Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hangs on 'asyncio.open_connection' #274

Open
realkibou opened this issue Dec 2, 2024 · 32 comments
Open

Hangs on 'asyncio.open_connection' #274

realkibou opened this issue Dec 2, 2024 · 32 comments
Labels
invalid This doesn't seem right

Comments

@realkibou
Copy link

Description

The setup with my Deye Inverter SUN-5K-SG03LP1-EU works perfectly. All sensor data etc gets pulled. But after maybe 5 minutes everything switches to 'unavailable'.

Reproduction Steps

I can remove the device, add it again, then I get all the data, but again after 5 minutes or so, it is all 'unavailable' again.

Log

No log

Version

2024.11.3

@realkibou realkibou added the bug Something isn't working label Dec 2, 2024
@sofkaski
Copy link
Contributor

sofkaski commented Dec 2, 2024

I updated my system to the the latest (b5b9ada) and see also problems:

2024-12-02 17:39:44.335 ERROR (MainThread) [homeassistant.components.switch] Error adding entity switch.inverter_2 for domain switch with platform solarman
Traceback (most recent call last):
File "/usr/src/homeassistant/homeassistant/helpers/entity_platform.py", line 599, in _async_add_entities
await coro
File "/usr/src/homeassistant/homeassistant/helpers/entity_platform.py", line 918, in _async_add_entity
await entity.add_to_platform_finish()
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1368, in add_to_platform_finish
self.async_write_ha_state()
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1007, in async_write_ha_state
self._async_write_ha_state()
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1132, in _async_write_ha_state
self.__async_calculate_state()
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1069, in __async_calculate_state
state = self._stringify_state(available)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1013, in _stringify_state
if (state := self.state) is None:
^^^^^^^^^^
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1672, in state
if (is_on := self.is_on) is None:
^^^^^^^^^^
File "/config/custom_components/solarman/switch.py", line 70, in is_on
return self._native_value() != self._value_off
^^^^^^^^^^^^^^^^^^^^
File "/config/custom_components/solarman/switch.py", line 65, in _native_value
return self._attr_native_value
^^^^^^^^^^^^^^^^^^^^^^^
AttributeError: 'SolarmanSwitchEntity' object has no attribute '_attr_native_value'. Did you mean: '_to_native_value'?
2024-12-02 17:39:44.359 ERROR (MainThread) [homeassistant.components.switch] Error adding entity switch.inverter_battery_wake_up for domain switch with platform solarman
Traceback (most recent call last):
File "/usr/src/homeassistant/homeassistant/helpers/entity_platform.py", line 599, in _async_add_entities
await coro
File "/usr/src/homeassistant/homeassistant/helpers/entity_platform.py", line 918, in _async_add_entity
await entity.add_to_platform_finish()
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1368, in add_to_platform_finish
self.async_write_ha_state()
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1007, in async_write_ha_state
self._async_write_ha_state()
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1132, in _async_write_ha_state
self.__async_calculate_state()
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1069, in __async_calculate_state
state = self._stringify_state(available)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1013, in _stringify_state
if (state := self.state) is None:
^^^^^^^^^^
File "/usr/src/homeassistant/homeassistant/helpers/entity.py", line 1672, in state
if (is_on := self.is_on) is None:
^^^^^^^^^^
File "/config/custom_components/solarman/switch.py", line 70, in is_on
return self._native_value() != self._value_off
^^^^^^^^^^^^^^^^^^^^
File "/config/custom_components/solarman/switch.py", line 65, in _native_value
return self._attr_native_value
^^^^^^^^^^^^^^^^^^^^^^^
AttributeError: 'SolarmanSwitchEntity' object has no attribute '_attr_native_value'. Did you mean: '_to_native_value'?

@sofkaski
Copy link
Contributor

sofkaski commented Dec 2, 2024

I reverted back to d30089e which was the previous version that I was successfully running. Quick glance shows that now the integration created new entities (with _2 postfix). Need to investigate further.

@davidrapan
Copy link
Owner

Hi @sofkaski, would you be willing to do the update to the latest, enabled debug logging, and restart HA w/ debug logging enabled and provide the log file? It would be very helpful!

@sofkaski
Copy link
Contributor

sofkaski commented Dec 2, 2024

I'll do that.

Here is the log for the first minute after restart. I hope this reveals already useful information.
home-assistant_solarman_2024-12-02T17-01-48.210Z.log

@sofkaski
Copy link
Contributor

sofkaski commented Dec 2, 2024

I'll do that.

Here is the log for the first minute after restart. I hope this reveals already useful information. home-assistant_solarman_2024-12-02T17-01-48.210Z.log

@davidrapan : Note that this is now the second time the new version is used since I reverted back after the first attempt. And the revert did not go well either.

@davidrapan
Copy link
Owner

You should have remove and re-add back device so it clears out those duplicates.

@davidrapan
Copy link
Owner

@davidrapan
Copy link
Owner

@realkibou, please I need you to enable debug logging then remove and re-add your device back. Wait until your sensors are 'unavailable', stop the debugging and attach the file here.

Thank you.

@realkibou
Copy link
Author

error_log-1.txt
Here you go

@davidrapan
Copy link
Owner

Whoa... 🤯

So you are saying that re-adding the device helps? And what about reload under that 3 dots menu? Could you also record the log w/ device remove and re-add back after that connections loss?

@realkibou
Copy link
Author

Reloading it also helps. I have a suspicion that is becomes unavailable once I log into my inverter with the Deye app. But also that is inconsistent.

@davidrapan
Copy link
Owner

What's the logger's firmware?

@realkibou
Copy link
Author

Inverter: V0.2.0.1 3385-1515 0000-036B
Logger: LSW3_15_FFFF_1.0.9E V1.1.00.10

@sofkaski
Copy link
Contributor

sofkaski commented Dec 3, 2024

Reloading it also helps. I have a suspicion that is becomes unavailable once I log into my inverter with the Deye app. But also that is inconsistent.

I have noticed that I get about once or twice a day no-socket-available errors and then timeout in connection, but solarman-ha recovers from that in the next update round nicely. My setup is such that the inverter is hybrid Deye SUN-8K-SG04P3-EU with a logger with firmware version LSW3_15_FFFF_1.0.9E. I have connected it also with Deye cloud. (which I would like to get rid of finally.)

My understading is that Deye app does not talk directly to the logger, but the logger pushes data to the Deye cloud and app uses data from there. (Remote control operations might though talk with the logger directly 🤔 ).
My perception is that at some point the periods of Deye and ha-solarman co-inside so that the logger runs out of resources and fails the connection .

@sofkaski
Copy link
Contributor

sofkaski commented Dec 3, 2024

I now updated ha-solarman to 39732bd and everything went fine. Migrations were run.
home-assistant_solarman_2024-12-03T08-35-49.621Z.log

@davidrapan
Copy link
Owner

Yes that's what's proly happening but as you said it should recover. Why it does not work in @realkibou's case is really weird...

Anyway, I'm glad it's good for you, @sofkaski. Thanks for the report, really appreciate it. 😉

@realkibou
Copy link
Author

realkibou commented Dec 3, 2024

I updated to the newest version of Solarman v24.12.02 and also my Deye inverter got an update to HMI: 0000-C372. The bug however persists. But one click on reload and it works for a bit

@davidrapan
Copy link
Owner

Hello @githubDante! Me again! Any ideas?

@githubDante
Copy link

Hi @davidrapan ,

Something remains hidden here:

2024-12-03 06:43:39.006 INFO (MainThread) [custom_components.solarman.api] [2786122897] Connecting to 192.168.101.3:8899
2024-12-03 06:44:09.011 DEBUG (MainThread) [custom_components.solarman.api] [2786122897] Fetching failed. [Previous State: Disconnected (-1)]
2024-12-03 06:44:09.011 INFO (MainThread) [custom_components.solarman.api] [2786122897] Disconnecting from 192.168.101.3:8899

but it looks like the logger is unavailable. Considering the timestamps probably a NoSocketAvailable error is raised in the call to connect(). This however is just a wild guess, as the connect call is nested deep under the safe_read_write method. A hint about the missing/unreachable logger is also the fact that this starts happening soon after the first read timeout.

