tripplesixer
Goto Top

Sipgate und Cisco 7962 bzw. 7975! Geht das? VOIP

Hallo!

Weiss jemand ob man ein Cisco IP Telefon auch ohne den Cisco Callmanager betreiben kann, also ich meine ... kann man seine z.B. Sipgate.de Daten einhacken und damit telefonieren?

Ich würde mir nämlich von der Optiker her, bzw. verarbeitung gerne so ein Telefon besorgen.

Gruß Trip

Content-ID: 102821

Url: https://administrator.de/contentid/102821

Ausgedruckt am: 22.11.2024 um 07:11 Uhr

dog
dog 27.11.2008 um 15:40:06 Uhr
Goto Top
Dafür brauchst du die SIP-Firmware von Cisco.
Aber das können die Cisco-Experten hier genauer beantworten.

Grüße

Max
aqui
aqui 27.11.2008, aktualisiert am 25.01.2021 um 10:36:38 Uhr
Goto Top
Richtig, und die gibt es nur in einem Router, denn ohne Call Manager funktionieren die Telefone nur mit einem SIP Image das du vorher von der Cisco Support Seite laden musst:
http://greenwirecommunications.com/phone-systems/how-to-reflash-a-7945g ...
bzw.
Cisco Telefone für All IP Anschluss, FritzBox und andere VoIP Anlagen fit machen
drpain2006
drpain2006 25.01.2009 um 11:56:35 Uhr
Goto Top
Kommt zwar etwas spaet aber du kannst die Cisco Phone auch ohne call manager betreiben. Habe ein 7961g mit Sipgate ueber 0815 DSL router laufen ohne probleme.

gruss alex
blueweiser
blueweiser 28.01.2009 um 13:08:48 Uhr
Goto Top
Alex!
Da würden mich aber mal ein paar Details interessieren - für mich kommt nämlich deine Antwort genau richtig.
Ich bin absolut kein VoIP Profi. Das Telefon steht seit einem Jahr hier tot rum, gestern habe ich versucht mich ein bisschen mit der Materie auseinanderzusetzen, aber es gibt so viel verwirrende Infos im Netz, dass ich eher dümmer bin als vorher.
Vorhanden ist:
. 0815 Router (Linksys)
. Cisco 7970G
. "vermeintlich erfolgreiches" Update der Cisco Firmware auf SIP 8.0.3
. Sipgate Account
Hast Du ein HowTo oder irgendeine Anleitung Beispiel xml-Dateien oder kannst eine kurze Übersicht geben, was wie eingestellt werden muss?

Schöne Grüße!
Adi
ciscoexpert
ciscoexpert 24.01.2021 um 19:06:30 Uhr
Goto Top
Mir ist zwar klar, dass hier seit 12 Jahren nichts mehr geschrieben wurde, aber ich werde diesen Beitrag einfach mal wieder beginnen. Ich kenne mich mit den Geräten ganz gut aus, hab ein 8851, 7912 und 7960 erfolgreich mit Sipgate und Telekom zum laufen bekommen.

Interessanterweise nimmt das 7961 die Konfigurationsdatei des 8851, welches ja das gleiche Format verwendet nicht an, also es kommt zu keiner Registrierung, sondern das Gerät bleibt am Registrierungsprozess hängen. So habe ich aucdh ein 7911, 7962, 7942, 7970 und ein 7961 versucht, aber keins will.

Meine Frage: Hat jemand eine funktionierende Konfiguration für ein Telefon der 79-Serie und nicht die 88-Serie, da die ja anders sind und könnte diese hier posten?

Der User drpain2006 hatte zwar angeblich eine funktionierende, hat diese aber leider nie gepostet...

Vielen Dank, falls dies hier jemand sehen sollte face-smile
aqui
aqui 25.01.2021 aktualisiert um 10:37:47 Uhr
Goto Top
Das hier sollte dir weiterhelfen:
Cisco Telefone für All IP Anschluss, FritzBox und andere VoIP Anlagen fit machen
Besonders auch die Kommentare im Thread Verlauf. 7962 und 7970 laufen wie alle anderen 79er Modelle damit vollkommen fehlerlos ! Sehr verwunderlich das du als "Experte" an dem einfachen Setup scheiterst. 😉
ciscoexpert
ciscoexpert 27.01.2021 um 11:07:06 Uhr
Goto Top
Tja auch ich komme mal an meine Grenzen...
Mich hat dabei aber am meisten irritiert, dass das 8851 ohne Probleme läuft, dass 79.. aber nicht.
Und dann habe ich irgendwann aufgegeben, nachdem ich mir wieder unzählige Anleitungen usw. durchgelesen habe, aber fange jetzt an.

Vielen Dank auf jeden Fall!
aqui
aqui 27.01.2021 aktualisiert um 12:43:15 Uhr
Goto Top
Die 79er laufen alle fehlerlos.
Wenn man eine FritzBox als VoIP Anlage betreibt muss man nur drauf achten TCP bei SIP zu verwenden:
Die FritzBox supportet seit längerem nur noch TCP als SIP Protocol und kein UDP mehr.
<transportLayerProtocol>1</transportLayerProtocol>
1 = TCP
2 = UDP
Bei den Providern ist das egal aber wenn man generell mit TCP arbeitet macht man nicht falsch.
ciscoexpert
ciscoexpert 27.01.2021 um 12:47:28 Uhr
Goto Top
Bei mir ist das aber nicht der Fall...
Ich möchte mich direkt bei Sipgate anmelden, da ich keine FritzBox, sonder ein TP-Link Modem verwende, welches diese Funktion aber nicht unterstützt.

Das mit dem <transportLayerProtocol>1</transportLayerProtocol>, kenne ich schon und habe ich auch mit rumgespielt, aber hat nicht wirklich weitergeholfen...
aqui
aqui 27.01.2021 aktualisiert um 13:10:16 Uhr
Goto Top
sonder ein TP-Link Modem verwende,
Ein reines NUR Modem ?? Wenn ja, was ist denn für ein Router dahinter ?
Oder hast du jetzt leider mal wieder laienhaft den Begriff "Modem" und "Router" verwechselt ? Technisch bekanntlich ja ein himmelweiter Unterschied ! Siehe dazu auch hier.
Aber letztlich völlig egal und tut, bezogen auf das Thema hier auch rein gar nix zur Sache wenn du direkt eine SIPgate Connection machen willst. Da ist es egal ob UDP oder TCP und du kannst direkt die im Tutorial geposteten XML Dateien verwenden. OK; angepasst auf deine SIP und IP Crednetials natürlich. face-wink
ciscoexpert
ciscoexpert 27.01.2021 um 14:22:58 Uhr
Goto Top
Ich meine Router, aber ich sage immer Modem meine aber Router, sorry - mein Fehler!

Ich versuche das mal...
ciscoexpert
ciscoexpert 27.01.2021 um 14:41:18 Uhr
Goto Top
Also ich bekomme leider keine Registrierung hin...
<?xml version="1.0" encoding="UTF-8"?>  
<device>
<deviceProtocol>SIP</deviceProtocol>
  <sshUserId>admin</sshUserId>
  <sshPassword>admin</sshPassword>
	<tzdata>
		<tzolsonversion>2015a</tzolsonversion>
		<tzupdater>tzupdater.jar</tzupdater>
	</tzdata>
  <devicePool>
		<dateTimeSetting> 
			<name>CMLocal</name>
			<dateTemplate>D/M/YY</dateTemplate> 
			<timeZone>Central Europe Standard/Daylight Time</timeZone>
			<olsonTimeZone>Europe/Berlin</olsonTimeZone>
		
			<ntps> 
				<ntp>
					<name>129.6.15.28</name> 
					<ntpMode>Unicast</ntpMode> 
				</ntp>
			</ntps>
		</dateTimeSetting> 
     <callManagerGroup>
        <members>
           <member priority="0">  
              <callManager>
                 <ports>
                    <ethernetPhonePort>2000</ethernetPhonePort>
                    <sipPort>5060</sipPort>
                    <securedSipPort>5061</securedSipPort>
                 </ports>
                 <processNodeName>sipgate.de</processNodeName>
              </callManager>
           </member>
        </members>
     </callManagerGroup>
  </devicePool>
  <commonProfile>
     <phonePassword></phonePassword>
     <backgroundImageAccess>true</backgroundImageAccess>
     <callLogBlfEnabled>2</callLogBlfEnabled>
  </commonProfile>
  <loadInformation>term06.default</loadInformation>
 
  <vendorConfig>
     <disableSpeaker>false</disableSpeaker>
     <disableSpeakerAndHeadset>false</disableSpeakerAndHeadset>
     <pcPort>0</pcPort>
     <settingsAccess>1</settingsAccess>
     <garp>0</garp>
     <voiceVlanAccess>0</voiceVlanAccess>
     <ciscoCamera>1</ciscoCamera>
     <videoCapability>1</videoCapability>
     <usbClasses>0,1,2</usbClasses>
     <sdio>1</sdio>
     <wifi>0</wifi>
     <bluetoothProfile>0,1</bluetoothProfile>
     <powerNegotiation>0</powerNegotiation>
     <autoSelectLineEnable>0</autoSelectLineEnable> 
     <webAccess>0</webAccess>
     <sshAccess>0</sshAccess>
	 <sshPort>22</sshPort>
     <g722CodecSupport>2</g722CodecSupport>
     <daysDisplayNotActive>1,2,3,4,5,6,7</daysDisplayNotActive> 
     <displayOnTime>07:00</displayOnTime> 
     <displayOnDuration>00:15</displayOnDuration> 
     <displayIdleTimeout>00:15</displayIdleTimeout> 
	 <displayOnWhenIncomingCall>1</displayOnWhenIncomingCall>
     <spanToPCPort>1</spanToPCPort>
     <loggingDisplay>1</loggingDisplay>
     <loadServer></loadServer>
  </vendorConfig>
  <commonConfig>
     <usb1>1</usb1>
     <usb2>1</usb2>
     <ciscoCamera>1</ciscoCamera>
     <usbClasses>0,1,2</usbClasses>
     <sdio>1</sdio>
     <bluetooth>1</bluetooth>
     <wifi>0</wifi>
     <bluetoothProfile>0,1</bluetoothProfile>
     <joinAndDirectTransferPolicy>0</joinAndDirectTransferPolicy>
  </commonConfig>
  <enterpriseConfig>
     <usb1>1</usb1>
     <usb2>1</usb2>
     <ciscoCamera>1</ciscoCamera>
     <usbClasses>0,1,2</usbClasses>
     <sdio>1</sdio>
     <bluetooth>1</bluetooth>
     <wifi>0</wifi>
     <bluetoothProfile>0,1</bluetoothProfile>
     <joinAndDirectTransferPolicy>0</joinAndDirectTransferPolicy>
     <videoCapability>0</videoCapability>
     <webAccess>0</webAccess>
     <eapAuthentication>2</eapAuthentication>
     <webProtocol>0</webProtocol>
  </enterpriseConfig>
  <advertiseG722Codec>1</advertiseG722Codec>
  <userLocale>
	<name>english_united_kingdom</name>
	<langCode>en</langCode>
</userLocale>
  <networkLocale>Germany</networkLocale>
	<networkLocaleInfo> 
		<name>Germany</name> 
		<uid>64</uid> 
		<version>1.0.0.0-1</version> 
	</networkLocaleInfo>
  <deviceSecurityMode>1</deviceSecurityMode>
  <idleTimeout>0</idleTimeout>
  <authenticationURL></authenticationURL>
  <directoryURL></directoryURL>
  <idleURL></idleURL>
  <informationURL></informationURL>
  <messagesNumber></messagesNumber>  
  <messagesURL></messagesURL>
  <proxyServerURL></proxyServerURL>
  <servicesURL></servicesURL>
  <dscpForSCCPPhoneConfig>96</dscpForSCCPPhoneConfig>
  <dscpForSCCPPhoneServices>0</dscpForSCCPPhoneServices>
  <dscpForCm2Dvce>96</dscpForCm2Dvce>
  <transportLayerProtocol>1</transportLayerProtocol>
  <dndCallAlert>5</dndCallAlert>
  <phonePersonalization>1</phonePersonalization>
  <rollover>0</rollover>
  <singleButtonBarge>0</singleButtonBarge>
  <joinAcrossLines>1</joinAcrossLines>
  <autoCallPickupEnable>false</autoCallPickupEnable>
  <blfAudibleAlertSettingOfIdleStation>0</blfAudibleAlertSettingOfIdleStation>
  <blfAudibleAlertSettingOfBusyStation>0</blfAudibleAlertSettingOfBusyStation>
  <capfAuthMode>0</capfAuthMode>
  <capfList>
     <capf>
        <phonePort>3804</phonePort>
     </capf>
  </capfList>
  <certHash></certHash>
  <encrConfig>false</encrConfig>
  <sipProfile>
     <sipProxies>
        <backupProxy>USECALLMANAGER</backupProxy>
        <backupProxyPort>5060</backupProxyPort>
        <emergencyProxy>USECALLMANAGER</emergencyProxy>
        <emergencyProxyPort>5060</emergencyProxyPort>
        <outboundProxy></outboundProxy>
        <outboundProxyPort></outboundProxyPort>
        <registerWithProxy>true</registerWithProxy>
     </sipProxies>
     <sipCallFeatures>
        <cnfJoinEnabled>true</cnfJoinEnabled>
        <callForwardURI>x-cisco-serviceuri-cfwdall</callForwardURI>
        <callPickupURI>x-cisco-serviceuri-pickup</callPickupURI>
        <callPickupListURI>x-cisco-serviceuri-opickup</callPickupListURI>
        <callPickupGroupURI>x-cisco-serviceuri-gpickup</callPickupGroupURI>
        <meetMeServiceURI>x-cisco-serviceuri-meetme</meetMeServiceURI>
        <abbreviatedDialURI>x-cisco-serviceuri-abbrdial</abbreviatedDialURI>
        <rfc2543Hold>false</rfc2543Hold>
        <callHoldRingback>2</callHoldRingback>
        <localCfwdEnable>true</localCfwdEnable>
        <semiAttendedTransfer>true</semiAttendedTransfer>
        <anonymousCallBlock>2</anonymousCallBlock>
        <callerIdBlocking>2</callerIdBlocking>
        <dndControl>1</dndControl>
        <remoteCcEnable>true</remoteCcEnable>
	<retainForwardInformation>true</retainForwardInformation>
     </sipCallFeatures>
     <sipStack>
        <sipInviteRetx>6</sipInviteRetx>
        <sipRetx>10</sipRetx>
        <timerInviteExpires>180</timerInviteExpires>
        <timerRegisterExpires>7200</timerRegisterExpires>
        <timerRegisterDelta>5</timerRegisterDelta>
        <timerKeepAliveExpires>120</timerKeepAliveExpires>
        <timerSubscribeExpires>120</timerSubscribeExpires>
        <timerSubscribeDelta>5</timerSubscribeDelta>
        <timerT1>500</timerT1>
        <timerT2>4000</timerT2>
        <maxRedirects>70</maxRedirects>
        <remotePartyID>false</remotePartyID>
        <userInfo>None</userInfo>
     </sipStack>
     <autoAnswerTimer>0</autoAnswerTimer>
     <autoAnswerAltBehavior>false</autoAnswerAltBehavior>
     <autoAnswerOverride>true</autoAnswerOverride>
     <transferOnhookEnabled>false</transferOnhookEnabled>
     <enableVad>false</enableVad>
     <preferredCodec>none</preferredCodec>
     <dtmfAvtPayload>101</dtmfAvtPayload>
     <dtmfDbLevel>3</dtmfDbLevel>
     <dtmfOutofBand>avt</dtmfOutofBand>
     <alwaysUsePrimeLine>false</alwaysUsePrimeLine>
     <alwaysUsePrimeLineVoiceMail>false</alwaysUsePrimeLineVoiceMail>
     <kpml>3</kpml>
     <natEnabled>false</natEnabled>
     <natAddress></natAddress>
     <stutterMsgWaiting>2</stutterMsgWaiting>
     <callStats>false</callStats>
     <silentPeriodBetweenCallWaitingBursts>10</silentPeriodBetweenCallWaitingBursts>
     <disableLocalSpeedDialConfig>false</disableLocalSpeedDialConfig>
     <startMediaPort>10000</startMediaPort>
     <stopMediaPort>20000</stopMediaPort>
     <voipControlPort>5060</voipControlPort>
     <dscpForAudio>184</dscpForAudio>
	 <dscpVideo>136</dscpVideo>
	 <dscpForTelepresence>128</dscpForTelepresence>
     <ringSettingBusyStationPolicy>0</ringSettingBusyStationPolicy>
	 <softKeyFile>AppDialRules.xml</softKeyFile>
     <dialTemplate>dialplan.xml</dialTemplate>
     <phoneLabel>Urosevic</phoneLabel>
     <sipLines>
		<line button="1" lineIndex="1">  
           <featureID>9</featureID>
           <featureLabel></featureLabel>
           <name></name>
           <displayName></displayName>
           <contact></contact>
           <proxy>USECALLMANAGER</proxy>
           <port>5060</port>
           <autoAnswer>
              <autoAnswerEnabled>2</autoAnswerEnabled>
           </autoAnswer>
           <callWaiting>3</callWaiting>
           <authName></authName>
           <authPassword></authPassword>
           <sharedLine>false</sharedLine>
           <messageWaitingLampPolicy>3</messageWaitingLampPolicy>
		   <messageWaitingAMWI>1</messageWaitingAMWI>
           <messagesNumber></messagesNumber>
           <ringSettingIdle>4</ringSettingIdle>
           <ringSettingActive>5</ringSettingActive>
           <forwardCallInfoDisplay>
              <callerName>true</callerName>
              <callerNumber>false</callerNumber>
              <redirectedNumber>false</redirectedNumber>
              <dialedNumber>true</dialedNumber>
           </forwardCallInfoDisplay>
			<maxNumCalls>4</maxNumCalls>
			<busyTrigger>2</busyTrigger>
        </line>
	</sipLines>
  </sipProfile>
	<phoneServices>
     <provisioning>0</provisioning>
     	<phoneService  type="1" category="0">  
     		<name>Missed Calls</name>
     		<url>Application:Cisco/MissedCalls</url>
        	<vendor></vendor>
     		<version></version>
     	</phoneService>
	<phoneService  type="2" category="0">  
		<name>Voicemail</name>
		<url>Application:Cisco/Voicemail</url>
		<vendor></vendor>
		<version></version>
	</phoneService>
	<phoneService  type="1" category="0">  
		<name>Received Calls</name>
		<url>Application:Cisco/ReceivedCalls</url>
		<vendor></vendor>
		<version></version>
	</phoneService>
	<phoneService  type="1" category="0">  
		<name>Placed Calls</name>
		<url>Application:Cisco/PlacedCalls</url>
		<vendor></vendor>
		<version></version>
		</phoneService>
			<phoneService  type="0" category="0">  
				<name>Telefonbuch</name>
                <url></url>
                <vendor></vendor>
                <version></version>
        </phoneService>
		<phoneService  type="0" category="0">  
				<name>Australian Cisco Services</name>
                <url>http://cisco.internect.net</url>
                <vendor></vendor>
                <version></version>
        </phoneService>
		<phoneService  type="0" category="0">  
				<name>Google</name>
                <url>http://google.de</url>
                <vendor></vendor>
                <version></version>
        </phoneService>
	</phoneServices>
</device>

Eventuell habe ich ja einen Fehler, den ich übersehe, weil das Telefon nur auf "Registering" hängen bleibt.
aqui
aqui 27.01.2021 aktualisiert um 15:27:33 Uhr
Goto Top
Ja da ist mit Sicherheit ein Syntax Fehler drin. Sowas wie <olsonTimeZone> ist ein NoGo für 79er Modelle denn es ist fraglich ob sie das verstehen. Ist in dem Beispiel Konfigs des Tutorials auch nicht drin.
Deine NTP Server IP 129.6.15.28 ist inexistent im Internet. Besser man nimmt offizielle NTP Server: https://www.heise.de/ct/hotline/Oeffentliche-Zeitquellen-322978.html
Das gravierenste ist aber der Load Information Tag <loadInformation>term06.default</loadInformation> der kann so niemals richtig sein, denn dort müsste ein Eintrag rein der zu deiner geladenen SIP Firmware Version passt. Sowas wie <loadInformation7 model="IP Phone 7960">P0S3-8-12-00</loadInformation7>
Das hiesige Cisco Tutorial weist explizit auf diesen Fakt hin !!!
So ein gravierender Syntax Error bewirkt das das Laden der XML Konfig Datei abgebrochen wird.
Was für ein Modell hast du da genau am Start ?
ciscoexpert
ciscoexpert 27.01.2021 um 17:56:52 Uhr
Goto Top
So,
ich habe jetzt erstmal alle angesprochenen Fehler ausgebessert - auch das mit der load information, aber leider noch kein Erfolg.
Die Datei liest es auch ein, hat es aber auch schon vorher...

Das Modell welches ich verwende, ist ein 7911. Ich hätte ansonsten auch noch andere Modelle wie vorher genannt zur Verfügung...

Vielen Dank!
aqui
aqui 27.01.2021 um 20:55:56 Uhr
Goto Top
Schmeiss mal einen Wireshark an und sieh dir mal an was das Telefon für SIP Requests sendet und was da von SIPgate zurückkommt wenn der File gebootet ist. Wenn er in der "Registering...." Loop hängt stimmt irgendwa smit der SIP Anmeldung nicht.
Normal funktionieren die 79er Modelle völlig problemlos und auf Anhieb mit SIPgate.
ciscoexpert
ciscoexpert 27.01.2021 um 22:55:34 Uhr
Goto Top
So ich habe mal aufgezeichnet, aber es kommt leider nicht einmal zu einer SIP-Registrierung...
Es werden nur IP-Adressen zugewiesen, die das Telefon dann auch bekommt, was aber nichts zur Sache bei tut.

Ich werde hier mal den Log posten, den Wireshark erstellt hat.

