Project

General

Profile

Bug #11949 ยป pfsense.txt

Packet capture - Scott Johnson, 05/23/2021 12:27 AM

 
1
[21.02.2-RELEASE][admin@pfsense.domain.tld]/root: tcpdump -i gif0
2
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
3
listening on gif0, link-type NULL (BSD loopback), capture size 262144 bytes
4
00:16:10.133159 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 928, length 9
5
00:16:10.236259 IP6 host.domain.tld.50007 > 2620:149:149:100c::9.https: Flags [S], seq 3137371551, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931382533 ecr 0,sackOK,eol], length 0
6
00:16:10.266401 IP6 host.domain.tld.50011 > 2620:149:149:1010::a.https: Flags [S], seq 1689603909, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931382563 ecr 0,sackOK,eol], length 0
7
00:16:10.465719 IP6 host.domain.tld.60809 > 2a00:1098:2c::1.domain: 58023+ AAAA? init.push.apple.com. (37)
8
00:16:10.497520 IP6 host.domain.tld.50008 > 2620:149:149:101a::f.https: Flags [S], seq 4126720704, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931382794 ecr 0,sackOK,eol], length 0
9
00:16:10.665406 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 929, length 9
10
00:16:10.757655 IP6 host.domain.tld.50009 > 2620:149:149:1015::7.https: Flags [S], seq 125082790, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931383054 ecr 0,sackOK,eol], length 0
11
00:16:11.014787 IP6 host.domain.tld.50010 > 2620:149:149:100b::12.https: Flags [S], seq 2395406560, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931383311 ecr 0,sackOK,eol], length 0
12
00:16:11.197275 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 930, length 9
13
00:16:11.268917 IP6 host.domain.tld.50011 > 2620:149:149:1010::a.https: Flags [S], seq 1689603909, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931383565 ecr 0,sackOK,eol], length 0
14
00:16:11.463049 IP6 host.domain.tld.50004 > 2620:149:149:1006::8.https: Flags [S], seq 2250226559, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931383759 ecr 0,sackOK,eol], length 0
15
00:16:11.466300 IP6 host.domain.tld.60809 > 2a00:1098:2c::1.domain: 58023+ AAAA? init.push.apple.com. (37)
16
00:16:11.524802 IP6 host.domain.tld.59198 > 2a00:1098:2c::1.domain: 27197+ A? init.push.apple.com. (37)
17
00:16:11.524827 IP6 host.domain.tld.53071 > 2a01:4f9:c010:3f02::1.domain: 23743+ AAAA? ipv4only.arpa. (31)
18
00:16:11.679822 IP6 host.domain.tld.57858 > 2a00:1098:2c::1.domain: 7498+ AAAA? gsp64-ssl.ls-apple.com.akadns.net. (51)
19
00:16:11.725172 IP6 host.domain.tld.50005 > 2620:149:149:1009::c.https: Flags [S], seq 739488880, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931384021 ecr 0,sackOK,eol], length 0
20
00:16:11.728922 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 931, length 9
21
00:16:11.983498 IP6 host.domain.tld.50006 > 2620:149:149:1014::d.https: Flags [S], seq 3764353486, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931384279 ecr 0,sackOK,eol], length 0
22
00:16:12.239664 IP6 host.domain.tld.50007 > 2620:149:149:100c::9.https: Flags [S], seq 3137371551, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931384535 ecr 0,sackOK,eol], length 0
23
00:16:12.246638 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 932, length 9
24
00:16:12.500777 IP6 host.domain.tld.50008 > 2620:149:149:101a::f.https: Flags [S], seq 4126720704, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931384795 ecr 0,sackOK,eol], length 0
25
00:16:12.530783 IP6 host.domain.tld.59198 > 2a00:1098:2c::1.domain: 27197+ A? init.push.apple.com. (37)
26
00:16:12.530865 IP6 host.domain.tld.53071 > 2a01:4f9:c010:3f02::1.domain: 23743+ AAAA? ipv4only.arpa. (31)
27
00:16:12.689173 IP6 host.domain.tld.57858 > 2a00:1098:2c::1.domain: 7498+ AAAA? gsp64-ssl.ls-apple.com.akadns.net. (51)
28
00:16:12.749348 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 933, length 9
29
00:16:12.761925 IP6 host.domain.tld.50009 > 2620:149:149:1015::7.https: Flags [S], seq 125082790, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931385056 ecr 0,sackOK,eol], length 0
30
00:16:13.019078 IP6 host.domain.tld.50010 > 2620:149:149:100b::12.https: Flags [S], seq 2395406560, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931385313 ecr 0,sackOK,eol], length 0
31
00:16:13.266958 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 934, length 9
32
00:16:13.273223 IP6 host.domain.tld.50011 > 2620:149:149:1010::a.https: Flags [S], seq 1689603909, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931385567 ecr 0,sackOK,eol], length 0