@realkibou can you try to reach the logger IP address (ping/telnet to port 8899) in such moment, preferrably from the device where ha-solarman is running.

@davidrapan
Copy link
Owner

davidrapan commented Dec 3, 2024

Yes, No Sockat Available does occur once per ~ 5m or so in my case.

This hang visible in the log is most likely in Asyncio’s open_connection as I’ve seen it happen but never in this unrecoverable form. Then there is 30s timeout triggered.

It would be great if we could see traffic between HA and logger alongside the debug log.

@githubDante
Copy link

With the latest version 24.12.02 & Python 3.12 the NoSocketAvailable exception is definitely propagated to the log. But ... I managed to achieve the same result

2024-12-03 18:34:29.433 DEBUG (MainThread) [custom_components.solarman.api] [2654321987] Querying 03 ~ 0000 - 0124 | 0x0000 - 0x007C # 125 ...
2024-12-03 18:34:29.433 INFO (MainThread) [custom_components.solarman.api] [2654321987] Connecting to 192.168.168.5:8890
2024-12-03 18:34:59.436 DEBUG (MainThread) [custom_components.solarman.api] [2654321987] Fetching failed. [Previous State: Disconnected (-1)]
2024-12-03 18:34:59.436 INFO (MainThread) [custom_components.solarman.api] [2654321987] Disconnecting from 192.168.168.5:8890
2024-12-03 18:34:59.436 DEBUG (MainThread) [custom_components.solarman.coordinator] Finished fetching  data in 30.003 seconds (success: False)

It's caused by a firewall dropping the packets to the destination address:

iptables -I OUTPUT -d 192.168.168.5 -j DROP

in the ha container/machine/device is enough.

@realkibou
Copy link
Author

I updated to the newest version of Solarman v24.12.02 and also my Deye inverter got an update to HMI: 0000-C372. The bug however persists. But one click on reload and it works for a bit

Still the same bug :(

@davidrapan davidrapan changed the title Everything unavailable Hangs on 'asyncio.open_connection' Dec 4, 2024
@davidrapan
Copy link
Owner

davidrapan commented Dec 4, 2024

I mean sure if you drop the packets I'd say it should timeout... but how could that happen in his case? Some HA's quirks?

@realkibou, could you run a fresh HA installation aside and try it there?

@githubDante
Copy link

but how could that happen in his case? Some HA's quirks?

It could be a router, switch or anything that stands between the datalogger and the client.

@davidrapan
Copy link
Owner

Yeah.. that's why I wanted to know if there is any chance that @realkibou heard anything about things like tcpdump and wireshark. 😆

@realkibou
Copy link
Author

The inverter is pingable. I just now made an automation that HA just reload the integration. Dirty, but it works.

@davidrapan
Copy link
Owner

It's not about inverter but the path between HA and inverter.

@realkibou
Copy link
Author

image

@davidrapan
Copy link
Owner

If you could run tcpdump in HA or on the device which hosts HA that would reveal way more.

@realkibou
Copy link
Author

At 11:47:35 the inverter became unavailable.

Here you go:

`
11:46:24.662597 ARP, Request who-has 192.168.101.11 tell 0.0.0.0, length 46
11:46:24.663585 IP6 :: > ff02::1:ffa6:7c38: ICMP6, neighbor solicitation, who has fe80::82ce:8d79:faa6:7c38, length 24
11:46:24.665859 IP6 fe80::82ce:8d79:faa6:7c38 > ip6-allrouters: ICMP6, router solicitation, length 8
11:46:24.667326 IP6 fe80::1 > ip6-allnodes: ICMP6, router advertisement, length 56
11:46:24.714852 ARP, Request who-has 192.168.101.1 tell 192.168.101.11, length 46
11:46:24.715840 IP6 fe80::82ce:8d79:faa6:7c38 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has fe80::1, length 32
11:46:24.800401 IP6 fe80::82ce:8d79:faa6:7c38.49388 > ff02::1:3.5355: UDP, length 24
11:46:24.884551 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:46:25.054898 IP6 fe80::82ce:8d79:faa6:7c38 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has fe80::1, length 32
11:46:25.229043 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:25.229371 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:25.229501 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:25.229741 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:25.230051 IP6 fe80::82ce:8d79:faa6:7c38.56813 > ff02::1:3.5355: UDP, length 24
11:46:25.230290 IP 192.168.101.11.56813 > 224.0.0.252.5355: UDP, length 24
11:46:25.269054 IP 192.168.101.11.137 > 192.168.101.255.137: UDP, length 68
11:46:25.269198 IP 192.168.101.11.137 > 192.168.101.255.137: UDP, length 68
11:46:25.269320 IP 192.168.101.11.137 > 192.168.101.255.137: UDP, length 68
11:46:25.294847 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:25.321277 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5437:5473, ack 10013, win 64024, length 36
11:46:25.340715 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:25.340794 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:25.420015 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [P.], seq 10013:10053, ack 5473, win 3336, length 40
11:46:25.420229 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [.], ack 10053, win 64024, length 0
11:46:25.422501 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5473:5509, ack 10053, win 64024, length 36
11:46:25.519873 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [P.], seq 10053:10089, ack 5509, win 3300, length 36
11:46:25.535812 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:46:25.560269 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [.], ack 10089, win 64024, length 0
11:46:25.569412 ARP, Request who-has 192.168.101.3 tell 192.168.101.1, length 46
11:46:25.569412 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:25.591766 ARP, Request who-has 192.168.101.10 tell 192.168.101.1, length 46
11:46:25.666987 ARP, Request who-has 192.168.101.11 tell 0.0.0.0, length 46
11:46:25.667345 IP6 fe80::82ce:8d79:faa6:7c38 > ip6-allnodes: ICMP6, neighbor advertisement, tgt is fe80::82ce:8d79:faa6:7c38, length 32
11:46:25.681781 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:25.682075 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:25.682259 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:25.682491 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:25.682773 IP6 fe80::82ce:8d79:faa6:7c38.50944 > ff02::1:3.5355: UDP, length 24
11:46:25.683052 IP 192.168.101.11.50944 > 224.0.0.252.5355: UDP, length 24
11:46:25.704251 IP 192.168.101.8.5353 > mdns.mcast.net.5353: 0 [5q] PTR (QM)? _ftp._tcp.local. PTR (QM)? _smb._tcp.local. PTR (QM)? _nfs._tcp.local. PTR (QM)? _sftp-ssh._tcp.local. PTR (QM)? _rtsp._tcp.local. (123)
11:46:26.001007 IP 192.168.101.11.137 > 192.168.101.255.137: UDP, length 68
11:46:26.001155 IP 192.168.101.11.137 > 192.168.101.255.137: UDP, length 68
11:46:26.001272 IP 192.168.101.11.137 > 192.168.101.255.137: UDP, length 68
11:46:26.368767 IP 192.168.101.11.27036 > 192.168.101.255.27036: UDP, length 41
11:46:26.471331 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:46:26.668154 ARP, Request who-has 192.168.101.11 tell 0.0.0.0, length 46
11:46:26.744844 IP 192.168.101.11.137 > 192.168.101.255.137: UDP, length 68
11:46:26.744990 IP 192.168.101.11.137 > 192.168.101.255.137: UDP, length 68
11:46:26.745077 IP 192.168.101.11.137 > 192.168.101.255.137: UDP, length 68
11:46:27.009671 IP 192.168.101.14.44049 > 192.168.101.16.38899: UDP, length 105
11:46:27.009960 IP 192.168.101.14.47624 > 192.168.101.7.38899: UDP, length 105
11:46:27.285157 IP 192.168.101.7.38899 > 192.168.101.14.47624: UDP, length 84
11:46:27.289747 IP 192.168.101.16.38899 > 192.168.101.14.44049: UDP, length 84
11:46:27.290943 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:46:27.290943 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 115
11:46:27.374322 IP 192.168.101.11.27036 > 192.168.101.255.27036: UDP, length 139
11:46:27.513932 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:27.514471 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:27.514809 IP6 fe80::82ce:8d79:faa6:7c38.51040 > ff02::1:3.5355: UDP, length 24
11:46:27.515127 IP 192.168.101.11.51040 > 224.0.0.252.5355: UDP, length 24
11:46:27.553491 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:46:27.719181 ARP, Request who-has 192.168.101.11 tell 192.168.101.11, length 46
11:46:27.938893 IP6 fe80::82ce:8d79:faa6:7c38.51040 > ff02::1:3.5355: UDP, length 24
11:46:27.939122 IP 192.168.101.11.51040 > 224.0.0.252.5355: UDP, length 24
11:46:28.265615 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:28.313112 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:28.313191 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:28.544636 ARP, Request who-has 192.168.101.3 tell 192.168.101.1, length 46
11:46:28.544636 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:28.566662 ARP, Request who-has 192.168.101.10 tell 192.168.101.1, length 46
11:46:28.592101 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:46:28.659237 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:28.659582 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:28.870982 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:46:29.744283 ARP, Request who-has 192.168.101.11 tell 192.168.101.11, length 46
11:46:29.882793 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:46:30.323103 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5509:5545, ack 10089, win 64024, length 36
11:46:30.474171 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [P.], seq 10089:10189, ack 5545, win 3264, length 100
11:46:30.474378 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [.], ack 10189, win 64024, length 0
11:46:30.477168 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5545:5581, ack 10189, win 64024, length 36
11:46:30.569436 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [.], ack 5581, win 3228, length 0
11:46:30.653392 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [P.], seq 10189:10315, ack 5581, win 3228, length 126
11:46:30.656543 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5581:5617, ack 10315, win 64024, length 36
11:46:30.760680 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [P.], seq 10315:10355, ack 5617, win 3192, length 40
11:46:30.763126 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5617:5653, ack 10355, win 64024, length 36
11:46:30.820532 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [.], ack 5653, win 3156, length 0
11:46:30.854095 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [P.], seq 10355:10389, ack 5653, win 3156, length 34
11:46:30.894268 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [.], ack 10389, win 64024, length 0
11:46:31.204470 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:31.249802 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:31.249882 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:31.404582 IP 192.168.101.11.27036 > 192.168.101.255.27036: UDP, length 41
11:46:31.469848 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:46:31.483489 ARP, Request who-has 192.168.101.3 tell 192.168.101.1, length 46
11:46:31.483489 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:31.518054 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:46:32.456351 ARP, Request who-has 192.168.101.7 tell 192.168.101.14, length 28
11:46:32.456437 ARP, Request who-has 192.168.101.16 tell 192.168.101.14, length 28
11:46:32.672473 ARP, Reply 192.168.101.7 is-at 6c:29:90:ae:8d:3b (oui Unknown), length 46
11:46:32.776398 ARP, Reply 192.168.101.16 is-at cc:40:85:25:8b:5c (oui Unknown), length 46
11:46:33.306813 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:46:33.374657 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:46:33.374854 IP 192.168.101.12.17500 > 192.168.101.255.17500: UDP, length 143
11:46:33.374939 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:46:33.375122 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:46:33.848937 IP6 fe80::82ce:8d79:faa6:7c38 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has fe80::1, length 32
11:46:33.870951 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:46:34.197024 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:34.248001 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:34.248084 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:34.481474 ARP, Request who-has 192.168.101.3 tell 192.168.101.1, length 46
11:46:34.481475 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:34.890449 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:46:36.321460 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5653:5689, ack 10389, win 64024, length 36
11:46:36.346947 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [.], ack 5689, win 3120, length 0
11:46:36.398145 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [P.], seq 10389:10429, ack 5689, win 3120, length 40
11:46:36.398320 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [.], ack 10429, win 64024, length 0
11:46:36.400623 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5689:5725, ack 10429, win 64024, length 36
11:46:36.473673 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:46:36.478243 IP 192.168.101.3.8899 > 192.168.101.14.60726: Flags [P.], seq 10429:10465, ack 5725, win 3084, length 36
11:46:36.519270 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [.], ack 10465, win 64024, length 0
11:46:37.183809 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:37.232183 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:37.232264 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:37.461185 ARP, Request who-has 192.168.101.3 tell 192.168.101.1, length 46
11:46:37.461185 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:37.509774 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:46:38.110296 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:46:38.871028 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:46:39.283219 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 70:cf:49:d7:64:91 (oui Unknown), length 304
11:46:39.284787 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:39.285250 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:39.285808 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:39.286245 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:39.287388 IP6 fe80::82ce:8d79:faa6:7c38.55278 > ff02::1:3.5355: UDP, length 24
11:46:39.287989 IP 192.168.101.11.55278 > 224.0.0.252.5355: UDP, length 24
11:46:39.290721 ARP, Request who-has 192.168.101.1 tell 192.168.101.11, length 46