1	0.000000	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2	0.000425	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1441 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
3	0.000512	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=2881 Win=1029 Len=0
4	0.000893	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=2881 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
5	0.001395	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=4321 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
6	0.001395	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
7	0.001472	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=5975 Win=1029 Len=0
8	0.339398	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
9	0.400481	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=5975 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
10	0.400657	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=7415 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
11	0.400738	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=8855 Win=1029 Len=0
12	0.401145	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=8855 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
13	0.401648	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=10295 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
14	0.401648	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
15	0.401734	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=12691 Win=1029 Len=0
16	0.800024	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=12691 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
17	0.800024	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=14131 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
18	0.800196	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=15571 Win=1029 Len=0
19	0.800536	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=15571 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
20	0.800922	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=17011 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
21	0.800922	51.195.5.70	192.168.1.123	TLSv1.2	300	Application Data
22	0.801012	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=18697 Win=1029 Len=0
23	1.201786	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=18697 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
24	1.202208	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=20137 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
25	1.202295	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=21577 Win=1029 Len=0
26	1.202485	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=21577 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
27	1.202917	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=23017 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
28	1.202917	51.195.5.70	192.168.1.123	TLSv1.2	989	Application Data
29	1.203010	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=25392 Win=1029 Len=0
30	1.599024	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=25392 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
31	1.599408	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=26832 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
32	1.599494	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=28272 Win=1029 Len=0
33	1.599684	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=28272 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
34	1.600177	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=29712 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
35	1.600177	51.195.5.70	192.168.1.123	TLSv1.2	999	Application Data
36	1.600260	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=32097 Win=1029 Len=0
37	1.998787	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=32097 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
38	1.999160	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=33537 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
39	1.999209	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=34977 Win=1029 Len=0
40	1.999658	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=34977 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
41	2.000158	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=36417 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
42	2.000158	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
43	2.000199	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=38071 Win=1029 Len=0
44	2.403088	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=38071 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
45	2.403088	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=39511 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
46	2.403088	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=40951 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
47	2.403088	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=42391 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
48	2.403088	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
49	2.403296	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=44787 Win=1029 Len=0
50	2.527458	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
51	2.529198	192.168.1.110	224.0.0.251	MDNS	81	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
52	2.529750	fe80::55d5:a9d:8bfd:889e	ff02::fb	MDNS	101	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
53	2.530349	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0xf6e2 A BRN001BA9933B17
54	2.530349	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0xf6e2 A BRN001BA9933B17
55	2.795290	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=44787 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
56	2.795722	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=46227 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
57	2.795809	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=47667 Win=1029 Len=0
58	2.796057	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=47667 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
59	2.796697	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=49107 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
60	2.796697	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
61	2.796819	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=50760 Win=1029 Len=0
62	2.962826	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0xf6e2 A BRN001BA9933B17
63	2.962826	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0xf6e2 A BRN001BA9933B17
64	2.962826	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
65	3.196246	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=50760 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
66	3.196463	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=52200 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
67	3.196550	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=53640 Win=1029 Len=0
68	3.197153	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=53640 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
69	3.197497	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=55080 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
70	3.197497	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
71	3.197582	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=57476 Win=1029 Len=0
72	3.283442	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
73	3.285144	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
74	3.414748	192.168.1.123	54.38.152.153	TCP	55	64506 → 443 [ACK] Seq=1 Ack=1 Win=1025 Len=1 [TCP segment of a reassembled PDU]
75	3.425964	54.38.152.153	192.168.1.123	TCP	60	443 → 64506 [ACK] Seq=1 Ack=2 Win=260 Len=0
76	3.542934	192.168.1.110	224.0.0.251	MDNS	81	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
77	3.542934	fe80::55d5:a9d:8bfd:889e	ff02::fb	MDNS	101	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
78	3.591252	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=57476 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
79	3.591465	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=58916 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
80	3.591502	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=60356 Win=1029 Len=0
81	3.591952	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=60356 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
82	3.592455	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=61796 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
83	3.592455	51.195.5.70	192.168.1.123	TLSv1.2	1109	Application Data
84	3.592542	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=64291 Win=1029 Len=0
85	3.995525	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=64291 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
86	3.995525	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=65731 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
87	3.995616	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=67171 Win=1029 Len=0
88	3.995699	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=67171 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
89	3.996164	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=68611 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
90	3.996164	51.195.5.70	192.168.1.123	TLSv1.2	169	Application Data
91	3.996204	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=70166 Win=1029 Len=0
92	4.030512	93.184.220.29	192.168.1.123	TCP	60	80 → 64536 [ACK] Seq=1 Ack=1 Win=131 Len=0
93	4.030574	192.168.1.123	93.184.220.29	TCP	54	[TCP ACKed unseen segment] 64536 → 80 [ACK] Seq=1 Ack=2 Win=1026 Len=0
94	4.046211	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
95	4.395055	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=70166 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
96	4.395466	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=71606 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
97	4.395552	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=73046 Win=1029 Len=0
98	4.395961	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=73046 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
99	4.396462	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=74486 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
100	4.396462	51.195.5.70	192.168.1.123	TLSv1.2	1110	Application Data
101	4.396543	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=76982 Win=1029 Len=0
102	4.645015	HuaweiTe_49:c9:15	Broadcast	ARP	60	Who has 192.168.1.1? Tell 192.168.1.116
103	4.795060	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=76982 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
104	4.795475	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=78422 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
105	4.795564	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=79862 Win=1029 Len=0
106	4.795756	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=79862 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
107	4.796228	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=81302 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
108	4.796228	51.195.5.70	192.168.1.123	TLSv1.2	910	Application Data
109	4.796311	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=83598 Win=1029 Len=0
110	4.806250	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
111	4.806757	192.168.1.110	224.0.0.251	MDNS	81	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
112	4.807142	fe80::55d5:a9d:8bfd:889e	ff02::fb	MDNS	101	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
113	4.808254	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0x05f3 A BRN001BA9933B17
114	4.808254	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0x05f3 A BRN001BA9933B17
115	5.118698	192.168.1.2	239.255.255.250	SSDP	171	M-SEARCH * HTTP/1.1 
116	5.194566	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=83598 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
117	5.194738	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=85038 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
118	5.194816	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=86478 Win=1029 Len=0
119	5.195216	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=86478 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
120	5.196364	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=87918 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
121	5.196364	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
122	5.196461	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=89572 Win=1029 Len=0
123	5.230970	192.168.1.2	239.255.255.250	SSDP	171	M-SEARCH * HTTP/1.1 
124	5.233685	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0x05f3 A BRN001BA9933B17
125	5.233937	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0x05f3 A BRN001BA9933B17
126	5.338171	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
127	5.567541	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
128	5.588977	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=89572 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
129	5.589448	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=91012 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
130	5.589491	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=92452 Win=1029 Len=0
131	5.589944	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=92452 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
132	5.590181	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=93892 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
133	5.590181	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
134	5.590216	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=96289 Win=1029 Len=0
135	5.966726	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
136	5.994522	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=96289 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
137	5.994992	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=97729 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
138	5.995077	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=99169 Win=1029 Len=0
139	5.995485	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=99169 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
140	5.995987	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=100609 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
141	5.995987	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
142	5.996065	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=102262 Win=1029 Len=0
143	6.323964	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
144	6.392111	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=102262 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
145	6.392592	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=103702 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
146	6.392675	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=105142 Win=1029 Len=0
147	6.392895	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=105142 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
148	6.394236	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=106582 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
149	6.394236	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
150	6.394341	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=108978 Win=1029 Len=0
151	6.792926	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=108978 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
152	6.793442	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=110418 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
153	6.793525	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=111858 Win=1029 Len=0
154	6.793748	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=111858 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
155	6.794236	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=113298 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
156	6.794236	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
157	6.794316	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=115695 Win=1029 Len=0
158	7.122930	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
159	7.188091	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=115695 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
160	7.188533	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=117135 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
161	7.188623	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=118575 Win=1029 Len=0
162	7.188901	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=118575 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
163	7.189226	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=120015 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
164	7.189226	51.195.5.70	192.168.1.123	TLSv1.2	266	Application Data
165	7.189273	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=121667 Win=1029 Len=0
166	7.603083	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=121667 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
167	7.603083	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=123107 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
168	7.603083	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=124547 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
169	7.603083	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=125987 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
170	7.603083	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
171	7.603288	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=128384 Win=1029 Len=0
172	7.991092	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=128384 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
173	7.991794	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=129824 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
174	7.991794	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=131264 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
175	7.991892	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=132704 Win=1029 Len=0
176	7.992220	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=132704 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
177	7.992220	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
178	7.992298	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=134358 Win=1029 Len=0
179	8.391853	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=134358 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
180	8.392030	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=135798 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
181	8.392109	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=137238 Win=1029 Len=0
182	8.392514	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=137238 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
183	8.393506	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=138678 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
184	8.393506	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
185	8.393613	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=141074 Win=1029 Len=0
186	8.803144	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=141074 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
187	8.803144	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=142514 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
188	8.803144	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=143954 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
189	8.803144	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=145394 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
190	8.803144	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
191	8.803345	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=147790 Win=1029 Len=0
192	8.971589	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
193	9.189373	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=147790 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
194	9.189794	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=149230 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
195	9.189877	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=150670 Win=1029 Len=0
196	9.190070	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=150670 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
197	9.190521	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=152110 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
198	9.190521	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
199	9.190601	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=153764 Win=1029 Len=0
200	9.597204	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=153764 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
201	9.597204	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=155204 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
202	9.597204	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=156644 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
203	9.597204	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=158084 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
204	9.597204	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
205	9.597342	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=160480 Win=1029 Len=0
206	9.988141	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=160480 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
207	9.988320	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=161920 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
208	9.988395	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=163360 Win=1029 Len=0
209	9.988792	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=163360 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
210	9.989296	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=164800 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
211	9.989296	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
212	9.989373	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=166453 Win=1029 Len=0
213	10.339104	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
214	10.388397	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=166453 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
215	10.388814	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=167893 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
216	10.388897	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=169333 Win=1029 Len=0
217	10.389086	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=169333 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
218	10.389548	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=170773 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
219	10.389548	51.195.5.70	192.168.1.123	TLSv1.2	1047	Application Data
220	10.389628	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=173206 Win=1029 Len=0
221	10.660682	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
222	10.789149	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=173206 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
223	10.789558	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=174646 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
224	10.789641	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=176086 Win=1029 Len=0
225	10.789832	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=176086 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
226	10.790295	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=177526 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
227	10.790295	51.195.5.70	192.168.1.123	TLSv1.2	973	Application Data
228	10.790374	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=179885 Win=1029 Len=0
229	11.188906	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=179885 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
230	11.189322	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=181325 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
231	11.189407	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=182765 Win=1029 Len=0
232	11.189656	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=182765 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
233	11.190309	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=184205 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
234	11.190309	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
235	11.190387	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=185859 Win=1029 Len=0
236	11.587027	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=185859 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
237	11.587027	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=187299 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
238	11.587027	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=188739 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
239	11.587137	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=190179 Win=1029 Len=0
240	11.587792	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=190179 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
241	11.587792	51.195.5.70	192.168.1.123	TLSv1.2	1049	Application Data
242	11.587834	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=192614 Win=1029 Len=0
243	11.985914	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=192614 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
244	11.986336	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=194054 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
245	11.986420	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=195494 Win=1029 Len=0
246	11.986668	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=195494 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
247	11.987045	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=196934 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
248	11.987045	51.195.5.70	192.168.1.123	TLSv1.2	325	Application Data
249	11.987124	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=198645 Win=1029 Len=0
250	12.385919	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=198645 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
251	12.386266	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=200085 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
252	12.386347	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=201525 Win=1029 Len=0
253	12.386592	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=201525 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
254	12.387074	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=202965 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
255	12.387074	51.195.5.70	192.168.1.123	TLSv1.2	915	Application Data
256	12.387152	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=205266 Win=1029 Len=0
257	12.785671	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=205266 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
258	12.786094	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=206706 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
259	12.786230	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=208146 Win=1029 Len=0
260	12.786447	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=208146 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
261	12.786820	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=209586 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
262	12.786820	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
263	12.786900	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=211982 Win=1029 Len=0
264	13.026391	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
265	13.187427	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=211982 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
266	13.187598	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=213422 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
267	13.187672	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=214862 Win=1029 Len=0
268	13.188084	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=214862 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
269	13.188596	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=216302 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
270	13.188596	51.195.5.70	192.168.1.123	TLSv1.2	266	Application Data
271	13.188679	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=217954 Win=1029 Len=0
272	13.196561	192.168.1.123	51.195.113.37	TCP	66	64551 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
273	13.208424	51.195.113.37	192.168.1.123	TCP	62	443 → 64551 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
274	13.208686	192.168.1.123	51.195.113.37	TCP	54	64551 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
275	13.209818	192.168.1.123	51.195.113.37	TLSv1.3	641	Client Hello
276	13.222186	51.195.113.37	192.168.1.123	TLSv1.3	288	Server Hello, Change Cipher Spec, Application Data, Application Data
277	13.228894	192.168.1.123	51.195.113.37	TLSv1.3	118	Change Cipher Spec, Application Data
278	13.229435	192.168.1.123	51.195.113.37	TLSv1.3	146	Application Data
279	13.230486	192.168.1.123	51.195.113.37	TLSv1.3	1136	Application Data
280	13.240361	51.195.113.37	192.168.1.123	TLSv1.3	325	Application Data
281	13.241032	51.195.113.37	192.168.1.123	TLSv1.3	100	Application Data
282	13.241151	192.168.1.123	51.195.113.37	TCP	54	64551 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
283	13.241523	192.168.1.123	51.195.113.37	TLSv1.3	85	Application Data
284	13.243012	51.195.113.37	192.168.1.123	TLSv1.3	391	Application Data
285	13.295140	51.195.113.37	192.168.1.123	TCP	60	443 → 64551 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
286	13.295748	192.168.1.123	51.195.113.37	TCP	54	64551 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
287	13.590984	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=217954 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
288	13.590984	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=219394 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
289	13.590984	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=220834 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
290	13.590984	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=222274 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
291	13.590984	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
292	13.591102	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=224671 Win=1029 Len=0
293	13.984689	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=224671 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
294	13.985087	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=226111 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
295	13.985170	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=227551 Win=1029 Len=0
296	13.985593	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=227551 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
297	13.985819	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=228991 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
298	13.985819	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
299	13.985894	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=230644 Win=1029 Len=0
300	14.384683	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=230644 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
301	14.385110	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=232084 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
302	14.385196	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=233524 Win=1029 Len=0
303	14.385389	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=233524 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
304	14.385896	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=234964 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
305	14.385896	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
306	14.385981	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=237361 Win=1029 Len=0
307	14.784454	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=237361 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
308	14.784917	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=238801 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
309	14.785001	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=240241 Win=1029 Len=0
310	14.785354	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=240241 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
311	14.785584	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=241681 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
312	14.785584	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
313	14.785660	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=244077 Win=1029 Len=0
314	14.840401	Cisco_0b:7c:cd	Nearest-non-TPMR-bridge	EAPOL	60	Start
315	14.914944	93.184.220.29	192.168.1.123	TCP	60	80 → 64540 [ACK] Seq=1 Ack=1 Win=133 Len=0
316	14.915065	192.168.1.123	93.184.220.29	TCP	54	[TCP ACKed unseen segment] 64540 → 80 [ACK] Seq=1 Ack=2 Win=1027 Len=0
317	15.183977	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=244077 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
318	15.184394	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=245517 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
319	15.184480	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=246957 Win=1029 Len=0
320	15.184673	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=246957 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
321	15.185149	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=248397 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
322	15.185149	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
323	15.185227	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=250051 Win=1029 Len=0
324	15.340454	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
325	15.584922	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=250051 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
326	15.585345	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=251491 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
327	15.585382	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=252931 Win=1029 Len=0
328	15.585568	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=252931 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
329	15.586092	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=254371 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
330	15.586092	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
331	15.586122	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=256767 Win=1029 Len=0
332	15.983056	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=256767 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
333	15.983415	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=258207 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
334	15.983500	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=259647 Win=1029 Len=0
335	15.983969	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=259647 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
336	15.984376	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=261087 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
337	15.984376	51.195.5.70	192.168.1.123	TLSv1.2	270	Application Data
338	15.984455	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=262743 Win=1029 Len=0
339	16.033342	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
340	16.382958	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=262743 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
341	16.383396	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=264183 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
342	16.383480	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=265623 Win=1029 Len=0
343	16.383693	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=265623 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
344	16.384132	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=267063 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
345	16.384132	51.195.5.70	192.168.1.123	TLSv1.2	1007	Application Data
346	16.384210	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=269456 Win=1029 Len=0
347	16.782424	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=269456 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
348	16.792564	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=270896 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
349	16.792564	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=272336 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
350	16.792564	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=273776 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
351	16.792564	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
352	16.792667	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=276173 Win=1029 Len=0
353	17.182103	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=276173 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
354	17.182368	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=277613 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
355	17.182418	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=279053 Win=1029 Len=0
356	17.192326	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=279053 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
357	17.192326	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=280493 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
358	17.192326	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
359	17.192420	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=282146 Win=1029 Len=0
360	17.579728	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=282146 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
361	17.580248	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=283586 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
362	17.580332	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=285026 Win=1029 Len=0
363	17.580544	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=285026 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
364	17.580868	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=286466 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
365	17.580868	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
366	17.580948	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=288862 Win=1029 Len=0
367	17.602053	192.168.1.114	224.0.0.251	MDNS	181	Standard query 0x0000 PTR _companion-link._tcp.local, "QU" question PTR _homekit._tcp.local, "QU" question PTR _airplay._tcp.local, "QU" question PTR _raop._tcp.local, "QU" question PTR _sleep-proxy._udp.local, "QU" question OPT  
368	17.602053	fe80::10e9:7cd0:1d94:7816	ff02::fb	MDNS	201	Standard query 0x0000 PTR _companion-link._tcp.local, "QU" question PTR _homekit._tcp.local, "QU" question PTR _airplay._tcp.local, "QU" question PTR _raop._tcp.local, "QU" question PTR _sleep-proxy._udp.local, "QU" question OPT  
369	17.983494	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=288862 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
370	17.983938	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=290302 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
371	17.984021	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=291742 Win=1029 Len=0
372	17.984270	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=291742 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
373	17.984634	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=293182 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
374	17.984634	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
375	17.984714	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=295579 Win=1029 Len=0
376	18.218753	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
377	18.218784	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
378	18.380745	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=295579 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
379	18.381157	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=297019 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
380	18.381240	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=298459 Win=1029 Len=0
381	18.381647	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=298459 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
382	18.381889	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=299899 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
383	18.381889	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
384	18.381964	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=301552 Win=1029 Len=0
385	18.482384	fe80::10e9:7cd0:1d94:7816	ff02::16	ICMPv6	90	Multicast Listener Report Message v2
386	18.578698	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
387	18.609426	192.168.1.114	224.0.0.251	MDNS	181	Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question OPT  
388	18.609426	fe80::10e9:7cd0:1d94:7816	ff02::fb	MDNS	201	Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question OPT  
389	18.783048	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=301552 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
390	18.783048	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=302992 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
391	18.783048	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=304432 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
392	18.783048	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=305872 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
393	18.783048	51.195.5.70	192.168.1.123	TLSv1.2	1093	Application Data
394	18.783310	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=308351 Win=1029 Len=0
395	19.011214	192.168.1.123	51.195.113.37	TCP	54	64551 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
396	19.023827	51.195.113.37	192.168.1.123	TCP	60	443 → 64551 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
397	19.023991	192.168.1.123	51.195.113.37	TCP	54	64551 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
398	19.036260	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
399	19.182240	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=308351 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
400	19.182240	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=309791 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
401	19.182240	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=311231 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
402	19.182240	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=312671 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
403	19.182240	51.195.5.70	192.168.1.123	TLSv1.2	185	Application Data
404	19.182436	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=314242 Win=1029 Len=0
405	19.281900	192.168.1.117	239.255.255.250	SSDP	333	NOTIFY * HTTP/1.1 
406	19.298074	192.168.1.117	239.255.255.250	SSDP	351	NOTIFY * HTTP/1.1 
407	19.314966	192.168.1.117	239.255.255.250	SSDP	405	NOTIFY * HTTP/1.1 
408	19.331596	192.168.1.117	239.255.255.250	SSDP	397	NOTIFY * HTTP/1.1 
409	19.348317	192.168.1.117	239.255.255.250	SSDP	327	NOTIFY * HTTP/1.1 
410	19.364767	192.168.1.117	239.255.255.250	SSDP	369	NOTIFY * HTTP/1.1 
411	19.382624	192.168.1.117	239.255.255.250	SSDP	401	NOTIFY * HTTP/1.1 
412	19.398618	192.168.1.117	239.255.255.250	SSDP	347	NOTIFY * HTTP/1.1 
413	19.414724	192.168.1.117	239.255.255.250	SSDP	399	NOTIFY * HTTP/1.1 
414	19.431715	192.168.1.117	239.255.255.250	SSDP	393	NOTIFY * HTTP/1.1 
415	19.490181	fe80::10e9:7cd0:1d94:7816	ff02::16	ICMPv6	90	Multicast Listener Report Message v2
416	19.579253	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=314242 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
417	19.579709	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=315682 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
418	19.579793	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=317122 Win=1029 Len=0
419	19.580029	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=317122 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
420	19.580662	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=318562 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
421	19.580662	51.195.5.70	192.168.1.123	TLSv1.2	1037	Application Data
422	19.580742	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=320985 Win=1029 Len=0
423	19.929317	192.168.1.128	224.0.0.251	MDNS	247	Standard query 0x0000 PTR _companion-link._tcp.local, "QU" question PTR _homekit._tcp.local, "QU" question PTR _raop._tcp.local, "QU" question PTR _airplay._tcp.local, "QU" question PTR _sleep-proxy._udp.local, "QU" question ANY iPad von Aleksandar._companion-link._tcp.local, "QU" question SRV 0 0 50658 iPad-von-Aleksandar.local OPT  
424	19.929840	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	267	Standard query 0x0000 PTR _companion-link._tcp.local, "QU" question PTR _homekit._tcp.local, "QU" question PTR _raop._tcp.local, "QU" question PTR _airplay._tcp.local, "QU" question PTR _sleep-proxy._udp.local, "QU" question ANY iPad von Aleksandar._companion-link._tcp.local, "QU" question SRV 0 0 50658 iPad-von-Aleksandar.local OPT  
425	19.929840	192.168.1.128	224.0.0.251	MDNS	382	Standard query response 0x0000 PTR _companion-link._tcp.local TXT PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
426	19.929840	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	402	Standard query response 0x0000 PTR _companion-link._tcp.local TXT PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
427	19.979764	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=320985 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
428	19.979938	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=322425 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
429	19.980012	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=323865 Win=1029 Len=0
430	19.980427	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=323865 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
431	19.980914	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=325305 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
432	19.980914	51.195.5.70	192.168.1.123	TLSv1.2	240	Application Data
433	19.980992	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=326931 Win=1029 Len=0
434	20.182470	192.168.1.128	224.0.0.251	MDNS	175	Standard query 0x0000 ANY iPad von Aleksandar._companion-link._tcp.local, "QM" question SRV 0 0 50658 iPad-von-Aleksandar.local OPT  
435	20.182470	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	195	Standard query 0x0000 ANY iPad von Aleksandar._companion-link._tcp.local, "QM" question SRV 0 0 50658 iPad-von-Aleksandar.local OPT  
436	20.340903	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
437	20.380114	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=326931 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
438	20.381130	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=328371 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
439	20.381130	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=329811 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
440	20.381246	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=331251 Win=1029 Len=0
441	20.381492	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=331251 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
442	20.381492	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
443	20.381572	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=333648 Win=1029 Len=0
444	20.523367	192.168.1.128	224.0.0.251	MDNS	225	Standard query 0x0000 ANY iPad von Aleksandar._companion-link._tcp.local, "QM" question ANY iPad-von-Aleksandar.local, "QU" question SRV 0 0 50658 iPad-von-Aleksandar.local AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT  
445	20.523367	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	245	Standard query 0x0000 ANY iPad von Aleksandar._companion-link._tcp.local, "QM" question ANY iPad-von-Aleksandar.local, "QU" question SRV 0 0 50658 iPad-von-Aleksandar.local AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT  
446	20.777111	192.168.1.128	224.0.0.251	MDNS	158	Standard query 0x0000 ANY iPad-von-Aleksandar.local, "QM" question AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT  
447	20.777604	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	178	Standard query 0x0000 ANY iPad-von-Aleksandar.local, "QM" question AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT  
448	20.778246	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=333648 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
449	20.778246	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=335088 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
450	20.778368	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=336528 Win=1029 Len=0
451	20.778636	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=336528 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
452	20.779189	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=337968 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
453	20.779189	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
454	20.779267	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=340364 Win=1029 Len=0
455	20.779640	192.168.1.128	224.0.0.251	MDNS	396	Standard query response 0x0000 TXT, cache flush PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local OPT
456	20.779975	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	416	Standard query response 0x0000 TXT, cache flush PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local OPT
457	20.844363	fe80::4e9:f5bf:61c4:5dbd	ff02::16	ICMPv6	90	Multicast Listener Report Message v2
458	20.969292	192.168.1.123	8.241.53.126	TCP	54	64541 → 80 [FIN, ACK] Seq=1 Ack=1 Win=1028 Len=0
459	20.981290	8.241.53.126	192.168.1.123	TCP	60	80 → 64541 [FIN, ACK] Seq=1 Ack=2 Win=501 Len=0
460	20.981363	192.168.1.123	8.241.53.126	TCP	54	64541 → 80 [ACK] Seq=2 Ack=2 Win=1028 Len=0
461	21.042996	192.168.1.128	224.0.0.251	MDNS	285	Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question ANY iPad-von-Aleksandar.local, "QM" question PTR iPad von Aleksandar._companion-link._tcp.local AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT  
462	21.042996	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	305	Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question ANY iPad-von-Aleksandar.local, "QM" question PTR iPad von Aleksandar._companion-link._tcp.local AAAA fe80::4e9:f5bf:61c4:5dbd A 192.168.1.128 OPT  
463	21.042996	192.168.1.128	224.0.0.251	MDNS	324	Standard query response 0x0000 PTR _companion-link._tcp.local PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
464	21.042996	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	344	Standard query response 0x0000 PTR _companion-link._tcp.local PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
465	21.178285	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=340364 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
466	21.178699	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=341804 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
467	21.178783	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=343244 Win=1029 Len=0
468	21.178975	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=343244 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
469	21.179443	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=344684 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
470	21.179443	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
471	21.179522	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=346337 Win=1029 Len=0
472	21.291054	192.168.1.128	224.0.0.251	MDNS	172	Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
473	21.291753	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	192	Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
474	21.578047	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=346337 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
475	21.578434	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=347777 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
476	21.578517	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=349217 Win=1029 Len=0
477	21.578947	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=349217 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
478	21.579445	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=350657 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
479	21.579445	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
480	21.579522	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=353054 Win=1029 Len=0
481	21.822619	192.168.1.128	224.0.0.251	MDNS	396	Standard query response 0x0000 TXT, cache flush PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local OPT
482	21.822619	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	416	Standard query response 0x0000 TXT, cache flush PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local OPT
483	21.978043	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=353054 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
484	21.978462	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=354494 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
485	21.978546	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=355934 Win=1029 Len=0
486	21.978698	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=355934 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
487	21.979397	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=357374 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
488	21.979397	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
489	21.979484	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=359770 Win=1029 Len=0
490	22.296110	192.168.1.128	224.0.0.251	MDNS	172	Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
491	22.296755	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	192	Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
492	22.377053	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=359770 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
493	22.377439	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=361210 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
494	22.377522	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=362650 Win=1029 Len=0
495	22.377713	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=362650 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
496	22.378213	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=364090 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
497	22.378213	51.195.5.70	192.168.1.123	TLSv1.2	297	Application Data
498	22.378292	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=365773 Win=1029 Len=0
499	22.778560	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=365773 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
500	22.778730	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=367213 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
501	22.778806	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=368653 Win=1029 Len=0
502	22.779216	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=368653 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
503	22.779715	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=370093 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
504	22.779715	51.195.5.70	192.168.1.123	TLSv1.2	981	Application Data
505	22.779795	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=372460 Win=1029 Len=0
506	23.042253	192.168.1.128	224.0.0.251	MDNS	591	Standard query response 0x0000 TXT, cache flush PTR _companion-link._tcp.local PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
507	23.046094	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	611	Standard query response 0x0000 TXT, cache flush PTR _companion-link._tcp.local PTR iPad von Aleksandar._companion-link._tcp.local TXT SRV, cache flush 0 0 50658 iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local PTR, cache flush iPad-von-Aleksandar.local NSEC, cache flush iPad von Aleksandar._companion-link._tcp.local NSEC, cache flush D.B.D.5.4.C.1.6.F.B.5.F.9.E.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 128.1.168.192.in-addr.arpa OPT
508	23.096725	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
509	23.176297	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=372460 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
510	23.176717	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=373900 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
511	23.176807	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=375340 Win=1029 Len=0
512	23.177481	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=375340 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
513	23.177481	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=376780 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
514	23.177481	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
515	23.177578	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=378433 Win=1029 Len=0
516	23.576522	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=378433 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
517	23.576730	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=379873 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
518	23.576767	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=381313 Win=1029 Len=0
519	23.577195	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=381313 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
520	23.577706	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=382753 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
521	23.577706	51.195.5.70	192.168.1.123	TLSv1.2	1044	Application Data
522	23.577741	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=385183 Win=1029 Len=0
523	23.854163	fe80::4e9:f5bf:61c4:5dbd	ff02::16	ICMPv6	90	Multicast Listener Report Message v2
524	23.973799	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=385183 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
525	23.973977	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=386623 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
526	23.974050	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=388063 Win=1029 Len=0
527	23.974487	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=388063 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
528	23.974984	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=389503 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
529	23.974984	51.195.5.70	192.168.1.123	TLSv1.2	233	Application Data
530	23.975062	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=391122 Win=1029 Len=0
531	24.051398	192.168.1.128	224.0.0.251	MDNS	215	Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question PTR iPad von Aleksandar._companion-link._tcp.local OPT  
532	24.051398	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	235	Standard query 0x0000 PTR _companion-link._tcp.local, "QM" question PTR _homekit._tcp.local, "QM" question PTR _raop._tcp.local, "QM" question PTR _airplay._tcp.local, "QM" question PTR _sleep-proxy._udp.local, "QM" question PTR iPad von Aleksandar._companion-link._tcp.local OPT  
533	24.305153	192.168.1.128	224.0.0.251	MDNS	172	Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
534	24.305648	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	192	Standard query response 0x0000 AAAA, cache flush fe80::4e9:f5bf:61c4:5dbd A, cache flush 192.168.1.128 NSEC, cache flush iPad-von-Aleksandar.local OPT
535	24.376072	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=391122 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
536	24.376495	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=392562 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
537	24.376579	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=394002 Win=1029 Len=0
538	24.376771	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=394002 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
539	24.377225	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=395442 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
540	24.377225	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
541	24.377304	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=397839 Win=1029 Len=0
542	24.775832	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=397839 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
543	24.776253	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=399279 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
544	24.776337	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=400719 Win=1029 Len=0
545	24.776739	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=400719 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
546	24.777242	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=402159 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
547	24.777242	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
548	24.777317	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=404555 Win=1029 Len=0
549	24.872175	192.168.1.128	224.0.0.251	MDNS	201	Standard query response 0x0000 PTR iPad von Aleksandar._companion-link._tcp.local TXT OPT
550	24.873504	fe80::4e9:f5bf:61c4:5dbd	ff02::fb	MDNS	221	Standard query response 0x0000 PTR iPad von Aleksandar._companion-link._tcp.local TXT OPT
551	25.179835	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=404555 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
552	25.180014	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=405995 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
553	25.180090	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=407435 Win=1029 Len=0
554	25.180492	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=407435 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
555	25.180988	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=408875 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
556	25.180988	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
557	25.181113	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=410529 Win=1029 Len=0
558	25.343123	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
559	25.492601	fe80::211:32ff:fe3b:5ade	ff02::1:2	DHCPv6	132	Solicit XID: 0x50d385 CID: 000300010011323b5ade 
560	25.495030	fe80::e80:63ff:fe26:d10	ff02::1:ff3b:5ade	ICMPv6	86	Neighbor Solicitation for fe80::211:32ff:fe3b:5ade from 0c:80:63:26:0d:10
561	25.575341	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=410529 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
562	25.575517	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=411969 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
563	25.575592	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=413409 Win=1029 Len=0
564	25.576005	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=413409 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
565	25.576503	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=414849 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
566	25.576503	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
567	25.576580	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=417245 Win=1029 Len=0
568	25.680717	Cisco_0b:7c:cd	CDP/VTP/DTP/PAgP/UDLD	CDP	140	Device ID: SEP0024C40B7CCD  Port ID: Port 1  
569	25.844905	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
570	25.909698	192.168.1.109	224.0.0.251	MDNS	119	Standard query 0x0001 PTR _674A0243._sub._googlecast._tcp.local, "QU" question PTR _8E6C866D._sub._googlecast._tcp.local, "QU" question PTR _googlecast._tcp.local, "QU" question  
571	25.974644	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=417245 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
572	25.975059	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=418685 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
573	25.975142	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=420125 Win=1029 Len=0
574	25.976365	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=420125 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
