易陆发现互联网技术论坛

 找回密码
 开始注册
查看: 3898|回复: 1
收起左侧

tcpdump抓包抓某个地址host,并写入文件时以时间命令

[复制链接]
发表于 2019-3-28 17:00:48 | 显示全部楼层 |阅读模式
购买主题 本主题需向作者支付 5 金钱 才能浏览
 楼主| 发表于 2022-12-14 09:48:06 | 显示全部楼层
[root@xa-radb-01 ~]# tcpdump  -i br0 host 192.168.0.232 -vv -nn
0 H# s, r' d3 P, t- I2 Vdropped privs to tcpdump
5 c. S) n4 {2 q5 [- Itcpdump: listening on br0, link-type EN10MB (Ethernet), capture size 262144 bytes
7 [0 o( m4 v0 {: Y/ T: \09:43:25.469439 IP (tos 0x0, ttl 64, id 60063, offset 0, flags [DF], proto ICMP (1), length 84)
" l, ?9 p+ l# P. G7 i3 c+ e* Y7 A    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11076, seq 1, length 645 j. t  \$ d- e
09:43:28.617495 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.0.41 tell 192.168.0.232, length 28
$ a5 A! x, E' [* }/ ?09:43:28.617529 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.0.41 is-at e8:61:1f:3e:ea:0f, length 281 o' }5 k# m) h" O, A' H7 _8 W
09:43:28.617630 IP (tos 0x0, ttl 64, id 1210, offset 0, flags [DF], proto ICMP (1), length 84)+ x; t) @5 a/ K1 {+ o* b. n. B& ]
    192.168.0.232 > 192.168.0.41: ICMP echo request, id 11077, seq 1, length 64" @/ v& K$ X: u" m8 i  q6 \
09:43:28.617657 IP (tos 0x0, ttl 64, id 35091, offset 0, flags [none], proto ICMP (1), length 84)- u2 l% E2 x7 h$ Z1 U
    192.168.0.41 > 192.168.0.232: ICMP echo reply, id 11077, seq 1, length 64- n0 B5 p( r9 k, Y4 y9 F
09:43:29.619053 IP (tos 0x0, ttl 64, id 1479, offset 0, flags [DF], proto ICMP (1), length 84)7 K6 h) w# _" G. N% I. F7 m- s* ?
    192.168.0.232 > 192.168.0.41: ICMP echo request, id 11077, seq 2, length 645 d5 f. ~) Y% ]$ ~
09:43:29.619067 IP (tos 0x0, ttl 64, id 35130, offset 0, flags [none], proto ICMP (1), length 84)
* m; |2 r7 ]2 {    192.168.0.41 > 192.168.0.232: ICMP echo reply, id 11077, seq 2, length 64
$ d. g9 {3 T, \7 ^5 u; `; _09:43:30.620547 IP (tos 0x0, ttl 64, id 1534, offset 0, flags [DF], proto ICMP (1), length 84)5 `# e$ g  j( t+ v3 ~- q7 `
    192.168.0.232 > 192.168.0.41: ICMP echo request, id 11077, seq 3, length 64
4 Y- a6 [3 Z2 T5 h& j0 b09:43:30.620566 IP (tos 0x0, ttl 64, id 35321, offset 0, flags [none], proto ICMP (1), length 84)& C, e) e0 A; `
    192.168.0.41 > 192.168.0.232: ICMP echo reply, id 11077, seq 3, length 64/ {& N* y9 e  K7 j' K
09:43:31.621869 IP (tos 0x0, ttl 64, id 1857, offset 0, flags [DF], proto ICMP (1), length 84)
  R2 M) d0 R* v8 F) q6 e8 Z9 s    192.168.0.232 > 192.168.0.41: ICMP echo request, id 11077, seq 4, length 64! [( F4 }/ R3 D' z- G  p
09:43:31.621890 IP (tos 0x0, ttl 64, id 35473, offset 0, flags [none], proto ICMP (1), length 84)
7 S9 J4 d' g& C7 Z; j& [: _    192.168.0.41 > 192.168.0.232: ICMP echo reply, id 11077, seq 4, length 64
! L3 T- W; j6 }09:43:33.536520 IP (tos 0x0, ttl 64, id 62363, offset 0, flags [DF], proto ICMP (1), length 84)9 e! E( j, N6 F8 e7 A+ {
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 1, length 642 j, S; M: u; C; @9 M; X1 V
09:43:33.819142 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.0.232 tell 192.168.0.41, length 28" F0 j4 z$ y! W