11:46:39.292599 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:39.292890 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:39.293225 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:39.293479 IP6 fe80::82ce:8d79:faa6:7c38.61379 > ff02::1:3.5355: UDP, length 24
11:46:39.294235 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:39.294516 IP 192.168.101.11.61379 > 224.0.0.252.5355: UDP, length 24
11:46:39.294769 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:46:39.395546 IP 192.168.101.14.59385 > 239.255.255.250.1900: UDP, length 327
11:46:39.445526 IP6 fe80::ec67:d45b:33d3:a0fe.44644 > ff02::c.1900: UDP, length 334
11:46:39.650175 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 70:cf:49:d7:64:91 (oui Unknown), length 304
11:46:39.651638 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:39.652792 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:39.653437 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:39.654106 IP6 fe80::82ce:8d79:faa6:7c38.55122 > ff02::1:3.5355: UDP, length 24
11:46:39.655289 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:39.655611 IP 192.168.101.11.55122 > 224.0.0.252.5355: UDP, length 24
11:46:39.655982 ARP, Request who-has 192.168.101.1 tell 192.168.101.11, length 46
11:46:39.657098 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:39.657345 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:39.657594 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:39.657839 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:39.658252 IP6 fe80::82ce:8d79:faa6:7c38.62224 > ff02::1:3.5355: UDP, length 24
11:46:39.663096 IP 192.168.101.11.62224 > 224.0.0.252.5355: UDP, length 24
11:46:39.663375 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:46:39.663576 ARP, Request who-has 192.168.101.11 tell 0.0.0.0, length 46
11:46:39.663938 IP6 :: > ff02::1:ffa6:7c38: ICMP6, neighbor solicitation, who has fe80::82ce:8d79:faa6:7c38, length 24
11:46:39.664220 IP6 fe80::82ce:8d79:faa6:7c38 > ip6-allrouters: ICMP6, router solicitation, length 8
11:46:39.665599 IP6 fe80::1 > ip6-allnodes: ICMP6, router advertisement, length 56
11:46:39.737366 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:39.737637 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:39.737784 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:39.738021 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:39.738341 IP6 fe80::82ce:8d79:faa6:7c38.56591 > ff02::1:3.5355: UDP, length 24
11:46:39.738629 IP 192.168.101.11.56591 > 224.0.0.252.5355: UDP, length 24
11:46:39.889212 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:46:40.163486 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:40.209141 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:40.209221 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:40.442576 ARP, Request who-has 192.168.101.3 tell 192.168.101.1, length 46
11:46:40.442576 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:40.454745 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:46:40.491992 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:46:40.664774 ARP, Request who-has 192.168.101.11 tell 0.0.0.0, length 46
11:46:40.664977 IP6 fe80::82ce:8d79:faa6:7c38 > ip6-allnodes: ICMP6, neighbor advertisement, tgt is fe80::82ce:8d79:faa6:7c38, length 32
11:46:41.324056 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5725:5761, ack 10465, win 64024, length 36
11:46:41.474644 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:46:41.616402 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5725:5761, ack 10465, win 64024, length 36
11:46:41.661528 ARP, Request who-has 192.168.101.11 tell 0.0.0.0, length 46
11:46:42.248407 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5725:5761, ack 10465, win 64024, length 36
11:46:42.295830 IP 192.168.101.14.56048 > ec2-34-215-129-125.us-west-2.compute.amazonaws.com.443: Flags [P.], seq 4189:4702, ack 10987, win 716, options [nop,nop,TS val 3294891761 ecr 1910271494], length 513
11:46:42.489671 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:46:42.574045 IP ec2-34-215-129-125.us-west-2.compute.amazonaws.com.443 > 192.168.101.14.56048: Flags [.], ack 4702, win 147, options [nop,nop,TS val 1910331506 ecr 3294891761], length 0
11:46:42.596254 IP ec2-34-215-129-125.us-west-2.compute.amazonaws.com.443 > 192.168.101.14.56048: Flags [P.], seq 10987:11815, ack 4702, win 147, options [nop,nop,TS val 1910331528 ecr 3294891761], length 828
11:46:42.596444 IP 192.168.101.14.56048 > ec2-34-215-129-125.us-west-2.compute.amazonaws.com.443: Flags [.], ack 11815, win 716, options [nop,nop,TS val 3294892062 ecr 1910331528], length 0
11:46:42.663685 ARP, Request who-has 192.168.101.11 tell 192.168.101.11, length 46
11:46:42.904420 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:46:43.153934 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:43.199483 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:43.199565 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:43.441601 ARP, Request who-has 192.168.101.3 tell 192.168.101.1, length 46
11:46:43.441602 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:43.464427 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5725:5761, ack 10465, win 64024, length 36
11:46:43.487829 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:46:43.691004 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:43.692065 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0 ANY (QM)? Boomba.local. (30)
11:46:43.692771 IP 192.168.101.11.5353 > mdns.mcast.net.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:43.693225 IP6 fe80::82ce:8d79:faa6:7c38.5353 > ff02::fb.5353: 0*- [0q] 2/0/0 AAAA fe80::82ce:8d79:faa6:7c38, A 192.168.101.11 (68)
11:46:43.693739 IP6 fe80::82ce:8d79:faa6:7c38.61192 > ff02::1:3.5355: UDP, length 24
11:46:43.694274 IP 192.168.101.11.61192 > 224.0.0.252.5355: UDP, length 24
11:46:43.871065 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:46:44.656799 ARP, Request who-has 192.168.101.11 tell 192.168.101.11, length 46
11:46:44.909900 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:46:45.832403 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5725:5761, ack 10465, win 64024, length 36
11:46:46.128708 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:46.176852 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:46.176935 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:46.414087 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:46.459863 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:46:46.484308 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:46:46.494803 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:46:47.010262 IP 192.168.101.14.44049 > 192.168.101.16.38899: UDP, length 105
11:46:47.010496 IP 192.168.101.14.47624 > 192.168.101.7.38899: UDP, length 105
11:46:47.276325 IP 192.168.101.7.38899 > 192.168.101.14.47624: UDP, length 84
11:46:47.276325 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 115
11:46:47.549585 IP 192.168.101.16.38899 > 192.168.101.14.44049: UDP, length 84
11:46:47.563638 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:46:47.732356 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:46:48.871132 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:46:49.112563 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:49.156638 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:49.156722 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:49.382137 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:49.426008 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:46:49.910983 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:46:50.888408 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5725:5761, ack 10465, win 64024, length 36
11:46:51.491834 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:46:52.074181 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:52.097052 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:52.097118 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:52.325630 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:52.347889 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:46:52.467745 IP 192.168.101.11.27036 > 192.168.101.255.27036: UDP, length 139
11:46:52.540310 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:46:53.871203 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:46:54.487299 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:46:54.896516 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:46:55.002700 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:55.024361 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:55.024445 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:55.248616 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:55.294529 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:46:56.485003 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:46:57.376525 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:46:57.922308 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:46:57.944374 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:46:57.944458 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:46:58.150144 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:46:58.190535 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:46:58.360842 ARP, Request who-has 192.168.101.16 tell 192.168.101.16, length 46
11:46:58.394863 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 40:2a:8f:01:e7:0e (oui Unknown), length 308
11:46:58.463075 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 40:2a:8f:01:e7:0e (oui Unknown), length 308
11:46:58.463953 ARP, Request who-has 192.168.101.2 tell 192.168.101.2, length 46
11:46:58.570724 IP 192.168.101.14.54555 > dns1.mtmbali.net.id.53: 29787+ [1au] PTR? 2.101.168.192.in-addr.arpa. (55)
11:46:58.575826 IP dns1.mtmbali.net.id.53 > 192.168.101.14.54555: 29787 NXDomain* 0/1/1 (110)
11:46:58.577951 IP 192.168.101.14.41350 > one.one.one.one.853: Flags [S], seq 2973877013, win 64240, options [mss 1460,sackOK,TS val 4131695939 ecr 0,nop,wscale 7], length 0
11:46:58.599675 IP one.one.one.one.853 > 192.168.101.14.41350: Flags [S.], seq 2985942215, ack 2973877014, win 65535, options [mss 1460,sackOK,TS val 4197421242 ecr 4131695939,nop,wscale 13], length 0
11:46:58.600047 IP 192.168.101.14.41350 > one.one.one.one.853: Flags [.], ack 1, win 502, options [nop,nop,TS val 4131695961 ecr 4197421242], length 0
11:46:58.601716 IP 192.168.101.14.41350 > one.one.one.one.853: Flags [P.], seq 1:504, ack 1, win 502, options [nop,nop,TS val 4131695963 ecr 4197421242], length 503
11:46:58.623197 IP one.one.one.one.853 > 192.168.101.14.41350: Flags [.], ack 504, win 9, options [nop,nop,TS val 4197421265 ecr 4131695963], length 0
11:46:58.623446 IP one.one.one.one.853 > 192.168.101.14.41350: Flags [P.], seq 1:204, ack 504, win 9, options [nop,nop,TS val 4197421265 ecr 4131695963], length 203
11:46:58.623628 IP 192.168.101.14.41350 > one.one.one.one.853: Flags [.], ack 204, win 501, options [nop,nop,TS val 4131695985 ecr 4197421265], length 0
11:46:58.625485 IP 192.168.101.14.41350 > one.one.one.one.853: Flags [P.], seq 504:568, ack 204, win 501, options [nop,nop,TS val 4131695987 ecr 4197421265], length 64
11:46:58.625758 IP 192.168.101.14.41350 > one.one.one.one.853: Flags [P.], seq 568:647, ack 204, win 501, options [nop,nop,TS val 4131695987 ecr 4197421265], length 79
