免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 1365 | 回复: 0
打印 上一主题 下一主题

求抓包分析指点。。。 [复制链接]

论坛徽章:
1
水瓶座
日期:2014-12-25 11:15:10
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2014-04-16 17:37 |只看该作者 |倒序浏览
  1. 17:34:16.291790 IP 183.160.59.33.55267 > fs.13qz.com.http: Flags [.], ack 5895361, win 16560, length 0
  2. 17:34:16.291808 IP fs.13qz.com.http > 183.160.59.33.55267: Flags [.], seq 5901121:5904001, ack 0, win 43, length 2880
  3. 17:34:16.291855 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 180940, win 46358, length 0
  4. 17:34:16.292133 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 181476:181976, ack 701, win 58, length 500
  5. 17:34:16.293128 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 181976:182140, ack 701, win 58, length 164
  6. 17:34:16.294126 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 182140:182304, ack 701, win 58, length 164
  7. 17:34:16.294153 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 181476, win 46537, length 0
  8. 17:34:16.294226 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 182304:182580, ack 701, win 58, length 276
  9. 17:34:16.294741 IP 183.160.59.33.55272 > fs.13qz.com.http: Flags [.], ack 4661281, win 16560, options [nop,nop,sack 1 {4664161:4665601}], length 0
  10. 17:34:16.294767 IP fs.13qz.com.http > 183.160.59.33.55272: Flags [.], seq 4665601:4667041, ack 0, win 43, length 1440
  11. 17:34:16.295137 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 182580:183016, ack 701, win 58, length 436
  12. 17:34:16.296131 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 183016:183180, ack 701, win 58, length 164
  13. 17:34:16.297178 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 183180:183344, ack 701, win 58, length 164
  14. 17:34:16.297378 IP 183.160.59.33.55270 > fs.13qz.com.http: Flags [.], ack 5279041, win 16560, length 0
  15. 17:34:16.297400 IP fs.13qz.com.http > 183.160.59.33.55270: Flags [.], seq 5283361:5286241, ack 0, win 43, length 2880
  16. 17:34:16.297444 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 182140, win 46454, length 0
  17. 17:34:16.297517 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 182580, win 46399, length 0
  18. 17:34:16.298141 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 183344:183940, ack 701, win 58, length 596
  19. 17:34:16.299121 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 183940:184104, ack 701, win 58, length 164
  20. 17:34:16.299264 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 183180, win 46537, length 0
  21. 17:34:16.300126 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 184104:184380, ack 701, win 58, length 276
  22. 17:34:16.301131 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 184380:184544, ack 701, win 58, length 164
  23. 17:34:16.302130 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 184544:184708, ack 701, win 58, length 164
  24. 17:34:16.302889 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 183940, win 46442, length 0
  25. 17:34:16.303140 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 184708:184984, ack 701, win 58, length 276
  26. 17:34:16.303355 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 184380, win 46387, length 0
  27. 17:34:16.303999 IP 183.160.59.33.55270 > fs.13qz.com.http: Flags [.], ack 5281921, win 16560, length 0
  28. 17:34:16.304024 IP fs.13qz.com.http > 183.160.59.33.55270: Flags [.], seq 5286241:5289121, ack 0, win 43, length 2880
  29. 17:34:16.304134 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 184984:185484, ack 701, win 58, length 500
  30. 17:34:16.304629 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 184708, win 46537, length 0
  31. 17:34:16.305130 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 185484:185760, ack 701, win 58, length 276
  32. 17:34:16.306134 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 185760:185924, ack 701, win 58, length 164
  33. 17:34:16.307133 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 185924:186088, ack 701, win 58, length 164
  34. 17:34:16.308123 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 186088:186252, ack 701, win 58, length 164
  35. 17:34:16.309141 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 186252:186416, ack 701, win 58, length 164
  36. 17:34:16.309365 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 185484, win 46440, length 0
  37. 17:34:16.309536 IP 183.160.59.33.55269 > fs.13qz.com.http: Flags [.], ack 5613121, win 33840, options [nop,nop,sack 1 {5616001:5618881}], length 0
  38. 17:34:16.309561 IP fs.13qz.com.http > 183.160.59.33.55269: Flags [.], seq 5613121:5614561, ack 0, win 43, length 1440
  39. 17:34:16.309609 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 185924, win 46385, length 0
  40. 17:34:16.310148 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 186416:187060, ack 701, win 58, length 644
  41. 17:34:16.310391 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 186252, win 46537, length 0
  42. 17:34:16.311139 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 187060:187336, ack 701, win 58, length 276
  43. 17:34:16.312121 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 187336:187500, ack 701, win 58, length 164
  44. 17:34:16.312620 IP 183.160.59.33.55269 > fs.13qz.com.http: Flags [.], ack 5613121, win 33840, options [nop,nop,sack 1 {5616001:5620321}], length 0
  45. 17:34:16.312645 IP fs.13qz.com.http > 183.160.59.33.55269: Flags [.], seq 5614561:5616001, ack 0, win 43, length 1440
