易陆发现互联网技术论坛

 找回密码
 开始注册
查看: 3899|回复: 1
收起左侧

tcpdump抓包抓某个地址host,并写入文件时以时间命令

[复制链接]
发表于 2019-3-28 17:00:48 | 显示全部楼层 |阅读模式
购买主题 本主题需向作者支付 5 金钱 才能浏览
 楼主| 发表于 2022-12-14 09:48:06 | 显示全部楼层
[root@xa-radb-01 ~]# tcpdump  -i br0 host 192.168.0.232 -vv -nn% U  M/ z6 h) }# E
dropped privs to tcpdump$ d+ K; x/ Z8 S7 w1 }6 D! O4 f
tcpdump: listening on br0, link-type EN10MB (Ethernet), capture size 262144 bytes
6 S3 D* g7 v. ~' d3 }: p09:43:25.469439 IP (tos 0x0, ttl 64, id 60063, offset 0, flags [DF], proto ICMP (1), length 84)' g$ a/ [* F: K# y: L
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11076, seq 1, length 64
+ U* V' K' Y  S: {7 J09:43:28.617495 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.0.41 tell 192.168.0.232, length 28" M2 p0 J# C' x+ l$ R% q" j% v# m
09:43:28.617529 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.0.41 is-at e8:61:1f:3e:ea:0f, length 28  l9 |& W! c) [, V5 Z
09:43:28.617630 IP (tos 0x0, ttl 64, id 1210, offset 0, flags [DF], proto ICMP (1), length 84)5 y/ [! ^, p# R3 h* b
    192.168.0.232 > 192.168.0.41: ICMP echo request, id 11077, seq 1, length 64+ N5 g9 `: v0 d. p; H2 q7 E
09:43:28.617657 IP (tos 0x0, ttl 64, id 35091, offset 0, flags [none], proto ICMP (1), length 84)9 U( G9 I5 N! |/ j, k
    192.168.0.41 > 192.168.0.232: ICMP echo reply, id 11077, seq 1, length 64; ]; r& Y) I2 m2 ]
09:43:29.619053 IP (tos 0x0, ttl 64, id 1479, offset 0, flags [DF], proto ICMP (1), length 84)4 O# d( u8 V3 V/ N6 a
    192.168.0.232 > 192.168.0.41: ICMP echo request, id 11077, seq 2, length 64
) o: M  d3 |$ s! t3 [9 ]1 P. K09:43:29.619067 IP (tos 0x0, ttl 64, id 35130, offset 0, flags [none], proto ICMP (1), length 84)
+ O$ K3 o! B4 e# Q    192.168.0.41 > 192.168.0.232: ICMP echo reply, id 11077, seq 2, length 64
/ i  }3 J/ V' `  p( m- p09:43:30.620547 IP (tos 0x0, ttl 64, id 1534, offset 0, flags [DF], proto ICMP (1), length 84)
7 y2 ~% F0 k0 J* c! b    192.168.0.232 > 192.168.0.41: ICMP echo request, id 11077, seq 3, length 649 ]5 n$ @( `% D, K
09:43:30.620566 IP (tos 0x0, ttl 64, id 35321, offset 0, flags [none], proto ICMP (1), length 84)
) u" o% y( {! A% r0 T    192.168.0.41 > 192.168.0.232: ICMP echo reply, id 11077, seq 3, length 64
) f" K9 ?) q) [7 f09:43:31.621869 IP (tos 0x0, ttl 64, id 1857, offset 0, flags [DF], proto ICMP (1), length 84)2 w; `  z7 a/ {! W* i: S+ p% {
    192.168.0.232 > 192.168.0.41: ICMP echo request, id 11077, seq 4, length 64
2 x" L% ^+ K5 P# W& S09:43:31.621890 IP (tos 0x0, ttl 64, id 35473, offset 0, flags [none], proto ICMP (1), length 84)
$ B+ h& n* ^) f  p) o$ b    192.168.0.41 > 192.168.0.232: ICMP echo reply, id 11077, seq 4, length 646 m) R- i8 M; h: f/ @: R+ f
09:43:33.536520 IP (tos 0x0, ttl 64, id 62363, offset 0, flags [DF], proto ICMP (1), length 84)
6 s0 \* c  a. O3 R. k' |' E    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 1, length 647 k7 @6 h& U  g8 \
09:43:33.819142 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.0.232 tell 192.168.0.41, length 28