11:46:58.647452 IP one.one.one.one.853 > 192.168.101.14.41350: Flags [.], ack 647, win 9, options [nop,nop,TS val 4197421289 ecr 4131695987], length 0
11:46:58.648024 IP one.one.one.one.853 > 192.168.101.14.41350: Flags [P.], seq 204:1114, ack 647, win 9, options [nop,nop,TS val 4197421290 ecr 4131695987], length 910
11:46:58.688533 IP 192.168.101.14.41350 > one.one.one.one.853: Flags [.], ack 1114, win 524, options [nop,nop,TS val 4131696050 ecr 4197421290], length 0
11:46:58.871232 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:46:59.188670 ARP, Request who-has 192.168.101.1 tell 192.168.101.11, length 46
11:46:59.657746 ARP, Request who-has 192.168.101.1 tell 192.168.101.2, length 46
11:46:59.893781 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:47:00.616473 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [P.], seq 5725:5761, ack 10465, win 64024, length 36
11:47:00.853994 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:00.878209 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:00.878292 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:01.112329 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:01.160495 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:01.492757 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:47:02.115608 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:03.511763 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:47:03.511954 IP 192.168.101.12.17500 > 192.168.101.255.17500: UDP, length 143
11:47:03.512108 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:47:03.512288 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:47:03.845013 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:03.868862 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:03.868946 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:03.871559 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:47:04.105126 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:04.151589 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:04.896627 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:47:06.475985 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:47:06.789401 IP 192.168.101.12.137 > 192.168.101.255.137: UDP, length 50
11:47:06.834188 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:06.857549 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:06.857632 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:06.908336 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:07.010924 IP 192.168.101.14.44049 > 192.168.101.16.38899: UDP, length 105
11:47:07.011128 IP 192.168.101.14.47624 > 192.168.101.7.38899: UDP, length 105
11:47:07.034866 IP 192.168.101.7.38899 > 192.168.101.14.47624: UDP, length 84
11:47:07.035020 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 115
11:47:07.091925 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:07.137299 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:07.237805 IP 192.168.101.16.38899 > 192.168.101.14.44049: UDP, length 84
11:47:07.238685 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:07.553747 IP 192.168.101.12.137 > 192.168.101.255.137: UDP, length 50
11:47:08.319033 IP 192.168.101.12.137 > 192.168.101.255.137: UDP, length 50
11:47:08.647327 IP one.one.one.one.853 > 192.168.101.14.41350: Flags [P.], seq 1114:1138, ack 647, win 9, options [nop,nop,TS val 4197431290 ecr 4131696050], length 24
11:47:08.647668 IP 192.168.101.14.41350 > one.one.one.one.853: Flags [.], ack 1138, win 524, options [nop,nop,TS val 4131706009 ecr 4197431290], length 0
11:47:08.871295 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:47:09.397398 IP 192.168.101.14.59385 > 239.255.255.250.1900: UDP, length 336
11:47:09.447407 IP6 fe80::ec67:d45b:33d3:a0fe.44644 > ff02::c.1900: UDP, length 343
11:47:09.824190 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:09.848018 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:09.848101 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:09.869294 IP 192.168.101.14.41350 > one.one.one.one.853: Flags [P.], seq 647:671, ack 1138, win 524, options [nop,nop,TS val 4131707230 ecr 4197431290], length 24
11:47:09.869457 IP 192.168.101.14.41350 > one.one.one.one.853: Flags [R.], seq 671, ack 1138, win 524, options [nop,nop,TS val 4131707231 ecr 4197431290], length 0
11:47:09.900003 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:47:10.079186 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:10.124840 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:10.504403 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:47:11.326269 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [FP.], seq 5761:5797, ack 10465, win 64024, length 36
11:47:11.498856 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:47:11.704606 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:12.392344 ARP, Request who-has 192.168.101.7 tell 192.168.101.14, length 28
11:47:12.392419 ARP, Request who-has 192.168.101.16 tell 192.168.101.14, length 28
11:47:12.612641 ARP, Reply 192.168.101.7 is-at 6c:29:90:ae:8d:3b (oui Unknown), length 46
11:47:12.717096 ARP, Reply 192.168.101.16 is-at cc:40:85:25:8b:5c (oui Unknown), length 46
11:47:12.784683 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:12.808859 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:12.808943 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:13.042364 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:13.088161 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:13.110917 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:13.110917 ARP, Request who-has 192.168.101.10 tell 192.168.101.1, length 46
11:47:13.871324 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:47:14.908793 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:47:15.753909 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:15.776540 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:15.776620 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:16.008307 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:16.053407 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:16.075862 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:16.075863 ARP, Request who-has 192.168.101.10 tell 192.168.101.1, length 46
11:47:16.322472 IP 192.168.101.14.33676 > 192.168.101.3.8899: Flags [S], seq 299480412, win 64240, options [mss 1460,sackOK,TS val 4282874010 ecr 0,nop,wscale 7], length 0
11:47:16.485189 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:47:16.488339 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:16.541520 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:17.384394 IP 192.168.101.14.33676 > 192.168.101.3.8899: Flags [S], seq 299480412, win 64240, options [mss 1460,sackOK,TS val 4282875072 ecr 0,nop,wscale 7], length 0
11:47:17.512366 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:18.408392 IP 192.168.101.14.33676 > 192.168.101.3.8899: Flags [S], seq 299480412, win 64240, options [mss 1460,sackOK,TS val 4282876096 ecr 0,nop,wscale 7], length 0
11:47:18.536364 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:18.714200 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:18.737350 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:18.737433 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:18.871591 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:47:18.965844 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:19.010976 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:19.033720 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:19.033721 ARP, Request who-has 192.168.101.10 tell 192.168.101.1, length 46
11:47:19.432398 IP 192.168.101.14.33676 > 192.168.101.3.8899: Flags [S], seq 299480412, win 64240, options [mss 1460,sackOK,TS val 4282877120 ecr 0,nop,wscale 7], length 0
11:47:19.560421 IP 192.168.101.14.60726 > 192.168.101.3.8899: Flags [FP.], seq 5725:5797, ack 10465, win 64024, length 72
11:47:19.905620 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:47:20.456428 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:21.311955 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:21.480365 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:21.503729 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:47:22.504348 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:22.704579 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:22.728141 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:22.728219 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:22.955504 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:23.001427 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:23.024259 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:23.528525 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:23.871472 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:47:24.552350 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:24.618602 IP 192.168.101.12.137 > 192.168.101.255.137: UDP, length 50
11:47:24.907157 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:47:25.395709 IP 192.168.101.12.137 > 192.168.101.255.137: UDP, length 50
11:47:25.576338 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:25.684625 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:25.708196 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:25.708279 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:25.943080 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:25.991175 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:26.015299 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:26.100274 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:26.159274 IP 192.168.101.12.137 > 192.168.101.255.137: UDP, length 50
11:47:26.541536 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:47:26.600648 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:27.011792 IP 192.168.101.14.44049 > 192.168.101.16.38899: UDP, length 105
11:47:27.012003 IP 192.168.101.14.47624 > 192.168.101.7.38899: UDP, length 105
11:47:27.189236 IP 192.168.101.7.38899 > 192.168.101.14.47624: UDP, length 84
11:47:27.190098 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 115
11:47:27.275603 IP 192.168.101.16.38899 > 192.168.101.14.44049: UDP, length 84
11:47:27.477573 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:27.624350 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:28.648350 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:28.720418 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:28.755838 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:28.755916 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:28.871762 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:47:28.990114 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:29.038073 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:29.062375 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:29.672667 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:29.931724 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:47:30.696359 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:30.706660 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:30.730225 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:30.730308 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:30.955686 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:30.961711 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:31.008579 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:31.029997 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:31.487305 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:47:31.720351 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:32.744657 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:33.604740 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:47:33.604926 IP 192.168.101.12.17500 > 192.168.101.255.17500: UDP, length 143
