Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

Why Is My Laptop Loopback to Port (5037) Andriod Device

This is always happens offline, while opening up another Wireshark interface. So, I want to see the activity of the Loopback when I open up another Wireshark and connect online to view traffic. Therefore offline, while bring up the second Wireshark my computer does a loopback and is communicating offline with an Android device. I do not have one running, but I'm looking for the offline hacker, when I'm actually online to them as a control issue of theirs. Frame 1: 56 bytes on wire, 56 bytes captured on interface \Device\NPF_Loopback, id 0 Null/Loopback Family: IP (2) Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1) 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 52 Identification: 0xc45a (50266) Flags: 0x40, Don't fragment 0... .... = Security flag: Not evil .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set ...0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 128 Protocol: TCP (6) Header Checksum: 0x0000 incorrect, should be 0x3867(may be caused by "IP checksum offload"?) [Expert Info (Error/Checksum): Bad checksum [should be 0x3867]] [Header checksum status: Bad] [Calculated Checksum: 0x3867] Source Address: 127.0.0.1 (127.0.0.1) <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[source="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[destination="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" transmission="" control="" protocol,="" src="" port:="" 49688="" (49688),="" dst="" port:="" 5037="" (5037),="" seq:="" 0,="" len:="" 0="" source="" port:="" 49688="" (49688)="" destination="" port:="" 5037="" (5037)="" <source="" or="" destination="" port:="" 49688="" (49688)&gt;="" <source="" or="" destination="" port:="" 5037="" (5037)&gt;="" [stream="" index:="" 0]="" [conversation="" completeness:="" incomplete="" (37)]="" [tcp="" segment="" len:="" 0]="" sequence="" number:="" 0="" (relative="" sequence="" number)="" sequence="" number="" (raw):="" 2276443805="" [next="" sequence="" number:="" 1="" (relative="" sequence="" number)]="" acknowledgment="" number:="" 0="" acknowledgment="" number="" (raw):="" 0="" 1000="" ....="Header" length:="" 32="" bytes="" (8)="" flags:="" 0x002="" (syn)="" 000.="" ....="" ....="Reserved:" not="" set="" ...0="" ....="" ....="Nonce:" not="" set="" ....="" 0...="" ....="Congestion" window="" reduced="" (cwr):="" not="" set="" ....="" .0..="" ....="ECN-Echo:" not="" set="" ....="" ..0.="" ....="Urgent:" not="" set="" ....="" ...0="" ....="Acknowledgment:" not="" set="" ....="" ....="" 0...="Push:" not="" set="" ....="" ....="" .0..="Reset:" not="" set="" ....="" ....="" ..1.="Syn:" set="" [expert="" info="" (chat="" sequence):="" connection="" establish="" request="" (syn):="" server="" port="" 5037]="" [connection="" establish="" request="" (syn):="" server="" port="" 5037]="" <message:="" connection="" establish="" request="" (syn):="" server="" port="" 5037=""> [Severity level: Chat] [Group: Sequence] .... .... ...0 = Fin: Not set [TCP Flags: ··········S·] Window: 65535 [Calculated window size: 65535] Checksum: 0x52d7 [correct] [Checksum Status: Good] [Calculated Checksum: 0x52d7] Urgent Pointer: 0 Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted TCP Option - Maximum segment size: 65495 bytes TCP Option - No-Operation (NOP) TCP Option - Window scale: 8 (multiply by 256) TCP Option - No-Operation (NOP) TCP Option - No-Operation (NOP) TCP Option - SACK permitted [Timestamps] [Time since first frame in this TCP stream: 0.000000000 seconds] [Time since previous frame in this TCP stream: 0.000000000 seconds]

Then frame 2: Frame 2: 44 bytes on wire, 44 bytes captured on interface \Device\NPF_Loopback, id 0 Null/Loopback Family: IP (2) Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1) 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xc45b (50267) Flags: 0x40, Don't fragment 0... .... = Security flag: Not evil .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set ...0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 128 Protocol: TCP (6) Header Checksum: 0x0000 incorrect, should be 0x3872(may be caused by "IP checksum offload"?) [Expert Info (Error/Checksum): Bad checksum [should be 0x3872]] [Bad checksum [should be 0x3872]] <message: bad="" checksum="" [should="" be="" 0x3872]&gt;="" [severity="" level:="" error]="" [group:="" checksum]="" [header="" checksum="" status:="" bad]="" [calculated="" checksum:="" 0x3872]="" source="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[source="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[destination="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" transmission="" control="" protocol,="" src="" port:="" 5037="" (5037),="" dst="" port:="" 49688="" (49688),="" seq:="" 1,="" ack:="" 1,="" len:="" 0="" source="" port:="" 5037="" (5037)="" destination="" port:="" 49688="" (49688)="" <source="" or="" destination="" port:="" 5037="" (5037)&gt;="" <source="" or="" destination="" port:="" 49688="" (49688)&gt;="" [stream="" index:="" 0]="" [conversation="" completeness:="" incomplete="" (37)]="" [tcp="" segment="" len:="" 0]="" sequence="" number:="" 1="" (relative="" sequence="" number)="" sequence="" number="" (raw):="" 0="" [next="" sequence="" number:="" 1="" (relative="" sequence="" number)]="" acknowledgment="" number:="" 1="" (relative="" ack="" number)="" acknowledgment="" number="" (raw):="" 2276443806="" 0101="" ....="Header" length:="" 20="" bytes="" (5)="" flags:="" 0x014="" (rst,="" ack)="" 000.="" ....="" ....="Reserved:" not="" set="" ...0="" ....="" ....="Nonce:" not="" set="" ....="" 0...="" ....="Congestion" window="" reduced="" (cwr):="" not="" set="" ....="" .0..="" ....="ECN-Echo:" not="" set="" ....="" ..0.="" ....="Urgent:" not="" set="" ....="" ...1="" ....="Acknowledgment:" set="" ....="" ....="" 0...="Push:" not="" set="" ....="" ....="" .1..="Reset:" set="" [expert="" info="" (warning="" sequence):="" connection="" reset="" (rst)]="" [connection="" reset="" (rst)]="" <message:="" connection="" reset="" (rst)&gt;="" [severity="" level:="" warning]="" [group:="" sequence]="" ....="" ....="" ..0.="Syn:" not="" set="" ....="" ....="" ...0="Fin:" not="" set="" [tcp="" flags:="" ·······a·r··]="" window:="" 0="" [calculated="" window="" size:="" 0]="" [window="" size="" scaling="" factor:="" -1="" (unknown)]="" checksum:="" 0x8dba="" [correct]="" [checksum="" status:="" good]="" [calculated="" checksum:="" 0x8dba]="" urgent="" pointer:="" 0="" [timestamps]="" [time="" since="" first="" frame="" in="" this="" tcp="" stream:="" 0.000041000="" seconds]="" [time="" since="" previous="" frame="" in="" this="" tcp="" stream:="" 0.000041000="" seconds]="" [seq="" ack="" analysis]="" [this="" is="" an="" ack="" to="" the="" segment="" in="" frame:="" 1]="" [the="" rtt="" to="" ack="" the="" segment="" was:="" 0.000041000="" seconds]="" [irtt:="" 0.000041000="" seconds]<="" p="">