33
00:16:13.605485 IP6 host.domain.tld.50012 > 2620:149:208:430e::4.https: Flags [S], seq 137667397, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931385899 ecr 0,sackOK,eol], length 0
34
00:16:13.799172 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 935, length 9
35
00:16:13.866918 IP6 host.domain.tld.50013 > 2620:149:208:430c::4.https: Flags [S], seq 3865317109, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931386159 ecr 0,sackOK,eol], length 0
36
00:16:14.091407 IP6 2001:470:xxxx:y::z.57483 > 2607:f8b0:4002:c00::5f.https: Flags [S], seq 2260061277, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 2729470485 ecr 0,sackOK,eol], length 0
37
00:16:14.128305 IP6 host.domain.tld.50014 > 2620:149:208:430b::4.https: Flags [S], seq 3352051742, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931386420 ecr 0,sackOK,eol], length 0
38
00:16:14.331426 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 936, length 9
39
00:16:14.389743 IP6 host.domain.tld.50015 > 2620:149:208:430d::4.https: Flags [S], seq 1886556071, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931386681 ecr 0,sackOK,eol], length 0
40
00:16:14.532180 IP6 host.domain.tld.53071 > 2a00:1098:2c::1.domain: 23743+ AAAA? ipv4only.arpa. (31)
41
00:16:14.610094 IP6 host.domain.tld.50012 > 2620:149:208:430e::4.https: Flags [S], seq 137667397, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931386899 ecr 0,sackOK,eol], length 0
42
00:16:14.651117 IP6 host.domain.tld.50017 > 2620:149:208:430a::4.https: Flags [S], seq 2074230723, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931386939 ecr 0,sackOK,eol], length 0
43
00:16:14.832713 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 937, length 9
44
00:16:14.872229 IP6 host.domain.tld.50013 > 2620:149:208:430c::4.https: Flags [S], seq 3865317109, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931387160 ecr 0,sackOK,eol], length 0
45
00:16:15.100332 IP6 2001:470:xxxx:y::z.57483 > 2607:f8b0:4002:c00::5f.https: Flags [S], seq 2260061277, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 2729471485 ecr 0,sackOK,eol], length 0
46
00:16:15.132454 IP6 host.domain.tld.50014 > 2620:149:208:430b::4.https: Flags [S], seq 3352051742, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931387420 ecr 0,sackOK,eol], length 0
47
00:16:15.364965 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 938, length 9
48
00:16:15.395600 IP6 host.domain.tld.50015 > 2620:149:208:430d::4.https: Flags [S], seq 1886556071, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931387683 ecr 0,sackOK,eol], length 0
49
00:16:15.472673 IP6 host.domain.tld.50004 > 2620:149:149:1006::8.https: Flags [S], seq 2250226559, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931387760 ecr 0,sackOK,eol], length 0
50
00:16:15.534456 IP6 host.domain.tld.53071 > 2a00:1098:2c::1.domain: 23743+ AAAA? ipv4only.arpa. (31)
51
00:16:15.613780 IP6 host.domain.tld.50012 > 2620:149:208:430e::4.https: Flags [S], seq 137667397, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931387901 ecr 0,sackOK,eol], length 0
52
00:16:15.652648 IP6 host.domain.tld.50017 > 2620:149:208:430a::4.https: Flags [S], seq 2074230723, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931387939 ecr 0,sackOK,eol], length 0
53
00:16:15.736768 IP6 host.domain.tld.50005 > 2620:149:149:1009::c.https: Flags [S], seq 739488880, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931388023 ecr 0,sackOK,eol], length 0
54
00:16:15.875890 IP6 host.domain.tld.50013 > 2620:149:208:430c::4.https: Flags [S], seq 3865317109, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931388162 ecr 0,sackOK,eol], length 0
55
00:16:15.897220 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 939, length 9
56
00:16:15.995018 IP6 host.domain.tld.50006 > 2620:149:149:1014::d.https: Flags [S], seq 3764353486, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931388281 ecr 0,sackOK,eol], length 0
57
00:16:16.111516 IP6 2001:470:xxxx:y::z.57483 > 2607:f8b0:4002:c00::5f.https: Flags [S], seq 2260061277, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 2729472485 ecr 0,sackOK,eol], length 0
58
00:16:16.136110 IP6 host.domain.tld.50014 > 2620:149:208:430b::4.https: Flags [S], seq 3352051742, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931388422 ecr 0,sackOK,eol], length 0
59