575	25.976365	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=421565 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
576	25.976365	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
577	25.976470	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=423961 Win=1029 Len=0
578	26.106082	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
579	26.371861	192.168.1.2	192.168.1.255	BROWSER	243	Host Announcement UROSEVIC_DS215J, Workstation, Server, Print Queue Server, Xenix Server, NT Workstation, NT Server, DFS server
580	26.373772	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=423961 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
581	26.374268	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=425401 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
582	26.374347	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=426841 Win=1029 Len=0
583	26.374759	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=426841 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
584	26.375262	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=428281 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
585	26.375262	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
586	26.375338	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=429934 Win=1029 Len=0
587	26.683097	Cisco_0b:7c:cd	CDP/VTP/DTP/PAgP/UDLD	CDP	140	Device ID: SEP0024C40B7CCD  Port ID: Port 1  
588	26.772810	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=429934 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
589	26.773249	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=431374 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
590	26.773292	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=432814 Win=1029 Len=0
591	26.773744	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=432814 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
592	26.774244	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=434254 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
593	26.774244	51.195.5.70	192.168.1.123	TLSv1.2	1043	Application Data
594	26.774273	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=436683 Win=1029 Len=0
595	26.898241	192.168.1.109	224.0.0.251	MDNS	119	Standard query 0x0002 PTR _674A0243._sub._googlecast._tcp.local, "QM" question PTR _8E6C866D._sub._googlecast._tcp.local, "QM" question PTR _googlecast._tcp.local, "QM" question  
596	27.171825	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=436683 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
597	27.172246	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=438123 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
598	27.172282	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=439563 Win=1029 Len=0
599	27.172776	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=439563 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
600	27.173247	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=441003 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
601	27.173247	51.195.5.70	192.168.1.123	TLSv1.2	312	Application Data
602	27.173277	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=442701 Win=1029 Len=0
603	27.573640	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=442701 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
604	27.574200	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=444141 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
605	27.574293	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=445581 Win=1029 Len=0
606	27.574513	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=445581 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
607	27.574877	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=447021 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
608	27.574877	51.195.5.70	192.168.1.123	TLSv1.2	934	Application Data
609	27.574956	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=449341 Win=1029 Len=0
610	27.674357	Cisco_0b:7c:cd	CDP/VTP/DTP/PAgP/UDLD	CDP	140	Device ID: SEP0024C40B7CCD  Port ID: Port 1  
611	27.896376	192.168.1.109	224.0.0.251	MDNS	119	Standard query 0x0003 PTR _674A0243._sub._googlecast._tcp.local, "QM" question PTR _8E6C866D._sub._googlecast._tcp.local, "QM" question PTR _googlecast._tcp.local, "QM" question  
612	27.970857	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=449341 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
613	27.971034	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=450781 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
614	27.971112	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=452221 Win=1029 Len=0
615	27.971789	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=452221 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
616	27.972298	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=453661 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
617	27.972298	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
618	27.972377	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=456057 Win=1029 Len=0
619	28.205208	192.168.1.123	51.195.113.37	TCP	66	64552 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
620	28.217145	51.195.113.37	192.168.1.123	TCP	62	443 → 64552 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
621	28.217412	192.168.1.123	51.195.113.37	TCP	54	64552 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
622	28.218600	192.168.1.123	51.195.113.37	TLSv1.3	641	Client Hello
623	28.231103	51.195.113.37	192.168.1.123	TLSv1.3	288	Server Hello, Change Cipher Spec, Application Data, Application Data
624	28.237785	192.168.1.123	51.195.113.37	TLSv1.3	118	Change Cipher Spec, Application Data
625	28.238363	192.168.1.123	51.195.113.37	TLSv1.3	146	Application Data
626	28.239386	192.168.1.123	51.195.113.37	TLSv1.3	1136	Application Data
627	28.249624	51.195.113.37	192.168.1.123	TLSv1.3	325	Application Data
628	28.250090	51.195.113.37	192.168.1.123	TLSv1.3	100	Application Data
629	28.250208	192.168.1.123	51.195.113.37	TCP	54	64552 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
630	28.250558	192.168.1.123	51.195.113.37	TLSv1.3	85	Application Data
631	28.253018	51.195.113.37	192.168.1.123	TLSv1.3	391	Application Data
632	28.305792	192.168.1.123	51.195.113.37	TCP	54	64552 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
633	28.307057	51.195.113.37	192.168.1.123	TCP	60	443 → 64552 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
634	28.371376	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=456057 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
635	28.371787	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=457497 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
636	28.371869	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=458937 Win=1029 Len=0
637	28.372071	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=458937 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
638	28.372544	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=460377 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
639	28.372544	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
640	28.372635	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=462030 Win=1029 Len=0
641	28.673597	Cisco_0b:7c:cd	CDP/VTP/DTP/PAgP/UDLD	CDP	140	Device ID: SEP0024C40B7CCD  Port ID: Port 1  
642	28.769080	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=462030 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
643	28.769286	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=463470 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
644	28.769323	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=464910 Win=1029 Len=0
645	28.769747	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=464910 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
646	28.770245	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=466350 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
647	28.770245	51.195.5.70	192.168.1.123	TLSv1.2	1021	Application Data
648	28.770276	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=468757 Win=1029 Len=0
649	29.036252	192.168.1.123	51.195.113.37	TCP	54	64552 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
650	29.048471	51.195.113.37	192.168.1.123	TCP	60	443 → 64552 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
651	29.048620	192.168.1.123	51.195.113.37	TCP	54	64552 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
652	29.109297	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
653	29.168164	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=468757 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
654	29.168537	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=470197 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
655	29.168621	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=471637 Win=1029 Len=0
656	29.168812	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=471637 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
657	29.169322	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=473077 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
658	29.169322	51.195.5.70	192.168.1.123	TLSv1.2	257	Application Data
659	29.169401	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=474720 Win=1029 Len=0
660	29.567157	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=474720 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
661	29.567332	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=476160 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
662	29.567406	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=477600 Win=1029 Len=0
663	29.567773	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=477600 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
664	29.568309	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=479040 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
665	29.568309	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
666	29.568389	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=481436 Win=1029 Len=0
667	29.674264	Cisco_0b:7c:cd	CDP/VTP/DTP/PAgP/UDLD	CDP	140	Device ID: SEP0024C40B7CCD  Port ID: Port 1  
668	29.968157	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=481436 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
669	29.968552	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=482876 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
670	29.968637	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=484316 Win=1029 Len=0
671	29.968827	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=484316 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
672	29.969320	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=485756 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
673	29.969320	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
674	29.969400	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=488153 Win=1029 Len=0
675	30.346888	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
676	30.369574	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=488153 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
677	30.369574	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=489593 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
678	30.369574	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=491033 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
679	30.369574	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=492473 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
680	30.369574	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
681	30.369700	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=494126 Win=1029 Len=0
682	30.674145	Cisco_0b:7c:cd	CDP/VTP/DTP/PAgP/UDLD	CDP	140	Device ID: SEP0024C40B7CCD  Port ID: Port 1  
683	30.766360	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=494126 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
684	30.766360	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=495566 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
685	30.766360	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=497006 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
686	30.766535	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=498446 Win=1029 Len=0
687	30.767114	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=498446 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
688	30.767114	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
689	30.767204	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=500842 Win=1029 Len=0
690	31.165425	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=500842 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
691	31.165836	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=502282 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
692	31.165919	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=503722 Win=1029 Len=0
693	31.166323	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=503722 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
694	31.166828	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=505162 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
695	31.166828	51.195.5.70	192.168.1.123	TLSv1.2	425	Application Data
696	31.166901	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=506973 Win=1029 Len=0
697	31.564931	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=506973 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
698	31.565342	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=508413 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
699	31.565425	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=509853 Win=1029 Len=0
700	31.565830	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=509853 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
701	31.566057	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=511293 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
702	31.566057	51.195.5.70	192.168.1.123	TLSv1.2	853	Application Data
703	31.566132	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=513532 Win=1029 Len=0
704	31.685447	Cisco_0b:7c:cd	CDP/VTP/DTP/PAgP/UDLD	CDP	140	Device ID: SEP0024C40B7CCD  Port ID: Port 1  
705	31.973566	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=513532 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
706	31.973566	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=514972 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
707	31.973566	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=516412 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
708	31.973566	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=517852 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
709	31.973566	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
710	31.973679	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=520248 Win=1029 Len=0
711	32.365476	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=520248 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
712	32.366037	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=521688 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
713	32.366037	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=523128 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
714	32.366151	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=524568 Win=1029 Len=0
715	32.366586	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=524568 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
716	32.366586	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
717	32.366678	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=526222 Win=1029 Len=0
718	32.684031	Cisco_0b:7c:cd	CDP/VTP/DTP/PAgP/UDLD	CDP	140	Device ID: SEP0024C40B7CCD  Port ID: Port 1  
719	32.763436	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=526222 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
720	32.763848	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=527662 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
721	32.763933	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=529102 Win=1029 Len=0
722	32.764349	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=529102 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
723	32.764854	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=530542 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
724	32.764854	51.195.5.70	192.168.1.123	TLSv1.2	1115	Application Data
725	32.764930	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=533043 Win=1029 Len=0
726	33.160387	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
727	33.163359	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=533043 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
728	33.163857	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=534483 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
729	33.163938	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=535923 Win=1029 Len=0
730	33.164132	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=535923 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
731	33.164605	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=537363 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
732	33.164605	51.195.5.70	192.168.1.123	TLSv1.2	163	Application Data
733	33.164681	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=538912 Win=1029 Len=0
734	33.563015	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=538912 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
735	33.563200	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=540352 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
736	33.563200	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=541792 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
737	33.563290	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=543232 Win=1029 Len=0
738	33.563862	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=543232 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
739	33.563862	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
740	33.563936	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=545628 Win=1029 Len=0
741	33.684351	Cisco_0b:7c:cd	CDP/VTP/DTP/PAgP/UDLD	CDP	140	Device ID: SEP0024C40B7CCD  Port ID: Port 1  
742	33.798339	192.168.1.1	224.0.0.1	IGMPv3	60	Membership Query, general
743	33.962459	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=545628 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
744	33.963069	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=547068 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
745	33.963155	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=548508 Win=1029 Len=0
746	33.963359	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=548508 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
747	33.963869	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=549948 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
748	33.963869	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
749	33.963948	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=552344 Win=1029 Len=0
750	34.332356	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
751	34.332413	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
752	34.361392	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=552344 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
753	34.361887	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=553784 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
754	34.361968	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=555224 Win=1029 Len=0
755	34.362374	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=555224 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
756	34.362921	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=556664 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
757	34.362921	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
758	34.363001	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=558317 Win=1029 Len=0
759	34.480517	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
760	34.537487	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
761	34.762223	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=558317 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
762	34.762666	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=559757 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
763	34.762755	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=561197 Win=1029 Len=0
764	34.763131	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=561197 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
765	34.763633	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=562637 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
766	34.763633	51.195.5.70	192.168.1.123	TLSv1.2	1055	Application Data
767	34.763711	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=565078 Win=1029 Len=0
768	34.788044	192.168.1.123	224.0.0.22	IGMPv3	54	Membership Report / Join group 224.0.0.252 for any sources
769	34.796659	Cisco_0b:7c:cd	LLDP_Multicast	LLDP	277	NA/0.0.0.0 LA/0024C40B7CCD:P1 180 SysN=SEP0024C40B7CCD SysD=Cisco IP Phone 7911G,V7, SIP11.9-2-1S 
770	34.817501	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
771	34.820488	HuaweiTe_49:c9:15	Broadcast	ARP	60	Who has 192.168.1.1? Tell 192.168.1.116
772	34.873490	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
773	34.929441	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
774	35.061052	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
775	35.123082	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
776	35.160922	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=565078 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
777	35.161167	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=566518 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
778	35.161216	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=567958 Win=1029 Len=0
779	35.161625	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=567958 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
780	35.162127	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=569398 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
781	35.162127	51.195.5.70	192.168.1.123	TLSv1.2	223	Application Data
782	35.162169	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=571007 Win=1029 Len=0
783	35.173404	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
784	35.226152	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
785	35.282501	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
786	35.338456	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
787	35.343860	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
788	35.363611	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
789	35.392403	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
790	35.560487	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=571007 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
791	35.560908	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=572447 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
792	35.560993	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=573887 Win=1029 Len=0
793	35.561373	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=573887 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
794	35.561875	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=575327 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
795	35.561875	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
796	35.561951	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=577723 Win=1029 Len=0
797	35.795103	Cisco_0b:7c:cd	LLDP_Multicast	LLDP	277	NA/0.0.0.0 LA/0024C40B7CCD:P1 180 SysN=SEP0024C40B7CCD SysD=Cisco IP Phone 7911G,V7, SIP11.9-2-1S 
798	35.959989	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=577723 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
799	35.960412	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=579163 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
800	35.960496	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=580603 Win=1029 Len=0
801	35.960877	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=580603 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
802	35.961175	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=582043 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
803	35.961175	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
804	35.961253	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=584439 Win=1029 Len=0
805	36.083881	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
806	36.083912	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
807	36.164090	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
808	36.236227	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
809	36.291903	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
810	36.359493	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=584439 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
811	36.359909	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=585879 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
812	36.359995	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=587319 Win=1029 Len=0
813	36.360186	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=587319 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
814	36.360641	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=588759 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
815	36.360641	51.195.5.70	192.168.1.123	TLSv1.2	385	Application Data
816	36.360719	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=590530 Win=1029 Len=0
817	36.567614	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
818	36.624240	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
819	36.678421	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
820	36.759208	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=590530 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
821	36.759626	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=591970 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
822	36.759709	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=593410 Win=1029 Len=0
823	36.760251	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=593410 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
824	36.760732	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=594850 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
825	36.760732	51.195.5.70	192.168.1.123	TLSv1.2	893	Application Data
826	36.760817	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=597129 Win=1029 Len=0
827	36.795121	Cisco_0b:7c:cd	LLDP_Multicast	LLDP	277	NA/0.0.0.0 LA/0024C40B7CCD:P1 180 SysN=SEP0024C40B7CCD SysD=Cisco IP Phone 7911G,V7, SIP11.9-2-1S 
828	36.798429	192.168.1.30	239.255.255.250	IGMPv2	60	Membership Report group 239.255.255.250
829	36.816128	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
830	36.873436	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
831	36.929474	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
832	36.985674	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
833	37.041569	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
834	37.096323	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
835	37.096323	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
836	37.096937	192.168.1.110	224.0.0.251	MDNS	81	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
837	37.097336	fe80::55d5:a9d:8bfd:889e	ff02::fb	MDNS	101	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
838	37.097929	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0x0328 A BRN001BA9933B17
839	37.097929	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0x0328 A BRN001BA9933B17
840	37.154050	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
841	37.160516	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=597129 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
842	37.161197	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=598569 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
843	37.161197	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=600009 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
844	37.161367	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=601449 Win=1029 Len=0
845	37.161664	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=601449 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
846	37.161664	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
847	37.161741	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=603103 Win=1029 Len=0
848	37.510554	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0x0328 A BRN001BA9933B17
849	37.510554	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0x0328 A BRN001BA9933B17
850	37.558449	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=603103 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
851	37.559004	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=604543 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
852	37.559092	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=605983 Win=1029 Len=0
853	37.559308	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=605983 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
854	37.559659	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=607423 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
855	37.559659	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
856	37.559738	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=609819 Win=1029 Len=0
857	37.798454	192.168.1.123	224.0.0.22	IGMPv3	54	Membership Report / Join group 239.255.255.250 for any sources
858	37.822534	::	ff02::1:ff0b:7ccd	ICMPv6	78	Neighbor Solicitation for fe80::224:c4ff:fe0b:7ccd
859	37.829195	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
860	37.829224	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
861	37.853256	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
862	37.958285	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=609819 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
863	37.958761	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=611259 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
864	37.958846	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=612699 Win=1029 Len=0
865	37.959100	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=612699 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
866	37.959398	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=614139 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
867	37.959398	51.195.5.70	192.168.1.123	TLSv1.2	1107	Application Data
868	37.959477	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=616632 Win=1029 Len=0
869	37.978288	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
870	38.032966	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
871	38.102067	192.168.1.110	224.0.0.251	MDNS	81	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
872	38.102067	fe80::55d5:a9d:8bfd:889e	ff02::fb	MDNS	101	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
873	38.316651	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
874	38.358233	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=616632 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
875	38.358433	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=618072 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
876	38.358481	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=619512 Win=1029 Len=0
877	38.358905	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=619512 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
878	38.359451	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=620952 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
879	38.359451	51.195.5.70	192.168.1.123	TLSv1.2	171	Application Data
880	38.359530	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=622509 Win=1029 Len=0
881	38.369570	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
882	38.423937	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
883	38.550281	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
884	38.606136	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
885	38.613815	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
886	38.651737	Cisco_09:6d:ea	CDP/VTP/DTP/PAgP/UDLD	CDP	160	Device ID: SEP84B517096DEA  Port ID: Port 1  
887	38.659731	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
888	38.714351	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
889	38.754985	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=622509 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
890	38.755428	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=623949 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
891	38.755483	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=625389 Win=1029 Len=0
892	38.755893	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=625389 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
893	38.756147	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=626829 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
894	38.756147	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
895	38.756179	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=629225 Win=1029 Len=0
896	38.769392	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
897	38.824483	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
898	38.879723	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
899	39.157289	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=629225 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
900	39.157677	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=630665 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
901	39.157761	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=632105 Win=1029 Len=0
902	39.158186	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=632105 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
903	39.158414	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=633545 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
904	39.158414	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
905	39.158490	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=635198 Win=1029 Len=0
906	39.175648	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
907	39.287498	192.168.1.117	239.255.255.250	SSDP	333	NOTIFY * HTTP/1.1 
908	39.287629	192.168.1.123	224.0.0.22	IGMPv3	54	Membership Report / Join group 224.0.0.251 for any sources
909	39.298133	192.168.1.117	239.255.255.250	SSDP	351	NOTIFY * HTTP/1.1 
910	39.314817	192.168.1.117	239.255.255.250	SSDP	405	NOTIFY * HTTP/1.1 
911	39.331658	192.168.1.117	239.255.255.250	SSDP	397	NOTIFY * HTTP/1.1 
912	39.348362	192.168.1.117	239.255.255.250	SSDP	327	NOTIFY * HTTP/1.1 
913	39.365076	192.168.1.117	239.255.255.250	SSDP	369	NOTIFY * HTTP/1.1 
914	39.365325	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
915	39.366050	192.168.1.110	224.0.0.251	MDNS	81	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
916	39.366623	fe80::55d5:a9d:8bfd:889e	ff02::fb	MDNS	101	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
917	39.367142	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0x66b6 A BRN001BA9933B17
918	39.367142	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0x66b6 A BRN001BA9933B17
919	39.381909	192.168.1.117	239.255.255.250	SSDP	401	NOTIFY * HTTP/1.1 
920	39.398379	192.168.1.117	239.255.255.250	SSDP	347	NOTIFY * HTTP/1.1 
921	39.414839	192.168.1.117	239.255.255.250	SSDP	399	NOTIFY * HTTP/1.1 
922	39.423525	Cisco_0b:7c:cd	Broadcast	ARP	60	ARP Announcement for 192.168.1.125
923	39.423525	Cisco_0b:7c:cd	Broadcast	ARP	60	Who has 192.168.1.1? Tell 192.168.1.125
924	39.431617	192.168.1.117	239.255.255.250	SSDP	393	NOTIFY * HTTP/1.1 
925	39.434091	192.168.1.125	255.255.255.255	DHCP	590	DHCP Request  - Transaction ID 0x763e
926	39.440108	192.168.1.1	255.255.255.255	DHCP	590	DHCP ACK      - Transaction ID 0x763e
927	39.482033	Cisco_0b:7c:cd	Broadcast	ARP	60	ARP Announcement for 192.168.1.125
928	39.482033	Cisco_0b:7c:cd	Broadcast	ARP	60	Who has 192.168.1.1? Tell 192.168.1.125
929	39.525909	fe80::224:c4ff:fe0b:7ccd	ff02::2	ICMPv6	70	Router Solicitation from 00:24:c4:0b:7c:cd
930	39.526598	fe80::224:c4ff:fe0b:7ccd	ff02::2	ICMPv6	70	Router Solicitation from 00:24:c4:0b:7c:cd
931	39.527967	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
932	39.531031	fe80::224:c4ff:fe0b:7ccd	ff02::1:2	DHCPv6	140	Solicit XID: 0x0041c6 CID: 000300010024c40b7ccd IAA: :: 
933	39.558974	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=635198 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
934	39.559405	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=636638 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
935	39.559489	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=638078 Win=1029 Len=0
936	39.559681	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=638078 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
937	39.560195	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=639518 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
938	39.560195	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
939	39.560272	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=641914 Win=1029 Len=0
940	39.580397	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
941	39.580444	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
942	39.731905	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
943	39.787571	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
944	39.787571	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0x66b6 A BRN001BA9933B17
945	39.787571	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0x66b6 A BRN001BA9933B17
946	39.956484	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=641914 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
947	39.957036	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=643354 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
948	39.957085	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=644794 Win=1029 Len=0
949	39.957407	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=644794 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
950	39.957903	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=646234 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
951	39.957903	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
952	39.957944	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=648631 Win=1029 Len=0
953	40.075380	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
954	40.115353	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
955	40.129949	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
956	40.185480	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
957	40.322832	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
958	40.344913	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
959	40.356446	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=648631 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
960	40.356924	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=650071 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
961	40.356959	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=651511 Win=1029 Len=0
962	40.357143	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=651511 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
963	40.357667	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=652951 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
964	40.357667	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
965	40.357696	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=654604 Win=1029 Len=0
966	40.370325	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
967	40.380460	192.168.1.110	224.0.0.251	MDNS	81	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
968	40.381139	fe80::55d5:a9d:8bfd:889e	ff02::fb	MDNS	101	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
969	40.425305	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
970	40.480411	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
971	40.535254	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
972	40.590964	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
973	40.645371	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
974	40.756300	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=654604 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
975	40.756713	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=656044 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
976	40.756797	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=657484 Win=1029 Len=0
977	40.757461	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=657484 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
978	40.757968	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=658924 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
979	40.757968	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
980	40.758044	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=661320 Win=1029 Len=0
981	40.870479	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
982	41.156562	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=661320 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
983	41.156978	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=662760 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
984	41.157063	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=664200 Win=1029 Len=0
985	41.157204	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=664200 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
986	41.157718	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=665640 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
987	41.157718	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
988	41.157797	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=667294 Win=1029 Len=0
989	41.316039	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
990	41.316100	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
991	41.465208	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
992	41.519732	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
993	41.556308	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=667294 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
994	41.556735	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=668734 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
995	41.556817	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=670174 Win=1029 Len=0
996	41.557207	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=670174 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
997	41.557711	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=671614 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
998	41.557711	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
999	41.557788	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=674010 Win=1029 Len=0
1000	41.796159	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1001	41.852427	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1002	41.906111	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1003	41.958075	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=674010 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1004	41.958452	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=675450 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1005	41.958501	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=676890 Win=1029 Len=0
1006	41.958695	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=676890 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1007	41.959204	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=678330 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1008	41.959204	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1009	41.959247	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=680727 Win=1029 Len=0
1010	42.040695	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1011	42.088904	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1012	42.142998	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1013	42.198162	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1014	42.253473	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1015	42.320837	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1016	42.355768	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=680727 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1017	42.356034	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=682167 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1018	42.356084	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=683607 Win=1029 Len=0
1019	42.356433	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=683607 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1020	42.356934	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=685047 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1021	42.356934	51.195.5.70	192.168.1.123	TLSv1.2	351	Application Data
1022	42.356980	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=686784 Win=1029 Len=0
1023	42.367147	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1024	42.754541	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=686784 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1025	42.754977	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=688224 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1026	42.755068	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=689664 Win=1029 Len=0
1027	42.755231	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=689664 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1028	42.755737	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=691104 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1029	42.755737	51.195.5.70	192.168.1.123	TLSv1.2	926	Application Data
1030	42.755817	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=693416 Win=1029 Len=0
1031	42.787754	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
1032	42.819801	192.168.1.123	192.168.1.1	DNS	91	Standard query 0xe0ef A browser.pipe.aria.microsoft.com
1033	42.830247	fe80::224:c4ff:fe0b:7ccd	ff02::1:2	DHCPv6	140	Solicit XID: 0x0041c6 CID: 000300010024c40b7ccd IAA: :: 
1034	42.831096	192.168.1.1	192.168.1.123	DNS	203	Standard query response 0xe0ef A browser.pipe.aria.microsoft.com CNAME browser.events.data.trafficmanager.net CNAME skypedataprdcolneu04.cloudapp.net A 52.114.77.33
1035	42.832661	192.168.1.123	52.114.77.33	TCP	66	64553 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
1036	42.864413	52.114.77.33	192.168.1.123	TCP	66	443 → 64553 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1440 WS=256 SACK_PERM=1
1037	42.864692	192.168.1.123	52.114.77.33	TCP	54	64553 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
1038	42.865701	192.168.1.123	52.114.77.33	TLSv1.2	571	Client Hello
1039	42.906189	52.114.77.33	192.168.1.123	TCP	1494	443 → 64553 [ACK] Seq=1 Ack=518 Win=525056 Len=1440 [TCP segment of a reassembled PDU]
1040	42.906822	52.114.77.33	192.168.1.123	TCP	1494	443 → 64553 [ACK] Seq=1441 Ack=518 Win=525056 Len=1440 [TCP segment of a reassembled PDU]
1041	42.906822	52.114.77.33	192.168.1.123	TCP	1494	443 → 64553 [ACK] Seq=2881 Ack=518 Win=525056 Len=1440 [TCP segment of a reassembled PDU]
1042	42.906957	192.168.1.123	52.114.77.33	TCP	54	64553 → 443 [ACK] Seq=518 Ack=4321 Win=263424 Len=0
1043	42.907187	52.114.77.33	192.168.1.123	TCP	1494	443 → 64553 [ACK] Seq=4321 Ack=518 Win=525056 Len=1440 [TCP segment of a reassembled PDU]
1044	42.907278	192.168.1.123	52.114.77.33	TCP	54	64553 → 443 [ACK] Seq=518 Ack=5761 Win=263424 Len=0
1045	42.907380	52.114.77.33	192.168.1.123	TLSv1.2	602	Server Hello, Certificate, Certificate Status, Server Key Exchange, Server Hello Done
1046	42.945499	192.168.1.123	52.114.77.33	TLSv1.2	212	Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
1047	42.987826	52.114.77.33	192.168.1.123	TLSv1.2	105	Change Cipher Spec, Encrypted Handshake Message
1048	42.990314	192.168.1.123	52.114.77.33	TLSv1.2	850	Application Data
1049	42.990385	192.168.1.123	52.114.77.33	TLSv1.2	733	Application Data
1050	43.003797	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1051	43.003835	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1052	43.023516	52.114.77.33	192.168.1.123	TCP	60	443 → 64553 [ACK] Seq=6360 Ack=2151 Win=525568 Len=0
1053	43.024211	52.114.77.33	192.168.1.123	TLSv1.2	480	Application Data
1054	43.065126	192.168.1.123	52.114.77.33	TCP	54	64553 → 443 [ACK] Seq=2151 Ack=6786 Win=262400 Len=0
1055	43.152899	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1056	43.154000	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=693416 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1057	43.154418	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=694856 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1058	43.154502	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=696296 Win=1029 Len=0
1059	43.154754	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=696296 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1060	43.155289	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=697736 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1061	43.155289	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1062	43.155369	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=700132 Win=1029 Len=0
1063	43.194249	192.168.1.123	51.195.113.37	TCP	66	64554 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
1064	43.207845	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1065	43.220155	51.195.113.37	192.168.1.123	TCP	62	443 → 64554 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
1066	43.220443	192.168.1.123	51.195.113.37	TCP	54	64554 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
1067	43.221533	192.168.1.123	51.195.113.37	TLSv1.3	641	Client Hello
1068	43.233841	51.195.113.37	192.168.1.123	TLSv1.3	288	Server Hello, Change Cipher Spec, Application Data, Application Data
1069	43.236817	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
1070	43.240316	192.168.1.123	51.195.113.37	TLSv1.3	118	Change Cipher Spec, Application Data
1071	43.240828	192.168.1.123	51.195.113.37	TLSv1.3	146	Application Data
1072	43.241861	192.168.1.123	51.195.113.37	TLSv1.3	1136	Application Data
1073	43.252058	51.195.113.37	192.168.1.123	TLSv1.3	325	Application Data
1074	43.252058	51.195.113.37	192.168.1.123	TLSv1.3	100	Application Data
1075	43.252274	192.168.1.123	51.195.113.37	TCP	54	64554 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
1076	43.252830	192.168.1.123	51.195.113.37	TLSv1.3	85	Application Data
1077	43.254000	51.195.113.37	192.168.1.123	TLSv1.3	391	Application Data
1078	43.295413	192.168.1.123	51.195.113.37	TCP	54	64554 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
1079	43.307051	51.195.113.37	192.168.1.123	TCP	60	443 → 64554 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
1080	43.501399	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1081	43.557171	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1082	43.558992	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=700132 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1083	43.559489	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=701572 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1084	43.559573	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=703012 Win=1029 Len=0
1085	43.560194	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=703012 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1086	43.560194	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=704452 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1087	43.560194	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
1088	43.560293	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=706106 Win=1029 Len=0
1089	43.611021	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1090	43.740689	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1091	43.794816	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1092	43.849630	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1093	43.905095	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1094	43.960740	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1095	43.975518	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=706106 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1096	43.975518	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=707546 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1097	43.975518	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=708986 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1098	43.975518	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=710426 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1099	43.975518	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1100	43.975647	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=712822 Win=1029 Len=0
1101	44.015306	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1102	44.070402	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1103	44.372615	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=712822 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1104	44.373815	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=714262 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1105	44.373815	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=715702 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1106	44.373815	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=717142 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1107	44.373815	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
1108	44.373961	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=718796 Win=1029 Len=0
1109	44.385731	Cisco_0b:7c:cd	Nearest-non-TPMR-bridge	EAPOL	60	Start
1110	44.743732	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1111	44.743794	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1112	44.752011	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=718796 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1113	44.752404	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=720236 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1114	44.752481	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=721676 Win=1029 Len=0
1115	44.752707	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=721676 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1116	44.754101	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=723116 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1117	44.754101	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1118	44.754206	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=725512 Win=1029 Len=0
1119	44.898293	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1120	44.953331	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1121	45.184110	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=725512 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1122	45.184557	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=726952 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1123	45.184643	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=728392 Win=1029 Len=0
1124	45.185016	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=728392 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1125	45.185245	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=729832 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1126	45.185245	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1127	45.185321	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=732228 Win=1029 Len=0
1128	45.232430	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1129	45.287054	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1130	45.339807	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1131	45.352229	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
1132	45.469048	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1133	45.523532	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1134	45.560845	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=732228 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1135	45.561246	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=733668 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1136	45.561330	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=735108 Win=1029 Len=0
1137	45.561765	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=735108 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1138	45.561995	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=736548 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1139	45.561995	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
1140	45.562071	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=738202 Win=1029 Len=0
1141	45.581722	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1142	45.634713	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1143	45.691100	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1144	45.744574	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1145	45.799352	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1146	45.948619	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=738202 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1147	45.948619	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=739642 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1148	45.948784	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=741082 Win=1029 Len=0
1149	45.949232	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=741082 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1150	45.949232	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=742522 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1151	45.949307	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=743962 Win=1029 Len=0
1152	45.949746	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1153	46.000848	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=744918 Win=1025 Len=0
1154	46.111825	fe80::224:c4ff:fe0b:7ccd	ff02::1:2	DHCPv6	140	Solicit XID: 0x0041c6 CID: 000300010024c40b7ccd IAA: :: 
1155	46.132624	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
1156	46.250981	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
1157	46.349578	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=744918 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1158	46.350040	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=746358 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1159	46.350123	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=747798 Win=1029 Len=0
1160	46.350319	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=747798 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1161	46.350778	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=749238 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1162	46.350778	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1163	46.350855	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=750891 Win=1029 Len=0
1164	46.459384	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1165	46.459442	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1166	46.622277	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1167	46.661013	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1168	46.750361	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=750891 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1169	46.750783	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=752331 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1170	46.750867	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=753771 Win=1029 Len=0
1171	46.751060	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=753771 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1172	46.751536	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=755211 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1173	46.751536	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1174	46.751615	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=757608 Win=1029 Len=0
1175	46.951051	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1176	47.005812	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1177	47.028990	Cisco_09:41:44	LLDP_Multicast	LLDP	310	NA/192.168.1.113 LA/84B517094144:P1 180 SysN=SEP84B517094144 SysD=Cisco IP Phone 8851, V1, sip88xx.12-8-1-0001-455.loads 
1178	47.059414	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1179	47.148131	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=757608 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1180	47.148310	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=759048 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1181	47.148384	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=760488 Win=1029 Len=0
1182	47.148785	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=760488 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1183	47.149313	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=761928 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1184	47.149313	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1185	47.149401	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=763581 Win=1029 Len=0
1186	47.184462	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1187	47.238791	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1188	47.293306	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1189	47.347864	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1190	47.401412	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1191	47.454483	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1192	47.510456	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1193	47.547314	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=763581 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1194	47.547802	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=765021 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1195	47.547886	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=766461 Win=1029 Len=0
1196	47.548298	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=766461 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1197	47.548801	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=767901 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1198	47.548801	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1199	47.548876	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=770297 Win=1029 Len=0
1200	47.908372	192.168.1.109	224.0.0.251	MDNS	119	Standard query 0x0004 PTR _674A0243._sub._googlecast._tcp.local, "QM" question PTR _8E6C866D._sub._googlecast._tcp.local, "QM" question PTR _googlecast._tcp.local, "QM" question  
1201	47.946347	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=770297 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1202	47.946815	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=771737 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1203	47.946899	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=773177 Win=1029 Len=0
1204	47.947307	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=773177 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1205	47.947807	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=774617 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1206	47.947807	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1207	47.947883	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=777014 Win=1029 Len=0
1208	48.164349	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1209	48.164408	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1210	48.314746	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1211	48.354387	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=777014 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1212	48.354387	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=778454 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1213	48.354548	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=779894 Win=1029 Len=0
1214	48.354748	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=779894 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1215	48.355296	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=781334 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1216	48.355296	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1217	48.355371	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=782987 Win=1029 Len=0
