水底游 发表于 2014-04-16 17:37

求抓包分析指点。。。

17:34:16.291790 IP 183.160.59.33.55267 > fs.13qz.com.http: Flags [.], ack 5895361, win 16560, length 0
17:34:16.291808 IP fs.13qz.com.http > 183.160.59.33.55267: Flags [.], seq 5901121:5904001, ack 0, win 43, length 2880
17:34:16.291855 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 180940, win 46358, length 0
17:34:16.292133 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 181476:181976, ack 701, win 58, length 500
17:34:16.293128 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 181976:182140, ack 701, win 58, length 164
17:34:16.294126 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 182140:182304, ack 701, win 58, length 164
17:34:16.294153 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 181476, win 46537, length 0
17:34:16.294226 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 182304:182580, ack 701, win 58, length 276
17:34:16.294741 IP 183.160.59.33.55272 > fs.13qz.com.http: Flags [.], ack 4661281, win 16560, options , length 0
17:34:16.294767 IP fs.13qz.com.http > 183.160.59.33.55272: Flags [.], seq 4665601:4667041, ack 0, win 43, length 1440
17:34:16.295137 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 182580:183016, ack 701, win 58, length 436
17:34:16.296131 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 183016:183180, ack 701, win 58, length 164
17:34:16.297178 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 183180:183344, ack 701, win 58, length 164
17:34:16.297378 IP 183.160.59.33.55270 > fs.13qz.com.http: Flags [.], ack 5279041, win 16560, length 0
17:34:16.297400 IP fs.13qz.com.http > 183.160.59.33.55270: Flags [.], seq 5283361:5286241, ack 0, win 43, length 2880
17:34:16.297444 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 182140, win 46454, length 0
17:34:16.297517 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 182580, win 46399, length 0
17:34:16.298141 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 183344:183940, ack 701, win 58, length 596
17:34:16.299121 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 183940:184104, ack 701, win 58, length 164
17:34:16.299264 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 183180, win 46537, length 0
17:34:16.300126 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 184104:184380, ack 701, win 58, length 276
17:34:16.301131 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 184380:184544, ack 701, win 58, length 164
17:34:16.302130 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 184544:184708, ack 701, win 58, length 164
17:34:16.302889 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 183940, win 46442, length 0
17:34:16.303140 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 184708:184984, ack 701, win 58, length 276
17:34:16.303355 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 184380, win 46387, length 0
17:34:16.303999 IP 183.160.59.33.55270 > fs.13qz.com.http: Flags [.], ack 5281921, win 16560, length 0
17:34:16.304024 IP fs.13qz.com.http > 183.160.59.33.55270: Flags [.], seq 5286241:5289121, ack 0, win 43, length 2880
17:34:16.304134 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 184984:185484, ack 701, win 58, length 500
17:34:16.304629 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 184708, win 46537, length 0
17:34:16.305130 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 185484:185760, ack 701, win 58, length 276
17:34:16.306134 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 185760:185924, ack 701, win 58, length 164
17:34:16.307133 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 185924:186088, ack 701, win 58, length 164
17:34:16.308123 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 186088:186252, ack 701, win 58, length 164
17:34:16.309141 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 186252:186416, ack 701, win 58, length 164
17:34:16.309365 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 185484, win 46440, length 0
17:34:16.309536 IP 183.160.59.33.55269 > fs.13qz.com.http: Flags [.], ack 5613121, win 33840, options , length 0
17:34:16.309561 IP fs.13qz.com.http > 183.160.59.33.55269: Flags [.], seq 5613121:5614561, ack 0, win 43, length 1440
17:34:16.309609 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 185924, win 46385, length 0
17:34:16.310148 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 186416:187060, ack 701, win 58, length 644
17:34:16.310391 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 186252, win 46537, length 0
17:34:16.311139 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 187060:187336, ack 701, win 58, length 276
17:34:16.312121 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 187336:187500, ack 701, win 58, length 164
17:34:16.312620 IP 183.160.59.33.55269 > fs.13qz.com.http: Flags [.], ack 5613121, win 33840, options , length 0
17:34:16.312645 IP fs.13qz.com.http > 183.160.59.33.55269: Flags [.], seq 5614561:5616001, ack 0, win 43, length 1440
17:34:16.313142 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 187500:187936, ack 701, win 58, length 436
