ack=3544 Win=262656 Len=1440 [TCP segment of a reassembled PDU]
2250 82.164371 192.168.1.123 54.38.152.152 TLSv1.2 112 Application Data
2251 82.168751 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
2252 82.168789 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
2253 82.177817 54.38.152.152 192.168.1.123 TCP 60 443 → 64557 [ACK] Seq=3544 Ack=2142 Win=33280 Len=0
2254 82.311340 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1322640 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2255 82.311769 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1324080 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2256 82.311855 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1325520 Win=1029 Len=0
2257 82.312270 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1325520 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2258 82.312523 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1326960 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2259 82.312523 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2260 82.312613 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1329356 Win=1029 Len=0
2261 82.319286 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
2262 82.376212 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
2263 82.650866 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2264 82.706653 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2265 82.715288 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1329356 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2266 82.715782 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1330796 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2267 82.715867 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1332236 Win=1029 Len=0
2268 82.716276 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1332236 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2269 82.716776 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1333676 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2270 82.716776 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
2271 82.716850 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1335329 Win=1029 Len=0
2272 82.762954 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2273 82.894000 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2274 82.950158 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2275 83.005862 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2276 83.061996 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2277 83.110563 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1335329 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2278 83.110828 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1336769 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2279 83.110868 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1338209 Win=1029 Len=0
2280 83.111231 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1338209 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2281 83.111749 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1339649 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2282 83.111749 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
2283 83.111780 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1342046 Win=1029 Len=0
2284 83.118344 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2285 83.174818 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2286 83.231152 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2287 83.509827 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1342046 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2288 83.510253 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1343486 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2289 83.510305 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1344926 Win=1029 Len=0
2290 83.510745 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1344926 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2291 83.511245 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1346366 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2292 83.511245 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
2293 83.511290 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1348019 Win=1029 Len=0
2294 83.531074 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
2295 83.757153 54.38.152.152 192.168.1.123 TLSv1.2 525 Application Data
2296 83.801678 192.168.1.123 54.38.152.152 TCP 54 64557 → 443 [ACK] Seq=2142 Ack=4015 Win=262144 Len=0
2297 83.875402 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
2298 83.875459 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
2299 83.909905 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1348019 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2300 83.910326 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1349459 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2301 83.910412 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1350899 Win=1029 Len=0
2302 83.910619 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1350899 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2303 83.911037 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1352339 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2304 83.911037 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
2305 83.911121 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1354736 Win=1029 Len=0
2306 84.023022 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
2307 84.079179 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
2308 84.309391 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1354736 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2309 84.309577 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1356176 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2310 84.309656 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1357616 Win=1029 Len=0
2311 84.310049 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1357616 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2312 84.310559 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1359056 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2313 84.310559 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2314 84.310638 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1361452 Win=1029 Len=0
2315 84.356777 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2316 84.422192 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2317 84.422192 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
2318 84.468531 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2319 84.601799 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2320 84.657369 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2321 84.708615 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1361452 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2322 84.708850 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1362892 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2323 84.708887 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1364332 Win=1029 Len=0
2324 84.709274 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1364332 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2325 84.709798 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1365772 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2326 84.709798 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
2327 84.709828 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1367425 Win=1029 Len=0
2328 84.713346 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2329 84.768903 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2330 84.825172 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2331 84.881610 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2332 84.939005 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2333 85.108896 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1367425 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2334 85.109352 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1368865 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2335 85.109442 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1370305 Win=1029 Len=0
2336 85.109661 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1370305 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2337 85.110056 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1371745 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2338 85.110056 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2339 85.110140 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1374141 Win=1029 Len=0
2340 85.360910 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
2341 85.508304 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1374141 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2342 85.508550 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1375581 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2343 85.508588 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1377021 Win=1029 Len=0
2344 85.509038 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1377021 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2345 85.509537 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1378461 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2346 85.509537 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2347 85.509568 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1380857 Win=1029 Len=0
2348 85.608272 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
2349 85.608330 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
2350 85.756585 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
2351 85.812104 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
2352 85.907662 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1380857 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2353 85.908080 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1382297 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2354 85.908163 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1383737 Win=1029 Len=0
2355 85.908567 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1383737 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2356 85.909070 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1385177 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2357 85.909070 51.195.5.70 192.168.1.123 TLSv1.2 269 Application Data
2358 85.909144 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1386832 Win=1029 Len=0
2359 86.088181 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2360 86.144282 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2361 86.200673 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2362 86.307666 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1386832 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2363 86.308482 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1388272 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2364 86.308482 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1389712 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2365 86.308587 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1391152 Win=1029 Len=0
2366 86.308839 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1391152 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2367 86.308839 51.195.5.70 192.168.1.123 TLSv1.2 1009 Application Data
2368 86.308920 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1393547 Win=1029 Len=0
2369 86.332098 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2370 86.400006 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2371 86.447933 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2372 86.502811 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2373 86.539683 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
2374 86.553557 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2375 86.609084 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2376 86.665080 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2377 86.707753 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1393547 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2378 86.707753 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1394987 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2379 86.707842 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1396427 Win=1029 Len=0
2380 86.708006 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1396427 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2381 86.708536 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1397867 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2382 86.708536 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
2383 86.708576 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1399521 Win=1029 Len=0
2384 87.106758 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1399521 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2385 87.107217 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1400961 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2386 87.107301 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1402401 Win=1029 Len=0
2387 87.107525 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1402401 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2388 87.107814 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1403841 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2389 87.107814 51.195.5.70 192.168.1.123 TLSv1.2 1122 Application Data
2390 87.107893 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1406349 Win=1029 Len=0
2391 87.328950 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
2392 87.328981 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
2393 87.479332 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
2394 87.506910 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1406349 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2395 87.507343 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1407789 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2396 87.507427 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1409229 Win=1029 Len=0
2397 87.507831 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1409229 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2398 87.508334 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1410669 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2399 87.508334 51.195.5.70 192.168.1.123 TLSv1.2 899 Application Data
2400 87.508411 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1412954 Win=1029 Len=0
2401 87.533136 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
2402 87.810110 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2403 87.865406 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2404 87.916984 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1412954 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2405 87.916984 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1414394 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2406 87.916984 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1415834 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2407 87.916984 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1417274 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2408 87.916984 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
2409 87.917090 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1418927 Win=1029 Len=0
2410 87.918980 192.168.1.109 224.0.0.251 MDNS 119 Standard query 0x0006 PTR _674A0243._sub._googlecast._tcp.local, "QM" question PTR _8E6C866D._sub._googlecast._tcp.local, "QM" question PTR _googlecast._tcp.local, "QM" question
2411 87.920164 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2412 88.051958 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2413 88.105610 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2414 88.160155 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2415 88.201332 192.168.1.123 51.195.113.37 TCP 66 64558 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
2416 88.213818 51.195.113.37 192.168.1.123 TCP 62 443 → 64558 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
2417 88.213818 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2418 88.214102 192.168.1.123 51.195.113.37 TCP 54 64558 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
2419 88.215335 192.168.1.123 51.195.113.37 TLSv1.3 641 Client Hello
2420 88.226535 Tp-LinkT_26:0d:10 Broadcast ARP 60 Who has 192.168.1.7? Tell 192.168.1.1
2421 88.227640 51.195.113.37 192.168.1.123 TLSv1.3 288 Server Hello, Change Cipher Spec, Application Data, Application Data
2422 88.234224 192.168.1.123 51.195.113.37 TLSv1.3 118 Change Cipher Spec, Application Data
2423 88.234733 192.168.1.123 51.195.113.37 TLSv1.3 146 Application Data
2424 88.235824 192.168.1.123 51.195.113.37 TLSv1.3 1136 Application Data
2425 88.246684 51.195.113.37 192.168.1.123 TLSv1.3 325 Application Data
2426 88.246684 51.195.113.37 192.168.1.123 TLSv1.3 100 Application Data
2427 88.246910 192.168.1.123 51.195.113.37 TCP 54 64558 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
2428 88.247471 192.168.1.123 51.195.113.37 TLSv1.3 85 Application Data
2429 88.248589 51.195.113.37 192.168.1.123 TLSv1.3 391 Application Data
2430 88.270227 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2431 88.302563 192.168.1.123 51.195.113.37 TCP 54 64558 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
2432 88.306609 51.195.113.37 192.168.1.123 TCP 60 443 → 64558 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
2433 88.306609 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1418927 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2434 88.306609 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1420367 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2435 88.306609 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1421807 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2436 88.306609 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1423247 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2437 88.306609 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2438 88.306816 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1425643 Win=1029 Len=0
2439 88.316119 192.168.1.123 239.255.255.250 SSDP 215 M-SEARCH * HTTP/1.1
2440 88.325820 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2441 88.380021 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2442 88.704170 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1425643 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2443 88.704603 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1427083 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2444 88.704655 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1428523 Win=1029 Len=0
2445 88.705080 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1428523 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2446 88.705591 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1429963 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2447 88.705591 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
2448 88.705637 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1431616 Win=1029 Len=0
2449 88.997845 fe80::e80:63ff:fe26:d10 ff02::1 ICMPv6 86 Router Advertisement from 0c:80:63:26:0d:10
2450 89.049925 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
2451 89.049981 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
2452 89.101189 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1431616 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2453 89.101364 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1433056 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2454 89.101438 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1434496 Win=1029 Len=0
2455 89.101835 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1434496 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2456 89.102365 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1435936 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2457 89.102365 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2458 89.102445 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1438332 Win=1029 Len=0
2459 89.122463 192.168.1.123 51.195.113.37 TCP 54 64558 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
2460 89.134305 51.195.113.37 192.168.1.123 TCP 60 443 → 64558 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
2461 89.134505 192.168.1.123 51.195.113.37 TCP 54 64558 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
2462 89.202877 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
2463 89.228166 Tp-LinkT_26:0d:10 Broadcast ARP 60 Who has 192.168.1.7? Tell 192.168.1.1
2464 89.258091 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
2465 89.323495 192.168.1.123 239.255.255.250 SSDP 215 M-SEARCH * HTTP/1.1
2466 89.503657 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1438332 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2467 89.504012 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1439772 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2468 89.504065 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1441212 Win=1029 Len=0
2469 89.504239 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1441212 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2470 89.504831 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1442652 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2471 89.504831 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
2472 89.504888 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1445049 Win=1029 Len=0
2473 89.536517 192.168.1.110 239.255.255.250 SSDP 143 M-SEARCH * HTTP/1.1
2474 89.553041 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2475 89.608279 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2476 89.662578 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2477 89.791894 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2478 89.847576 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2479 89.902880 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2480 89.904605 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1445049 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2481 89.905093 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1446489 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2482 89.905134 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1447929 Win=1029 Len=0
2483 89.905589 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1447929 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2484 89.906087 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1449369 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2485 89.906087 51.195.5.70 192.168.1.123 TLSv1.2 268 Application Data
2486 89.906122 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1451023 Win=1029 Len=0
2487 89.957266 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2488 90.012346 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2489 90.066762 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2490 90.121171 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2491 90.229917 Tp-LinkT_26:0d:10 Broadcast ARP 60 Who has 192.168.1.7? Tell 192.168.1.1
2492 90.303252 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1451023 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2493 90.303628 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1452463 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2494 90.303713 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1453903 Win=1029 Len=0