00:16:16.250794 IP6 host.domain.tld.50007 > 2620:149:149:100c::9.https: Flags [S], seq 3137371551, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931388536 ecr 0,sackOK,eol], length 0
60
00:16:16.399903 IP6 host.domain.tld.50015 > 2620:149:208:430d::4.https: Flags [S], seq 1886556071, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931388684 ecr 0,sackOK,eol], length 0
61
00:16:16.400047 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 940, length 9
62
00:16:16.513133 IP6 host.domain.tld.50008 > 2620:149:149:101a::f.https: Flags [S], seq 4126720704, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931388797 ecr 0,sackOK,eol], length 0
63
00:16:16.619158 IP6 host.domain.tld.50012 > 2620:149:208:430e::4.https: Flags [S], seq 137667397, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931388903 ecr 0,sackOK,eol], length 0
64
00:16:16.657349 IP6 host.domain.tld.50017 > 2620:149:208:430a::4.https: Flags [S], seq 2074230723, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931388941 ecr 0,sackOK,eol], length 0
65
00:16:16.774509 IP6 host.domain.tld.50009 > 2620:149:149:1015::7.https: Flags [S], seq 125082790, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931389058 ecr 0,sackOK,eol], length 0
66
00:16:16.880615 IP6 host.domain.tld.50013 > 2620:149:208:430c::4.https: Flags [S], seq 3865317109, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931389164 ecr 0,sackOK,eol], length 0
67
00:16:16.901151 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 941, length 9
68
00:16:17.031766 IP6 host.domain.tld.50010 > 2620:149:149:100b::12.https: Flags [S], seq 2395406560, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931389315 ecr 0,sackOK,eol], length 0
69
00:16:17.122038 IP6 2001:470:xxxx:y::z.57483 > 2607:f8b0:4002:c00::5f.https: Flags [S], seq 2260061277, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 2729473485 ecr 0,sackOK,eol], length 0
70
00:16:17.140363 IP6 host.domain.tld.50014 > 2620:149:208:430b::4.https: Flags [S], seq 3352051742, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931389423 ecr 0,sackOK,eol], length 0
71
00:16:17.284593 IP6 host.domain.tld.50011 > 2620:149:149:1010::a.https: Flags [S], seq 1689603909, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931389567 ecr 0,sackOK,eol], length 0
72
00:16:17.403726 IP6 host.domain.tld.50015 > 2620:149:208:430d::4.https: Flags [S], seq 1886556071, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931389686 ecr 0,sackOK,eol], length 0
73
00:16:17.419878 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 942, length 9
74
00:16:17.622862 IP6 host.domain.tld.50012 > 2620:149:208:430e::4.https: Flags [S], seq 137667397, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931389905 ecr 0,sackOK,eol], length 0
75
00:16:17.661004 IP6 host.domain.tld.50017 > 2620:149:208:430a::4.https: Flags [S], seq 2074230723, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931389943 ecr 0,sackOK,eol], length 0
76
00:16:17.884137 IP6 host.domain.tld.50013 > 2620:149:208:430c::4.https: Flags [S], seq 3865317109, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931390166 ecr 0,sackOK,eol], length 0
77
00:16:17.935898 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 943, length 9
78
00:16:18.133811 IP6 2001:470:xxxx:y::z.57483 > 2607:f8b0:4002:c00::5f.https: Flags [S], seq 2260061277, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 2729474486 ecr 0,sackOK,eol], length 0
79
00:16:18.143266 IP6 host.domain.tld.50014 > 2620:149:208:430b::4.https: Flags [S], seq 3352051742, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931390425 ecr 0,sackOK,eol], length 0
80
00:16:18.192731 IP6 2001:470:xxxx:a::b.56133 > 2620:149:a42:703::f.https: Flags [SEW], seq 3605941357, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1677888982 ecr 0,sackOK,eol], length 0
81
00:16:18.406390 IP6 host.domain.tld.50015 > 2620:149:208:430d::4.https: Flags [S], seq 1886556071, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931390687 ecr 0,sackOK,eol], length 0
82
00:16:18.440691 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 944, length 9
83
00:16:18.626643 IP6 host.domain.tld.50012 > 2620:149:208:430e::4.https: Flags [S], seq 137667397, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931390907 ecr 0,sackOK,eol], length 0
84
00:16:18.664784 IP6 host.domain.tld.50017 > 2620:149:208:430a::4.https: Flags [S], seq 2074230723, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931390945 ecr 0,sackOK,eol], length 0
