Ask Your Question

Revision history [back]

ethernet arp interface id NBNS Beacons Hosts

on my interface ID search something weird showed up platform.twitter.map.fastly.net Frame 359668: 42 bytes on wire (336 bits), 42 bytes captured (336 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0 Interface id: 0 (\Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}) Interface name: \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A} Interface description: Wi-Fi 2 Encapsulation type: Ethernet (1) Arrival Time: Mar 5, 2020 09:27:17.403230000 Eastern Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1583418437.403230000 seconds [Time delta from previous captured frame: 0.000067000 seconds] [Time delta from previous displayed frame: 0.000067000 seconds] [Time since reference or first frame: 17404.962768000 seconds] Frame Number: 359668 Frame Length: 42 bytes (336 bits) Capture Length: 42 bytes (336 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:arp] [Coloring Rule Name: ARP] [Coloring Rule String: arp] Ethernet II, Src: DESKTOP-Q4VCO63.local (c8:d7:19:c3:b3:b5), Dst: Broadcast (ff:ff:ff:ff:ff:ff) Address Resolution Protocol (request) NBNS 92 Name query NB WORKGROUP<1b> 407105 2020-03-05 09:47:22.270373 0.client-channel.google.com DESKTOP-Q4VCO63.local TLSv1.3 126 Application Data 407489 2020-03-05 09:48:06.306890 beacons4.gvt2.com DESKTOP-Q4VCO63.local TCP 60 https(443) → 59306 [ACK] Seq=4990 Ack=1676 Win=64000 Len=0 409357 2020-03-05 09:50:17.802580 192.168.0.254 DESKTOP-Q4VCO63.local TCP 54 cloudcheck(45514) → 59341 [RST, ACK] Seq=1 Ack=197 Win=15680 Len=0 410733 2020-03-05 09:51:39.929230 192.168.0.254 192.168.0.255 BROWSER 255 Local Master Announcement INTEL_CE_LINUX, Workstation, Server, Print Queue Server, Xenix Server, NT Workstation, NT Server, Master Browser, DFS server 410917 2020-03-05 09:52:26.467093 nyc04-007.ff.avast.com DESKTOP-Q4VCO63.local TCP 60 http(80) → 51814 [ACK] Seq=202310 Ack=20537 Win=17 Len=0 DEC-LanBridge-Copy-packets-(All-bridges) 418967 2020-03-05 09:57:50.801442 settingsfd-geo.trafficmanager.net DESKTOP-Q4VCO63.local TCP 60 https(443) → 59486 [ACK] Seq=3852 Ack=1236 Win=261632 Len=0 420307 2020-03-05 09:59:21.607250 DESKTOP-Q4VCO63.local 192.168.0.255 BROWSER 216 Get Backup List Request 422802 2020-03-05 10:00:21.290413 DESKTOP-Q4VCO63.local www.gstatic.com TCP 74 59543 → https(443) [ACK] Seq=3038 Ack=4785 Win=130816 Len=0 09:00:2b:00:00:05 DEC-MAP-(or-OSI?)-Intermediate-System-Hello? DEC-Local-Area-VAX-Cluster-groups-SCA DEC-DNA-Level-2-Routing-Layer-routers?DEC-CSMA/CD-Encryption? DEC-MOP-Remote-Console DOCSIS-CMTS DOCSIS-STP DSPGroup nmea-onenet Odd right?Hosts 67997 2020-03-05 05:57:56.146827 DESKTOP-Q4VCO63.local a1488.dscd.akamai.net TCP 86 [TCP Retransmission] 54497 → http(80) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1

click to hide/show revision 2
None

ethernet arp interface id NBNS Beacons Hosts

on my interface ID search something weird showed up platform.twitter.map.fastly.net platform.twitter.map.fastly.net

Frame 359668: 42 bytes on wire (336 bits), 42 bytes captured (336 bits) on interface \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}, id 0
    Interface id: 0 (\Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A})
        Interface name: \Device\NPF_{0B73953C-3C2D-4A0F-92DE-C4FC81698B9A}
        Interface description: Wi-Fi 2
    Encapsulation type: Ethernet (1)
    Arrival Time: Mar  5, 2020 09:27:17.403230000 Eastern Standard Time
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1583418437.403230000 seconds
    [Time delta from previous captured frame: 0.000067000 seconds]
    [Time delta from previous displayed frame: 0.000067000 seconds]
    [Time since reference or first frame: 17404.962768000 seconds]
    Frame Number: 359668
    Frame Length: 42 bytes (336 bits)
    Capture Length: 42 bytes (336 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: eth:ethertype:arp]
    [Coloring Rule Name: ARP]
    [Coloring Rule String: arp]
 Ethernet II, Src: DESKTOP-Q4VCO63.local (c8:d7:19:c3:b3:b5), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
 Address Resolution Protocol (request)  
NBNS    92  Name query NB WORKGROUP<1b>
407105  2020-03-05 09:47:22.270373  0.client-channel.google.com DESKTOP-Q4VCO63.local   TLSv1.3 126 Application Data
407489  2020-03-05 09:48:06.306890  beacons4.gvt2.com   DESKTOP-Q4VCO63.local   TCP 60  https(443) → 59306 [ACK] Seq=4990 Ack=1676 Win=64000 Len=0
409357  2020-03-05 09:50:17.802580  192.168.0.254   DESKTOP-Q4VCO63.local   TCP 54  cloudcheck(45514) → 59341 [RST, ACK] Seq=1 Ack=197 Win=15680 Len=0
410733  2020-03-05 09:51:39.929230  192.168.0.254   192.168.0.255   BROWSER 255 Local Master Announcement INTEL_CE_LINUX, Workstation, Server, Print Queue Server, Xenix Server, NT Workstation, NT Server, Master Browser, DFS server
410917  2020-03-05 09:52:26.467093  nyc04-007.ff.avast.com  DESKTOP-Q4VCO63.local   TCP 60  http(80) → 51814 [ACK] Seq=202310 Ack=20537 Win=17 Len=0
DEC-LanBridge-Copy-packets-(All-bridges)
418967  2020-03-05 09:57:50.801442  settingsfd-geo.trafficmanager.net   DESKTOP-Q4VCO63.local   TCP 60  https(443) → 59486 [ACK] Seq=3852 Ack=1236 Win=261632 Len=0
420307  2020-03-05 09:59:21.607250  DESKTOP-Q4VCO63.local   192.168.0.255   BROWSER 216 Get Backup List Request
422802  2020-03-05 10:00:21.290413  DESKTOP-Q4VCO63.local   www.gstatic.com TCP 74  59543 → https(443) [ACK] Seq=3038 Ack=4785 Win=130816 Len=0
09:00:2b:00:00:05 DEC-MAP-(or-OSI?)-Intermediate-System-Hello?
DEC-Local-Area-VAX-Cluster-groups-SCA
DEC-DNA-Level-2-Routing-Layer-routers?DEC-CSMA/CD-Encryption?
DEC-MOP-Remote-Console
DOCSIS-CMTS DOCSIS-STP 
DSPGroup nmea-onenet
Odd right?Hosts
67997   2020-03-05 05:57:56.146827  DESKTOP-Q4VCO63.local   a1488.dscd.akamai.net   TCP 86  [TCP Retransmission] 54497 → http(80) [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM=1

SACK_PERM=1