11:47:33.605039 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:47:33.605265 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:47:33.605545 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:47:33.605738 IP 192.168.101.12.17500 > 255.255.255.255.17500: UDP, length 143
11:47:33.768349 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:33.871557 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:47:34.684786 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:34.708505 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:34.708586 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:34.792350 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:34.906416 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:47:34.940889 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:34.986407 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:35.009879 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:35.697223 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:35.816662 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:36.486015 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 141
11:47:36.840351 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:37.665195 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:37.688092 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:37.688174 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:37.864353 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:37.924501 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:37.972023 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:37.996542 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:38.871618 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:47:38.904003 IP 192.168.101.14.47624 > 192.168.101.7.38899: UDP, length 45
11:47:39.083627 IP 192.168.101.7.38899 > 192.168.101.14.47624: UDP, length 59
11:47:39.083628 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 114
11:47:39.399500 IP 192.168.101.14.59385 > 239.255.255.250.1900: UDP, length 385
11:47:39.449829 IP6 fe80::ec67:d45b:33d3:a0fe.44644 > ff02::c.1900: UDP, length 392
11:47:39.910845 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:47:40.329915 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:40.521617 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:40.644383 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:40.668421 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:40.668504 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:40.903013 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:40.949416 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:40.973078 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:41.384355 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:41.481989 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 140
11:47:42.295508 IP 192.168.101.14.56048 > ec2-34-215-129-125.us-west-2.compute.amazonaws.com.443: Flags [P.], seq 4702:5215, ack 11815, win 716, options [nop,nop,TS val 3294951761 ecr 1910331528], length 513
11:47:42.408352 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:42.520237 IP6 fe80::82ce:8d79:faa6:7c38.546 > ff02::1:2.547: dhcp6 inf-req
11:47:42.542025 IP ec2-34-215-129-125.us-west-2.compute.amazonaws.com.443 > 192.168.101.14.56048: Flags [.], ack 5215, win 149, options [nop,nop,TS val 1910391465 ecr 3294951761], length 0
11:47:42.584387 IP ec2-34-215-129-125.us-west-2.compute.amazonaws.com.443 > 192.168.101.14.56048: Flags [P.], seq 11815:12643, ack 5215, win 149, options [nop,nop,TS val 1910391508 ecr 3294951761], length 828
11:47:42.584562 IP 192.168.101.14.56048 > ec2-34-215-129-125.us-west-2.compute.amazonaws.com.443: Flags [.], ack 12643, win 716, options [nop,nop,TS val 3294952050 ecr 1910391508], length 0
11:47:43.085460 IP6 fe80::ec67:d45b:33d3:a0fe.546 > ff02::1:2.547: dhcp6 inf-req
11:47:43.635509 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:43.652150 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:43.685663 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:43.685746 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:43.871887 80:f7:a6:f0:e8:98 (oui Unknown) > Broadcast, ethertype Unknown (0xfffa), length 60:
0x0000: dead beef 0172 6561 6c74 656b 5f6c 6f6f .....realtek_loo
0x0010: 7062 6163 6b5f 6465 7465 6374 5f70 6163 pback_detect_pac
0x0020: 6b65 7400 0000 0000 0000 0000 0000 ket...........
11:47:43.961735 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:44.013270 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:44.038960 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:44.136341 ARP, Request who-has 192.168.101.7 tell 192.168.101.14, length 28
11:47:44.170782 ARP, Reply 192.168.101.7 is-at 6c:29:90:ae:8d:3b (oui Unknown), length 46
11:47:44.648395 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:44.902165 IP 192.168.101.6.59731 > 255.255.255.255.6667: UDP, length 172
11:47:45.107493 IP 192.168.101.12.137 > 192.168.101.255.137: UDP, length 50
11:47:45.108253 IP 192.168.101.12.5353 > mdns.mcast.net.5353: 0 A (QM)? homeassistant.local. (37)
11:47:45.108869 IP6 fe80::1086:7ac5:ba91:21c0.5353 > ff02::fb.5353: 0 A (QM)? homeassistant.local. (37)
11:47:45.109902 IP 192.168.101.14.5353 > mdns.mcast.net.5353: 0*- [0q] 1/0/0 (Cache flush) A 192.168.101.14 (47)
11:47:45.110255 IP6 fe80::1086:7ac5:ba91:21c0.53233 > ff02::1:3.5355: UDP, length 31
11:47:45.110523 IP 192.168.101.12.53233 > 224.0.0.252.5355: UDP, length 31
11:47:45.111916 IP 192.168.101.14.5355 > 192.168.101.12.53233: UDP, length 47
11:47:45.112322 IP6 fe80::ec67:d45b:33d3:a0fe.5355 > fe80::1086:7ac5:ba91:21c0.53233: UDP, length 72
11:47:45.117247 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [S], seq 3107547405, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
11:47:45.117464 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [S.], seq 3760895760, ack 3107547406, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
11:47:45.124584 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 1, win 513, length 0
11:47:45.124843 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1:530, ack 1, win 513, length 529
11:47:45.124919 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], ack 530, win 501, length 0
11:47:45.128876 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 1:249, ack 530, win 501, length 248
11:47:45.129595 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 249:414, ack 530, win 501, length 165
11:47:45.134561 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 414, win 511, length 0
11:47:45.135341 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 530:730, ack 414, win 511, length 200
11:47:45.137422 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 414:536, ack 730, win 501, length 122
11:47:45.143775 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 730:794, ack 536, win 511, length 64
11:47:45.143935 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 794:835, ack 536, win 511, length 41
11:47:45.143993 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 835:854, ack 536, win 511, length 19
11:47:45.144400 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], ack 854, win 501, length 0
11:47:45.144933 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 854:890, ack 536, win 511, length 36
11:47:45.144933 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 890:917, ack 536, win 511, length 27
11:47:45.144933 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 917:938, ack 536, win 511, length 21
11:47:45.144933 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 938:956, ack 536, win 511, length 18
11:47:45.144934 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 956:975, ack 536, win 511, length 19
11:47:45.144934 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 975:995, ack 536, win 511, length 20
11:47:45.144934 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 995:1015, ack 536, win 511, length 20
11:47:45.144934 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1015:1034, ack 536, win 511, length 19
11:47:45.145121 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1034:1063, ack 536, win 511, length 29
11:47:45.145122 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1063:1092, ack 536, win 511, length 29
11:47:45.145122 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1092:1124, ack 536, win 511, length 32
11:47:45.145122 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1124:1152, ack 536, win 511, length 28
11:47:45.145122 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1152:1166, ack 536, win 511, length 14
11:47:45.145122 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1166:1234, ack 536, win 511, length 68
11:47:45.145122 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1234:1249, ack 536, win 511, length 15
11:47:45.145123 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1249:1269, ack 536, win 511, length 20
11:47:45.145287 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1269:1288, ack 536, win 511, length 19
11:47:45.145287 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1288:1308, ack 536, win 511, length 20
11:47:45.145287 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1308:1321, ack 536, win 511, length 13
11:47:45.145287 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1321:1335, ack 536, win 511, length 14
11:47:45.145288 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1335:1349, ack 536, win 511, length 14
11:47:45.145288 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1349:1362, ack 536, win 511, length 13
11:47:45.145288 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1362:1375, ack 536, win 511, length 13
11:47:45.145288 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1375:1388, ack 536, win 511, length 13
11:47:45.145397 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1388:1401, ack 536, win 511, length 13
11:47:45.145397 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1401:1414, ack 536, win 511, length 13
11:47:45.145397 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1414:1428, ack 536, win 511, length 14
11:47:45.145397 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1428:1473, ack 536, win 511, length 45
11:47:45.145398 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1473:1490, ack 536, win 511, length 17
11:47:45.145398 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1490:1507, ack 536, win 511, length 17
11:47:45.145398 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1507:1526, ack 536, win 511, length 19
11:47:45.145398 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1526:1539, ack 536, win 511, length 13
11:47:45.145487 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], ack 1401, win 501, length 0
11:47:45.145558 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1539:1557, ack 536, win 511, length 18
11:47:45.145558 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1557:1575, ack 536, win 511, length 18