17:34:16.313887 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 187060, win 46436, length 0
17:34:16.313973 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 187500, win 46381, length 0
17:34:16.314146 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 187936:188308, ack 701, win 58, length 372
17:34:16.315101 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 188308:188472, ack 701, win 58, length 164
17:34:16.316161 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 188472:188636, ack 701, win 58, length 164
17:34:16.316990 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 188308, win 46537, length 0
17:34:16.317099 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 188636:188912, ack 701, win 58, length 276
17:34:16.318135 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 188912:189076, ack 701, win 58, length 164
17:34:16.318384 IP 183.160.59.33.55267 > fs.13qz.com.http: Flags [.], ack 5898241, win 16560, length 0
17:34:16.318409 IP fs.13qz.com.http > 183.160.59.33.55267: Flags [.], seq 5904001:5906881, ack 0, win 43, length 2880
17:34:16.318476 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 188636, win 46496, length 0
17:34:16.319146 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 189076:189576, ack 701, win 58, length 500
17:34:16.320119 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 189576:189740, ack 701, win 58, length 164
17:34:16.320573 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 189076, win 46441, length 0
17:34:16.321142 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 189740:190016, ack 701, win 58, length 276
17:34:16.322135 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 190016:190180, ack 701, win 58, length 164
17:34:16.323122 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 190180:190344, ack 701, win 58, length 164
17:34:16.323890 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 189740, win 46358, length 0
17:34:16.324129 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 190344:190620, ack 701, win 58, length 276
17:34:16.324342 IP 183.160.59.33.55267 > fs.13qz.com.http: Flags [.], ack 5901121, win 16560, length 0
17:34:16.324363 IP fs.13qz.com.http > 183.160.59.33.55267: Flags [.], seq 5906881:5909761, ack 0, win 43, length 2880
17:34:16.324648 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 190180, win 46537, length 0
17:34:16.325129 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 190620:191120, ack 701, win 58, length 500
17:34:16.325189 IP fs.13qz.com.20086 > 113.68.18.199.6288: Flags , seq 2612396:2612512, ack 961, win 58, length 116
17:34:16.325208 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 191120:191284, ack 701, win 58, length 164
17:34:16.326273 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 191284:191576, ack 701, win 58, length 292
17:34:16.326690 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 190620, win 46482, length 0
17:34:16.327179 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 191576:191852, ack 701, win 58, length 276
17:34:16.328255 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 191852:192016, ack 701, win 58, length 164
17:34:16.329185 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 192016:192180, ack 701, win 58, length 164
17:34:16.329928 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 191284, win 46399, length 0
17:34:16.329988 IP 113.68.18.199.6288 > fs.13qz.com.20086: Flags [.], ack 2612512, win 46376, length 0
17:34:16.330046 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 191852, win 46537, length 0
17:34:16.330130 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 192180:192664, ack 701, win 58, length 484
17:34:16.330667 IP 183.160.59.33.55267 > fs.13qz.com.http: Flags [.], ack 5904001, win 16560, length 0
17:34:16.330687 IP fs.13qz.com.http > 183.160.59.33.55267: Flags [.], seq 5909761:5912641, ack 0, win 43, length 2880
17:34:16.331174 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 192664:193052, ack 701, win 58, length 388
17:34:16.331400 ARP, Request who-has 60.29.229.38 tell 60.29.229.35, length 46
17:34:16.331554 IP fs.13qz.com.56118 > 202.96.128.86.domain: 9428+ PTR? 38.229.29.60.in-addr.arpa. (43)
17:34:16.331863 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 192180, win 46496, length 0
17:34:16.332201 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags , seq 193052:193216, ack 701, win 58, length 164
17:34:16.333591 IP 183.160.59.33.55272 > fs.13qz.com.http: Flags [.], ack 4661281, win 16560, options , length 0
17:34:16.333621 IP fs.13qz.com.http > 183.160.59.33.55272: Flags [.], seq 4661281:4662721, ack 0, win 43, length 1440
17:34:16.336115 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 193052, win 46387, length 0
17:34:16.336207 IP 183.160.59.33.55270 > fs.13qz.com.http: Flags [.], ack 5284801, win 16560, length 0
17:34:16.336226 IP fs.13qz.com.http > 183.160.59.33.55270: Flags [.], seq 5289121:5292001, ack 0, win 43, length 2880我一台的其中一个网卡流量很大,用tcpdump -i eth0 捕获了一下信息回来,打印出这么写内容。。。
fs.13qz.com 这个域名我已经解绑了域名绑定的,为咋还会捕获到这么些内容的?
页: [1]
查看完整版本: 求抓包分析指点。。。