1218	48.369566	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1219	48.438063	192.168.1.123	54.38.152.153	TCP	55	[TCP Keep-Alive] 64506 → 443 [ACK] Seq=1 Ack=1 Win=1025 Len=1
1220	48.449328	54.38.152.153	192.168.1.123	TCP	60	[TCP Keep-Alive ACK] 443 → 64506 [ACK] Seq=1 Ack=2 Win=260 Len=0
1221	48.658750	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1222	48.713141	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1223	48.745906	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=782987 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1224	48.746381	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=784427 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1225	48.746464	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=785867 Win=1029 Len=0
1226	48.746817	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=785867 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1227	48.747320	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=787307 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1228	48.747320	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1229	48.747396	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=789703 Win=1029 Len=0
1230	48.767812	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1231	48.896631	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1232	48.951896	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1233	49.007462	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1234	49.061844	192.168.1.123	52.114.77.33	TCP	54	64553 → 443 [FIN, ACK] Seq=2151 Ack=6786 Win=262400 Len=0
1235	49.062181	192.168.1.123	51.195.113.37	TCP	54	64554 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
1236	49.062977	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1237	49.074159	51.195.113.37	192.168.1.123	TCP	60	443 → 64554 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
1238	49.074320	192.168.1.123	51.195.113.37	TCP	54	64554 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
1239	49.093656	52.114.77.33	192.168.1.123	TCP	60	443 → 64553 [FIN, ACK] Seq=6786 Ack=2152 Win=525568 Len=0
1240	49.093859	192.168.1.123	52.114.77.33	TCP	54	64553 → 443 [ACK] Seq=2152 Ack=6787 Win=262400 Len=0
1241	49.117584	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1242	49.146595	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=789703 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1243	49.147070	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=791143 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1244	49.147155	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=792583 Win=1029 Len=0
1245	49.147574	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=792583 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1246	49.148077	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=794023 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1247	49.148077	51.195.5.70	192.168.1.123	TLSv1.2	1034	Application Data
1248	49.148152	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=796443 Win=1029 Len=0
1249	49.172449	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1250	49.227555	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1251	49.264259	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
1252	49.545348	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=796443 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1253	49.545748	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=797883 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1254	49.545833	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=799323 Win=1029 Len=0
1255	49.546106	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=799323 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1256	49.546740	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=800763 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1257	49.546740	51.195.5.70	192.168.1.123	TLSv1.2	243	Application Data
1258	49.546824	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=802392 Win=1029 Len=0
1259	49.917706	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1260	49.917737	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1261	49.944633	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=802392 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1262	49.945336	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=803832 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1263	49.945420	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=805272 Win=1029 Len=0
1264	49.945844	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=805272 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1265	49.946344	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=806712 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1266	49.946344	51.195.5.70	192.168.1.123	TLSv1.2	1094	Application Data
1267	49.946423	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=809192 Win=1029 Len=0
1268	50.068281	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1269	50.122100	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1270	50.187183	Cisco_09:41:44	CDP/VTP/DTP/PAgP/UDLD	CDP	166	Device ID: SEP84B517094144  Port ID: Port 1  
1271	50.343896	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=809192 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1272	50.344325	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=810632 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1273	50.344361	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=812072 Win=1029 Len=0
1274	50.344820	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=812072 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1275	50.345318	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=813512 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1276	50.345318	51.195.5.70	192.168.1.123	TLSv1.2	185	Application Data
1277	50.345344	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=815083 Win=1029 Len=0
1278	50.347333	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
1279	50.410416	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1280	50.465015	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1281	50.519893	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1282	50.648951	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1283	50.703581	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1284	50.745675	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=815083 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1285	50.746135	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=816523 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1286	50.746220	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=817963 Win=1029 Len=0
1287	50.746411	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=817963 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1288	50.746846	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=819403 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1289	50.746846	51.195.5.70	192.168.1.123	TLSv1.2	1009	Application Data
1290	50.746925	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=821798 Win=1029 Len=0
1291	50.758485	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1292	50.813289	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1293	50.881119	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1294	50.924234	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1295	50.978287	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1296	51.144696	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=821798 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1297	51.145143	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=823238 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1298	51.145228	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=824678 Win=1029 Len=0
1299	51.145433	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=824678 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1300	51.145841	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=826118 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1301	51.145841	51.195.5.70	192.168.1.123	TLSv1.2	1012	Application Data
1302	51.145921	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=828516 Win=1029 Len=0
1303	51.310689	fe80::224:c4ff:fe0b:7ccd	ff02::1:2	DHCPv6	140	Solicit XID: 0x0041c6 CID: 000300010024c40b7ccd IAA: :: 
1304	51.546163	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=828516 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1305	51.546605	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=829956 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1306	51.546689	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=831396 Win=1029 Len=0
1307	51.547123	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=831396 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1308	51.547604	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=832836 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1309	51.547604	51.195.5.70	192.168.1.123	TLSv1.2	266	Application Data
1310	51.547679	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=834488 Win=1029 Len=0
1311	51.597377	192.168.1.123	143.204.94.100	TCP	54	64533 → 443 [FIN, ACK] Seq=1 Ack=1 Win=1025 Len=0
1312	51.608275	143.204.94.100	192.168.1.123	TCP	60	443 → 64533 [FIN, ACK] Seq=1 Ack=2 Win=265 Len=0
1313	51.608398	192.168.1.123	143.204.94.100	TCP	54	64533 → 443 [ACK] Seq=2 Ack=2 Win=1025 Len=0
1314	51.636434	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1315	51.636486	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1316	51.782939	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1317	51.837834	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1318	51.944660	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=834488 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1319	51.945069	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=835928 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1320	51.945105	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=837368 Win=1029 Len=0
1321	51.945272	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=837368 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1322	51.945830	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=838808 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1323	51.945830	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1324	51.945860	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=841205 Win=1029 Len=0
1325	52.115391	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1326	52.169483	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1327	52.223471	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1328	52.343207	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=841205 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1329	52.343618	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=842645 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1330	52.343702	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=844085 Win=1029 Len=0
1331	52.344115	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=844085 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1332	52.344340	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=845525 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1333	52.344340	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1334	52.344415	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=847178 Win=1029 Len=0
1335	52.351069	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1336	52.408089	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1337	52.462068	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1338	52.531578	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1339	52.573191	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1340	52.628689	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1341	52.682117	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1342	52.743157	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=847178 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1343	52.743380	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=848618 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1344	52.743421	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=850058 Win=1029 Len=0
1345	52.747078	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=850058 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1346	52.747078	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=851498 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1347	52.747078	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1348	52.747168	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=853895 Win=1029 Len=0
1349	53.146169	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=853895 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1350	53.146169	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=855335 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1351	53.146169	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=856775 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1352	53.146169	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=858215 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1353	53.146169	51.195.5.70	192.168.1.123	TLSv1.2	1009	Application Data
1354	53.146294	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=860610 Win=1029 Len=0
1355	53.204255	192.168.1.123	93.184.220.29	TCP	54	[TCP ACKed unseen segment] 64536 → 80 [FIN, ACK] Seq=1 Ack=2 Win=1026 Len=0
1356	53.221951	93.184.220.29	192.168.1.123	TCP	60	[TCP Previous segment not captured] 80 → 64536 [FIN, ACK] Seq=2 Ack=2 Win=131 Len=0
1357	53.222023	192.168.1.123	93.184.220.29	TCP	54	[TCP ACKed unseen segment] 64536 → 80 [ACK] Seq=2 Ack=3 Win=1026 Len=0
1358	53.331797	Cisco_b3:76:2e	CDP/VTP/DTP/PAgP/UDLD	CDP	130	Device ID: SIP000BBEB3762E  Port ID: Port 1  
1359	53.334000	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
1360	53.343121	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1361	53.343159	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1362	53.489979	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1363	53.544593	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=860610 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1364	53.544593	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=862050 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1365	53.544593	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=863490 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1366	53.544593	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=864930 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1367	53.544593	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
1368	53.544816	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=866584 Win=1029 Len=0
1369	53.545615	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1370	53.819685	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1371	53.874414	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1372	53.928255	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1373	53.943415	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=866584 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1374	53.943880	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=868024 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1375	53.943964	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=869464 Win=1029 Len=0
1376	53.944425	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=869464 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1377	53.944669	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=870904 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1378	53.944669	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1379	53.944747	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=873301 Win=1029 Len=0
1380	54.057631	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1381	54.112900	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1382	54.167475	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1383	54.222615	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1384	54.240383	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
1385	54.277970	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1386	54.333617	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1387	54.341923	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=873301 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1388	54.349588	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=874741 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1389	54.349588	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=876181 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1390	54.349588	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=877621 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1391	54.349588	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1392	54.349700	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=879274 Win=1029 Len=0
1393	54.395564	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1394	54.742779	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=879274 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1395	54.742779	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=880714 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1396	54.742779	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=882154 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1397	54.742779	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=883594 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1398	54.742779	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1399	54.743012	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=885991 Win=1029 Len=0
1400	55.026138	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1401	55.026196	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1402	55.139997	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=885991 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1403	55.140380	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=887431 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1404	55.140463	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=888871 Win=1029 Len=0
1405	55.140888	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=888871 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1406	55.141136	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=890311 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1407	55.141136	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1408	55.141212	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=892707 Win=1029 Len=0
1409	55.174546	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1410	55.228847	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1411	55.350038	Cisco_0b:7c:cd	Broadcast	ARP	60	Who has 192.168.1.2? Tell 192.168.1.125
1412	55.350038	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
1413	55.505420	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1414	55.553571	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=892707 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1415	55.553571	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=894147 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1416	55.553571	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=895587 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1417	55.553571	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=897027 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1418	55.553571	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1419	55.553676	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=898680 Win=1029 Len=0
1420	55.560476	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1421	55.615547	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1422	55.743160	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1423	55.800964	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1424	55.850537	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1425	55.902311	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1426	55.940486	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=898680 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1427	55.940906	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=900120 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1428	55.940992	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=901560 Win=1029 Len=0
1429	55.941187	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=901560 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1430	55.941956	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=903000 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1431	55.941956	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1432	55.942052	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=905396 Win=1029 Len=0
1433	55.956915	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1434	56.011994	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1435	56.067007	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1436	56.334433	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
1437	56.341692	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=905396 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1438	56.342067	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=906836 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1439	56.342148	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=908276 Win=1029 Len=0
1440	56.342369	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=908276 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1441	56.342914	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=909716 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1442	56.342914	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
1443	56.342995	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=911370 Win=1029 Len=0
1444	56.701994	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1445	56.702052	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1446	56.739278	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=911370 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1447	56.739701	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=912810 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1448	56.739786	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=914250 Win=1029 Len=0
1449	56.740031	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=914250 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1450	56.740672	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=915690 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1451	56.740672	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1452	56.740752	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=918086 Win=1029 Len=0
1453	56.849820	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1454	56.904539	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1455	56.995821	192.168.1.124	239.255.255.250	SSDP	216	M-SEARCH * HTTP/1.1 
1456	57.138271	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=918086 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1457	57.138698	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=919526 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1458	57.138782	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=920966 Win=1029 Len=0
1459	57.139184	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=920966 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1460	57.139683	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=922406 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1461	57.139683	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1462	57.139759	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=924802 Win=1029 Len=0
1463	57.176854	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1464	57.231822	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1465	57.286746	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1466	57.414855	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1467	57.469816	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1468	57.523193	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1469	57.538458	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=924802 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1470	57.538835	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=926242 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1471	57.538918	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=927682 Win=1029 Len=0
1472	57.539116	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=927682 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1473	57.539675	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=929122 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1474	57.539675	51.195.5.70	192.168.1.123	TLSv1.2	303	Application Data
1475	57.539753	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=930811 Win=1029 Len=0
1476	57.578331	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1477	57.633050	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1478	57.688262	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1479	57.743065	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1480	57.936480	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=930811 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1481	57.936910	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=932251 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1482	57.936950	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=933691 Win=1029 Len=0
1483	57.937412	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=933691 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1484	57.937652	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=935131 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1485	57.937652	51.195.5.70	192.168.1.123	TLSv1.2	975	Application Data
1486	57.937686	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=937492 Win=1029 Len=0
1487	58.004155	192.168.1.124	239.255.255.250	SSDP	216	M-SEARCH * HTTP/1.1 
1488	58.208782	192.168.1.123	51.195.113.37	TCP	66	64555 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
1489	58.220783	51.195.113.37	192.168.1.123	TCP	62	443 → 64555 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
1490	58.221045	192.168.1.123	51.195.113.37	TCP	54	64555 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
1491	58.222280	192.168.1.123	51.195.113.37	TLSv1.3	641	Client Hello
1492	58.234026	51.195.113.37	192.168.1.123	TLSv1.3	288	Server Hello, Change Cipher Spec, Application Data, Application Data
1493	58.240559	192.168.1.123	51.195.113.37	TLSv1.3	118	Change Cipher Spec, Application Data
1494	58.241059	192.168.1.123	51.195.113.37	TLSv1.3	146	Application Data
1495	58.242088	192.168.1.123	51.195.113.37	TLSv1.3	1136	Application Data
1496	58.252487	51.195.113.37	192.168.1.123	TLSv1.3	325	Application Data
1497	58.253134	51.195.113.37	192.168.1.123	TLSv1.3	100	Application Data
1498	58.253253	192.168.1.123	51.195.113.37	TCP	54	64555 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
1499	58.253643	192.168.1.123	51.195.113.37	TLSv1.3	85	Application Data
1500	58.254451	51.195.113.37	192.168.1.123	TLSv1.3	391	Application Data
1501	58.307280	51.195.113.37	192.168.1.123	TCP	60	443 → 64555 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
1502	58.309603	192.168.1.123	51.195.113.37	TCP	54	64555 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
1503	58.336004	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=937492 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1504	58.336476	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=938932 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1505	58.336557	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=940372 Win=1029 Len=0
1506	58.336752	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=940372 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1507	58.337197	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=941812 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1508	58.337197	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
1509	58.337273	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=943466 Win=1029 Len=0
1510	58.382938	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1511	58.382992	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1512	58.528067	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1513	58.549996	192.168.1.1	239.255.255.250	SSDP	464	NOTIFY * HTTP/1.1 
1514	58.549996	192.168.1.1	239.255.255.250	SSDP	473	NOTIFY * HTTP/1.1 
1515	58.550433	192.168.1.1	239.255.255.250	SSDP	536	NOTIFY * HTTP/1.1 
1516	58.550433	192.168.1.1	239.255.255.250	SSDP	528	NOTIFY * HTTP/1.1 
1517	58.550766	192.168.1.1	239.255.255.250	SSDP	473	NOTIFY * HTTP/1.1 
1518	58.550766	192.168.1.1	239.255.255.250	SSDP	512	NOTIFY * HTTP/1.1 
1519	58.550766	192.168.1.1	239.255.255.250	SSDP	544	NOTIFY * HTTP/1.1 
1520	58.551216	192.168.1.1	239.255.255.250	SSDP	473	NOTIFY * HTTP/1.1 
1521	58.551216	192.168.1.1	239.255.255.250	SSDP	532	NOTIFY * HTTP/1.1 
1522	58.551492	192.168.1.1	239.255.255.250	SSDP	526	NOTIFY * HTTP/1.1 
1523	58.583360	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1524	58.653741	192.168.1.1	239.255.255.250	SSDP	464	NOTIFY * HTTP/1.1 
1525	58.653741	192.168.1.1	239.255.255.250	SSDP	473	NOTIFY * HTTP/1.1 
1526	58.653741	192.168.1.1	239.255.255.250	SSDP	536	NOTIFY * HTTP/1.1 
1527	58.653741	192.168.1.1	239.255.255.250	SSDP	528	NOTIFY * HTTP/1.1 
1528	58.653741	192.168.1.1	239.255.255.250	SSDP	473	NOTIFY * HTTP/1.1 
1529	58.653741	192.168.1.1	239.255.255.250	SSDP	512	NOTIFY * HTTP/1.1 
1530	58.653741	192.168.1.1	239.255.255.250	SSDP	544	NOTIFY * HTTP/1.1 
1531	58.654738	192.168.1.1	239.255.255.250	SSDP	473	NOTIFY * HTTP/1.1 
1532	58.654738	192.168.1.1	239.255.255.250	SSDP	532	NOTIFY * HTTP/1.1 
1533	58.654738	192.168.1.1	239.255.255.250	SSDP	526	NOTIFY * HTTP/1.1 
1534	58.736795	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=943466 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1535	58.737211	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=944906 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1536	58.737296	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=946346 Win=1029 Len=0
1537	58.737490	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=946346 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1538	58.737956	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=947786 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1539	58.737956	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1540	58.738037	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=950182 Win=1029 Len=0
1541	58.861924	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1542	58.917506	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1543	58.971720	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1544	59.009357	192.168.1.124	239.255.255.250	SSDP	216	M-SEARCH * HTTP/1.1 
1545	59.069982	192.168.1.123	51.195.113.37	TCP	54	64555 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
1546	59.082140	51.195.113.37	192.168.1.123	TCP	60	443 → 64555 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
1547	59.082244	192.168.1.123	51.195.113.37	TCP	54	64555 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
1548	59.100388	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1549	59.134802	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=950182 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1550	59.134976	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=951622 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1551	59.135050	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=953062 Win=1029 Len=0
1552	59.135459	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=953062 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1553	59.135965	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=954502 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1554	59.135965	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1555	59.136043	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=956898 Win=1029 Len=0
1556	59.153786	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1557	59.211890	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1558	59.263791	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1559	59.281987	192.168.1.117	239.255.255.250	SSDP	333	NOTIFY * HTTP/1.1 
1560	59.298241	192.168.1.117	239.255.255.250	SSDP	351	NOTIFY * HTTP/1.1 
1561	59.314895	192.168.1.117	239.255.255.250	SSDP	405	NOTIFY * HTTP/1.1 
1562	59.319197	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1563	59.331967	192.168.1.117	239.255.255.250	SSDP	397	NOTIFY * HTTP/1.1 
1564	59.338611	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
1565	59.348484	192.168.1.117	239.255.255.250	SSDP	327	NOTIFY * HTTP/1.1 
1566	59.364886	192.168.1.117	239.255.255.250	SSDP	369	NOTIFY * HTTP/1.1 
1567	59.374293	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1568	59.383091	192.168.1.117	239.255.255.250	SSDP	401	NOTIFY * HTTP/1.1 
1569	59.398463	192.168.1.117	239.255.255.250	SSDP	347	NOTIFY * HTTP/1.1 
1570	59.414943	192.168.1.117	239.255.255.250	SSDP	399	NOTIFY * HTTP/1.1 
1571	59.436105	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1572	59.436105	192.168.1.117	239.255.255.250	SSDP	393	NOTIFY * HTTP/1.1 
1573	59.533755	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=956898 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1574	59.533963	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=958338 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1575	59.534001	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=959778 Win=1029 Len=0
1576	59.534429	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=959778 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1577	59.535093	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=961218 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1578	59.535093	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1579	59.535135	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=962871 Win=1029 Len=0
1580	59.798035	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
1581	59.933452	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=962871 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1582	59.933452	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=964311 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1583	59.933641	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=965751 Win=1029 Len=0
1584	59.934044	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=965751 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1585	59.934471	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=967191 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1586	59.934471	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1587	59.934552	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=969588 Win=1029 Len=0
1588	60.017397	192.168.1.124	239.255.255.250	SSDP	216	M-SEARCH * HTTP/1.1 
1589	60.064267	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1590	60.064306	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1591	60.107223	fe80::224:c4ff:fe0b:7ccd	ff02::1:2	DHCPv6	140	Solicit XID: 0x0041c6 CID: 000300010024c40b7ccd IAA: :: 
1592	60.210694	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1593	60.265563	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1594	60.333300	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=969588 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1595	60.333477	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=971028 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1596	60.333556	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=972468 Win=1029 Len=0
1597	60.333718	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=972468 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1598	60.334221	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=973908 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1599	60.334221	51.195.5.70	192.168.1.123	TLSv1.2	266	Application Data
1600	60.334305	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=975560 Win=1029 Len=0
1601	60.350506	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
1602	60.543254	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1603	60.598403	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1604	60.653432	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1605	60.743069	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=975560 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1606	60.743069	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=977000 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1607	60.743069	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=978440 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1608	60.743069	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=979880 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1609	60.743069	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1610	60.743271	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=982277 Win=1029 Len=0
1611	60.795382	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1612	60.838262	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1613	60.892137	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1614	60.947932	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1615	61.003768	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1616	61.058314	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1617	61.114057	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1618	61.133502	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=982277 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1619	61.133752	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=983717 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1620	61.133795	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=985157 Win=1029 Len=0
1621	61.134215	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=985157 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1622	61.134691	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=986597 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1623	61.134691	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1624	61.134726	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=988994 Win=1029 Len=0
1625	61.531023	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=988994 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1626	61.531526	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=990434 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1627	61.531610	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=991874 Win=1029 Len=0
1628	61.532017	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=991874 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1629	61.532495	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=993314 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1630	61.532495	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1631	61.532569	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=994967 Win=1029 Len=0
1632	61.761289	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1633	61.761320	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1634	61.906611	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1635	61.931552	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=994967 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1636	61.931717	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=996407 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1637	61.931790	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=997847 Win=1029 Len=0
1638	61.932235	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=997847 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1639	61.932944	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=999287 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1640	61.932944	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1641	61.933034	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1001683 Win=1029 Len=0
1642	61.960968	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1643	62.234950	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1644	62.290667	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1645	62.337587	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1001683 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1646	62.337762	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1003123 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1647	62.337840	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1004563 Win=1029 Len=0
1648	62.338250	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1004563 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1649	62.338250	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1006003 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1650	62.338318	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1007443 Win=1029 Len=0
1651	62.338709	51.195.5.70	192.168.1.123	TLSv1.2	292	Application Data
1652	62.343721	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1653	62.380552	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1007681 Win=1028 Len=0
1654	62.471001	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1655	62.526340	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1656	62.581524	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1657	62.639950	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1658	62.691801	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1659	62.731802	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1007681 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1660	62.732221	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1009121 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1661	62.732264	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1010561 Win=1029 Len=0
1662	62.732771	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1010561 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1663	62.733534	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1012001 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1664	62.733534	51.195.5.70	192.168.1.123	TLSv1.2	986	Application Data
1665	62.733631	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1014373 Win=1029 Len=0
1666	62.745600	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1667	62.800871	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1668	63.130824	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1014373 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1669	63.131238	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1015813 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1670	63.131293	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1017253 Win=1029 Len=0
1671	63.131736	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1017253 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1672	63.132232	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1018693 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1673	63.132232	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1674	63.132278	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1021089 Win=1029 Len=0
1675	63.404771	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
1676	63.440864	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1677	63.440919	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1678	63.532623	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1021089 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1679	63.533057	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1022529 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1680	63.533150	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1023969 Win=1029 Len=0
1681	63.533581	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1023969 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1682	63.533821	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1025409 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1683	63.533821	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1684	63.533897	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1027062 Win=1029 Len=0
1685	63.588140	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1686	63.643271	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1687	63.920759	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1688	63.930528	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1027062 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1689	63.931017	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1028502 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1690	63.931100	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1029942 Win=1029 Len=0
1691	63.931544	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1029942 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1692	63.932025	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1031382 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1693	63.932025	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1694	63.932100	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1033778 Win=1029 Len=0
1695	63.975626	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1696	64.030398	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1697	64.160099	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1698	64.184689	192.168.1.123	172.67.75.39	TCP	54	64539 → 443 [FIN, ACK] Seq=1 Ack=1 Win=1021 Len=0
1699	64.215478	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1700	64.270545	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1701	64.336903	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1702	64.336903	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1033778 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1703	64.336903	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1035218 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1704	64.336903	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1036658 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1705	64.336903	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1038098 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1706	64.336903	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
1707	64.337060	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1039752 Win=1029 Len=0
1708	64.346846	172.67.75.39	192.168.1.123	TCP	60	443 → 64539 [FIN, ACK] Seq=1 Ack=2 Win=67 Len=0
1709	64.346955	192.168.1.123	172.67.75.39	TCP	54	64539 → 443 [ACK] Seq=2 Ack=2 Win=1021 Len=0
1710	64.380043	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1711	64.433643	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1712	64.488215	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1713	64.730349	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1039752 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1714	64.730615	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1041192 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1715	64.730663	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1042632 Win=1029 Len=0
1716	64.731006	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1042632 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1717	64.731509	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1044072 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1718	64.731509	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1719	64.731552	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1046468 Win=1029 Len=0
1720	64.755511	192.168.1.123	93.184.220.29	TCP	54	[TCP ACKed unseen segment] 64540 → 80 [FIN, ACK] Seq=1 Ack=2 Win=1027 Len=0
1721	64.775444	93.184.220.29	192.168.1.123	TCP	60	[TCP Previous segment not captured] 80 → 64540 [FIN, ACK] Seq=2 Ack=2 Win=133 Len=0
1722	64.775555	192.168.1.123	93.184.220.29	TCP	54	[TCP ACKed unseen segment] 64540 → 80 [ACK] Seq=2 Ack=3 Win=1027 Len=0
1723	64.998466	HuaweiTe_49:c9:15	Broadcast	ARP	60	Who has 192.168.1.1? Tell 192.168.1.116
1724	65.129381	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1046468 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1725	65.129743	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1047908 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1726	65.129826	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1049348 Win=1029 Len=0
1727	65.130069	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1049348 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1728	65.130536	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1050788 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1729	65.130536	51.195.5.70	192.168.1.123	TLSv1.2	1110	Application Data
1730	65.130616	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1053284 Win=1029 Len=0
1731	65.131416	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1732	65.131449	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1733	65.279308	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1734	65.340873	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1735	65.356237	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
1736	65.528635	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1053284 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1737	65.529051	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1054724 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1738	65.529135	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1056164 Win=1029 Len=0
1739	65.529543	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1056164 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1740	65.530044	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1057604 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1741	65.530044	51.195.5.70	192.168.1.123	TLSv1.2	236	Application Data
1742	65.530117	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1059226 Win=1029 Len=0
1743	65.604842	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1744	65.658783	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1745	65.718698	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1746	65.837795	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
1747	65.843914	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1748	65.898553	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1749	65.930381	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1059226 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1750	65.930790	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1060666 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1751	65.930872	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1062106 Win=1029 Len=0
1752	65.931064	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1062106 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1753	65.931540	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1063546 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1754	65.931540	51.195.5.70	192.168.1.123	TLSv1.2	1026	Application Data
1755	65.931620	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1065958 Win=1029 Len=0
1756	65.953346	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1757	66.008650	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1758	66.063231	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1759	66.119068	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1760	66.173981	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1761	66.327645	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1065958 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1762	66.328092	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1067398 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1763	66.328185	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1068838 Win=1029 Len=0
1764	66.328402	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1068838 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1765	66.328798	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1070278 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1766	66.328798	51.195.5.70	192.168.1.123	TLSv1.2	927	Application Data
1767	66.328882	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1072591 Win=1029 Len=0
1768	66.413867	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
1769	66.727361	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1072591 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1770	66.727534	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1074031 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1771	66.727610	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1075471 Win=1029 Len=0
1772	66.728065	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1075471 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1773	66.728562	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1076911 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1774	66.728562	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
1775	66.728642	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1078565 Win=1029 Len=0
1776	66.817367	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1777	66.817428	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1778	66.973257	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1779	67.016470	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1780	67.104623	192.168.1.110	239.255.255.250	SSDP	215	M-SEARCH * HTTP/1.1 
1781	67.126631	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1078565 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1782	67.128257	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1080005 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1783	67.128257	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1081445 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1784	67.128257	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1082885 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1785	67.128257	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1786	67.128384	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1085281 Win=1029 Len=0
1787	67.293392	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1788	67.362664	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1789	67.382515	204.79.197.222	192.168.1.123	TCP	60	443 → 64534 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1790	67.403523	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1791	67.526162	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1085281 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1792	67.526571	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1086721 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1793	67.526655	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1088161 Win=1029 Len=0
1794	67.527072	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1088161 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1795	67.527370	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1089601 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1796	67.527370	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1797	67.527446	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1091254 Win=1029 Len=0
1798	67.532315	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1799	67.587618	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1800	67.642511	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1801	67.697670	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1802	67.752049	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1803	67.807683	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1804	67.862452	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1805	67.917055	192.168.1.109	224.0.0.251	MDNS	119	Standard query 0x0005 PTR _674A0243._sub._googlecast._tcp.local, "QM" question PTR _8E6C866D._sub._googlecast._tcp.local, "QM" question PTR _googlecast._tcp.local, "QM" question  
1806	67.925602	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1091254 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1807	67.926020	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1092694 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1808	67.926103	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1094134 Win=1029 Len=0
1809	67.926354	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1094134 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1810	67.926827	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1095574 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1811	67.926827	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1812	67.926906	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1097970 Win=1029 Len=0
1813	68.108235	192.168.1.110	239.255.255.250	SSDP	215	M-SEARCH * HTTP/1.1 
1814	68.326681	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1097970 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1815	68.326852	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1099410 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1816	68.326927	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1100850 Win=1029 Len=0
1817	68.327333	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1100850 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1818	68.327836	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1102290 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1819	68.327836	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1820	68.327914	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1104686 Win=1029 Len=0
1821	68.507840	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1822	68.507900	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1823	68.653982	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1824	68.708851	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1825	68.725121	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1104686 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1826	68.725595	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1106126 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1827	68.725680	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1107566 Win=1029 Len=0
1828	68.725874	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1107566 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1829	68.726339	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1109006 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1830	68.726339	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
1831	68.726416	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1110660 Win=1029 Len=0
1832	68.983097	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1833	69.038225	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1834	69.093773	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1835	69.117698	192.168.1.110	239.255.255.250	SSDP	215	M-SEARCH * HTTP/1.1 
1836	69.124857	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1110660 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1837	69.125353	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1112100 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1838	69.125434	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1113540 Win=1029 Len=0
1839	69.125864	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1113540 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1840	69.126342	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1114980 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1841	69.126342	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1842	69.126417	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1117376 Win=1029 Len=0
1843	69.223160	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1844	69.278315	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1845	69.333344	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1846	69.388239	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1847	69.414585	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
1848	69.443895	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1849	69.499556	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1850	69.523862	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1117376 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1851	69.524346	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1118816 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1852	69.524431	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1120256 Win=1029 Len=0
1853	69.525664	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1120256 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1854	69.525664	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1121696 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1855	69.525664	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1856	69.525770	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1123349 Win=1029 Len=0
1857	69.554184	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1858	69.923952	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1123349 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1859	69.924394	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1124789 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1860	69.924479	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1126229 Win=1029 Len=0
1861	69.924597	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1126229 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1862	69.925112	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1127669 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1863	69.925112	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1864	69.925190	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1130066 Win=1029 Len=0
1865	70.132393	192.168.1.110	239.255.255.250	SSDP	215	M-SEARCH * HTTP/1.1 
1866	70.189563	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1867	70.189601	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1868	70.323702	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1130066 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1869	70.323893	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1131506 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1870	70.323972	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1132946 Win=1029 Len=0
1871	70.332559	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1132946 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1872	70.332559	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1134386 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1873	70.332559	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1874	70.332745	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1136782 Win=1029 Len=0
1875	70.339081	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1876	70.364188	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
1877	70.393717	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1878	70.686235	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1879	70.724701	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1136782 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1880	70.725113	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1138222 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1881	70.725196	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1139662 Win=1029 Len=0
1882	70.725615	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1139662 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1883	70.726116	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1141102 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1884	70.726116	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
1885	70.726192	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1142755 Win=1029 Len=0
