sudo tcpdump -i wlan0 -nn -ttt host 78.157.227.38
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wlan0, link-type EN10MB (Ethernet), capture size 96 bytes
00:00:00.000000 IP 192.168.0.23.44772 > 78.157.227.38.80: Flags [ S ], seq 3516724279, win 5840, options [mss 1460,sackOK,TS val 4294944890 ecr 0,nop,wscale 6], length 0
00:00:01.437617 IP 78.157.227.38.80 > 192.168.0.23.44772: Flags [ S. ], seq 2583992933, ack 3516724280, win 64620, options [mss 1436,nop,wscale 3], length 0
00:00:00.000034 IP 192.168.0.23.44772 > 78.157.227.38.80: Flags [.], ack 1, win 92, length 0
00:00:00.000159 IP 192.168.0.23.44772 > 78.157.227.38.80: Flags [ P. ], seq 1:381, ack 1, win 92, length 380
00:00:01.771326 IP 78.157.227.38.80 > 192.168.0.23.44772: Flags [.], ack 381, win 64620, length 0
00:00:42.805091 IP 192.168.0.23.44772 > 78.157.227.38.80: Flags [F.], seq 381, ack 1, win 92, length 0
00:00:01.593537 IP 78.157.227.38.80 > 192.168.0.23.44772: Flags [.], ack 382, win 64620, length 0
00:00:00.793340 IP 192.168.0.23.44775 > 78.157.227.38.80: Flags [ S ], seq 4276495256, win 5840, options [mss 1460,sackOK,TS val 4294956990 ecr 0,nop,wscale 6], length 0
00:00:02.052709 IP 78.157.227.38.80 > 192.168.0.23.44775: Flags [ S. ], seq 138378382, ack 4276495257, win 64620, options [mss 1436,nop,wscale 3], length 0
00:00:00.000028 IP 192.168.0.23.44775 > 78.157.227.38.80: Flags [.], ack 1, win 92, length 0
00:00:00.000071 IP 192.168.0.23.44775 > 78.157.227.38.80: Flags [ P.], seq 1:381, ack 1, win 92, length 380
00:00:01.496913 IP 78.157.227.38.80 > 192.168.0.23.44775: Flags [.], ack 381, win 64620, length 0
00:00:45.785629 IP 192.168.0.23.44775 > 78.157.227.38.80: Flags [ F.], seq 381, ack 1, win 92, length 0
00:00:00.003628 IP 192.168.0.23.57594 > 78.157.227.38.80: Flags [ S ], seq 776935385, win 5840, options [mss 1460,sackOK,TS val 2029 ecr 0,nop,wscale 6], length 0
00:00:01.802937 IP 78.157.227.38.80 > 192.168.0.23.57594: Flags [ S. ], seq 1687575327, ack 776935386, win 64620, options [mss 1436,nop,wscale 3], length 0
00:00:00.000027 IP 192.168.0.23.57594 > 78.157.227.38.80: Flags [.], ack 1, win 92, length 0
00:00:00.000152 IP 192.168.0.23.57594 > 78.157.227.38.80: Flags [ P.], seq 1:381, ack 1, win 92, length 380
00:00:01.913062 IP 78.157.227.38.80 > 192.168.0.23.57594: Flags [.], ack 381, win 64620, length 0
00:00:05.259454 IP 192.168.0.23.44775 > 78.157.227.38.80: Flags [ F. ], seq 381, ack 1, win 92, length 0
00:00:01.258986 IP 78.157.227.38.80 > 192.168.0.23.44772: Flags [.], ack 382, win 64620, length 0
00:00:00.000019 IP 192.168.0.23.44772 > 78.157.227.38.80: Flags [ R ], seq 3516724661, win 0, length 0
00:00:01.149808 IP 78.157.227.38.80 > 192.168.0.23.44775: Flags [.], ack 382, win 64620, length 0
00:00:07.162392 IP 192.168.0.23.57594 > 78.157.227.38.80: Flags [ F. ], seq 381, ack 1, win 92, length 0
00:00:00.003182 IP 192.168.0.23.57595 > 78.157.227.38.80: Flags [ S ], seq 1061264105, win 5840, options [mss 1460,sackOK,TS val 6666 ecr 0,nop,wscale 6], length 0
00:00:02.202828 IP 78.157.227.38.80 > 192.168.0.23.57594: Flags [.], ack 382, win 64620, length 0
00:00:00.795014 IP 192.168.0.23.57595 > 78.157.227.38.80: Flags [ S ], seq 1061264105, win 5840, options [mss 1460,sackOK,TS val 7416 ecr 0,nop,wscale 6], length 0
00:00:01.524144 IP 78.157.227.38.80 > 192.168.0.23.57595: Flags [.], ack 1061264106, win 64620, length 0
00:00:01.172774 IP 78.157.227.38.80 > 192.168.0.23.57595: Flags [ S. ], seq 4201724734, ack 1061264106, win 64620, options [mss 1436,nop,wscale 3], length 0
00:00:00.000027 IP 192.168.0.23.57595 > 78.157.227.38.80: Flags [.], ack 1, win 92, length 0
00:00:00.000068 IP 192.168.0.23.57595 > 78.157.227.38.80: Flags [ P. ], seq 1:381, ack 1, win 92, length 380
00:00:01.968758 IP 78.157.227.38.80 > 192.168.0.23.57595: Flags [ . ], ack 381, win 64620, length 0
^C
31 packets captured
31 packets received by filter
0 packets dropped by kernel