2495 90.303890 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1453903 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2496 90.304381 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1455343 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2497 90.304381 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2498 90.304458 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1457739 Win=1029 Len=0
2499 90.334308 192.168.1.123 239.255.255.250 SSDP 215 M-SEARCH * HTTP/1.1
2500 90.356656 192.168.1.100 255.255.255.255 UDP 214 49153 → 6667 Len=172
2501 90.701708 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1457739 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2502 90.702121 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1459179 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2503 90.702207 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1460619 Win=1029 Len=0
2504 90.702895 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1460619 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2505 90.702895 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1462059 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2506 90.702895 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
2507 90.702987 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1463712 Win=1029 Len=0
2508 90.793545 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
2509 90.793605 Fujitsu_b5:62:27 Tp-LinkT_26:0d:10 ARP 42 192.168.1.123 is at 00:23:26:b5:62:27
2510 90.941351 Tp-LinkT_26:0d:10 IntelCor_8c:5f:d0 ARP 60 Who has 192.168.1.131? Tell 192.168.1.1
2511 90.994022 Tp-LinkT_26:0d:10 TCLKingE_2f:4c:42 ARP 60 Who has 192.168.1.119? Tell 192.168.1.1
2512 91.101980 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1463712 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2513 91.102391 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1465152 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2514 91.102476 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1466592 Win=1029 Len=0
2515 91.102968 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1466592 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2516 91.103399 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1468032 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2517 91.103399 51.195.5.70 192.168.1.123 TLSv1.2 1011 Application Data
2518 91.103477 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1470429 Win=1029 Len=0
2519 91.278053 Tp-LinkT_26:0d:10 Apple_2b:e9:18 ARP 60 Who has 192.168.1.108? Tell 192.168.1.1
2520 91.335018 Tp-LinkT_26:0d:10 Cisco_1f:2a:80 ARP 60 Who has 192.168.1.111? Tell 192.168.1.1
2521 91.343537 192.168.1.123 239.255.255.250 SSDP 215 M-SEARCH * HTTP/1.1
2522 91.388469 Tp-LinkT_26:0d:10 Luxshare_55:64:31 ARP 60 Who has 192.168.1.122? Tell 192.168.1.1
2523 91.501900 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1470429 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2524 91.501900 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1471869 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2525 91.501900 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1473309 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2526 91.502007 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1474749 Win=1029 Len=0
2527 91.502371 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1474749 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2528 91.502371 51.195.5.70 192.168.1.123 TLSv1.2 1010 Application Data
2529 91.502421 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1477145 Win=1029 Len=0
2530 91.522838 Tp-LinkT_26:0d:10 Apple_af:b0:4e ARP 60 Who has 192.168.1.8? Tell 192.168.1.1
2531 91.571112 Tp-LinkT_26:0d:10 IntelCor_5b:0f:13 ARP 60 Who has 192.168.1.130? Tell 192.168.1.1
2532 91.627861 Tp-LinkT_26:0d:10 Microsof_a4:f1:59 ARP 60 Who has 192.168.1.107? Tell 192.168.1.1
2533 91.679126 Tp-LinkT_26:0d:10 a2:dc:1f:8f:b7:cb ARP 60 Who has 192.168.1.118? Tell 192.168.1.1
2534 91.733505 Tp-LinkT_26:0d:10 16:f5:bf:a0:0e:a3 ARP 60 Who has 192.168.1.112? Tell 192.168.1.1
2535 91.787587 Tp-LinkT_26:0d:10 Apple_25:9f:00 ARP 60 Who has 192.168.1.129? Tell 192.168.1.1
2536 91.841476 Tp-LinkT_26:0d:10 WistronI_91:df:38 ARP 60 Who has 192.168.1.138? Tell 192.168.1.1
2537 91.901740 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1477145 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2538 91.901914 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1478585 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2539 91.901988 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1480025 Win=1029 Len=0
2540 91.902394 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1480025 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2541 91.903540 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1481465 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2542 91.903540 51.195.5.70 192.168.1.123 TLSv1.2 267 Application Data
2543 91.903642 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1483118 Win=1029 Len=0
2544 92.301950 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1483118 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2545 92.302390 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1484558 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2546 92.302441 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1485998 Win=1029 Len=0
2547 92.302906 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1485998 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2548 92.303143 51.195.5.70 192.168.1.123 TCP 1494 443 → 49241 [ACK] Seq=1487438 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2549 92.303143 51.195.5.70 192.168.1.123 TLSv1.2 1107 Application Data
2550 92.303187 192.168.1.123 51.195.5.70 TCP 54 49241 → 443 [ACK] Seq=1 Ack=1489931 Win=1029 Len=0
2551 92.530446 Tp-LinkT_26:0d:10 Fujitsu_b5:62:27 ARP 60 Who has 192.168.1.123? Tell 192.168.1.1
Vielen Dank schonmal...
So ich habe mal aufgezeichnet, aber es kommt leider nicht einmal zu einer SIP-Registrierung...
Wenig hilfreich und ohne jegliche Aussage. Ohne das du überhaupt einmal mitteilst welche IP Adresse das Telefon hat ist der obige Trace do sinnfrei.
Setze den Capture Filter doch dann bitte auf die IP des Telefons mit host <ip_adress>
https://wiki.wireshark.org/CaptureFilters
So wird dir gefiltert lediglich der Traffic vom und zum Telefon angezeigt !!! Das oben zeigt zu 99,99% nur den Winblows Traffic deines Rechners der sinnfrei und völlig uninteressant ist und hier nur Speicherplatz frisst.
Port 5060 Frames sind da nirgendwo zu sehen. Oder man übersieht sie ob der schieren Masse.
https://support.yeastar.com/hc/en-us/articles/360007606533-How-to-Analyz ...
https://www.easybell.de/business/webinare/sip-debugging-wireshark.html
https://www.youtube.com/watch?v=OE7AgTAqNoo
usw.
Sorry, da habe ich wohl wieder Müll gemacht, habe aber Wireshark, ehrlich gesagt nur selten genutzt.
Nun, die IP des Telefons (Cisco IP Phone 7911) ist 192.168.1.125
Wenn ich nur Traffic dafür ansehe, sehe ich nur das:
Wenn ich nach dem SIP Protokoll filtere , sehe ich nichts.
Zeichne ich eventuell auch falsch auf? Ich habe als Aufnahme Interface "Ethernet" in meinem Fall der Anschluss an den Router genommen.
Danke
Nun, die IP des Telefons (Cisco IP Phone 7911) ist 192.168.1.125
Wenn ich nur Traffic dafür ansehe, sehe ich nur das:
284 37.797961 192.168.1.125 255.255.255.255 DHCP 590 DHCP Request - Transaction ID 0x596
Zeichne ich eventuell auch falsch auf? Ich habe als Aufnahme Interface "Ethernet" in meinem Fall der Anschluss an den Router genommen.
Danke
Zeichne ich eventuell auch falsch auf?
Ja das könnte durchaus sein wenn du einen Switch benutzt !!Dann "siehst" du im Wireshark ja nur die DHCP Requestst bzw. den Traffic den das Telefon direkt mit deinem PC austauscht.
Da der Switch ja nur an Ports forwardet wo auch die Ziel Mac Adressen hinterliegen wäre aller anderer Verkehr der vom Telefon nicht zu deinem PC geht unsichtbar. Ausgenommen von dem Traffic den der Switch auf alle Ports fluten muss wie Broadcasts und Multicasts. Dein o.a. DHCP Frame ist so ein Paket wie auch du sicher selber sofort an der Zieladresse 255.255.255.255 was ja zweifelsohne eine All Net Broadcast Adresse ist ! Das ist der DHCP Request mit dem sich das Telefon 192.168.1.125 eine gültige IP vom DHCP holt oder bestätigen lässt.
Logischerweise benötigst du also einen Mirror Port am Switch der die den Telefon Port auf einem Messport "spiegelt". Sowas haben nur managebare Switches natürlich.
Wenn du einen ungemangten Dödelswitch hast ist das aber kein Beinbruch du musst dann nur den Wireshark als Bridge oder mit einem Spiegeldevice (Tap) in die Telefonleitung einschleifen. Guckst du hier:
https://www.heise.de/ct/artikel/Ethernet-Bridge-als-Sniffer-Quelle-22148 ...
https://www.heise.de/select/ct/2017/18/1504370006723906
Kapitel: Throwing Star LAN Tap Pro
So,
ich habe es leider nicht hinbekommen, das WireShark mehr als nur den DHCP aufzeichnet. Irgendwie mache ich da immer etwas, trotz Anleitung nicht ganz richtig.
Aber dafür habe ich im Log des Telefons gesehen, dass eine Registrierung tatsächlich stattfindet.
Ich habe mal, weil ich dachte, dass es eventuell hilft, anstelle von sipgate.de einfach die IP-Adresse eingegeben...
Folgende Zeile habe ich oft gesehen und weiß nicht genau, was sie bedeutet:
Und hier sieht man, dass eine Registrierung stattfindet, aber dann fehschlägt:
Eventuell hilft das auch weiter bei der Diagnose,
danke schonmal
ich habe es leider nicht hinbekommen, das WireShark mehr als nur den DHCP aufzeichnet. Irgendwie mache ich da immer etwas, trotz Anleitung nicht ganz richtig.
Aber dafür habe ich im Log des Telefons gesehen, dass eine Registrierung tatsächlich stattfindet.
Ich habe mal, weil ich dachte, dass es eventuell hilft, anstelle von sipgate.de einfach die IP-Adresse eingegeben...
Folgende Zeile habe ich oft gesehen und weiß nicht genau, was sie bedeutet:
1249: NOT 18:54:11.462164 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
1250: ERR 18:54:11.463025 JVM: SIPCC-SYS_CALL: sip_tcp_channel_send: Error: sipSocketSend failed: errno = 54
Und hier sieht man, dass eine Registrierung stattfindet, aber dann fehschlägt:
1205: NOT 18:54:03.976024 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_IDLE <- E_SIP_REG_REG_REQ
1206: NOT 18:54:03.979938 JVM: SIPCC-SIP_MSG_SEND: ccsip_dump_send_msg_info: <217.10.79.9:5060>:REGISTE: <sip:ANMELDENAME@217.10.79.9> :102 REGISTER::0024c40b-7ccd0003-86576fe2-bccb091d@192.168.1.125
1207: ERR 18:54:03.981268 JVM: SIPCC-SYS_CALL: sip_tcp_channel_send: Error: sipSocketSend failed: errno = 54
Eventuell hilft das auch weiter bei der Diagnose,
danke schonmal
das WireShark mehr als nur den DHCP aufzeichnet. Irgendwie mache ich da immer etwas, trotz Anleitung nicht ganz richtig.
Kann ja auch richtig sein sofern das Telefon keinerlei SIP Requests sendet.Man muss aber vermuten das du am Switch keinen Mirrorport nutzt so das dir die Daten des telefons gar nicht angezeigt werden. Dann "siehst" du am Sniffer natürlich nur die Broadcast Pakete die der Switch ja prinzipbedingt an alle Ports fluten muss. Das ist dann in der Tat wenig hilfreich.
Du musst schon eienn Mirror oder SPAN Port nutzen am Switch oder wenn du das nicht hast am Wireshark mit einer Netzwerkbrücke arbeiten was dann 2 NICs erfordert (2te z.B. ein USB Ethernet Adapter)
OK, aber die mitgeschnittenen SIP Pakete haben ja schon eine gewisse Aussage:
"<217.10.79.9:5060>:REGISTE: <sip:ANMELDENAME@217.10.79.9> :102 REGISTER::0024c40b-7ccd0003-86576fe2-bccb091d@192.168.1.125"
Bedeutet ja das versucht wird einen User "ANMELDENAME" am SIP Server 217.10.79.9 (IP ist der SIPgate Server) zu registrieren was dann aber mit einem Socket Error scheitert.
Das kann mehrere Gründe haben:
- "ANMELDENAME" ist natürlich Blödsinn, denn solche Usernamen gibt es nicht bei SIPgate. Klar das das dann schiefgeht ! Leider weiss man jetzt nicht ob du das hier anonymisiert hast ober ob das real so rausgegangen ist und muss doof rumraten.
- Möglich das SIPgate SIP Sessions nur mit UDP akzeptiert statt TCP. Wäre auch einen Versuch wert das im Telefon Setup mal umzustellen.
Also, statt ANMELDENAME steht da eigentlich der Anmeldename, den ich auf anderen Telefonen und Softphones usw. immer verwende um mich bei Sipgate anzumelden, habe den hier aber mal durch ANMELDENAME ersetzt.
Auch wenn ich UDP verwende, konnte ich leider keine Änderung feststellen.
Der Fehler bleibt gleich.
Auch wenn ich UDP verwende, konnte ich leider keine Änderung feststellen.
Der Fehler bleibt gleich.
Wenn du im gleichen IP Segment ein Softphone wie phoner oder phonter lite betreibst mit exakt den Credentials des Cisco Phones, kann das eine SIP Session aufbauen ?
http://phoner.de/index.htm
http://www.phonerlite.de/index_de.htm
Interessant wäre da auch einmal ein Sniffer Trace
http://phoner.de/index.htm
http://www.phonerlite.de/index_de.htm
Interessant wäre da auch einmal ein Sniffer Trace
Also, ein SoftPhone wie PhonerLite funktioniert ohne Probleme,
hier mal ein Debugausschnit:
hier mal ein Debugausschnit:
15:33:15,644: Start of application PhonerLite (C:\Windows\explorer.exe)
15:33:16,447: Loading profiles from configuration file: C:\Users\Aleksandar Urosevic\AppData\Roaming\PhonerLite\sipper.ini
15:33:16,477: Loading profile "2048221" from configuration file: C:\Users\Aleksandar Urosevic\AppData\Roaming\PhonerLite\sipper.ini
15:33:16,492: loading USBphone
15:33:16,540: OpenDevice (C:\Program Files (x86)\PhonerLite\sipper.dll)
15:33:16,540: LoadCAPI(C:\Program Files (x86)\PhonerLite\sipper.dll)
15:33:16,717: Installed
15:33:16,717: Installed:
15:33:16,717: Get Manufacturer: 53 49 50 50 45 52 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
15:33:16,717: Get Version: 02 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00
15:33:16,717: SIPPER: 2.0 (3.0)
15:33:16,717: Register: 160 bytes blocksize
15:33:16,717: Register: 00 0C 00 00 02 00 00 00 07 00 00 00 A0 00 00 00
15:33:16,728: Register returns: 01 00 00 00
15:33:16,728: Get Profile: 01 00 1E 00 19 00 00 00 03 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
15:33:16,729: Listen Request: 1A 00 01 00 05 80 04 00 01 00 00 00 FF 17 00 00 12 00 01 00 00 00 00 00 00 00
15:33:16,729: Listen Request
15:33:16,729: Facility Request: 12 00 01 00 80 80 06 00 01 00 00 00 03 00 03 00 00 00
15:33:16,729: Facility Request (Get Supplementary Services)
15:33:16,733: CAPI thread created: 0x0638
15:33:16,869: Using SIP configuration file: C:\Users\Aleksandar Urosevic\AppData\Roaming\PhonerLite\sipper.ini
-------------------------------------------
15:33:16,757: R: DNS lookup for 'sipgate.de'
start resolving SRV (UDP)...