85
00:16:18.887935 IP6 host.domain.tld.50013 > 2620:149:208:430c::4.https: Flags [S], seq 3865317109, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931391168 ecr 0,sackOK,eol], length 0
86
00:16:18.968705 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 945, length 9
87
00:16:19.147089 IP6 host.domain.tld.50014 > 2620:149:208:430b::4.https: Flags [S], seq 3352051742, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931391427 ecr 0,sackOK,eol], length 0
88
00:16:19.409255 IP6 host.domain.tld.50015 > 2620:149:208:430d::4.https: Flags [S], seq 1886556071, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931391689 ecr 0,sackOK,eol], length 0
89
00:16:19.475661 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 946, length 9
90
00:16:19.667424 IP6 host.domain.tld.50017 > 2620:149:208:430a::4.https: Flags [S], seq 2074230723, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931391947 ecr 0,sackOK,eol], length 0
91
00:16:20.007900 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 947, length 9
92
00:16:20.539881 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 948, length 9
93
00:16:20.629542 IP6 host.domain.tld.50012 > 2620:149:208:430e::4.https: Flags [S], seq 137667397, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931392909 ecr 0,sackOK,eol], length 0
94
00:16:20.635924 IP6 2001:470:xxxx:a::b.56134 > 2620:149:a42:702::e.https: Flags [SEW], seq 3854577412, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1677906523 ecr 0,sackOK,eol], length 0
95
00:16:20.890748 IP6 host.domain.tld.50013 > 2620:149:208:430c::4.https: Flags [S], seq 3865317109, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931393170 ecr 0,sackOK,eol], length 0
96
00:16:21.072142 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 949, length 9
97
00:16:21.149848 IP6 host.domain.tld.50014 > 2620:149:208:430b::4.https: Flags [S], seq 3352051742, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931393429 ecr 0,sackOK,eol], length 0
98
00:16:21.411968 IP6 host.domain.tld.50015 > 2620:149:208:430d::4.https: Flags [S], seq 1886556071, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931393691 ecr 0,sackOK,eol], length 0
99
00:16:21.576886 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 950, length 9
100
00:16:21.672901 IP6 host.domain.tld.50017 > 2620:149:208:430a::4.https: Flags [S], seq 2074230723, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931393949 ecr 0,sackOK,eol], length 0
101
00:16:22.098176 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 951, length 9
102
00:16:22.611112 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 952, length 9
103
00:16:23.143360 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 953, length 9
104
00:16:23.487131 IP6 host.domain.tld.50004 > 2620:149:149:1006::8.https: Flags [S], seq 2250226559, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931395761 ecr 0,sackOK,eol], length 0
105
00:16:23.675618 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 954, length 9
106
00:16:23.751252 IP6 host.domain.tld.50005 > 2620:149:149:1009::c.https: Flags [S], seq 739488880, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931396025 ecr 0,sackOK,eol], length 0
107
00:16:23.857520 IP6 2001:470:xxxx:c::d.54924 > g2600-1406-1400-0a8f-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [SEW], seq 1895040035, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 3396192033 ecr 0,sackOK,eol], length 0
108
00:16:23.858281 IP6 2001:470:xxxx:c::d.54925 > g2600-1406-1400-0a8f-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [SEW], seq 386122075, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 1201953442 ecr 0,sackOK,eol], length 0
109
00:16:24.009396 IP6 host.domain.tld.50006 > 2620:149:149:1014::d.https: Flags [S], seq 3764353486, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931396283 ecr 0,sackOK,eol], length 0
110
00:16:24.114547 IP6 2001:470:xxxx:c::d.54926 > g2600-1406-1400-0a99-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [SEW], seq 26280463, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 974165941 ecr 0,sackOK,eol], length 0
111
00:16:24.115963 IP6 2001:470:xxxx:c::d.54927 > g2600-1406-1400-0a99-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [SEW], seq 115375949, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 4041740361 ecr 0,sackOK,eol], length 0
112