1886	70.741153	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1887	70.796015	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1888	70.926219	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1889	70.981341	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1890	71.035944	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1891	71.091245	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1892	71.121960	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1142755 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1893	71.122439	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1144195 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1894	71.122542	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1145635 Win=1029 Len=0
1895	71.122777	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1145635 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1896	71.123374	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1147075 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1897	71.123374	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1898	71.123454	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1149471 Win=1029 Len=0
1899	71.145645	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1900	71.203062	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1901	71.262823	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1902	71.521966	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1149471 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1903	71.522381	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1150911 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1904	71.522465	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1152351 Win=1029 Len=0
1905	71.522679	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1152351 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1906	71.523129	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1153791 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1907	71.523129	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
1908	71.523211	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1155445 Win=1029 Len=0
1909	71.643156	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
1910	71.643709	192.168.1.110	224.0.0.251	MDNS	81	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
1911	71.644104	fe80::55d5:a9d:8bfd:889e	ff02::fb	MDNS	101	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
1912	71.644833	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0x6424 A BRN001BA9933B17
1913	71.644833	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0x6424 A BRN001BA9933B17
1914	71.896394	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1915	71.896426	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1916	71.921894	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1155445 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1917	71.921894	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1156885 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1918	71.921996	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1158325 Win=1029 Len=0
1919	71.922359	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1158325 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1920	71.922901	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1159765 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1921	71.922901	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1922	71.922938	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1162162 Win=1029 Len=0
1923	72.042203	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1924	72.060442	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0x6424 A BRN001BA9933B17
1925	72.060442	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0x6424 A BRN001BA9933B17
1926	72.097047	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1927	72.321966	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1162162 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1928	72.322404	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1163602 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1929	72.322488	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1165042 Win=1029 Len=0
1930	72.323171	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1165042 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1931	72.323171	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1166482 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1932	72.323171	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
1933	72.323271	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1168878 Win=1029 Len=0
1934	72.379346	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
1935	72.409349	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
1936	72.435417	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
1937	72.490076	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
1938	72.619090	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
1939	72.651735	192.168.1.110	224.0.0.251	MDNS	81	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
1940	72.651735	fe80::55d5:a9d:8bfd:889e	ff02::fb	MDNS	101	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
1941	72.673948	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
1942	72.721507	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1168878 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1943	72.721879	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1170318 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1944	72.721963	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1171758 Win=1029 Len=0
1945	72.722155	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1171758 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1946	72.722957	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1173198 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1947	72.722957	51.195.5.70	192.168.1.123	TLSv1.2	329	Application Data
1948	72.723043	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1174913 Win=1029 Len=0
1949	72.728934	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
1950	72.784613	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
1951	72.841037	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
1952	72.899008	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
1953	72.951897	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
1954	73.122489	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1174913 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1955	73.122962	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1176353 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1956	73.123047	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1177793 Win=1029 Len=0
1957	73.123275	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1177793 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1958	73.123898	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1179233 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1959	73.123898	51.195.5.70	192.168.1.123	TLSv1.2	1024	Application Data
1960	73.123977	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1181643 Win=1029 Len=0
1961	73.163467	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
1962	73.200917	192.168.1.123	51.195.113.37	TCP	66	64556 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
1963	73.213118	13.107.21.200	192.168.1.123	TCP	60	443 → 64537 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1964	73.213815	51.195.113.37	192.168.1.123	TCP	62	443 → 64556 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
1965	73.214038	192.168.1.123	51.195.113.37	TCP	54	64556 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
1966	73.215179	192.168.1.123	51.195.113.37	TLSv1.3	641	Client Hello
1967	73.227388	51.195.113.37	192.168.1.123	TLSv1.3	288	Server Hello, Change Cipher Spec, Application Data, Application Data
1968	73.233987	192.168.1.123	51.195.113.37	TLSv1.3	118	Change Cipher Spec, Application Data
1969	73.234499	192.168.1.123	51.195.113.37	TLSv1.3	146	Application Data
1970	73.235531	192.168.1.123	51.195.113.37	TLSv1.3	1136	Application Data
1971	73.245669	51.195.113.37	192.168.1.123	TLSv1.3	325	Application Data
1972	73.246408	51.195.113.37	192.168.1.123	TLSv1.3	100	Application Data
1973	73.246522	192.168.1.123	51.195.113.37	TCP	54	64556 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
1974	73.246860	192.168.1.123	51.195.113.37	TLSv1.3	85	Application Data
1975	73.248134	51.195.113.37	192.168.1.123	TLSv1.3	391	Application Data
1976	73.299219	51.195.113.37	192.168.1.123	TCP	60	443 → 64556 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
1977	73.302696	192.168.1.123	51.195.113.37	TCP	54	64556 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
1978	73.460023	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
1979	73.520741	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1181643 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1980	73.521170	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1183083 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1981	73.521255	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1184523 Win=1029 Len=0
1982	73.521446	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1184523 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1983	73.521892	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1185963 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1984	73.521892	51.195.5.70	192.168.1.123	TLSv1.2	191	Application Data
1985	73.521967	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1187540 Win=1029 Len=0
1986	73.592897	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
1987	73.592955	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
1988	73.736255	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
1989	73.790952	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
1990	73.920000	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1187540 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1991	73.920414	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1188980 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1992	73.920499	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1190420 Win=1029 Len=0
1993	73.920649	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1190420 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1994	73.921147	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1191860 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
1995	73.921147	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
1996	73.921226	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1194257 Win=1029 Len=0
1997	73.928581	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
1998	73.929349	192.168.1.110	224.0.0.251	MDNS	81	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
1999	73.929349	fe80::55d5:a9d:8bfd:889e	ff02::fb	MDNS	101	Standard query 0x0000 A BRN001BA9933B17.local, "QM" question  
2000	73.930019	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0x005a A BRN001BA9933B17
2001	73.930019	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0x005a A BRN001BA9933B17
2002	74.087610	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2003	74.096748	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
2004	74.142611	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2005	74.198877	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2006	74.268173	Cisco_0b:7c:cd	Nearest-non-TPMR-bridge	EAPOL	60	Start
2007	74.322490	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1194257 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2008	74.323418	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1195697 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2009	74.323418	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1197137 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2010	74.323555	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1198577 Win=1029 Len=0
2011	74.323693	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1198577 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2012	74.323693	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2013	74.323762	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1200973 Win=1029 Len=0
2014	74.328851	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2015	74.354562	fe80::55d5:a9d:8bfd:889e	ff02::1:3	LLMNR	95	Standard query 0x005a A BRN001BA9933B17
2016	74.354871	192.168.1.110	224.0.0.252	LLMNR	75	Standard query 0x005a A BRN001BA9933B17
2017	74.383669	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2018	74.439366	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2019	74.493367	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2020	74.548616	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2021	74.603742	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2022	74.658671	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2023	74.682383	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
2024	74.721999	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1200973 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2025	74.722166	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1202413 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2026	74.722245	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1203853 Win=1029 Len=0
2027	74.722922	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1203853 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2028	74.723183	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1205293 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2029	74.723183	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
2030	74.723259	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1206947 Win=1029 Len=0
2031	75.121012	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1206947 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2032	75.121185	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1208387 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2033	75.121259	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1209827 Win=1029 Len=0
2034	75.121660	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1209827 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2035	75.122177	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1211267 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2036	75.122177	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2037	75.122257	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1213663 Win=1029 Len=0
2038	75.330710	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
2039	75.330770	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
2040	75.352265	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
2041	75.437307	192.168.1.110	192.168.1.255	NBNS	92	Name query NB BRN001BA9933B17<00>
2042	75.481387	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
2043	75.522015	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1213663 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2044	75.522459	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1215103 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2045	75.522547	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1216543 Win=1029 Len=0
2046	75.531685	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1216543 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2047	75.531685	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1217983 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2048	75.531685	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
2049	75.531845	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1219637 Win=1029 Len=0
2050	75.543087	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
2051	75.821220	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2052	75.877183	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2053	75.920525	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1219637 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2054	75.920943	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1221077 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2055	75.921025	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1222517 Win=1029 Len=0
2056	75.921218	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1222517 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2057	75.921688	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1223957 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2058	75.921688	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2059	75.921767	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1226353 Win=1029 Len=0
2060	75.932896	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2061	76.069493	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2062	76.120907	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2063	76.177184	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2064	76.234176	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2065	76.289074	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2066	76.319511	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1226353 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2067	76.320051	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1227793 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2068	76.320141	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1229233 Win=1029 Len=0
2069	76.320261	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1229233 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2070	76.321044	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1230673 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2071	76.321044	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2072	76.321135	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1233069 Win=1029 Len=0
2073	76.343372	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2074	76.399020	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2075	76.464527	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
2076	76.719792	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1233069 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2077	76.720203	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1234509 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2078	76.720287	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1235949 Win=1029 Len=0
2079	76.720480	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1235949 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2080	76.720938	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1237389 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2081	76.720938	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
2082	76.721017	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1239043 Win=1029 Len=0
2083	77.000128	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
2084	77.000164	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
2085	77.119298	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1239043 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2086	77.119475	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1240483 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2087	77.119554	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1241923 Win=1029 Len=0
2088	77.119950	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1241923 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2089	77.120455	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1243363 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2090	77.120455	51.195.5.70	192.168.1.123	TLSv1.2	1009	Application Data
2091	77.120536	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1245758 Win=1029 Len=0
2092	77.152930	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
2093	77.209365	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
2094	77.501878	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2095	77.523025	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1245758 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2096	77.523025	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1247198 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2097	77.523025	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1248638 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2098	77.523025	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1250078 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2099	77.523025	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
2100	77.523219	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1252475 Win=1029 Len=0
2101	77.558127	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2102	77.614023	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2103	77.746035	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2104	77.802200	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2105	77.858283	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2106	77.914025	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2107	77.922857	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1252475 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2108	77.922857	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1253915 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2109	77.922857	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1255355 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2110	77.922857	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1256795 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2111	77.922857	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
2112	77.922956	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1258449 Win=1029 Len=0
2113	77.970083	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2114	78.029633	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2115	78.081968	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2116	78.318311	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1258449 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2117	78.318756	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1259889 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2118	78.318840	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1261329 Win=1029 Len=0
2119	78.319033	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1261329 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2120	78.319473	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1262769 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2121	78.319473	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2122	78.319553	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1265165 Win=1029 Len=0
2123	78.678276	54.38.152.153	192.168.1.123	TLSv1.2	85	Encrypted Alert
2124	78.678276	54.38.152.153	192.168.1.123	TCP	60	443 → 64506 [FIN, ACK] Seq=32 Ack=2 Win=260 Len=0
2125	78.678534	192.168.1.123	54.38.152.153	TCP	54	64506 → 443 [ACK] Seq=2 Ack=33 Win=1025 Len=0
2126	78.678967	192.168.1.123	54.38.152.153	TCP	54	64506 → 443 [FIN, ACK] Seq=2 Ack=33 Win=1025 Len=0
2127	78.690042	54.38.152.153	192.168.1.123	TCP	60	443 → 64506 [ACK] Seq=33 Ack=3 Win=260 Len=0
2128	78.719022	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1265165 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2129	78.719951	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1266605 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2130	78.719951	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1268045 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2131	78.720065	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1269485 Win=1029 Len=0
2132	78.720310	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1269485 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2133	78.720310	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
2134	78.720390	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1271138 Win=1029 Len=0
2135	78.777599	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
2136	78.777635	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
2137	78.929403	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
2138	78.984951	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
2139	79.104517	192.168.1.123	51.195.113.37	TCP	54	64556 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
2140	79.116654	51.195.113.37	192.168.1.123	TCP	60	443 → 64556 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
2141	79.116864	192.168.1.123	51.195.113.37	TCP	54	64556 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
2142	79.132603	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1271138 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2143	79.132603	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1272578 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2144	79.132603	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1274018 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2145	79.132603	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1275458 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2146	79.132603	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2147	79.132706	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1277854 Win=1029 Len=0
2148	79.262918	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2149	79.282286	192.168.1.117	239.255.255.250	SSDP	333	NOTIFY * HTTP/1.1 
2150	79.298310	192.168.1.117	239.255.255.250	SSDP	351	NOTIFY * HTTP/1.1 
2151	79.314992	192.168.1.117	239.255.255.250	SSDP	405	NOTIFY * HTTP/1.1 
2152	79.319164	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2153	79.331796	192.168.1.117	239.255.255.250	SSDP	397	NOTIFY * HTTP/1.1 
2154	79.348569	192.168.1.117	239.255.255.250	SSDP	327	NOTIFY * HTTP/1.1 
2155	79.365714	192.168.1.117	239.255.255.250	SSDP	369	NOTIFY * HTTP/1.1 
2156	79.375645	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2157	79.381806	192.168.1.117	239.255.255.250	SSDP	401	NOTIFY * HTTP/1.1 
2158	79.398759	192.168.1.117	239.255.255.250	SSDP	347	NOTIFY * HTTP/1.1 
2159	79.415229	192.168.1.117	239.255.255.250	SSDP	399	NOTIFY * HTTP/1.1 
2160	79.431791	192.168.1.117	239.255.255.250	SSDP	393	NOTIFY * HTTP/1.1 
2161	79.476896	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
2162	79.509031	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2163	79.516748	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1277854 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2164	79.517230	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1279294 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2165	79.517316	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1280734 Win=1029 Len=0
2166	79.517811	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1280734 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2167	79.518420	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1282174 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2168	79.518420	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
2169	79.518526	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1284571 Win=1029 Len=0
2170	79.565032	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2171	79.620884	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2172	79.677210	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2173	79.735554	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2174	79.790123	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2175	79.845228	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2176	79.912414	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1284571 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2177	79.912856	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1286011 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2178	79.912901	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1287451 Win=1029 Len=0
2179	79.913298	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1287451 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2180	79.913474	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1288891 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2181	79.913474	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
2182	79.913505	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1290544 Win=1029 Len=0
2183	80.318844	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1290544 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2184	80.319021	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1291984 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2185	80.319095	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1293424 Win=1029 Len=0
2186	80.319499	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1293424 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2187	80.319499	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1294864 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2188	80.319572	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1296304 Win=1029 Len=0
2189	80.319982	51.195.5.70	192.168.1.123	TLSv1.2	1123	Application Data
2190	80.353438	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
2191	80.370890	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1297373 Win=1025 Len=0
2192	80.519565	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
2193	80.519625	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
2194	80.668059	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
2195	80.713131	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
2196	80.714227	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1297373 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2197	80.714449	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1298813 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2198	80.714485	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1300253 Win=1029 Len=0
2199	80.714986	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1300253 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2200	80.715475	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1301693 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2201	80.715475	51.195.5.70	192.168.1.123	TLSv1.2	155	Application Data
2202	80.715505	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1303234 Win=1029 Len=0
2203	80.725445	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
2204	81.003210	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2205	81.059143	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2206	81.113586	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1303234 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2207	81.114039	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1304674 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2208	81.114124	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1306114 Win=1029 Len=0
2209	81.114317	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1306114 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2210	81.114317	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2211	81.114743	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1307554 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2212	81.114743	51.195.5.70	192.168.1.123	TLSv1.2	1094	Application Data
2213	81.114821	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1310034 Win=1029 Len=0
2214	81.245926	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2215	81.300857	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2216	81.361642	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2217	81.411036	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2218	81.466976	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2219	81.512605	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1310034 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2220	81.513136	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1311474 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2221	81.513226	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1312914 Win=1029 Len=0
2222	81.513440	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1312914 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2223	81.514124	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1314354 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2224	81.514124	51.195.5.70	192.168.1.123	TLSv1.2	184	Application Data
2225	81.514213	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1315924 Win=1029 Len=0
2226	81.521834	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2227	81.578098	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2228	81.700779	192.168.1.123	192.168.1.1	DNS	78	Standard query 0xdca2 A mp3.planetradio.de
2229	81.713907	192.168.1.1	192.168.1.123	DNS	190	Standard query response 0xdca2 A mp3.planetradio.de A 54.38.152.152 A 54.38.152.153 A 54.38.152.155 A 145.239.1.191 A 51.195.5.70 A 54.38.152.154 A 54.38.152.157
2230	81.715712	192.168.1.123	54.38.152.152	TCP	66	64557 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
2231	81.727191	54.38.152.152	192.168.1.123	TCP	62	443 → 64557 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1440 WS=128
2232	81.727420	192.168.1.123	54.38.152.152	TCP	54	64557 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
2233	81.728380	192.168.1.123	54.38.152.152	TLSv1.2	571	Client Hello
2234	81.740537	54.38.152.152	192.168.1.123	TCP	60	443 → 64557 [ACK] Seq=1 Ack=518 Win=30336 Len=0
2235	81.768321	54.38.152.152	192.168.1.123	TLSv1.2	1494	Server Hello
2236	81.768321	54.38.152.152	192.168.1.123	TCP	1494	443 → 64557 [ACK] Seq=1441 Ack=518 Win=30336 Len=1440 [TCP segment of a reassembled PDU]
2237	81.768563	192.168.1.123	54.38.152.152	TCP	54	64557 → 443 [ACK] Seq=518 Ack=2881 Win=263424 Len=0
2238	81.782886	54.38.152.152	192.168.1.123	TLSv1.2	475	Certificate, Server Key Exchange, Server Hello Done
2239	81.787739	192.168.1.123	54.38.152.152	TLSv1.2	180	Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
2240	81.839305	54.38.152.152	192.168.1.123	TCP	60	443 → 64557 [ACK] Seq=3302 Ack=644 Win=30336 Len=0
2241	81.911852	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1315924 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2242	81.912563	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1317364 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2243	81.912668	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1318804 Win=1029 Len=0
2244	81.914206	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1318804 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2245	81.914206	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1320244 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2246	81.914206	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2247	81.914327	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1322640 Win=1029 Len=0
2248	82.162957	54.38.152.152	192.168.1.123	TLSv1.2	296	New Session Ticket, Change Cipher Spec, Encrypted Handshake Message
2249	82.164371	192.168.1.123	54.38.152.152	TCP	1494	64557 → 443 [ACK] Seq=644 Ack=3544 Win=262656 Len=1440 [TCP segment of a reassembled PDU]
2250	82.164371	192.168.1.123	54.38.152.152	TLSv1.2	112	Application Data
2251	82.168751	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
2252	82.168789	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
2253	82.177817	54.38.152.152	192.168.1.123	TCP	60	443 → 64557 [ACK] Seq=3544 Ack=2142 Win=33280 Len=0
2254	82.311340	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1322640 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2255	82.311769	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1324080 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2256	82.311855	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1325520 Win=1029 Len=0
2257	82.312270	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1325520 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2258	82.312523	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1326960 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2259	82.312523	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2260	82.312613	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1329356 Win=1029 Len=0
2261	82.319286	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
2262	82.376212	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
2263	82.650866	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2264	82.706653	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2265	82.715288	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1329356 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2266	82.715782	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1330796 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2267	82.715867	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1332236 Win=1029 Len=0
2268	82.716276	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1332236 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2269	82.716776	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1333676 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2270	82.716776	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
2271	82.716850	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1335329 Win=1029 Len=0
2272	82.762954	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2273	82.894000	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2274	82.950158	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2275	83.005862	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2276	83.061996	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2277	83.110563	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1335329 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2278	83.110828	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1336769 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2279	83.110868	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1338209 Win=1029 Len=0
2280	83.111231	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1338209 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2281	83.111749	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1339649 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2282	83.111749	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
2283	83.111780	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1342046 Win=1029 Len=0
2284	83.118344	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2285	83.174818	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2286	83.231152	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2287	83.509827	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1342046 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2288	83.510253	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1343486 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2289	83.510305	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1344926 Win=1029 Len=0
2290	83.510745	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1344926 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2291	83.511245	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1346366 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2292	83.511245	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
2293	83.511290	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1348019 Win=1029 Len=0
2294	83.531074	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
2295	83.757153	54.38.152.152	192.168.1.123	TLSv1.2	525	Application Data
2296	83.801678	192.168.1.123	54.38.152.152	TCP	54	64557 → 443 [ACK] Seq=2142 Ack=4015 Win=262144 Len=0
2297	83.875402	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
2298	83.875459	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
2299	83.909905	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1348019 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2300	83.910326	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1349459 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2301	83.910412	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1350899 Win=1029 Len=0
2302	83.910619	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1350899 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2303	83.911037	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1352339 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2304	83.911037	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
2305	83.911121	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1354736 Win=1029 Len=0
2306	84.023022	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
2307	84.079179	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
2308	84.309391	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1354736 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2309	84.309577	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1356176 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2310	84.309656	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1357616 Win=1029 Len=0
2311	84.310049	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1357616 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2312	84.310559	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1359056 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2313	84.310559	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2314	84.310638	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1361452 Win=1029 Len=0
2315	84.356777	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2316	84.422192	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2317	84.422192	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
2318	84.468531	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2319	84.601799	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2320	84.657369	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2321	84.708615	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1361452 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2322	84.708850	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1362892 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2323	84.708887	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1364332 Win=1029 Len=0
2324	84.709274	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1364332 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2325	84.709798	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1365772 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2326	84.709798	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
2327	84.709828	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1367425 Win=1029 Len=0
2328	84.713346	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2329	84.768903	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2330	84.825172	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2331	84.881610	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2332	84.939005	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2333	85.108896	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1367425 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2334	85.109352	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1368865 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2335	85.109442	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1370305 Win=1029 Len=0
2336	85.109661	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1370305 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2337	85.110056	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1371745 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2338	85.110056	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2339	85.110140	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1374141 Win=1029 Len=0
2340	85.360910	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
2341	85.508304	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1374141 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2342	85.508550	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1375581 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2343	85.508588	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1377021 Win=1029 Len=0
2344	85.509038	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1377021 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2345	85.509537	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1378461 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2346	85.509537	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2347	85.509568	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1380857 Win=1029 Len=0
2348	85.608272	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
2349	85.608330	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
2350	85.756585	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
2351	85.812104	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
2352	85.907662	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1380857 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2353	85.908080	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1382297 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2354	85.908163	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1383737 Win=1029 Len=0
2355	85.908567	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1383737 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2356	85.909070	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1385177 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2357	85.909070	51.195.5.70	192.168.1.123	TLSv1.2	269	Application Data
2358	85.909144	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1386832 Win=1029 Len=0
2359	86.088181	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2360	86.144282	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2361	86.200673	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2362	86.307666	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1386832 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2363	86.308482	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1388272 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2364	86.308482	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1389712 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2365	86.308587	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1391152 Win=1029 Len=0
2366	86.308839	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1391152 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2367	86.308839	51.195.5.70	192.168.1.123	TLSv1.2	1009	Application Data
2368	86.308920	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1393547 Win=1029 Len=0
2369	86.332098	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2370	86.400006	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2371	86.447933	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2372	86.502811	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2373	86.539683	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
2374	86.553557	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2375	86.609084	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2376	86.665080	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2377	86.707753	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1393547 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2378	86.707753	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1394987 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2379	86.707842	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1396427 Win=1029 Len=0
2380	86.708006	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1396427 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2381	86.708536	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1397867 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2382	86.708536	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
2383	86.708576	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1399521 Win=1029 Len=0
2384	87.106758	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1399521 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2385	87.107217	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1400961 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2386	87.107301	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1402401 Win=1029 Len=0
2387	87.107525	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1402401 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2388	87.107814	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1403841 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2389	87.107814	51.195.5.70	192.168.1.123	TLSv1.2	1122	Application Data
2390	87.107893	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1406349 Win=1029 Len=0
2391	87.328950	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
2392	87.328981	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
2393	87.479332	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
2394	87.506910	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1406349 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2395	87.507343	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1407789 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2396	87.507427	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1409229 Win=1029 Len=0
2397	87.507831	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1409229 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2398	87.508334	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1410669 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2399	87.508334	51.195.5.70	192.168.1.123	TLSv1.2	899	Application Data
2400	87.508411	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1412954 Win=1029 Len=0
2401	87.533136	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
2402	87.810110	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2403	87.865406	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2404	87.916984	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1412954 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2405	87.916984	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1414394 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2406	87.916984	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1415834 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2407	87.916984	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1417274 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2408	87.916984	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
2409	87.917090	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1418927 Win=1029 Len=0
2410	87.918980	192.168.1.109	224.0.0.251	MDNS	119	Standard query 0x0006 PTR _674A0243._sub._googlecast._tcp.local, "QM" question PTR _8E6C866D._sub._googlecast._tcp.local, "QM" question PTR _googlecast._tcp.local, "QM" question  
2411	87.920164	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2412	88.051958	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2413	88.105610	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2414	88.160155	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2415	88.201332	192.168.1.123	51.195.113.37	TCP	66	64558 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
2416	88.213818	51.195.113.37	192.168.1.123	TCP	62	443 → 64558 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1440 WS=128
2417	88.213818	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2418	88.214102	192.168.1.123	51.195.113.37	TCP	54	64558 → 443 [ACK] Seq=1 Ack=1 Win=263424 Len=0
2419	88.215335	192.168.1.123	51.195.113.37	TLSv1.3	641	Client Hello
2420	88.226535	Tp-LinkT_26:0d:10	Broadcast	ARP	60	Who has 192.168.1.7? Tell 192.168.1.1
2421	88.227640	51.195.113.37	192.168.1.123	TLSv1.3	288	Server Hello, Change Cipher Spec, Application Data, Application Data
2422	88.234224	192.168.1.123	51.195.113.37	TLSv1.3	118	Change Cipher Spec, Application Data
2423	88.234733	192.168.1.123	51.195.113.37	TLSv1.3	146	Application Data
2424	88.235824	192.168.1.123	51.195.113.37	TLSv1.3	1136	Application Data
2425	88.246684	51.195.113.37	192.168.1.123	TLSv1.3	325	Application Data
2426	88.246684	51.195.113.37	192.168.1.123	TLSv1.3	100	Application Data
2427	88.246910	192.168.1.123	51.195.113.37	TCP	54	64558 → 443 [ACK] Seq=1826 Ack=552 Win=262912 Len=0
2428	88.247471	192.168.1.123	51.195.113.37	TLSv1.3	85	Application Data
2429	88.248589	51.195.113.37	192.168.1.123	TLSv1.3	391	Application Data
2430	88.270227	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2431	88.302563	192.168.1.123	51.195.113.37	TCP	54	64558 → 443 [ACK] Seq=1857 Ack=889 Win=262400 Len=0
2432	88.306609	51.195.113.37	192.168.1.123	TCP	60	443 → 64558 [ACK] Seq=889 Ack=1857 Win=64128 Len=0
2433	88.306609	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1418927 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2434	88.306609	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1420367 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2435	88.306609	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1421807 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2436	88.306609	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1423247 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2437	88.306609	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2438	88.306816	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1425643 Win=1029 Len=0
2439	88.316119	192.168.1.123	239.255.255.250	SSDP	215	M-SEARCH * HTTP/1.1 
2440	88.325820	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2441	88.380021	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2442	88.704170	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1425643 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2443	88.704603	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1427083 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2444	88.704655	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1428523 Win=1029 Len=0
2445	88.705080	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1428523 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2446	88.705591	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1429963 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2447	88.705591	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
2448	88.705637	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1431616 Win=1029 Len=0
2449	88.997845	fe80::e80:63ff:fe26:d10	ff02::1	ICMPv6	86	Router Advertisement from 0c:80:63:26:0d:10
2450	89.049925	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
2451	89.049981	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
2452	89.101189	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1431616 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2453	89.101364	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1433056 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2454	89.101438	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1434496 Win=1029 Len=0
2455	89.101835	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1434496 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2456	89.102365	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1435936 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2457	89.102365	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2458	89.102445	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1438332 Win=1029 Len=0
2459	89.122463	192.168.1.123	51.195.113.37	TCP	54	64558 → 443 [FIN, ACK] Seq=1857 Ack=889 Win=262400 Len=0
2460	89.134305	51.195.113.37	192.168.1.123	TCP	60	443 → 64558 [FIN, ACK] Seq=889 Ack=1858 Win=64128 Len=0
2461	89.134505	192.168.1.123	51.195.113.37	TCP	54	64558 → 443 [ACK] Seq=1858 Ack=890 Win=262400 Len=0
2462	89.202877	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
2463	89.228166	Tp-LinkT_26:0d:10	Broadcast	ARP	60	Who has 192.168.1.7? Tell 192.168.1.1
2464	89.258091	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
2465	89.323495	192.168.1.123	239.255.255.250	SSDP	215	M-SEARCH * HTTP/1.1 
2466	89.503657	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1438332 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2467	89.504012	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1439772 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2468	89.504065	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1441212 Win=1029 Len=0
2469	89.504239	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1441212 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2470	89.504831	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1442652 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2471	89.504831	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
2472	89.504888	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1445049 Win=1029 Len=0
2473	89.536517	192.168.1.110	239.255.255.250	SSDP	143	M-SEARCH * HTTP/1.1 
2474	89.553041	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2475	89.608279	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2476	89.662578	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2477	89.791894	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2478	89.847576	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2479	89.902880	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2480	89.904605	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1445049 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2481	89.905093	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1446489 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2482	89.905134	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1447929 Win=1029 Len=0
2483	89.905589	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1447929 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2484	89.906087	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1449369 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2485	89.906087	51.195.5.70	192.168.1.123	TLSv1.2	268	Application Data
2486	89.906122	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1451023 Win=1029 Len=0
2487	89.957266	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2488	90.012346	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2489	90.066762	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2490	90.121171	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2491	90.229917	Tp-LinkT_26:0d:10	Broadcast	ARP	60	Who has 192.168.1.7? Tell 192.168.1.1
2492	90.303252	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1451023 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2493	90.303628	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1452463 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2494	90.303713	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1453903 Win=1029 Len=0
2495	90.303890	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1453903 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2496	90.304381	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1455343 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2497	90.304381	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2498	90.304458	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1457739 Win=1029 Len=0
2499	90.334308	192.168.1.123	239.255.255.250	SSDP	215	M-SEARCH * HTTP/1.1 
2500	90.356656	192.168.1.100	255.255.255.255	UDP	214	49153 → 6667 Len=172
2501	90.701708	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1457739 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2502	90.702121	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1459179 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2503	90.702207	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1460619 Win=1029 Len=0
2504	90.702895	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1460619 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2505	90.702895	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1462059 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2506	90.702895	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
2507	90.702987	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1463712 Win=1029 Len=0
2508	90.793545	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1
2509	90.793605	Fujitsu_b5:62:27	Tp-LinkT_26:0d:10	ARP	42	192.168.1.123 is at 00:23:26:b5:62:27
2510	90.941351	Tp-LinkT_26:0d:10	IntelCor_8c:5f:d0	ARP	60	Who has 192.168.1.131? Tell 192.168.1.1
2511	90.994022	Tp-LinkT_26:0d:10	TCLKingE_2f:4c:42	ARP	60	Who has 192.168.1.119? Tell 192.168.1.1
2512	91.101980	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1463712 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2513	91.102391	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1465152 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2514	91.102476	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1466592 Win=1029 Len=0
2515	91.102968	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1466592 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2516	91.103399	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1468032 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2517	91.103399	51.195.5.70	192.168.1.123	TLSv1.2	1011	Application Data
2518	91.103477	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1470429 Win=1029 Len=0
2519	91.278053	Tp-LinkT_26:0d:10	Apple_2b:e9:18	ARP	60	Who has 192.168.1.108? Tell 192.168.1.1
2520	91.335018	Tp-LinkT_26:0d:10	Cisco_1f:2a:80	ARP	60	Who has 192.168.1.111? Tell 192.168.1.1
2521	91.343537	192.168.1.123	239.255.255.250	SSDP	215	M-SEARCH * HTTP/1.1 
2522	91.388469	Tp-LinkT_26:0d:10	Luxshare_55:64:31	ARP	60	Who has 192.168.1.122? Tell 192.168.1.1
2523	91.501900	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1470429 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2524	91.501900	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1471869 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2525	91.501900	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1473309 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2526	91.502007	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1474749 Win=1029 Len=0
2527	91.502371	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1474749 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2528	91.502371	51.195.5.70	192.168.1.123	TLSv1.2	1010	Application Data
2529	91.502421	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1477145 Win=1029 Len=0
2530	91.522838	Tp-LinkT_26:0d:10	Apple_af:b0:4e	ARP	60	Who has 192.168.1.8? Tell 192.168.1.1
2531	91.571112	Tp-LinkT_26:0d:10	IntelCor_5b:0f:13	ARP	60	Who has 192.168.1.130? Tell 192.168.1.1
2532	91.627861	Tp-LinkT_26:0d:10	Microsof_a4:f1:59	ARP	60	Who has 192.168.1.107? Tell 192.168.1.1
2533	91.679126	Tp-LinkT_26:0d:10	a2:dc:1f:8f:b7:cb	ARP	60	Who has 192.168.1.118? Tell 192.168.1.1
2534	91.733505	Tp-LinkT_26:0d:10	16:f5:bf:a0:0e:a3	ARP	60	Who has 192.168.1.112? Tell 192.168.1.1
2535	91.787587	Tp-LinkT_26:0d:10	Apple_25:9f:00	ARP	60	Who has 192.168.1.129? Tell 192.168.1.1
2536	91.841476	Tp-LinkT_26:0d:10	WistronI_91:df:38	ARP	60	Who has 192.168.1.138? Tell 192.168.1.1
2537	91.901740	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1477145 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2538	91.901914	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1478585 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2539	91.901988	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1480025 Win=1029 Len=0
2540	91.902394	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1480025 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2541	91.903540	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1481465 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2542	91.903540	51.195.5.70	192.168.1.123	TLSv1.2	267	Application Data
2543	91.903642	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1483118 Win=1029 Len=0
2544	92.301950	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1483118 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2545	92.302390	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1484558 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2546	92.302441	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1485998 Win=1029 Len=0
2547	92.302906	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1485998 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2548	92.303143	51.195.5.70	192.168.1.123	TCP	1494	443 → 49241 [ACK] Seq=1487438 Ack=1 Win=501 Len=1440 [TCP segment of a reassembled PDU]
2549	92.303143	51.195.5.70	192.168.1.123	TLSv1.2	1107	Application Data
2550	92.303187	192.168.1.123	51.195.5.70	TCP	54	49241 → 443 [ACK] Seq=1 Ack=1489931 Win=1029 Len=0
2551	92.530446	Tp-LinkT_26:0d:10	Fujitsu_b5:62:27	ARP	60	Who has 192.168.1.123? Tell 192.168.1.1

Vielen Dank schonmal...
aqui
aqui 28.01.2021 um 10:51:44 Uhr
Goto Top
So ich habe mal aufgezeichnet, aber es kommt leider nicht einmal zu einer SIP-Registrierung...
Wenig hilfreich und ohne jegliche Aussage. face-sad
Ohne das du überhaupt einmal mitteilst welche IP Adresse das Telefon hat ist der obige Trace do sinnfrei.
Setze den Capture Filter doch dann bitte auf die IP des Telefons mit host <ip_adress>
https://wiki.wireshark.org/CaptureFilters
So wird dir gefiltert lediglich der Traffic vom und zum Telefon angezeigt !!! Das oben zeigt zu 99,99% nur den Winblows Traffic deines Rechners der sinnfrei und völlig uninteressant ist und hier nur Speicherplatz frisst. face-sad
Port 5060 Frames sind da nirgendwo zu sehen. Oder man übersieht sie ob der schieren Masse.
https://support.yeastar.com/hc/en-us/articles/360007606533-How-to-Analyz ...
https://www.easybell.de/business/webinare/sip-debugging-wireshark.html
https://www.youtube.com/watch?v=OE7AgTAqNoo
usw.
ciscoexpert
ciscoexpert 28.01.2021 um 13:09:07 Uhr
Goto Top
Sorry, da habe ich wohl wieder Müll gemacht, habe aber Wireshark, ehrlich gesagt nur selten genutzt.