09:43:33.819270 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.0.232 is-at 52:54:00:3a:43:52, length 28
* {# B" B" o% |# d7 Q8 ]1 e0 H% W8 ?09:43:34.536049 IP (tos 0x0, ttl 64, id 62471, offset 0, flags [DF], proto ICMP (1), length 84)) P, B3 h) b# q6 d2 M- V
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 2, length 64
# y% A' |, m2 T) @09:43:35.536039 IP (tos 0x0, ttl 64, id 63261, offset 0, flags [DF], proto ICMP (1), length 84)
/ v! d$ j; ]2 g( Y8 V. _" g6 b$ k    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 3, length 64* ?4 F% c7 ]7 `9 e
09:43:36.536014 IP (tos 0x0, ttl 64, id 63451, offset 0, flags [DF], proto ICMP (1), length 84)& c0 [  P6 ]( J, [  P5 [6 `
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 4, length 649 `, ]) R0 i! n0 ]# o3 q1 J. _
09:43:37.536025 IP (tos 0x0, ttl 64, id 64171, offset 0, flags [DF], proto ICMP (1), length 84)$ G/ v9 `) O. X- ?
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 5, length 64
& p# L& a- w& V( ?. W; Z09:43:38.535994 IP (tos 0x0, ttl 64, id 64546, offset 0, flags [DF], proto ICMP (1), length 84)
  O2 e( e; g* z' r    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 6, length 640 r' U. W  ?) W
09:43:39.535993 IP (tos 0x0, ttl 64, id 65261, offset 0, flags [DF], proto ICMP (1), length 84)' ~4 A9 H3 K1 @0 k6 M2 R; N
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 7, length 640 @# _: O, Q1 x$ a( `0 [2 ^! W2 V
09:43:40.535978 IP (tos 0x0, ttl 64, id 590, offset 0, flags [DF], proto ICMP (1), length 84)  u$ U) Q8 f6 G3 r# |
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 8, length 64" j! g. L1 c; {$ l# p$ w
09:43:47.885238 IP (tos 0x0, ttl 64, id 6499, offset 0, flags [DF], proto ICMP (1), length 84)2 ~, \7 v/ K0 n- n/ }
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11080, seq 1, length 64# {8 ]$ r6 R% U; I( @1 p9 V
09:43:48.884913 IP (tos 0x0, ttl 64, id 6872, offset 0, flags [DF], proto ICMP (1), length 84)) p! q3 @) l4 @/ x" X1 u9 a
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11080, seq 2, length 64
! y- Y1 k6 S1 }# P# }8 R: s09:43:49.884924 IP (tos 0x0, ttl 64, id 6895, offset 0, flags [DF], proto ICMP (1), length 84)! g0 P! t9 F- E0 v* y+ C
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11080, seq 3, length 649 m7 ~$ _3 `! Z. b; _0 J; h+ V
09:43:50.884893 IP (tos 0x0, ttl 64, id 7013, offset 0, flags [DF], proto ICMP (1), length 84)
3 Z# F- J! j' A2 v: o" \" ^! I    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11080, seq 4, length 64
1 l! e2 F' ^2 S& G8 T" m09:44:52.844611 IP (tos 0x0, ttl 62, id 43536, offset 0, flags [DF], proto TCP (6), length 60)" J# n' t8 v6 u! s" W) V# b3 R/ J
您需要登录后才可以回帖 登录 | 开始注册

本版积分规则

关闭

站长推荐上一条 /4 下一条

北京云银创陇科技有限公司以云计算运维,代码开发

QQ|返回首页|Archiver|小黑屋|易陆发现技术论坛 ( 蜀ICP备2026014127号-1 )点击这里给我发消息

GMT+8, 2026-4-8 21:36 , Processed in 0.054030 second(s), 25 queries .

Powered by Discuz! X3.4 Licensed

© 2012-2025 Discuz! Team.

快速回复 返回顶部 返回列表