00:16:24.207887 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 955, length 9
113
00:16:24.264520 IP6 host.domain.tld.50007 > 2620:149:149:100c::9.https: Flags [S], seq 3137371551, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931396538 ecr 0,sackOK,eol], length 0
114
00:16:24.372681 IP6 2001:470:xxxx:c::d.54928 > g2600-1406-1400-0a93-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [SEW], seq 2336430303, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 1733192522 ecr 0,sackOK,eol], length 0
115
00:16:24.375286 IP6 2001:470:xxxx:c::d.54929 > g2600-1406-1400-0a93-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [SEW], seq 599372749, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 2026428958 ecr 0,sackOK,eol], length 0
116
00:16:24.525657 IP6 host.domain.tld.50008 > 2620:149:149:101a::f.https: Flags [S], seq 4126720704, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931396799 ecr 0,sackOK,eol], length 0
117
q00:16:24.630903 IP6 2001:470:xxxx:c::d.54930 > g2600-1406-1400-0aa4-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [SEW], seq 1980895453, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 3811567871 ecr 0,sackOK,eol], length 0
118
00:16:24.633576 IP6 2001:470:xxxx:c::d.54931 > g2600-1406-1400-0aa4-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [SEW], seq 2008532530, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 3346894208 ecr 0,sackOK,eol], length 0
119
00:16:24.637764 IP6 host.domain.tld.50012 > 2620:149:208:430e::4.https: Flags [S], seq 137667397, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931396911 ecr 0,sackOK,eol], length 0
120
00:16:24.714418 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 956, length 9
121
00:16:24.786932 IP6 host.domain.tld.50009 > 2620:149:149:1015::7.https: Flags [S], seq 125082790, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931397060 ecr 0,sackOK,eol], length 0
122
00:16:24.862988 IP6 2001:470:xxxx:c::d.54925 > g2600-1406-1400-0a8f-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 386122075, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 1201954444 ecr 0,sackOK,eol], length 0
123
00:16:24.863000 IP6 2001:470:xxxx:c::d.54924 > g2600-1406-1400-0a8f-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 1895040035, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 3396193035 ecr 0,sackOK,eol], length 0
124
00:16:24.885202 IP6 2001:470:xxxx:c::d.54932 > g2600-1406-1400-0a86-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [SEW], seq 916068997, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 2332815671 ecr 0,sackOK,eol], length 0
125
00:16:24.888228 IP6 2001:470:xxxx:c::d.54933 > g2600-1406-1400-0a86-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [SEW], seq 3918433039, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 924481610 ecr 0,sackOK,eol], length 0
126
00:16:24.897112 IP6 host.domain.tld.50013 > 2620:149:208:430c::4.https: Flags [S], seq 3865317109, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931397170 ecr 0,sackOK,eol], length 0
127
00:16:25.044202 IP6 host.domain.tld.50010 > 2620:149:149:100b::12.https: Flags [S], seq 2395406560, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931397317 ecr 0,sackOK,eol], length 0
128
00:16:25.122566 IP6 2001:470:xxxx:c::d.54927 > g2600-1406-1400-0a99-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 115375949, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 4041741364 ecr 0,sackOK,eol], length 0
129
00:16:25.122594 IP6 2001:470:xxxx:c::d.54926 > g2600-1406-1400-0a99-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 26280463, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 974166945 ecr 0,sackOK,eol], length 0
130
00:16:25.158363 IP6 host.domain.tld.50014 > 2620:149:208:430b::4.https: Flags [S], seq 3352051742, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931397431 ecr 0,sackOK,eol], length 0
131
00:16:25.220177 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 957, length 9
132
00:16:25.296492 IP6 host.domain.tld.50011 > 2620:149:149:1010::a.https: Flags [S], seq 1689603909, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931397569 ecr 0,sackOK,eol], length 0
133
00:16:25.380971 IP6 2001:470:xxxx:c::d.54929 > g2600-1406-1400-0a93-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 599372749, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 2026429961 ecr 0,sackOK,eol], length 0
134
