tcpdump -n -i eth0 tcp port 443
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
16:25:40.722696 IP 84.17.49.21.51033 > 192.168.10.5.443: Flags [S], seq 35459899 60, win 1024, options [mss 1286], length 0
16:25:40.722757 IP 192.168.10.5.443 > 84.17.49.21.51033: Flags [S.], seq 6517412 09, ack 3545989961, win 5880, options [mss 1960], length 0
16:25:42.369467 IP 84.17.49.21.51294 > 192.168.10.5.443: Flags [S], seq 14899527 22, win 1024, options [mss 1286], length 0
16:25:42.369548 IP 192.168.10.5.443 > 84.17.49.21.51294: Flags [S.], seq 6837445 57, ack 1489952723, win 5880, options [mss 1960], length 0
16:25:42.378204 IP 84.17.49.21.51289 > 192.168.10.5.443: Flags [S], seq 14897561 19, win 1024, options [mss 1286], length 0
16:25:42.378288 IP 192.168.10.5.443 > 84.17.49.21.51289: Flags [S.], seq 6831282 29, ack 1489756120, win 5880, options [mss 1960], length 0
16:25:43.671472 IP 84.17.49.21.51296 > 192.168.10.5.443: Flags [S], seq 14898216 48, win 1024, options [mss 1286], length 0
16:25:43.671553 IP 192.168.10.5.443 > 84.17.49.21.51296: Flags [S.], seq 7129527 13, ack 1489821649, win 5880, options [mss 1960], length 0
16:25:44.978292 IP 84.17.49.21.51298 > 192.168.10.5.443: Flags [S], seq 14891663 02, win 1024, options [mss 1286], length 0
16:25:44.978358 IP 192.168.10.5.443 > 84.17.49.21.51298: Flags [S.], seq 7218126 25, ack 1489166303, win 5880, options [mss 1960], length 0
16:25:45.119044 IP 192.168.10.5.443 > 84.17.49.21.51033: Flags [S.], seq 6517412 09, ack 3545989961, win 5880, options [mss 1960], length 0
16:25:46.719060 IP 192.168.10.5.443 > 84.17.49.21.51289: Flags [S.], seq 6831282 29, ack 1489756120, win 5880, options [mss 1960], length 0
16:25:46.719086 IP 192.168.10.5.443 > 84.17.49.21.51294: Flags [S.], seq 6837445 57, ack 1489952723, win 5880, options [mss 1960], length 0
16:25:47.123053 IP 192.168.10.5.443 > 84.17.49.21.51296: Flags [S.], seq 7129527 13, ack 1489821649, win 5880, options [mss 1960], length 0
16:25:48.319063 IP 192.168.10.5.443 > 84.17.49.21.51298: Flags [S.], seq 7218126 25, ack 1489166303, win 5880, options [mss 1960], length 0
16:25:51.119052 IP 192.168.10.5.443 > 84.17.49.21.51033: Flags [S.], seq 651741209, ack 3545989961, win 5880, options [mss 1960], length 0
16:25:52.719051 IP 192.168.10.5.443 > 84.17.49.21.51289: Flags [S.], seq 683128229, ack 1489756120, win 5880, options [mss 1960], length 0
16:25:52.719075 IP 192.168.10.5.443 > 84.17.49.21.51294: Flags [S.], seq 683744557, ack 1489952723, win 5880, options [mss 1960], length 0
16:25:53.119051 IP 192.168.10.5.443 > 84.17.49.21.51296: Flags [S.], seq 712952713, ack 1489821649, win 5880, options [mss 1960], length 0
16:25:54.319054 IP 192.168.10.5.443 > 84.17.49.21.51298: Flags [S.], seq 721812625, ack 1489166303, win 5880, options [mss 1960], length 0
16:26:03.119052 IP 192.168.10.5.443 > 84.17.49.21.51033: Flags [S.], seq 651741209, ack 3545989961, win 5880, options [mss 1960], length 0
16:26:04.719065 IP 192.168.10.5.443 > 84.17.49.21.51289: Flags [S.], seq 683128229, ack 1489756120, win 5880, options [mss 1960], length 0
16:26:04.919061 IP 192.168.10.5.443 > 84.17.49.21.51294: Flags [S.], seq 683744557, ack 1489952723, win 5880, options [mss 1960], length 0
16:26:05.119053 IP 192.168.10.5.443 > 84.17.49.21.51296: Flags [S.], seq 712952713, ack 1489821649, win 5880, options [mss 1960], length 0
16:26:06.323059 IP 192.168.10.5.443 > 84.17.49.21.51298: Flags [S.], seq 721812625, ack 1489166303, win 5880, options [mss 1960], length 0