-------------------------------------------
15:33:16,859: R: DNS lookup for 'sipgate.de'
217.10.79.9:5060 (TTL=1442)
-------------------------------------------
15:33:16,874: R: open UDP port (SIP): 5060
-------------------------------------------
15:33:16,977: T: UPnP for Port=5060 -> 79.193.126.112
OK
-------------------------------------------
15:33:16,990: R: open TCP port (TLS listen): 5061
-------------------------------------------
15:33:17,015: T: UPnP for Port=5061 -> TLS listen
OK
-------------------------------------------
15:33:17,015: R: open TCP port (TCP listen): 5060
-------------------------------------------
15:33:17,040: T: UPnP for Port=5060 -> TCP listen
OK
15:33:17,138: Listen Confirm: 0E 00 01 00 05 81 04 00 01 00 00 00 00 00
15:33:17,138: Listen Confirm
-------------------------------------------
15:33:17,043: R: open UDP port (mDNS): 5353
15:33:17,148: Facility Confirm: 1A 00 01 00 80 81 06 00 01 00 00 00 00 00 03 00 09 00 00 06 00 00 3D 01 00 00
15:33:17,148: Facility Confirm (Supplementary Services)
15:33:17,148: Facility Request: 16 00 01 00 80 80 07 00 01 00 00 00 03 00 07 01 00 04 3D 01 00 00
15:33:17,148: Facility Request (Listen To Supplementary Services)
15:33:17,148: Get Supported Services: success
-------------------------------------------
15:33:17,044: T: 217.10.79.9:5060 (UDP)
REGISTER sip:sipgate.de SIP/2.0
Via: SIP/2.0/UDP 79.193.126.112:5060;branch=z9hG4bK80f414ed3e62eb11a66e2aadfbc3a07e;rport
From: "PhonerLite" <sip:ANMELDENAME0@sipgate.de>;tag=901591769
To: "PhonerLite" <sip:ANMELDENAME0@sipgate.de>
Call-ID: 005E7CEC-3E62-EB11-A66C-2AADFBC3A07E@79.193.126.112
CSeq: 1 REGISTER
Contact: <sip:ANMELDENAME0@79.193.126.112:5060>;+sip.instance="<urn:uuid:00E9CC97-2662-EB11-8DEE-3A52B38FF3F8>"
Allow: INVITE, ACK, BYE, CANCEL, INFO, MESSAGE, NOTIFY, OPTIONS, REFER, UPDATE, PRACK
Max-Forwards: 70
Allow-Events: org.3gpp.nwinitdereg
User-Agent: PhonerLite 2.86
Supported: 100rel, replaces, from-change, gruu
Expires: 600
Content-Length: 0
Du kannst an Via: SIP/2.0/UDP 79.193.126.112:5060;branch=... sehen das das Softphone UDP nutzt statt TCP. Du aber hast TCP im Telefon eingestellt !! Vermutlich ist das das Problem und erklärt auch den Socket Error !
Der Parameter:
<transportLayerProtocol>2</transportLayerProtocol>
1 = TCP
2 = UDP
sollte also im XML Setup des Telefons auf "2" stehen !
Der Parameter:
<transportLayerProtocol>2</transportLayerProtocol>
1 = TCP
2 = UDP
sollte also im XML Setup des Telefons auf "2" stehen !
Also, jetzt habe ich das Telefon nochmal zurückgesetzt, Umstellung auf UDP hat dann auch geklappt. Habe dabei wieder etwas interessantes entdeckt, was mich etwas stutzig gemacht hat:
Hier ist dann der gesamte, letzte Log.
Danke schonmal!
SIPProcessUDPMessage : SIPTaskCheckSource() failed - Sender not recognized
Hier ist dann der gesamte, letzte Log.
2319: NOT 13:55:59.135397 JVM: --> Properties JNI: SignalApp() handling SIGIPCFG. msgCode=256 value=4
2320: NOT 13:55:59.150865 JVM: <-- Properties JNI: SignalApp()
2321: NOT 13:55:59.200279 PAE: paeSetLastSupStatus: LastSupStatus 0
2322: ERR 13:56:00.274730 JVM: SIP : SIPProcessUDPMessage : SIPTaskCheckSource() failed - Sender not recognized
2323: NOT 13:56:02.582417 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2324: NOT 13:56:06.582355 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2325: NOT 13:56:10.582382 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2326: NOT 13:56:14.582398 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2327: DBG 13:56:14.802665 cffs_gc(): runing gc 1
2328: NOT 13:56:18.582358 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2329: NOT 13:56:22.582342 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2330: NOT 13:56:23.080981 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_ACK
2331: ERR 13:56:23.082176 JVM: %REGISTRIERUNG Auth. fehlgeschlagen: Ack-Timer
2332: NOT 13:56:23.090475 JVM: set_active_ccm: ccm=PRIMARY port=-1
2333: ERR 13:56:23.091248 JVM: SIPCC-LINE_NUM: sip_platform_localexpires_timer_stop: Error: Line number (53) is invalid
2334: NOT 13:56:23.092442 JVM: SIPCC-UI_API: 1/0, ui_set_sip_registration_state: 0
2335: NOT 13:56:23.094390 JVM: SIPCC-UI_API: 0/0, ui_set_notification: Registrierung: 176:20
2336: NOT 13:56:26.582370 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2337: NOT 13:56:27.582351 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2338: NOT 13:56:29.582382 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2765: NOT 20:52:06.985770 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2766: NOT 20:52:10.982146 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2767: NOT 20:52:14.982164 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2768: NOT 20:52:18.982147 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2769: NOT 20:53:28.491587 JVM: SIPCC-SIP_MSG_RECV: ccsip_dump_recv_msg_info: <51.159.95.5:0 >:INVITE : <sip:-01179193126112:5060@192.168.1.125:5060>;tag=1443742916 :1 INVITE::1838939795-1932241721-1849453545
2770: ERR 20:53:28.544215 JVM: Unknown address in Request URI
2771: ERR 20:53:28.544955 JVM: sipSPICheckRequest: Request URI Not Found
2772: ERR 20:53:28.545568 JVM: SIP : SIPTaskProcessSIPMessage : sipSPICheckRequest() returned error.