00:16:25.380983 IP6 2001:470:xxxx:c::d.54928 > g2600-1406-1400-0a93-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 2336430303, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 1733193527 ecr 0,sackOK,eol], length 0
135
00:16:25.420634 IP6 host.domain.tld.50015 > 2620:149:208:430d::4.https: Flags [S], seq 1886556071, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931397693 ecr 0,sackOK,eol], length 0
136
00:16:25.638374 IP6 2001:470:xxxx:c::d.54931 > g2600-1406-1400-0aa4-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 2008532530, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 3346895211 ecr 0,sackOK,eol], length 0
137
00:16:25.638386 IP6 2001:470:xxxx:c::d.54930 > g2600-1406-1400-0aa4-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 1980895453, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 3811568876 ecr 0,sackOK,eol], length 0
138
00:16:25.727631 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 958, length 9
139
00:16:25.739624 IP6 host.domain.tld.50018 > 2620:149:208:430e::4.https: Flags [S], seq 3360307689, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931398010 ecr 0,sackOK,eol], length 0
140
00:16:25.870749 IP6 2001:470:xxxx:c::d.54924 > g2600-1406-1400-0a8f-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 1895040035, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 3396194040 ecr 0,sackOK,eol], length 0
141
00:16:25.870760 IP6 2001:470:xxxx:c::d.54925 > g2600-1406-1400-0a8f-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 386122075, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 1201955449 ecr 0,sackOK,eol], length 0
142
00:16:25.891093 IP6 2001:470:xxxx:c::d.54933 > g2600-1406-1400-0a86-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 3918433039, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 924482612 ecr 0,sackOK,eol], length 0
143
00:16:25.891195 IP6 2001:470:xxxx:c::d.54932 > g2600-1406-1400-0a86-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 916068997, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 2332816675 ecr 0,sackOK,eol], length 0
144
00:16:25.997816 IP6 host.domain.tld.50019 > 2620:149:208:430c::4.https: Flags [S], seq 1686335120, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931398267 ecr 0,sackOK,eol], length 0
145
00:16:26.129699 IP6 2001:470:xxxx:c::d.54927 > g2600-1406-1400-0a99-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 115375949, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 4041742369 ecr 0,sackOK,eol], length 0
146
00:16:26.129710 IP6 2001:470:xxxx:c::d.54926 > g2600-1406-1400-0a99-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 26280463, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 974167950 ecr 0,sackOK,eol], length 0
147
00:16:26.242118 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 959, length 9
148
00:16:26.256808 IP6 host.domain.tld.50020 > 2620:149:208:430b::4.https: Flags [S], seq 3174308123, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931398525 ecr 0,sackOK,eol], length 0
149
00:16:26.388086 IP6 2001:470:xxxx:c::d.54929 > g2600-1406-1400-0a93-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 599372749, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 2026430966 ecr 0,sackOK,eol], length 0
150
00:16:26.388098 IP6 2001:470:xxxx:c::d.54928 > g2600-1406-1400-0a93-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 2336430303, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 1733194532 ecr 0,sackOK,eol], length 0
151
00:16:26.509369 IP6 host.domain.tld.50021 > 2620:149:208:430d::4.https: Flags [S], seq 244301887, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931398777 ecr 0,sackOK,eol], length 0
152
00:16:26.645541 IP6 2001:470:xxxx:c::d.54931 > g2600-1406-1400-0aa4-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 2008532530, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 3346896216 ecr 0,sackOK,eol], length 0
153
00:16:26.645553 IP6 2001:470:xxxx:c::d.54930 > g2600-1406-1400-0aa4-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 1980895453, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 3811569881 ecr 0,sackOK,eol], length 0
154
00:16:26.743069 IP6 host.domain.tld.50018 > 2620:149:208:430e::4.https: Flags [S], seq 3360307689, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931399010 ecr 0,sackOK,eol], length 0
155
00:16:26.751816 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 960, length 9
156