% Y  Q4 s' z% R- R4 y  Z# D8 _09:43:33.819270 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.0.232 is-at 52:54:00:3a:43:52, length 28
7 k' H+ F5 t; j% o09:43:34.536049 IP (tos 0x0, ttl 64, id 62471, offset 0, flags [DF], proto ICMP (1), length 84)
' X# M) |! c, y0 s: J2 j    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 2, length 64* |' J. `. Y! ~
09:43:35.536039 IP (tos 0x0, ttl 64, id 63261, offset 0, flags [DF], proto ICMP (1), length 84)5 W; r' U6 h7 F' X3 g' k
    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 3, length 64: v. d; h9 r4 ?, O6 _
09:43:36.536014 IP (tos 0x0, ttl 64, id 63451, offset 0, flags [DF], proto ICMP (1), length 84)
8 j+ c+ t% E" i5 L; N3 h% D    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 4, length 64+ u. s" q; \! ~4 P
09:43:37.536025 IP (tos 0x0, ttl 64, id 64171, offset 0, flags [DF], proto ICMP (1), length 84)
) t3 f" b1 P& r: y    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 5, length 64
$ H' z$ F, x, u# @3 t09:43:38.535994 IP (tos 0x0, ttl 64, id 64546, offset 0, flags [DF], proto ICMP (1), length 84)
+ F# ]3 }& |1 C& s( s6 B3 B' G    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 6, length 64
5 r4 v5 f( {) S( r) C4 ?; U' W$ m09:43:39.535993 IP (tos 0x0, ttl 64, id 65261, offset 0, flags [DF], proto ICMP (1), length 84)
- A6 K8 F" a1 Q" R$ s/ w    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 7, length 641 ?1 l+ B# ?: C  ~
09:43:40.535978 IP (tos 0x0, ttl 64, id 590, offset 0, flags [DF], proto ICMP (1), length 84)
2 X% H5 ~; r4 s( E* z6 c' \    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11078, seq 8, length 64
, t% m$ g; t; {, u1 O7 b/ X3 l; x09:43:47.885238 IP (tos 0x0, ttl 64, id 6499, offset 0, flags [DF], proto ICMP (1), length 84)
( j/ ]& `/ K" r5 V" x' D% D9 D    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11080, seq 1, length 64+ Q( ^% j8 b3 m* ?' s& h* s
09:43:48.884913 IP (tos 0x0, ttl 64, id 6872, offset 0, flags [DF], proto ICMP (1), length 84)
, t4 ^1 F! M4 Z    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11080, seq 2, length 64
8 E/ _6 c: f# T( m+ g( ?! O' {09:43:49.884924 IP (tos 0x0, ttl 64, id 6895, offset 0, flags [DF], proto ICMP (1), length 84)
  B0 f+ v7 |2 X- ^$ M1 @    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11080, seq 3, length 64  ^0 ]: v+ b8 L8 l9 T( W
09:43:50.884893 IP (tos 0x0, ttl 64, id 7013, offset 0, flags [DF], proto ICMP (1), length 84)
5 ~1 f* [7 M/ I/ I    192.168.0.232 > 192.168.0.1: ICMP echo request, id 11080, seq 4, length 64: i/ v0 a$ B, n* ?+ k9 L+ m; l% K/ N
09:44:52.844611 IP (tos 0x0, ttl 62, id 43536, offset 0, flags [DF], proto TCP (6), length 60)) c$ O2 }: T6 p3 N% d0 E# _: e
您需要登录后才可以回帖 登录 | 开始注册

本版积分规则

关闭

站长推荐上一条 /4 下一条

北京云银创陇科技有限公司以云计算运维,代码开发

QQ|返回首页|Archiver|小黑屋|易陆发现技术论坛 ( 蜀ICP备2026014127号-1 )点击这里给我发消息

GMT+8, 2026-4-8 21:41 , Processed in 0.045019 second(s), 25 queries .

Powered by Discuz! X3.4 Licensed

© 2012-2025 Discuz! Team.

快速回复 返回顶部 返回列表