2773: NOT 20:53:28.547244 JVM: SIPCC-SIP_MSG_SEND: ccsip_dump_send_msg_info: <51.159.95.5:64231>:404 Not: <sip:-011972594858636@192.168.1.125:5060> :1 INVITE::1838939795-1932241721-1849453545
2774: NOT 20:53:32.617683 JVM: SIPCC-SIP_MSG_RECV: ccsip_dump_recv_msg_info: <37.49.229.192:0 >:INVITE : <sip:test@192.168.1.125:5060;transport=UDP>;tag=niwyyaek :1 INVITE::W28HjSKrxVpMycJcEKHlFB..
2775: ERR 20:53:32.661461 JVM: Unknown address in Request URI
2776: ERR 20:53:32.662205 JVM: sipSPICheckRequest: Request URI Not Found
2777: ERR 20:53:32.662808 JVM: SIP : SIPTaskProcessSIPMessage : sipSPICheckRequest() returned error.
2778: NOT 20:53:32.664491 JVM: SIPCC-SIP_MSG_SEND: ccsip_dump_send_msg_info: <37.49.229.192:5060>:404 Not: <sip:148323395006@192.168.1.125:5060;transport=UDP> :1 INVITE::W28HjSKrxVpMycJcEKHlFB..
2779: NOT 20:53:39.680781 JVM: SIPCC-SIP_MSG_RECV: ccsip_dump_recv_msg_info: <138.204.232.169:0 >:OPTIONS: "sipvicious"<sip:100@1.1.1.1>;tag=3466633137653730313363340133383538383030373734 :1 OPTIONS::1048895417340106417526640
2780: NOT 20:53:39.682229 JVM: SIPCC-CC_API: 0/0, cc_int_options_sdp_req: SIP -> GSM: OPTIONS
2781: NOT 20:53:39.683173 JVM: SIPCC-DCSM: dcsm_process_event: DCSM 0 :(DCSM_READY:OPTIONS )
2782: NOT 20:53:39.723960 DSP: CODEC G.711 direction:2 cost:26 budget:100 available
2783: NOT 20:53:39.724665 DSP: CODEC[1] G.729A or G.729AB direction:2 cost:41 budget:100 available
2784: NOT 20:53:39.725248 DSP: CODEC[2] G.729 or G.729B direction:2 cost:41 budget:100 available
2785: NOT 20:53:39.725842 DSP: CODEC[3] LINEAR 8 or 16kHz direction:2 cost:26 budget:100 available
2786: NOT 20:53:39.726447 DSP: CODEC[4] G.722 direction:2 cost:32767 budget:100 NOT available
2787: NOT 20:53:39.727047 DSP: CODEC[5] iLBC direction:2 cost:48 budget:100 available
2788: NOT 20:53:39.727677 DSP: STREAM- GetCapableCodecList requestType:2 bitmap:0x2f
2789: NOT 20:53:39.731271 JVM: SIPCC-CC_API: 0/0, cc_int_options_sdp_ack: GSM -> SIP: OPTIONS_ACK
2790: NOT 20:53:39.735000 JVM: SIPCC-SIP_MSG_SEND: ccsip_dump_send_msg_info: <138.204.232.169:5061>:200 OK
: "sipvicious"<sip:100@1.1.1.1>;tag=0024c40b7ccd00068e491cd5-7844cfbd :1 OPTIONS::1048895417340106417526640
Danke schonmal!
👏 Glückwunsch !
Du hast im Router vergessen TCP/UDP 5060 per Port Forwarding auf die lokale IP freizugeben. Das löst das Problem. Ohne das können inbound Calls vom Provider die NAT Firewall des Routers zum Telefon nicht überwinden.
Du kannst alternativ mit SIP Keepalives arbeiten oder STUN.
Näheres zur VoIP Kommunikation auch hier:
VoIP-Telefonie über SIP-Client "Zoiper" (FritzBox 7560 als Router)
Du hast im Router vergessen TCP/UDP 5060 per Port Forwarding auf die lokale IP freizugeben. Das löst das Problem. Ohne das können inbound Calls vom Provider die NAT Firewall des Routers zum Telefon nicht überwinden.
Du kannst alternativ mit SIP Keepalives arbeiten oder STUN.
Näheres zur VoIP Kommunikation auch hier:
VoIP-Telefonie über SIP-Client "Zoiper" (FritzBox 7560 als Router)