00:16:26.770821 IP6 host.domain.tld.50022 > 2620:149:208:430a::4.https: Flags [S], seq 1822255185, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931399037 ecr 0,sackOK,eol], length 0
157
00:16:26.877782 IP6 2001:470:xxxx:c::d.54924 > g2600-1406-1400-0a8f-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 1895040035, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 3396195045 ecr 0,sackOK,eol], length 0
158
00:16:26.877793 IP6 2001:470:xxxx:c::d.54925 > g2600-1406-1400-0a8f-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 386122075, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 1201956454 ecr 0,sackOK,eol], length 0
159
00:16:26.896718 IP6 2001:470:xxxx:c::d.54932 > g2600-1406-1400-0a86-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 916068997, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 2332817678 ecr 0,sackOK,eol], length 0
160
00:16:26.896730 IP6 2001:470:xxxx:c::d.54933 > g2600-1406-1400-0a86-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 3918433039, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 924483615 ecr 0,sackOK,eol], length 0
161
00:16:27.002169 IP6 host.domain.tld.50019 > 2620:149:208:430c::4.https: Flags [S], seq 1686335120, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931399268 ecr 0,sackOK,eol], length 0
162
00:16:27.136882 IP6 2001:470:xxxx:c::d.54927 > g2600-1406-1400-0a99-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 115375949, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 4041743374 ecr 0,sackOK,eol], length 0
163
00:16:27.136929 IP6 2001:470:xxxx:c::d.54926 > g2600-1406-1400-0a99-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 26280463, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 974168955 ecr 0,sackOK,eol], length 0
164
00:16:27.261333 IP6 host.domain.tld.50020 > 2620:149:208:430b::4.https: Flags [S], seq 3174308123, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931399527 ecr 0,sackOK,eol], length 0
165
00:16:27.261983 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 961, length 9
166
00:16:27.392440 IP6 2001:470:xxxx:c::d.54928 > g2600-1406-1400-0a93-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 2336430303, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 1733195534 ecr 0,sackOK,eol], length 0
167
00:16:27.392449 IP6 2001:470:xxxx:c::d.54929 > g2600-1406-1400-0a93-0000-0000-0000-02a1.deploy.static.akamaitechnologies.com.https: Flags [S], seq 599372749, win 65535, options [mss 1440,nop,wscale 5,nop,nop,TS val 2026431968 ecr 0,sackOK,eol], length 0
168
00:16:27.513407 IP6 host.domain.tld.50021 > 2620:149:208:430d::4.https: Flags [S], seq 244301887, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931399779 ecr 0,sackOK,eol], length 0
169
00:16:27.746530 IP6 host.domain.tld.50018 > 2620:149:208:430e::4.https: Flags [S], seq 3360307689, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931400012 ecr 0,sackOK,eol], length 0
170
00:16:27.762765 IP6 tunnelXXXXXX-pt.tunnel.tserv3.fmt2.ipv6.he.net > tunnelXXXXXX.tunnel.tserv3.fmt2.ipv6.he.net: ICMP6, echo request, seq 962, length 9
171
00:16:27.773665 IP6 host.domain.tld.50022 > 2620:149:208:430a::4.https: Flags [S], seq 1822255185, win 65535, options [mss 1440,nop,wscale 6,nop,nop,TS val 1931400039 ecr 0,sackOK,eol], length 0
172
^Z
173
Suspended
174

    
175

    
176

    
177

    
178
[21.02.2-RELEASE][admin@pfsense.domain.tld]/root: tcpdump -ni lagg0 host 72.52.104.74
179
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
180
listening on lagg0, link-type EN10MB (Ethernet), capture size 262144 bytes
181
00:21:14.530212 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1517, length 9
182
00:21:15.032201 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1518, length 9
183
00:21:15.534253 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1519, length 9
184
00:21:16.036209 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1520, length 9
185
00:21:16.538208 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1521, length 9
186
00:21:17.040237 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1522, length 9
187
00:21:17.549796 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1523, length 9
188
00:21:18.070933 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1524, length 9
189
00:21:18.589042 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1525, length 9
190
00:21:19.090857 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1526, length 9
191
00:21:19.596841 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1527, length 9