Nun, die IP des Telefons (Cisco IP Phone 7911) ist 192.168.1.125
Wenn ich nur Traffic dafür ansehe, sehe ich nur das:
284	37.797961	192.168.1.125	255.255.255.255	DHCP	590	DHCP Request  - Transaction ID 0x596
Wenn ich nach dem SIP Protokoll filtere , sehe ich nichts.

Zeichne ich eventuell auch falsch auf? Ich habe als Aufnahme Interface "Ethernet" in meinem Fall der Anschluss an den Router genommen.

Danke
aqui
aqui 28.01.2021 aktualisiert um 13:28:38 Uhr
Goto Top
Zeichne ich eventuell auch falsch auf?
Ja das könnte durchaus sein wenn du einen Switch benutzt !!
Dann "siehst" du im Wireshark ja nur die DHCP Requestst bzw. den Traffic den das Telefon direkt mit deinem PC austauscht.
Da der Switch ja nur an Ports forwardet wo auch die Ziel Mac Adressen hinterliegen wäre aller anderer Verkehr der vom Telefon nicht zu deinem PC geht unsichtbar. Ausgenommen von dem Traffic den der Switch auf alle Ports fluten muss wie Broadcasts und Multicasts. Dein o.a. DHCP Frame ist so ein Paket wie auch du sicher selber sofort an der Zieladresse 255.255.255.255 was ja zweifelsohne eine All Net Broadcast Adresse ist ! Das ist der DHCP Request mit dem sich das Telefon 192.168.1.125 eine gültige IP vom DHCP holt oder bestätigen lässt. face-wink