11:47:45.145558 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1575:1593, ack 536, win 511, length 18
11:47:45.145558 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1593:1616, ack 536, win 511, length 23
11:47:45.145558 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1616:1637, ack 536, win 511, length 21
11:47:45.145558 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1637:1659, ack 536, win 511, length 22
11:47:45.145558 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1659:1677, ack 536, win 511, length 18
11:47:45.145559 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1677:1695, ack 536, win 511, length 18
11:47:45.145664 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1695:1713, ack 536, win 511, length 18
11:47:45.145664 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1713:1735, ack 536, win 511, length 22
11:47:45.145665 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1735:1749, ack 536, win 511, length 14
11:47:45.145665 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1749:1785, ack 536, win 511, length 36
11:47:45.145665 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1785:1807, ack 536, win 511, length 22
11:47:45.145665 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1807:1832, ack 536, win 511, length 25
11:47:45.145665 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1832:1846, ack 536, win 511, length 14
11:47:45.145665 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1846:1860, ack 536, win 511, length 14
11:47:45.145764 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1860:1874, ack 536, win 511, length 14
11:47:45.145764 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1874:1888, ack 536, win 511, length 14
11:47:45.145764 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1888:1915, ack 536, win 511, length 27
11:47:45.149418 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], ack 1915, win 501, length 0
11:47:45.192775 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 536:546, ack 1915, win 501, length 10
11:47:45.192887 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 546:2006, ack 1915, win 501, length 1460
11:47:45.192892 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 2006:3466, ack 1915, win 501, length 1460
11:47:45.192951 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 3466:4926, ack 1915, win 501, length 1460
11:47:45.192956 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 4926:6386, ack 1915, win 501, length 1460
11:47:45.192997 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 6386:7846, ack 1915, win 501, length 1460
11:47:45.193003 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 7846:9306, ack 1915, win 501, length 1460
11:47:45.193038 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 9306:10766, ack 1915, win 501, length 1460
11:47:45.193043 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 10766:12226, ack 1915, win 501, length 1460
11:47:45.193075 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 12226:13686, ack 1915, win 501, length 1460
11:47:45.210249 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 13686:15146, ack 1915, win 501, length 1460
11:47:45.217692 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 546, win 511, options [nop,nop,sack 1 {6386:13686}], length 0
11:47:45.217692 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 2006, win 513, options [nop,nop,sack 1 {6386:13686}], length 0
11:47:45.217692 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 13686, win 513, length 0
11:47:45.217692 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 15146, win 513, length 0
11:47:45.217828 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 15146:16606, ack 1915, win 501, length 1460
11:47:45.217836 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 16606:18066, ack 1915, win 501, length 1460
11:47:45.217839 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 18066:19526, ack 1915, win 501, length 1460
11:47:45.217889 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 19526:20986, ack 1915, win 501, length 1460
11:47:45.217893 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 20986:22446, ack 1915, win 501, length 1460
11:47:45.217896 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 22446:23906, ack 1915, win 501, length 1460
11:47:45.217967 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 23906:25366, ack 1915, win 501, length 1460
11:47:45.217972 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 25366:26826, ack 1915, win 501, length 1460
11:47:45.217974 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 26826:28286, ack 1915, win 501, length 1460
11:47:45.218022 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 28286:29746, ack 1915, win 501, length 1460
11:47:45.218026 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 29746:31206, ack 1915, win 501, length 1460
11:47:45.218029 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 31206:32666, ack 1915, win 501, length 1460
11:47:45.218077 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 32666:34126, ack 1915, win 501, length 1460
11:47:45.218082 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 34126:35586, ack 1915, win 501, length 1460
11:47:45.218085 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 35586:37046, ack 1915, win 501, length 1460
11:47:45.218157 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 37046:38506, ack 1915, win 501, length 1460
11:47:45.218164 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 38506:39966, ack 1915, win 501, length 1460
11:47:45.218167 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 39966:41426, ack 1915, win 501, length 1460
11:47:45.218212 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 41426:42886, ack 1915, win 501, length 1460
11:47:45.218217 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 42886:44346, ack 1915, win 501, length 1460
11:47:45.218220 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 44346:45806, ack 1915, win 501, length 1460
11:47:45.225074 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 25366, win 513, length 0
11:47:45.225217 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 45806:47266, ack 1915, win 501, length 1460
11:47:45.225226 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 47266:48726, ack 1915, win 501, length 1460
11:47:45.225229 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 48726:50186, ack 1915, win 501, length 1460
11:47:45.225231 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 50186:51646, ack 1915, win 501, length 1460
11:47:45.225296 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 51646:53106, ack 1915, win 501, length 1460
11:47:45.225300 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 53106:54566, ack 1915, win 501, length 1460
11:47:45.225304 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 54566:56026, ack 1915, win 501, length 1460
11:47:45.225307 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 56026:57486, ack 1915, win 501, length 1460
11:47:45.225349 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 57486:58946, ack 1915, win 501, length 1460
11:47:45.225354 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 58946:60406, ack 1915, win 501, length 1460
11:47:45.225356 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 60406:61866, ack 1915, win 501, length 1460
11:47:45.225360 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 61866:63326, ack 1915, win 501, length 1460
11:47:45.252253 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 63326:64786, ack 1915, win 501, length 1460
11:47:45.252274 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 64786:66246, ack 1915, win 501, length 1460
11:47:45.311104 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:45.403415 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 48726, win 513, length 0
11:47:45.403415 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 63326, win 513, length 0
11:47:45.403415 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 66246, win 513, length 0
11:47:45.403549 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 66246:67706, ack 1915, win 501, length 1460
11:47:45.403556 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 67706:69166, ack 1915, win 501, length 1460
11:47:45.403604 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 69166:70626, ack 1915, win 501, length 1460
11:47:45.403608 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 70626:72086, ack 1915, win 501, length 1460
11:47:45.403668 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 72086:73546, ack 1915, win 501, length 1460
11:47:45.403672 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 73546:75006, ack 1915, win 501, length 1460
11:47:45.403710 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 75006:76466, ack 1915, win 501, length 1460
11:47:45.403715 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 76466:77926, ack 1915, win 501, length 1460
11:47:45.403753 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 77926:79386, ack 1915, win 501, length 1460
11:47:45.403757 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 79386:80846, ack 1915, win 501, length 1460
11:47:45.403802 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 80846:82306, ack 1915, win 501, length 1460
11:47:45.403807 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 82306:83766, ack 1915, win 501, length 1460
11:47:45.403843 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 83766:85226, ack 1915, win 501, length 1460
11:47:45.403847 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 85226:86686, ack 1915, win 501, length 1460
11:47:45.403884 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 86686:88146, ack 1915, win 501, length 1460
11:47:45.403888 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 88146:89606, ack 1915, win 501, length 1460
11:47:45.403926 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 89606:91066, ack 1915, win 501, length 1460
11:47:45.403930 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 91066:92526, ack 1915, win 501, length 1460
11:47:45.403971 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 92526:93986, ack 1915, win 501, length 1460
11:47:45.403975 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 93986:95446, ack 1915, win 501, length 1460
11:47:45.404012 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 95446:96906, ack 1915, win 501, length 1460
11:47:45.404016 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 96906:98366, ack 1915, win 501, length 1460
11:47:45.404053 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 98366:99826, ack 1915, win 501, length 1460
11:47:45.404057 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 99826:101286, ack 1915, win 501, length 1460
11:47:45.404094 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 101286:102746, ack 1915, win 501, length 1460
11:47:45.404098 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 102746:104206, ack 1915, win 501, length 1460
11:47:45.404134 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 104206:105666, ack 1915, win 501, length 1460
11:47:45.404138 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 105666:107126, ack 1915, win 501, length 1460
11:47:45.404175 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 107126:108586, ack 1915, win 501, length 1460
11:47:45.404179 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 108586:110046, ack 1915, win 501, length 1460
11:47:45.404216 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 110046:111506, ack 1915, win 501, length 1460
11:47:45.404220 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 111506:112966, ack 1915, win 501, length 1460
11:47:45.404257 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 112966:114426, ack 1915, win 501, length 1460
11:47:45.404262 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 114426:115886, ack 1915, win 501, length 1460
11:47:45.404299 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 115886:117346, ack 1915, win 501, length 1460
11:47:45.404303 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 117346:118806, ack 1915, win 501, length 1460
11:47:45.404341 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 118806:120266, ack 1915, win 501, length 1460
11:47:45.404346 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 120266:121726, ack 1915, win 501, length 1460
11:47:45.404382 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 121726:123186, ack 1915, win 501, length 1460
11:47:45.404386 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 123186:124646, ack 1915, win 501, length 1460
11:47:45.404424 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 124646:126106, ack 1915, win 501, length 1460
11:47:45.404428 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 126106:127566, ack 1915, win 501, length 1460
11:47:45.404465 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 127566:129026, ack 1915, win 501, length 1460
11:47:45.404469 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 129026:130486, ack 1915, win 501, length 1460
11:47:45.404505 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 130486:131946, ack 1915, win 501, length 1460
11:47:45.404522 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 131946:133406, ack 1915, win 501, length 1460
11:47:45.404527 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 133406:134866, ack 1915, win 501, length 1460
11:47:45.404561 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 134866:136326, ack 1915, win 501, length 1460
11:47:45.404566 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 136326:137786, ack 1915, win 501, length 1460
11:47:45.404600 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 137786:139246, ack 1915, win 501, length 1460
11:47:45.404605 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 139246:140706, ack 1915, win 501, length 1460
11:47:45.404644 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 140706:142166, ack 1915, win 501, length 1460
11:47:45.404648 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 142166:143626, ack 1915, win 501, length 1460
11:47:45.404686 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 143626:145086, ack 1915, win 501, length 1460
11:47:45.404690 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 145086:146546, ack 1915, win 501, length 1460
11:47:45.404724 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 146546:148006, ack 1915, win 501, length 1460
11:47:45.439571 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 89606, win 513, length 0
11:47:45.439571 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 104206, win 513, length 0
11:47:45.439571 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 127566, win 513, length 0
11:47:45.439572 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 133406, win 513, length 0
11:47:45.439572 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 142166, win 513, length 0
11:47:45.439572 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 148006, win 513, length 0
11:47:45.439833 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 148006:149466, ack 1915, win 501, length 1460
11:47:45.439846 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 149466:150926, ack 1915, win 501, length 1460
11:47:45.439986 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 150926:152386, ack 1915, win 501, length 1460
11:47:45.439995 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 152386:153846, ack 1915, win 501, length 1460
11:47:45.440106 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 153846:155306, ack 1915, win 501, length 1460
11:47:45.440115 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 155306:156766, ack 1915, win 501, length 1460
11:47:45.440121 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 156766:158226, ack 1915, win 501, length 1460
11:47:45.440126 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 158226:159686, ack 1915, win 501, length 1460
11:47:45.440195 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 159686:161146, ack 1915, win 501, length 1460
11:47:45.440204 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 161146:162606, ack 1915, win 501, length 1460
11:47:45.440209 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 162606:164066, ack 1915, win 501, length 1460
11:47:45.440214 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 164066:165526, ack 1915, win 501, length 1460
11:47:45.440279 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 165526:166986, ack 1915, win 501, length 1460
11:47:45.440288 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 166986:168446, ack 1915, win 501, length 1460
11:47:45.440293 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 168446:169906, ack 1915, win 501, length 1460
11:47:45.440299 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 169906:171366, ack 1915, win 501, length 1460
11:47:45.440369 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 171366:172826, ack 1915, win 501, length 1460
11:47:45.440377 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 172826:174286, ack 1915, win 501, length 1460
11:47:45.440383 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 174286:175746, ack 1915, win 501, length 1460
11:47:45.440388 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 175746:177206, ack 1915, win 501, length 1460
11:47:45.440461 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 177206:178666, ack 1915, win 501, length 1460
11:47:45.440469 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 178666:180126, ack 1915, win 501, length 1460
11:47:45.440475 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 180126:181586, ack 1915, win 501, length 1460
11:47:45.440480 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 181586:183046, ack 1915, win 501, length 1460
11:47:45.440552 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 183046:184506, ack 1915, win 501, length 1460
11:47:45.440561 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 184506:185966, ack 1915, win 501, length 1460
11:47:45.440567 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [.], seq 185966:187426, ack 1915, win 501, length 1460
11:47:45.440572 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 187426:188886, ack 1915, win 501, length 1460
11:47:45.440643 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 188886:189444, ack 1915, win 501, length 558
11:47:45.450749 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 171366, win 513, length 0
11:47:45.450750 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 185966, win 513, length 0
11:47:45.450750 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 189444, win 513, length 0
11:47:45.470717 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1915:1941, ack 189444, win 513, length 26
11:47:45.472440 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 189444:189632, ack 1941, win 501, length 188
11:47:45.553901 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 189632, win 512, length 0
11:47:45.672461 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:45.675414 IP 192.168.101.14.33826 > dns1.mtmbali.net.id.53: 18046+ [1au] PTR? 0.c.1.2.1.9.a.b.5.c.a.7.6.8.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. (101)
11:47:45.867724 IP 192.168.101.12.137 > 192.168.101.255.137: UDP, length 50
11:47:46.499352 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 140
11:47:46.631621 IP 192.168.101.12.137 > 192.168.101.255.137: UDP, length 50
11:47:46.695631 ARP, Request who-has 192.168.101.4 tell 192.168.101.1, length 46
11:47:46.719483 ARP, Request who-has 192.168.101.14 tell 192.168.101.1, length 46
11:47:46.719565 ARP, Reply 192.168.101.14 is-at 7c:d3:0a:1d:18:37 (oui Unknown), length 28
11:47:46.949055 ARP, Request who-has 192.168.101.12 tell 192.168.101.1, length 46
11:47:46.994610 ARP, Request who-has 192.168.101.11 tell 192.168.101.1, length 46
11:47:47.013582 IP 192.168.101.14.44049 > 192.168.101.16.38899: UDP, length 105
11:47:47.013813 IP 192.168.101.14.47624 > 192.168.101.7.38899: UDP, length 105
11:47:47.017697 ARP, Request who-has 192.168.101.2 tell 192.168.101.1, length 46
11:47:47.047176 IP 192.168.101.7.38899 > 192.168.101.14.47624: UDP, length 84
11:47:47.047347 IP 192.168.101.7.49156 > 192.168.101.14.38900: UDP, length 114
11:47:47.086846 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [P.], seq 1941:2025, ack 189632, win 512, length 84
11:47:47.093464 IP 192.168.101.14.8123 > 192.168.101.12.50983: Flags [P.], seq 189632:190217, ack 2025, win 501, length 585
11:47:47.099973 ARP, Request who-has 192.168.101.3 tell 192.168.101.14, length 28
11:47:47.162881 IP 192.168.101.12.50983 > 192.168.101.14.8123: Flags [.], ack 190217, win 510, length 0
11:47:47.348235 IP 192.168.101.16.38899 > 192.168.101.14.44049: UDP, length 84
11:47:47.349358 IP 192.168.101.16.51326 > 192.168.101.14.38900: UDP, length 178
11:47:47.677063 IP 192.168.101.14.40320 > dns2.mtmbali.net.id.53: 58125+ [1au] PTR? 0.c.1.2.1.9.a.b.5.c.a.7.6.8.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. (101)
11:47:47.677125 IP 192.168.101.14.60119 > dns1.mtmbali.net.id.53: 4010+ NS? . (17)
11:47:47.687554 IP dns1.mtmbali.net.id.53 > 192.168.101.14.60119: 4010 13/0/15 NS h.root-servers.net., NS k.root-servers.net., NS d.root-servers.net., NS j.root-servers.net., NS e.root-servers.net., NS g.root-servers.net., NS i.root-servers.net., NS f.root-servers.net., NS c.root-servers.net., NS l.root-servers.net., NS m.root-servers.net., NS b.root-servers.net., NS a.root-servers.net. (492)

`

@githubDante
Copy link

192.168.101.3 is definitely not responding to ARP requests, making it unavailable.

@davidrapan
Copy link
Owner

davidrapan commented Dec 6, 2024

Yes it's clear it's not integration's fault. Something on your network is here to blame. Almost reminds me one issue I was experiencing w/ OpenWRT on AX3600, ARP table was not flushed when client reappeared on different network path and packets were still send to their old location. Which is really not the case here as I bet your inverter does not walk around the house, right? 😆

And I proly even know why reload of the integration helps, it's thanks to the discovery which sends broadcast packets at the start so I guess because inverter replies there is then small window for which it works.

Anyway w/ the recent changes I implemented feature of rediscovery after every timeout. 😉

But still, I advise you to try to find the culprit!

@davidrapan davidrapan added invalid This doesn't seem right and removed bug Something isn't working labels Dec 7, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
invalid This doesn't seem right
Projects
None yet
Development

No branches or pull requests

4 participants