192
00:21:20.112021 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1528, length 9
193
00:21:20.644245 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1529, length 9
194
00:21:21.150976 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1530, length 9
195
00:21:21.677909 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1531, length 9
196
00:21:22.183477 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1532, length 9
197
00:21:22.689072 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1533, length 9
198
00:21:23.221317 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1534, length 9
199
00:21:23.722848 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1535, length 9
200
00:21:24.231014 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1536, length 9
201
00:21:24.733549 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1537, length 9
202
00:21:25.265903 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1538, length 9
203
00:21:25.796909 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1539, length 9
204
00:21:26.301899 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1540, length 9
205
00:21:26.830890 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1541, length 9
206
00:21:27.338648 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1542, length 9
207
00:21:27.858380 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1543, length 9
208
00:21:28.377899 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1544, length 9
209
00:21:28.907935 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1545, length 9
210
00:21:29.419107 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1546, length 9
211
00:21:29.951263 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1547, length 9
212
00:21:30.460667 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1548, length 9
213
00:21:30.969608 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1549, length 9
214
00:21:31.471019 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1550, length 9
215
00:21:31.972981 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1551, length 9
216
00:21:32.475278 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1552, length 9
217
00:21:32.978436 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1553, length 9
218
00:21:33.484579 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1554, length 9
219
00:21:34.002279 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1555, length 9
220
00:21:34.525932 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1556, length 9
221
00:21:35.043360 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1557, length 9
222
00:21:35.549943 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1558, length 9
223
00:21:36.059603 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1559, length 9
224
00:21:36.591876 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1560, length 9
225
00:21:37.104163 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1561, length 9
226
00:21:37.606215 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1562, length 9
227
00:21:38.107182 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1563, length 9
228
00:21:38.617774 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1564, length 9
229
00:21:39.122924 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1565, length 9
230
00:21:39.645920 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1566, length 9
231
00:21:40.151103 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1567, length 9
232
00:21:40.657643 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1568, length 9
233
00:21:41.169112 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1569, length 9
234
00:21:41.701351 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1570, length 9
235
00:21:42.210636 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1571, length 9
236
00:21:42.742873 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1572, length 9
237
00:21:43.275124 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1573, length 9
238
00:21:43.807376 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1574, length 9
239
00:21:44.339629 IP xx.xx.xx.xx > 72.52.104.74: IP6 2001:470:xxxx:xxxx::2 > 2001:470:xxxx:xxxx::1: ICMP6, echo request, seq 1575, length 9
240
^Z
241
Suspended
242
[21.02.2-RELEASE][admin@pfsense.domain.tld]/root: 
243

    
    (1-1/1)