  46. 17:34:16.313142 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 187500:187936, ack 701, win 58, length 436
  47. 17:34:16.313887 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 187060, win 46436, length 0
  48. 17:34:16.313973 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 187500, win 46381, length 0
  49. 17:34:16.314146 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 187936:188308, ack 701, win 58, length 372
  50. 17:34:16.315101 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 188308:188472, ack 701, win 58, length 164
  51. 17:34:16.316161 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 188472:188636, ack 701, win 58, length 164
  52. 17:34:16.316990 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 188308, win 46537, length 0
  53. 17:34:16.317099 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 188636:188912, ack 701, win 58, length 276
  54. 17:34:16.318135 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 188912:189076, ack 701, win 58, length 164
  55. 17:34:16.318384 IP 183.160.59.33.55267 > fs.13qz.com.http: Flags [.], ack 5898241, win 16560, length 0
  56. 17:34:16.318409 IP fs.13qz.com.http > 183.160.59.33.55267: Flags [.], seq 5904001:5906881, ack 0, win 43, length 2880
  57. 17:34:16.318476 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 188636, win 46496, length 0
  58. 17:34:16.319146 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 189076:189576, ack 701, win 58, length 500
  59. 17:34:16.320119 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 189576:189740, ack 701, win 58, length 164
  60. 17:34:16.320573 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 189076, win 46441, length 0
  61. 17:34:16.321142 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 189740:190016, ack 701, win 58, length 276
  62. 17:34:16.322135 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 190016:190180, ack 701, win 58, length 164
  63. 17:34:16.323122 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 190180:190344, ack 701, win 58, length 164
  64. 17:34:16.323890 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 189740, win 46358, length 0
  65. 17:34:16.324129 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 190344:190620, ack 701, win 58, length 276
  66. 17:34:16.324342 IP 183.160.59.33.55267 > fs.13qz.com.http: Flags [.], ack 5901121, win 16560, length 0
  67. 17:34:16.324363 IP fs.13qz.com.http > 183.160.59.33.55267: Flags [.], seq 5906881:5909761, ack 0, win 43, length 2880
  68. 17:34:16.324648 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 190180, win 46537, length 0
  69. 17:34:16.325129 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 190620:191120, ack 701, win 58, length 500
  70. 17:34:16.325189 IP fs.13qz.com.20086 > 113.68.18.199.6288: Flags [P.], seq 2612396:2612512, ack 961, win 58, length 116
  71. 17:34:16.325208 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 191120:191284, ack 701, win 58, length 164
  72. 17:34:16.326273 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 191284:191576, ack 701, win 58, length 292
  73. 17:34:16.326690 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 190620, win 46482, length 0
  74. 17:34:16.327179 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 191576:191852, ack 701, win 58, length 276
  75. 17:34:16.328255 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 191852:192016, ack 701, win 58, length 164
  76. 17:34:16.329185 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 192016:192180, ack 701, win 58, length 164
  77. 17:34:16.329928 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 191284, win 46399, length 0
  78. 17:34:16.329988 IP 113.68.18.199.6288 > fs.13qz.com.20086: Flags [.], ack 2612512, win 46376, length 0
  79. 17:34:16.330046 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 191852, win 46537, length 0
  80. 17:34:16.330130 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 192180:192664, ack 701, win 58, length 484
  81. 17:34:16.330667 IP 183.160.59.33.55267 > fs.13qz.com.http: Flags [.], ack 5904001, win 16560, length 0
  82. 17:34:16.330687 IP fs.13qz.com.http > 183.160.59.33.55267: Flags [.], seq 5909761:5912641, ack 0, win 43, length 2880
  83. 17:34:16.331174 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 192664:193052, ack 701, win 58, length 388
  84. 17:34:16.331400 ARP, Request who-has 60.29.229.38 tell 60.29.229.35, length 46
  85. 17:34:16.331554 IP fs.13qz.com.56118 > 202.96.128.86.domain: 9428+ PTR? 38.229.29.60.in-addr.arpa. (43)
  86. 17:34:16.331863 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 192180, win 46496, length 0
  87. 17:34:16.332201 IP fs.13qz.com.20086 > 113.68.18.199.11701: Flags [P.], seq 193052:193216, ack 701, win 58, length 164
  88. 17:34:16.333591 IP 183.160.59.33.55272 > fs.13qz.com.http: Flags [.], ack 4661281, win 16560, options [nop,nop,sack 1 {4664161:4667041}], length 0
  89. 17:34:16.333621 IP fs.13qz.com.http > 183.160.59.33.55272: Flags [.], seq 4661281:4662721, ack 0, win 43, length 1440
  90. 17:34:16.336115 IP 113.68.18.199.11701 > fs.13qz.com.20086: Flags [.], ack 193052, win 46387, length 0
  91. 17:34:16.336207 IP 183.160.59.33.55270 > fs.13qz.com.http: Flags [.], ack 5284801, win 16560, length 0
  92. 17:34:16.336226 IP fs.13qz.com.http > 183.160.59.33.55270: Flags [.], seq 5289121:5292001, ack 0, win 43, length 2880
复制代码
我一台的其中一个网卡流量很大,用tcpdump -i eth0 捕获了一下信息回来,打印出这么写内容。。。
fs.13qz.com 这个域名我已经解绑了域名绑定的,为咋还会捕获到这么些内容的?
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP