Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

HI not sure where to upload this or ask questions about what it is thanks!

Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0 Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22) Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6) Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517 Transport Layer Security

Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0 Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22) Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6) Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517 Transport Layer Security Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0 Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22) Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6) Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517 Transport Layer Security Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0 Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22) Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6) Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517 Transport Layer Security 1313 72.103582 2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net TCP 86 51751 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1 1316 72.117849 e7622.dscg.akamaiedge.net 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86 https(443) → 51750 [SYN, ACK] Seq=0 Ack=1 Win=28800 Len=0 MSS=1440 SACK_PERM=1 WS=128 1318 72.119961 2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net TLSv1.3 591 Client Hello 1319 72.123220 e7622.dscg.akamaiedge.net 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86 https(443) → 51751 [SYN, ACK] Seq=0 Ack=1 Win=28800 Len=0 MSS=1440 SACK_PERM=1 WS=128 1320 72.123390 2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net TCP 74 51751 → https(443) [ACK] Seq=1 Ack=1 Win=132352 Len=0 1321 72.125417 2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net TLSv1.3 591 Client Hello 1538 73.510279 2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net TCP 74 51751 → https(443) [RST, ACK] Seq=1218 Ack=13325 Win=0 Len=0 1771 75.751828 2620:1ec:8f8::254 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74 https(443) → 51724 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0 1790 75.927224 2607:fea8:99a0:1805:6031:4be7:6511:f609 dual-a-0001.a-msedge.net TLSv1.2 205 Application Data 2187 81.317065 dual-a-0001.a-msedge.net 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74 https(443) → 51709 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0 39750 3257.313104 2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com TCP 74 52359 → https(443) [FIN, ACK] Seq=9184 Ack=213563 Win=131584 Len=0 3 0.817611 fe80::4e0:7c03:ad17:2d09 ff02::16 ICMPv6 90 Multicast Listener Report Message v2 2 0.001120 Android.local ff02::fb MDNS 738 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.0.12 AAAA, cache flush fd00:bc4d:fbd0:8922:b937:b89a:30fd:b1cf AAAA, cache flush 2607:fea8:99a0:1805:76eb:80ff:fec6:c340 AAAA, cache flush 2607:fea8:99a0:1805:b937:b89a:30fd:b1cf AAAA, cache flush fe80::76eb:80ff:fec6:c340 AAAA, cache flush fd00:bc4d:fbd0:8922:76eb:80ff:fec6:c340 NSEC, cache flush 12.0.168.192.in-addr.arpa NSEC, cache flush F.C.1.B.D.F.0.3.A.9.8.B.7.3.9.B.2.2.9.8.0.D.B.F.D.4.C.B.0.0.D.F.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.5.0.8.1.0.A.9.9.8.A.E.F.7.0.6.2.ip6.arpa NSEC, cache flush F.C.1.B.D.F.0.3.A.9.8.B.7.3.9.B.5.0.8.1.0.A.9.9.8.A.E.F.7.0.6.2.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.2.2.9.8.0.D.B.F.D.4.C.B.0.0.D.F.ip6.arpa NSEC, cache flush Android.local 3 0.817611 fe80::4e0:7c03:ad17:2d09 ff02::16 ICMPv6 90 Multicast Listener Report Message v2 85 8.741180 fe80::be4d:fbff:fed0:8922 2607:fea8:99a0:1805:6031:4be7:6511:f609 ICMPv6 86 Neighbor Solicitation for 2607:fea8:99a0:1805:6031:4be7:6511:f609 from bc:4d:fb:d0:89:22 86 8.741289 2607:fea8:99a0:1805:6031:4be7:6511:f609 fe80::be4d:fbff:fed0:8922 ICMPv6 86 Neighbor Advertisement 2607:fea8:99a0:1805:6031:4be7:6511:f609 (sol, ovr) is at c8:d7:19:c3:b3:b5 351 53.361799 192.168.0.13 192.168.0.1 TCP 66 51735 → 45121 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1 598 66.298150 l-0003.l-msedge.net 192.168.0.13 TCP 56 https(443) → 51716 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0 599 66.299698 dual-a-0001.a-msedge.net 192.168.0.13 TCP 56 https(443) → 51719 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0 600 66.308744 192.168.0.13 platform.origin.avg.com TLSv1.2 628 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message 620 67.269749 dual-a-0001.a-msedge.net 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86 https(443) → 51743 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1400 WS=256 SACK_PERM=1 631 67.355784 2607:fea8:99a0:1805:6031:4be7:6511:f609 dual-a-0001.a-msedge.net TLSv1.2 232 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message 632 67.367874 dual-a-0001.a-msedge.net 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74 https(443) → 51743 [ACK] Seq=7371 Ack=676 Win=524800 Len=0 633 67.368983 dual-a-0001.a-msedge.net 2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.2 125 Change Cipher Spec, Encrypted Handshake Message 634 67.368984 dual-a-0001.a-msedge.net 2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.2 143 Application Data 640 67.392475 dual-a-0001.a-msedge.net 192.168.0.13 TCP 56 https(443) → 51718 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0 739 67.995107 192.168.0.13 urlinfo.ns1.ff.avast.com TCP 66 51744 → https(443) [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1 745 68.037653 urlinfo.ns1.ff.avast.com 192.168.0.13 TCP 62 https(443) → 51744 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 WS=128 747 68.041596 192.168.0.13 urlinfo.ns1.ff.avast.com TLSv1.2 571 Client Hello 804 68.620757 2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com TCP 86 51747 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1 809 68.682844 beacons-handoff.gcp.gvt2.com 2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 1294 Server Hello, Change Cipher Spec 810 68.682846 beacons-handoff.gcp.gvt2.com 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 1294 https(443) → 51747 [ACK] Seq=1221 Ack=518 Win=66816 Len=1220 [TCP segment of a reassembled PDU] 811 68.682846 beacons-handoff.gcp.gvt2.com 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 1294 https(443) → 51747 [ACK] Seq=2441 Ack=518 Win=66816 Len=1220 [TCP segment of a reassembled PDU] 812 68.682847 beacons-handoff.gcp.gvt2.com 2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 210 Application Data 815 68.747925 beacons-handoff.gcp.gvt2.com 2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 686 Application Data, Application Data 816 68.789291 2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com TCP 74 51747 → https(443) [ACK] Seq=598 Ack=4409 Win=131072 Len=0 817 68.930791 192.168.0.1 239.255.255.250 SSDP 423 NOTIFY * HTTP/1.1 900 69.366345 192.168.0.13 104.92.231.222 TCP 54 51692 → http(80) [FIN, ACK] Seq=1 Ack=1 Win=513 Len=0 903 69.386197 192.168.0.13 wg.spotify.com TCP 54 51691 → https(443) [ACK] Seq=2 Ack=2 Win=512 Len=0 1135 70.125807 192.168.0.13 www.tm.a.prd.aadg.akadns.net TLSv1.2 571 Client Hello 1508 73.480472 2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com TCP 74 51747 → https(443) [RST, ACK] Seq=598 Ack=4409 Win=0 Len=0 1771 75.751828 2620:1ec:8f8::254 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74 https(443) → 51724 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0 1882 77.900116 204.79.197.222 192.168.0.13 TCP 56 https(443) → 51722 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0 2171 80.046095 2620:1ec:26:49::41 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74 https(443) → 51725 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0 3119 115.149659 192.168.0.13 k-9999.k-msedge.net TLSv1.2 212 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message 3120 115.150855 192.168.0.13 k-9999.k-msedge.net TLSv1.2 141 Application Data 3121 115.151192 192.168.0.13 k-9999.k-msedge.net TLSv1.2 378 Application Data 3122 115.161633 k-9999.k-msedge.net 192.168.0.13 TCP 60 https(443) → 51772 [ACK] Seq=6331 Ack=397 Win=525056 Len=0 3123 115.162883 k-9999.k-msedge.net 192.168.0.13 TLSv1.2 105 Change Cipher Spec, Encrypted Handshake Message 3140 115.204122 2607:fea8:99a0:1805:6031:4be7:6511:f609 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 DNS 103 Standard query 0xfa10 AAAA rum18.perf.linkedin.com 3393 119.919229 2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com TCP 86 51785 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1 3396 119.933633 beacons-handoff.gcp.gvt2.com 2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86 https(443) → 51785 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1360 SACK_PERM=1 WS=256 3415 120.128188 2607:fea8:99a0:1805:6031:4be7:6511:f609 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 ICMPv6 86 Neighbor Solicitation for 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 from c8:d7:19:c3:b3:b5 3416 120.132179 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 2607:fea8:99a0:1805:6031:4be7:6511:f609 ICMPv6 78 Neighbor Advertisement 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 (rtr, sol)

Anyways tons of beacons no idea what that means and have lots more but not sure what is relevant or not thanks

click to hide/show revision 2
None

HI not sure where to upload this or ask questions about what it is thanks!

Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0 Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22) Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6) Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517 Transport Layer Security

Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0
Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22)
Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6)
Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517
Transport Layer Security
Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0
Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22)
Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6)
Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517
Transport Layer Security
Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0
Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22)
Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6)
Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517
Transport Layer Security
1313    72.103582   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TCP 86  51751 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1
1316    72.117849   e7622.dscg.akamaiedge.net   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51750 [SYN, ACK] Seq=0 Ack=1 Win=28800 Len=0 MSS=1440 SACK_PERM=1 WS=128
1318    72.119961   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TLSv1.3 591 Client Hello
1319    72.123220   e7622.dscg.akamaiedge.net   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51751 [SYN, ACK] Seq=0 Ack=1 Win=28800 Len=0 MSS=1440 SACK_PERM=1 WS=128
1320    72.123390   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TCP 74  51751 → https(443) [ACK] Seq=1 Ack=1 Win=132352 Len=0
1321    72.125417   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TLSv1.3 591 Client Hello
1538    73.510279   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TCP 74  51751 → https(443) [RST, ACK] Seq=1218 Ack=13325 Win=0 Len=0
1771    75.751828   2620:1ec:8f8::254   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51724 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1790    75.927224   2607:fea8:99a0:1805:6031:4be7:6511:f609 dual-a-0001.a-msedge.net    TLSv1.2 205 Application Data
2187    81.317065   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51709 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
39750   3257.313104 2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 74  52359 → https(443) [FIN, ACK] Seq=9184 Ack=213563 Win=131584 Len=0
3   0.817611    fe80::4e0:7c03:ad17:2d09    ff02::16    ICMPv6  90  Multicast Listener Report Message v2
2   0.001120    Android.local   ff02::fb    MDNS    738 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.0.12 AAAA, cache flush fd00:bc4d:fbd0:8922:b937:b89a:30fd:b1cf AAAA, cache flush 2607:fea8:99a0:1805:76eb:80ff:fec6:c340 AAAA, cache flush 2607:fea8:99a0:1805:b937:b89a:30fd:b1cf AAAA, cache flush fe80::76eb:80ff:fec6:c340 AAAA, cache flush fd00:bc4d:fbd0:8922:76eb:80ff:fec6:c340 NSEC, cache flush 12.0.168.192.in-addr.arpa NSEC, cache flush F.C.1.B.D.F.0.3.A.9.8.B.7.3.9.B.2.2.9.8.0.D.B.F.D.4.C.B.0.0.D.F.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.5.0.8.1.0.A.9.9.8.A.E.F.7.0.6.2.ip6.arpa NSEC, cache flush F.C.1.B.D.F.0.3.A.9.8.B.7.3.9.B.5.0.8.1.0.A.9.9.8.A.E.F.7.0.6.2.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.2.2.9.8.0.D.B.F.D.4.C.B.0.0.D.F.ip6.arpa NSEC, cache flush Android.local
3   0.817611    fe80::4e0:7c03:ad17:2d09    ff02::16    ICMPv6  90  Multicast Listener Report Message v2
85  8.741180    fe80::be4d:fbff:fed0:8922   2607:fea8:99a0:1805:6031:4be7:6511:f609 ICMPv6  86  Neighbor Solicitation for 2607:fea8:99a0:1805:6031:4be7:6511:f609 from bc:4d:fb:d0:89:22
86  8.741289    2607:fea8:99a0:1805:6031:4be7:6511:f609 fe80::be4d:fbff:fed0:8922   ICMPv6  86  Neighbor Advertisement 2607:fea8:99a0:1805:6031:4be7:6511:f609 (sol, ovr) is at c8:d7:19:c3:b3:b5
351 53.361799   192.168.0.13    192.168.0.1 TCP 66  51735 → 45121 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
598 66.298150   l-0003.l-msedge.net 192.168.0.13    TCP 56  https(443) → 51716 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
599 66.299698   dual-a-0001.a-msedge.net    192.168.0.13    TCP 56  https(443) → 51719 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
600 66.308744   192.168.0.13    platform.origin.avg.com TLSv1.2 628 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
620 67.269749   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51743 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1400 WS=256 SACK_PERM=1
631 67.355784   2607:fea8:99a0:1805:6031:4be7:6511:f609 dual-a-0001.a-msedge.net    TLSv1.2 232 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
632 67.367874   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51743 [ACK] Seq=7371 Ack=676 Win=524800 Len=0
633 67.368983   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.2 125 Change Cipher Spec, Encrypted Handshake Message
634 67.368984   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.2 143 Application Data
640 67.392475   dual-a-0001.a-msedge.net    192.168.0.13    TCP 56  https(443) → 51718 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
739 67.995107   192.168.0.13    urlinfo.ns1.ff.avast.com    TCP 66  51744 → https(443) [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
745 68.037653   urlinfo.ns1.ff.avast.com    192.168.0.13    TCP 62  https(443) → 51744 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
747 68.041596   192.168.0.13    urlinfo.ns1.ff.avast.com    TLSv1.2 571 Client Hello
804 68.620757   2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 86  51747 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1
809 68.682844   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 1294    Server Hello, Change Cipher Spec
810 68.682846   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 1294    https(443) → 51747 [ACK] Seq=1221 Ack=518 Win=66816 Len=1220 [TCP segment of a reassembled PDU]
811 68.682846   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 1294    https(443) → 51747 [ACK] Seq=2441 Ack=518 Win=66816 Len=1220 [TCP segment of a reassembled PDU]
812 68.682847   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 210 Application Data
815 68.747925   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 686 Application Data, Application Data
816 68.789291   2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 74  51747 → https(443) [ACK] Seq=598 Ack=4409 Win=131072 Len=0
817 68.930791   192.168.0.1 239.255.255.250 SSDP    423 NOTIFY * HTTP/1.1 
900 69.366345   192.168.0.13    104.92.231.222  TCP 54  51692 → http(80) [FIN, ACK] Seq=1 Ack=1 Win=513 Len=0
903 69.386197   192.168.0.13    wg.spotify.com  TCP 54  51691 → https(443) [ACK] Seq=2 Ack=2 Win=512 Len=0
1135    70.125807   192.168.0.13    www.tm.a.prd.aadg.akadns.net    TLSv1.2 571 Client Hello
1508    73.480472   2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 74  51747 → https(443) [RST, ACK] Seq=598 Ack=4409 Win=0 Len=0
1771    75.751828   2620:1ec:8f8::254   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51724 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1882    77.900116   204.79.197.222  192.168.0.13    TCP 56  https(443) → 51722 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
2171    80.046095   2620:1ec:26:49::41  2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51725 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3119    115.149659  192.168.0.13    k-9999.k-msedge.net TLSv1.2 212 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
3120    115.150855  192.168.0.13    k-9999.k-msedge.net TLSv1.2 141 Application Data
3121    115.151192  192.168.0.13    k-9999.k-msedge.net TLSv1.2 378 Application Data
3122    115.161633  k-9999.k-msedge.net 192.168.0.13    TCP 60  https(443) → 51772 [ACK] Seq=6331 Ack=397 Win=525056 Len=0
3123    115.162883  k-9999.k-msedge.net 192.168.0.13    TLSv1.2 105 Change Cipher Spec, Encrypted Handshake Message
3140    115.204122  2607:fea8:99a0:1805:6031:4be7:6511:f609 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 DNS 103 Standard query 0xfa10 AAAA rum18.perf.linkedin.com
3393    119.919229  2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 86  51785 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1
3396    119.933633  beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51785 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1360 SACK_PERM=1 WS=256
3415    120.128188  2607:fea8:99a0:1805:6031:4be7:6511:f609 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 ICMPv6  86  Neighbor Solicitation for 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 from c8:d7:19:c3:b3:b5
3416    120.132179  2607:fea8:99a0:1805:be4d:fbff:fed0:8922 2607:fea8:99a0:1805:6031:4be7:6511:f609 ICMPv6  78  Neighbor Advertisement 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 (rtr, sol)

sol)

Anyways tons of beacons no idea what that means and have lots more but not sure what is relevant or not thanks

click to hide/show revision 3
None

HI not sure where to upload this or ask questions about what it is thanks!

Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0 Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22) Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6) Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517 Transport Layer Security

Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0
Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22)
Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6)
Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517
Transport Layer Security
Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0
Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22)
Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6)
Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517
Transport Layer Security
Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0
Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22)
Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6)
Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517
Transport Layer Security
 1313    72.103582   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TCP 86  51751 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1
1316    72.117849   e7622.dscg.akamaiedge.net   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51750 [SYN, ACK] Seq=0 Ack=1 Win=28800 Len=0 MSS=1440 SACK_PERM=1 WS=128
1318    72.119961   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TLSv1.3 591 Client Hello
1319    72.123220   e7622.dscg.akamaiedge.net   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51751 [SYN, ACK] Seq=0 Ack=1 Win=28800 Len=0 MSS=1440 SACK_PERM=1 WS=128
1320    72.123390   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TCP 74  51751 → https(443) [ACK] Seq=1 Ack=1 Win=132352 Len=0
1321    72.125417   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TLSv1.3 591 Client Hello
1538    73.510279   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TCP 74  51751 → https(443) [RST, ACK] Seq=1218 Ack=13325 Win=0 Len=0
1771    75.751828   2620:1ec:8f8::254   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51724 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1790    75.927224   2607:fea8:99a0:1805:6031:4be7:6511:f609 dual-a-0001.a-msedge.net    TLSv1.2 205 Application Data
2187    81.317065   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51709 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
39750   3257.313104 2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 74  52359 → https(443) [FIN, ACK] Seq=9184 Ack=213563 Win=131584 Len=0
3   0.817611    fe80::4e0:7c03:ad17:2d09    ff02::16    ICMPv6  90  Multicast Listener Report Message v2
2   0.001120    Android.local   ff02::fb    MDNS    738 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.0.12 AAAA, cache flush fd00:bc4d:fbd0:8922:b937:b89a:30fd:b1cf AAAA, cache flush 2607:fea8:99a0:1805:76eb:80ff:fec6:c340 AAAA, cache flush 2607:fea8:99a0:1805:b937:b89a:30fd:b1cf AAAA, cache flush fe80::76eb:80ff:fec6:c340 AAAA, cache flush fd00:bc4d:fbd0:8922:76eb:80ff:fec6:c340 NSEC, cache flush 12.0.168.192.in-addr.arpa NSEC, cache flush F.C.1.B.D.F.0.3.A.9.8.B.7.3.9.B.2.2.9.8.0.D.B.F.D.4.C.B.0.0.D.F.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.5.0.8.1.0.A.9.9.8.A.E.F.7.0.6.2.ip6.arpa NSEC, cache flush F.C.1.B.D.F.0.3.A.9.8.B.7.3.9.B.5.0.8.1.0.A.9.9.8.A.E.F.7.0.6.2.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.2.2.9.8.0.D.B.F.D.4.C.B.0.0.D.F.ip6.arpa NSEC, cache flush Android.local
3   0.817611    fe80::4e0:7c03:ad17:2d09    ff02::16    ICMPv6  90  Multicast Listener Report Message v2
85  8.741180    fe80::be4d:fbff:fed0:8922   2607:fea8:99a0:1805:6031:4be7:6511:f609 ICMPv6  86  Neighbor Solicitation for 2607:fea8:99a0:1805:6031:4be7:6511:f609 from bc:4d:fb:d0:89:22
86  8.741289    2607:fea8:99a0:1805:6031:4be7:6511:f609 fe80::be4d:fbff:fed0:8922   ICMPv6  86  Neighbor Advertisement 2607:fea8:99a0:1805:6031:4be7:6511:f609 (sol, ovr) is at c8:d7:19:c3:b3:b5
351 53.361799   192.168.0.13    192.168.0.1 TCP 66  51735 → 45121 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
598 66.298150   l-0003.l-msedge.net 192.168.0.13    TCP 56  https(443) → 51716 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
599 66.299698   dual-a-0001.a-msedge.net    192.168.0.13    TCP 56  https(443) → 51719 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
600 66.308744   192.168.0.13    platform.origin.avg.com TLSv1.2 628 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
620 67.269749   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51743 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1400 WS=256 SACK_PERM=1
631 67.355784   2607:fea8:99a0:1805:6031:4be7:6511:f609 dual-a-0001.a-msedge.net    TLSv1.2 232 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
632 67.367874   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51743 [ACK] Seq=7371 Ack=676 Win=524800 Len=0
633 67.368983   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.2 125 Change Cipher Spec, Encrypted Handshake Message
634 67.368984   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.2 143 Application Data
640 67.392475   dual-a-0001.a-msedge.net    192.168.0.13    TCP 56  https(443) → 51718 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
739 67.995107   192.168.0.13    urlinfo.ns1.ff.avast.com    TCP 66  51744 → https(443) [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
745 68.037653   urlinfo.ns1.ff.avast.com    192.168.0.13    TCP 62  https(443) → 51744 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
747 68.041596   192.168.0.13    urlinfo.ns1.ff.avast.com    TLSv1.2 571 Client Hello
804 68.620757   2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 86  51747 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1
809 68.682844   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 1294    Server Hello, Change Cipher Spec
810 68.682846   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 1294    https(443) → 51747 [ACK] Seq=1221 Ack=518 Win=66816 Len=1220 [TCP segment of a reassembled PDU]
811 68.682846   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 1294    https(443) → 51747 [ACK] Seq=2441 Ack=518 Win=66816 Len=1220 [TCP segment of a reassembled PDU]
812 68.682847   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 210 Application Data
815 68.747925   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 686 Application Data, Application Data
816 68.789291   2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 74  51747 → https(443) [ACK] Seq=598 Ack=4409 Win=131072 Len=0
817 68.930791   192.168.0.1 239.255.255.250 SSDP    423 NOTIFY * HTTP/1.1 
900 69.366345   192.168.0.13    104.92.231.222  TCP 54  51692 → http(80) [FIN, ACK] Seq=1 Ack=1 Win=513 Len=0
903 69.386197   192.168.0.13    wg.spotify.com  TCP 54  51691 → https(443) [ACK] Seq=2 Ack=2 Win=512 Len=0
1135    70.125807   192.168.0.13    www.tm.a.prd.aadg.akadns.net    TLSv1.2 571 Client Hello
1508    73.480472   2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 74  51747 → https(443) [RST, ACK] Seq=598 Ack=4409 Win=0 Len=0
1771    75.751828   2620:1ec:8f8::254   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51724 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1882    77.900116   204.79.197.222  192.168.0.13    TCP 56  https(443) → 51722 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
2171    80.046095   2620:1ec:26:49::41  2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51725 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3119    115.149659  192.168.0.13    k-9999.k-msedge.net TLSv1.2 212 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
3120    115.150855  192.168.0.13    k-9999.k-msedge.net TLSv1.2 141 Application Data
3121    115.151192  192.168.0.13    k-9999.k-msedge.net TLSv1.2 378 Application Data
3122    115.161633  k-9999.k-msedge.net 192.168.0.13    TCP 60  https(443) → 51772 [ACK] Seq=6331 Ack=397 Win=525056 Len=0
3123    115.162883  k-9999.k-msedge.net 192.168.0.13    TLSv1.2 105 Change Cipher Spec, Encrypted Handshake Message
3140    115.204122  2607:fea8:99a0:1805:6031:4be7:6511:f609 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 DNS 103 Standard query 0xfa10 AAAA rum18.perf.linkedin.com
3393    119.919229  2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 86  51785 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1
3396    119.933633  beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51785 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1360 SACK_PERM=1 WS=256
3415    120.128188  2607:fea8:99a0:1805:6031:4be7:6511:f609 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 ICMPv6  86  Neighbor Solicitation for 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 from c8:d7:19:c3:b3:b5
3416    120.132179  2607:fea8:99a0:1805:be4d:fbff:fed0:8922 2607:fea8:99a0:1805:6031:4be7:6511:f609 ICMPv6  78  Neighbor Advertisement 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 (rtr, sol)

Anyways tons of beacons no idea what that means and have lots more but not sure what is relevant or not thanks

click to hide/show revision 4
None

HI not sure where to upload this or ask questions about what it is thanks!

Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0 Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22) Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6) Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517 Transport Layer SecurityPackets:

Frame 1321: 591 bytes on wire (4728 bits), 591 bytes captured (4728 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0
Ethernet II, Src: Cisco-Li_c3:b3:b5 (c8:d7:19:c3:b3:b5), Dst: HitronTe_d0:89:22 (bc:4d:fb:d0:89:22)
Internet Protocol Version 6, Src: 2607:fea8:99a0:1805:6031:4be7:6511:f609 (2607:fea8:99a0:1805:6031:4be7:6511:f609), Dst: e7622.dscg.akamaiedge.net (2600:140a:6000:28e::1dc6)
Transmission Control Protocol, Src Port: 51751 (51751), Dst Port: https (443), Seq: 1, Ack: 1, Len: 517
Transport Layer Security

1313    72.103582   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TCP 86  51751 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1
1316    72.117849   e7622.dscg.akamaiedge.net   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51750 [SYN, ACK] Seq=0 Ack=1 Win=28800 Len=0 MSS=1440 SACK_PERM=1 WS=128
1318    72.119961   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TLSv1.3 591 Client Hello
1319    72.123220   e7622.dscg.akamaiedge.net   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51751 [SYN, ACK] Seq=0 Ack=1 Win=28800 Len=0 MSS=1440 SACK_PERM=1 WS=128
1320    72.123390   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TCP 74  51751 → https(443) [ACK] Seq=1 Ack=1 Win=132352 Len=0
1321    72.125417   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TLSv1.3 591 Client Hello
1538    73.510279   2607:fea8:99a0:1805:6031:4be7:6511:f609 e7622.dscg.akamaiedge.net   TCP 74  51751 → https(443) [RST, ACK] Seq=1218 Ack=13325 Win=0 Len=0
1771    75.751828   2620:1ec:8f8::254   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51724 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1790    75.927224   2607:fea8:99a0:1805:6031:4be7:6511:f609 dual-a-0001.a-msedge.net    TLSv1.2 205 Application Data
2187    81.317065   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51709 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
39750   3257.313104 2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 74  52359 → https(443) [FIN, ACK] Seq=9184 Ack=213563 Win=131584 Len=0
3   0.817611    fe80::4e0:7c03:ad17:2d09    ff02::16    ICMPv6  90  Multicast Listener Report Message v2
2   0.001120    Android.local   ff02::fb    MDNS    738 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.0.12 AAAA, cache flush fd00:bc4d:fbd0:8922:b937:b89a:30fd:b1cf AAAA, cache flush 2607:fea8:99a0:1805:76eb:80ff:fec6:c340 AAAA, cache flush 2607:fea8:99a0:1805:b937:b89a:30fd:b1cf AAAA, cache flush fe80::76eb:80ff:fec6:c340 AAAA, cache flush fd00:bc4d:fbd0:8922:76eb:80ff:fec6:c340 NSEC, cache flush 12.0.168.192.in-addr.arpa NSEC, cache flush F.C.1.B.D.F.0.3.A.9.8.B.7.3.9.B.2.2.9.8.0.D.B.F.D.4.C.B.0.0.D.F.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.5.0.8.1.0.A.9.9.8.A.E.F.7.0.6.2.ip6.arpa NSEC, cache flush F.C.1.B.D.F.0.3.A.9.8.B.7.3.9.B.5.0.8.1.0.A.9.9.8.A.E.F.7.0.6.2.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush 0.4.3.C.6.C.E.F.F.F.0.8.B.E.6.7.2.2.9.8.0.D.B.F.D.4.C.B.0.0.D.F.ip6.arpa NSEC, cache flush Android.local
3   0.817611    fe80::4e0:7c03:ad17:2d09    ff02::16    ICMPv6  90  Multicast Listener Report Message v2
85  8.741180    fe80::be4d:fbff:fed0:8922   2607:fea8:99a0:1805:6031:4be7:6511:f609 ICMPv6  86  Neighbor Solicitation for 2607:fea8:99a0:1805:6031:4be7:6511:f609 from bc:4d:fb:d0:89:22
86  8.741289    2607:fea8:99a0:1805:6031:4be7:6511:f609 fe80::be4d:fbff:fed0:8922   ICMPv6  86  Neighbor Advertisement 2607:fea8:99a0:1805:6031:4be7:6511:f609 (sol, ovr) is at c8:d7:19:c3:b3:b5
351 53.361799   192.168.0.13    192.168.0.1 TCP 66  51735 → 45121 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
598 66.298150   l-0003.l-msedge.net 192.168.0.13    TCP 56  https(443) → 51716 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
599 66.299698   dual-a-0001.a-msedge.net    192.168.0.13    TCP 56  https(443) → 51719 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
600 66.308744   192.168.0.13    platform.origin.avg.com TLSv1.2 628 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
620 67.269749   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51743 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1400 WS=256 SACK_PERM=1
631 67.355784   2607:fea8:99a0:1805:6031:4be7:6511:f609 dual-a-0001.a-msedge.net    TLSv1.2 232 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
632 67.367874   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51743 [ACK] Seq=7371 Ack=676 Win=524800 Len=0
633 67.368983   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.2 125 Change Cipher Spec, Encrypted Handshake Message
634 67.368984   dual-a-0001.a-msedge.net    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.2 143 Application Data
640 67.392475   dual-a-0001.a-msedge.net    192.168.0.13    TCP 56  https(443) → 51718 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
739 67.995107   192.168.0.13    urlinfo.ns1.ff.avast.com    TCP 66  51744 → https(443) [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
745 68.037653   urlinfo.ns1.ff.avast.com    192.168.0.13    TCP 62  https(443) → 51744 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 WS=128
747 68.041596   192.168.0.13    urlinfo.ns1.ff.avast.com    TLSv1.2 571 Client Hello
804 68.620757   2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 86  51747 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1
809 68.682844   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 1294    Server Hello, Change Cipher Spec
810 68.682846   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 1294    https(443) → 51747 [ACK] Seq=1221 Ack=518 Win=66816 Len=1220 [TCP segment of a reassembled PDU]
811 68.682846   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 1294    https(443) → 51747 [ACK] Seq=2441 Ack=518 Win=66816 Len=1220 [TCP segment of a reassembled PDU]
812 68.682847   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 210 Application Data
815 68.747925   beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TLSv1.3 686 Application Data, Application Data
816 68.789291   2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 74  51747 → https(443) [ACK] Seq=598 Ack=4409 Win=131072 Len=0
817 68.930791   192.168.0.1 239.255.255.250 SSDP    423 NOTIFY * HTTP/1.1 
900 69.366345   192.168.0.13    104.92.231.222  TCP 54  51692 → http(80) [FIN, ACK] Seq=1 Ack=1 Win=513 Len=0
903 69.386197   192.168.0.13    wg.spotify.com  TCP 54  51691 → https(443) [ACK] Seq=2 Ack=2 Win=512 Len=0
1135    70.125807   192.168.0.13    www.tm.a.prd.aadg.akadns.net    TLSv1.2 571 Client Hello
1508    73.480472   2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 74  51747 → https(443) [RST, ACK] Seq=598 Ack=4409 Win=0 Len=0
1771    75.751828   2620:1ec:8f8::254   2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51724 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1882    77.900116   204.79.197.222  192.168.0.13    TCP 56  https(443) → 51722 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
2171    80.046095   2620:1ec:26:49::41  2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 74  https(443) → 51725 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3119    115.149659  192.168.0.13    k-9999.k-msedge.net TLSv1.2 212 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
3120    115.150855  192.168.0.13    k-9999.k-msedge.net TLSv1.2 141 Application Data
3121    115.151192  192.168.0.13    k-9999.k-msedge.net TLSv1.2 378 Application Data
3122    115.161633  k-9999.k-msedge.net 192.168.0.13    TCP 60  https(443) → 51772 [ACK] Seq=6331 Ack=397 Win=525056 Len=0
3123    115.162883  k-9999.k-msedge.net 192.168.0.13    TLSv1.2 105 Change Cipher Spec, Encrypted Handshake Message
3140    115.204122  2607:fea8:99a0:1805:6031:4be7:6511:f609 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 DNS 103 Standard query 0xfa10 AAAA rum18.perf.linkedin.com
3393    119.919229  2607:fea8:99a0:1805:6031:4be7:6511:f609 beacons-handoff.gcp.gvt2.com    TCP 86  51785 → https(443) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1
3396    119.933633  beacons-handoff.gcp.gvt2.com    2607:fea8:99a0:1805:6031:4be7:6511:f609 TCP 86  https(443) → 51785 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1360 SACK_PERM=1 WS=256
3415    120.128188  2607:fea8:99a0:1805:6031:4be7:6511:f609 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 ICMPv6  86  Neighbor Solicitation for 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 from c8:d7:19:c3:b3:b5
3416    120.132179  2607:fea8:99a0:1805:be4d:fbff:fed0:8922 2607:fea8:99a0:1805:6031:4be7:6511:f609 ICMPv6  78  Neighbor Advertisement 2607:fea8:99a0:1805:be4d:fbff:fed0:8922 (rtr, sol)

Anyways tons of beacons no idea what that means and have lots more but not sure what is relevant or not thanks