Logischerweise benötigst du also einen Mirror Port am Switch der die den Telefon Port auf einem Messport "spiegelt". Sowas haben nur managebare Switches natürlich.
Wenn du einen ungemangten Dödelswitch hast ist das aber kein Beinbruch du musst dann nur den Wireshark als Bridge oder mit einem Spiegeldevice (Tap) in die Telefonleitung einschleifen. Guckst du hier:
https://www.heise.de/ct/artikel/Ethernet-Bridge-als-Sniffer-Quelle-22148 ...
https://www.heise.de/select/ct/2017/18/1504370006723906
Kapitel: Throwing Star LAN Tap Pro
ciscoexpert
ciscoexpert 30.01.2021 um 21:48:39 Uhr
Goto Top
So,

ich habe es leider nicht hinbekommen, das WireShark mehr als nur den DHCP aufzeichnet. Irgendwie mache ich da immer etwas, trotz Anleitung nicht ganz richtig.
Aber dafür habe ich im Log des Telefons gesehen, dass eine Registrierung tatsächlich stattfindet.

Ich habe mal, weil ich dachte, dass es eventuell hilft, anstelle von sipgate.de einfach die IP-Adresse eingegeben...

Folgende Zeile habe ich oft gesehen und weiß nicht genau, was sie bedeutet:

1249: NOT 18:54:11.462164 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
1250: ERR 18:54:11.463025 JVM: SIPCC-SYS_CALL: sip_tcp_channel_send: Error: sipSocketSend failed: errno = 54

Und hier sieht man, dass eine Registrierung stattfindet, aber dann fehschlägt:

1205: NOT 18:54:03.976024 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_IDLE <- E_SIP_REG_REG_REQ
1206: NOT 18:54:03.979938 JVM: SIPCC-SIP_MSG_SEND: ccsip_dump_send_msg_info: <217.10.79.9:5060>:REGISTE: <sip:ANMELDENAME@217.10.79.9> :102 REGISTER::0024c40b-7ccd0003-86576fe2-bccb091d@192.168.1.125
1207: ERR 18:54:03.981268 JVM: SIPCC-SYS_CALL: sip_tcp_channel_send: Error: sipSocketSend failed: errno = 54

Eventuell hilft das auch weiter bei der Diagnose,

danke schonmal
aqui
aqui 31.01.2021 aktualisiert um 11:39:47 Uhr
Goto Top
das WireShark mehr als nur den DHCP aufzeichnet. Irgendwie mache ich da immer etwas, trotz Anleitung nicht ganz richtig.
Kann ja auch richtig sein sofern das Telefon keinerlei SIP Requests sendet.

Man muss aber vermuten das du am Switch keinen Mirrorport nutzt so das dir die Daten des telefons gar nicht angezeigt werden. Dann "siehst" du am Sniffer natürlich nur die Broadcast Pakete die der Switch ja prinzipbedingt an alle Ports fluten muss. Das ist dann in der Tat wenig hilfreich.
Du musst schon eienn Mirror oder SPAN Port nutzen am Switch oder wenn du das nicht hast am Wireshark mit einer Netzwerkbrücke arbeiten was dann 2 NICs erfordert (2te z.B. ein USB Ethernet Adapter)

OK, aber die mitgeschnittenen SIP Pakete haben ja schon eine gewisse Aussage:
"<217.10.79.9:5060>:REGISTE: <sip:ANMELDENAME@217.10.79.9> :102 REGISTER::0024c40b-7ccd0003-86576fe2-bccb091d@192.168.1.125"
Bedeutet ja das versucht wird einen User "ANMELDENAME" am SIP Server 217.10.79.9 (IP ist der SIPgate Server) zu registrieren was dann aber mit einem Socket Error scheitert.
Das kann mehrere Gründe haben:
  • "ANMELDENAME" ist natürlich Blödsinn, denn solche Usernamen gibt es nicht bei SIPgate. Klar das das dann schiefgeht ! Leider weiss man jetzt nicht ob du das hier anonymisiert hast ober ob das real so rausgegangen ist und muss doof rumraten. face-sad
  • Möglich das SIPgate SIP Sessions nur mit UDP akzeptiert statt TCP. Wäre auch einen Versuch wert das im Telefon Setup mal umzustellen.
ciscoexpert
ciscoexpert 31.01.2021 um 12:40:54 Uhr
Goto Top
Also, statt ANMELDENAME steht da eigentlich der Anmeldename, den ich auf anderen Telefonen und Softphones usw. immer verwende um mich bei Sipgate anzumelden, habe den hier aber mal durch ANMELDENAME ersetzt.

Auch wenn ich UDP verwende, konnte ich leider keine Änderung feststellen.

Der Fehler bleibt gleich.
aqui
aqui 31.01.2021 aktualisiert um 15:23:27 Uhr
Goto Top
Wenn du im gleichen IP Segment ein Softphone wie phoner oder phonter lite betreibst mit exakt den Credentials des Cisco Phones, kann das eine SIP Session aufbauen ?
http://phoner.de/index.htm
http://www.phonerlite.de/index_de.htm
Interessant wäre da auch einmal ein Sniffer Trace
ciscoexpert
ciscoexpert 31.01.2021 um 15:39:05 Uhr
Goto Top
Also, ein SoftPhone wie PhonerLite funktioniert ohne Probleme,

hier mal ein Debugausschnit:

15:33:15,644: Start of application PhonerLite (C:\Windows\explorer.exe)
15:33:16,447: Loading profiles from configuration file: C:\Users\Aleksandar Urosevic\AppData\Roaming\PhonerLite\sipper.ini
15:33:16,477: Loading profile "2048221" from configuration file: C:\Users\Aleksandar Urosevic\AppData\Roaming\PhonerLite\sipper.ini  
15:33:16,492: loading USBphone
15:33:16,540: OpenDevice (C:\Program Files (x86)\PhonerLite\sipper.dll)
15:33:16,540: LoadCAPI(C:\Program Files (x86)\PhonerLite\sipper.dll)
15:33:16,717: Installed
15:33:16,717: Installed: 
15:33:16,717: Get Manufacturer: 53 49 50 50 45 52 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
15:33:16,717: Get Version: 02 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 
15:33:16,717: SIPPER: 2.0 (3.0)
15:33:16,717: Register: 160 bytes blocksize
15:33:16,717: Register: 00 0C 00 00 02 00 00 00 07 00 00 00 A0 00 00 00 
15:33:16,728: Register returns: 01 00 00 00 
15:33:16,728: Get Profile: 01 00 1E 00 19 00 00 00 03 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
15:33:16,729: Listen Request: 1A 00 01 00 05 80 04 00 01 00 00 00 FF 17 00 00 12 00 01 00 00 00 00 00 00 00 
15:33:16,729: Listen Request
15:33:16,729: Facility Request: 12 00 01 00 80 80 06 00 01 00 00 00 03 00 03 00 00 00 
15:33:16,729: Facility Request (Get Supplementary Services)
15:33:16,733: CAPI thread created: 0x0638
15:33:16,869: Using SIP configuration file: C:\Users\Aleksandar Urosevic\AppData\Roaming\PhonerLite\sipper.ini
-------------------------------------------
15:33:16,757: R: DNS lookup for 'sipgate.de'  
start resolving SRV (UDP)...
-------------------------------------------
15:33:16,859: R: DNS lookup for 'sipgate.de'  
217.10.79.9:5060 (TTL=1442)
-------------------------------------------
15:33:16,874: R: open UDP port (SIP): 5060

-------------------------------------------
15:33:16,977: T: UPnP for Port=5060 -> 79.193.126.112
OK
-------------------------------------------
15:33:16,990: R: open TCP port (TLS listen): 5061

-------------------------------------------
15:33:17,015: T: UPnP for Port=5061 -> TLS listen
OK
-------------------------------------------
15:33:17,015: R: open TCP port (TCP listen): 5060

-------------------------------------------
15:33:17,040: T: UPnP for Port=5060 -> TCP listen
OK
15:33:17,138: Listen Confirm: 0E 00 01 00 05 81 04 00 01 00 00 00 00 00 
15:33:17,138: Listen Confirm
-------------------------------------------
15:33:17,043: R: open UDP port (mDNS): 5353

15:33:17,148: Facility Confirm: 1A 00 01 00 80 81 06 00 01 00 00 00 00 00 03 00 09 00 00 06 00 00 3D 01 00 00 
15:33:17,148: Facility Confirm (Supplementary Services)
15:33:17,148: Facility Request: 16 00 01 00 80 80 07 00 01 00 00 00 03 00 07 01 00 04 3D 01 00 00 
15:33:17,148: Facility Request (Listen To Supplementary Services)
15:33:17,148:  Get Supported Services: success
-------------------------------------------
15:33:17,044: T: 217.10.79.9:5060 (UDP)
REGISTER sip:sipgate.de SIP/2.0
Via: SIP/2.0/UDP 79.193.126.112:5060;branch=z9hG4bK80f414ed3e62eb11a66e2aadfbc3a07e;rport
From: "PhonerLite" <sip:ANMELDENAME0@sipgate.de>;tag=901591769  
To: "PhonerLite" <sip:ANMELDENAME0@sipgate.de>  
Call-ID: 005E7CEC-3E62-EB11-A66C-2AADFBC3A07E@79.193.126.112
CSeq: 1 REGISTER
Contact: <sip:ANMELDENAME0@79.193.126.112:5060>;+sip.instance="<urn:uuid:00E9CC97-2662-EB11-8DEE-3A52B38FF3F8>"  
Allow: INVITE, ACK, BYE, CANCEL, INFO, MESSAGE, NOTIFY, OPTIONS, REFER, UPDATE, PRACK
Max-Forwards: 70
Allow-Events: org.3gpp.nwinitdereg
User-Agent: PhonerLite 2.86
Supported: 100rel, replaces, from-change, gruu
Expires: 600
Content-Length: 0
aqui
aqui 31.01.2021 aktualisiert um 15:44:09 Uhr
Goto Top
Du kannst an Via: SIP/2.0/UDP 79.193.126.112:5060;branch=... sehen das das Softphone UDP nutzt statt TCP. Du aber hast TCP im Telefon eingestellt !! Vermutlich ist das das Problem und erklärt auch den Socket Error !
Der Parameter:
<transportLayerProtocol>2</transportLayerProtocol>
1 = TCP
2 = UDP
sollte also im XML Setup des Telefons auf "2" stehen !
ciscoexpert
ciscoexpert 31.01.2021 um 16:07:03 Uhr
Goto Top
Auch nach einer Umstellung, konnte ich leider keine Änderung feststellen.

Aber dafür diese Zeile aus dem letzten Log:
sip_tcp_channel_send: Error: cprSend failed: errno = 54
aqui
aqui 31.01.2021 aktualisiert um 16:37:45 Uhr
Goto Top
Mmmhhh sip_tcp_channel_send: Error:... Zeigt ja das deine Umstellung auf UDP irgendwie nicht nicht wirklich geklappt hat oder du das keinen Reset auf dem Telefon gemacht das es den XML File per TFTP neu einliest ?!
ciscoexpert
ciscoexpert 31.01.2021 aktualisiert um 20:55:12 Uhr
Goto Top
Also, jetzt habe ich das Telefon nochmal zurückgesetzt, Umstellung auf UDP hat dann auch geklappt. Habe dabei wieder etwas interessantes entdeckt, was mich etwas stutzig gemacht hat:

SIPProcessUDPMessage : SIPTaskCheckSource() failed - Sender not recognized

Hier ist dann der gesamte, letzte Log.

2319: NOT 13:55:59.135397 JVM:  --> Properties JNI: SignalApp() handling SIGIPCFG. msgCode=256 value=4
2320: NOT 13:55:59.150865 JVM:  <-- Properties JNI: SignalApp()
2321: NOT 13:55:59.200279 PAE: paeSetLastSupStatus: LastSupStatus 0 
2322: ERR 13:56:00.274730 JVM: SIP : SIPProcessUDPMessage : SIPTaskCheckSource() failed - Sender not recognized
2323: NOT 13:56:02.582417 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2324: NOT 13:56:06.582355 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2325: NOT 13:56:10.582382 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2326: NOT 13:56:14.582398 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2327: DBG 13:56:14.802665 cffs_gc(): runing gc 1
2328: NOT 13:56:18.582358 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2329: NOT 13:56:22.582342 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2330: NOT 13:56:23.080981 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_ACK
2331: ERR 13:56:23.082176 JVM: %REGISTRIERUNG Auth. fehlgeschlagen: Ack-Timer
2332: NOT 13:56:23.090475 JVM: set_active_ccm: ccm=PRIMARY  port=-1
2333: ERR 13:56:23.091248 JVM: SIPCC-LINE_NUM: sip_platform_localexpires_timer_stop: Error: Line number (53) is invalid
2334: NOT 13:56:23.092442 JVM: SIPCC-UI_API: 1/0, ui_set_sip_registration_state: 0
2335: NOT 13:56:23.094390 JVM: SIPCC-UI_API: 0/0, ui_set_notification: Registrierung: 176:20
2336: NOT 13:56:26.582370 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2337: NOT 13:56:27.582351 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2338: NOT 13:56:29.582382 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2765: NOT 20:52:06.985770 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2766: NOT 20:52:10.982146 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2767: NOT 20:52:14.982164 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2768: NOT 20:52:18.982147 JVM: SIPCC-SIP_REG_STATE: 1/51, sip_reg_sm_process_event: SIP_REG_STATE_REGISTERING <- E_SIP_REG_TMR_RETRY
2769: NOT 20:53:28.491587 JVM: SIPCC-SIP_MSG_RECV: ccsip_dump_recv_msg_info: <51.159.95.5:0   >:INVITE : <sip:-01179193126112:5060@192.168.1.125:5060>;tag=1443742916 :1 INVITE::1838939795-1932241721-1849453545
2770: ERR 20:53:28.544215 JVM: Unknown address in Request URI
2771: ERR 20:53:28.544955 JVM: sipSPICheckRequest: Request URI Not Found
2772: ERR 20:53:28.545568 JVM: SIP : SIPTaskProcessSIPMessage : sipSPICheckRequest() returned error.
2773: NOT 20:53:28.547244 JVM: SIPCC-SIP_MSG_SEND: ccsip_dump_send_msg_info: <51.159.95.5:64231>:404 Not: <sip:-011972594858636@192.168.1.125:5060> :1 INVITE::1838939795-1932241721-1849453545
2774: NOT 20:53:32.617683 JVM: SIPCC-SIP_MSG_RECV: ccsip_dump_recv_msg_info: <37.49.229.192:0   >:INVITE : <sip:test@192.168.1.125:5060;transport=UDP>;tag=niwyyaek :1 INVITE::W28HjSKrxVpMycJcEKHlFB..
2775: ERR 20:53:32.661461 JVM: Unknown address in Request URI
2776: ERR 20:53:32.662205 JVM: sipSPICheckRequest: Request URI Not Found
2777: ERR 20:53:32.662808 JVM: SIP : SIPTaskProcessSIPMessage : sipSPICheckRequest() returned error.
2778: NOT 20:53:32.664491 JVM: SIPCC-SIP_MSG_SEND: ccsip_dump_send_msg_info: <37.49.229.192:5060>:404 Not: <sip:148323395006@192.168.1.125:5060;transport=UDP> :1 INVITE::W28HjSKrxVpMycJcEKHlFB..
2779: NOT 20:53:39.680781 JVM: SIPCC-SIP_MSG_RECV: ccsip_dump_recv_msg_info: <138.204.232.169:0   >:OPTIONS: "sipvicious"<sip:100@1.1.1.1>;tag=3466633137653730313363340133383538383030373734 :1 OPTIONS::1048895417340106417526640  
2780: NOT 20:53:39.682229 JVM: SIPCC-CC_API: 0/0, cc_int_options_sdp_req: SIP -> GSM: OPTIONS             
2781: NOT 20:53:39.683173 JVM: SIPCC-DCSM: dcsm_process_event: DCSM 0   :(DCSM_READY:OPTIONS )
2782: NOT 20:53:39.723960 DSP: CODEC G.711 direction:2 cost:26 budget:100 available
2783: NOT 20:53:39.724665 DSP: CODEC[1] G.729A or G.729AB direction:2 cost:41 budget:100 available
2784: NOT 20:53:39.725248 DSP: CODEC[2] G.729 or G.729B direction:2 cost:41 budget:100 available
2785: NOT 20:53:39.725842 DSP: CODEC[3] LINEAR 8 or 16kHz direction:2 cost:26 budget:100 available
2786: NOT 20:53:39.726447 DSP: CODEC[4] G.722 direction:2 cost:32767 budget:100 NOT available
2787: NOT 20:53:39.727047 DSP: CODEC[5] iLBC direction:2 cost:48 budget:100 available
2788: NOT 20:53:39.727677 DSP: STREAM- GetCapableCodecList requestType:2 bitmap:0x2f
2789: NOT 20:53:39.731271 JVM: SIPCC-CC_API: 0/0, cc_int_options_sdp_ack: GSM -> SIP: OPTIONS_ACK         
2790: NOT 20:53:39.735000 JVM: SIPCC-SIP_MSG_SEND: ccsip_dump_send_msg_info: <138.204.232.169:5061>:200 OK
: "sipvicious"<sip:100@1.1.1.1>;tag=0024c40b7ccd00068e491cd5-7844cfbd :1 OPTIONS::1048895417340106417526640  

Danke schonmal!
aqui
aqui 01.02.2021 um 10:06:13 Uhr
Goto Top
Mmmhhh "%REGISTRIERUNG Auth. fehlgeschlagen: Ack-Timer" Zeigt ja das deine SIP Authentisierung fehlgeschlagen ist. Ggf. Tippfehler bei den User Credentials ?!
Hast du im XML Konfig File NAT aktiviert oder nicht ?!
ciscoexpert
ciscoexpert 01.02.2021 um 12:03:13 Uhr
Goto Top
Ich habe NAT nicht aktiviert und die Anmeldedaten stimmen auch, habe sie aber nochmal von Sipgate direkt abkopiert...
aqui
aqui 01.02.2021 um 15:15:14 Uhr
Goto Top
Ich habe NAT nicht aktiviert
Du nutzt aber einen NAT Router, oder ?
Dann musst du auch NAT aktivieren.
ciscoexpert
ciscoexpert 01.02.2021 aktualisiert um 15:38:32 Uhr
Goto Top
Tatsächlich!

WOW, es hat funktioniert!!!

Rausrufen geht, aber ich empfange leider noch keine Anrufe. Woran könnte das liegen?

Vielen Herzlichen Dank!
aqui
aqui 01.02.2021 um 20:06:10 Uhr
Goto Top
👏 Glückwunsch !
Du hast im Router vergessen TCP/UDP 5060 per Port Forwarding auf die lokale IP freizugeben. Das löst das Problem. Ohne das können inbound Calls vom Provider die NAT Firewall des Routers zum Telefon nicht überwinden.
Du kannst alternativ mit SIP Keepalives arbeiten oder STUN.
Näheres zur VoIP Kommunikation auch hier:
VoIP-Telefonie über SIP-Client "Zoiper" (FritzBox 7560 als Router)