Thank You very much in advance!

Why Is My Laptop Loopback to Port (5037) Andriod Device

This is always happens offline, while opening up another Wireshark interface. So, I want to see the activity of the Loopback when I open up another Wireshark and connect online to view traffic. Therefore offline, while bring up the second Wireshark my computer does a loopback and is communicating offline with an Android device. I do not have one running, but I'm looking for the offline hacker, when I'm actually online to them as a control issue of theirs.

In the preview this looks like it is all jumbled together, but in my view of it as I have copied and pasted, it is not that way. Sorry, I cannot straighten it out.

Frame 1: 56 bytes on wire, 56 bytes captured on interface \Device\NPF_Loopback, id 0 Null/Loopback Family: IP (2) Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1) 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 52 Identification: 0xc45a (50266) Flags: 0x40, Don't fragment 0... .... = Security flag: Not evil .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set ...0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 128 Protocol: TCP (6) Header Checksum: 0x0000 incorrect, should be 0x3867(may be caused by "IP checksum offload"?) [Expert Info (Error/Checksum): Bad checksum [should be 0x3867]] [Header checksum status: Bad] [Calculated Checksum: 0x3867] Source Address: 127.0.0.1 (127.0.0.1) <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[source="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[destination="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" transmission="" control="" protocol,="" src="" port:="" 49688="" (49688),="" dst="" port:="" 5037="" (5037),="" seq:="" 0,="" len:="" 0="" source="" port:="" 49688="" (49688)="" destination="" port:="" 5037="" (5037)="" <source="" or="" destination="" port:="" 49688="" (49688)&gt;="" <source="" or="" destination="" port:="" 5037="" (5037)&gt;="" [stream="" index:="" 0]="" [conversation="" completeness:="" incomplete="" (37)]="" [tcp="" segment="" len:="" 0]="" sequence="" number:="" 0="" (relative="" sequence="" number)="" sequence="" number="" (raw):="" 2276443805="" [next="" sequence="" number:="" 1="" (relative="" sequence="" number)]="" acknowledgment="" number:="" 0="" acknowledgment="" number="" (raw):="" 0="" 1000="" ....="Header" length:="" 32="" bytes="" (8)="" flags:="" 0x002="" (syn)="" 000.="" ....="" ....="Reserved:" not="" set="" ...0="" ....="" ....="Nonce:" not="" set="" ....="" 0...="" ....="Congestion" window="" reduced="" (cwr):="" not="" set="" ....="" .0..="" ....="ECN-Echo:" not="" set="" ....="" ..0.="" ....="Urgent:" not="" set="" ....="" ...0="" ....="Acknowledgment:" not="" set="" ....="" ....="" 0...="Push:" not="" set="" ....="" ....="" .0..="Reset:" not="" set="" ....="" ....="" ..1.="Syn:" set="" [expert="" info="" (chat="" sequence):="" connection="" establish="" request="" (syn):="" server="" port="" 5037]="" [connection="" establish="" request="" (syn):="" server="" port="" 5037]="" <message:="" connection="" establish="" request="" (syn):="" server="" port="" 5037=""> [Severity level: Chat] [Group: Sequence] .... .... ...0 = Fin: Not set [TCP Flags: ··········S·] Window: 65535 [Calculated window size: 65535] Checksum: 0x52d7 [correct] [Checksum Status: Good] [Calculated Checksum: 0x52d7] Urgent Pointer: 0 Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted TCP Option - Maximum segment size: 65495 bytes TCP Option - No-Operation (NOP) TCP Option - Window scale: 8 (multiply by 256) TCP Option - No-Operation (NOP) TCP Option - No-Operation (NOP) TCP Option - SACK permitted [Timestamps] [Time since first frame in this TCP stream: 0.000000000 seconds] [Time since previous frame in this TCP stream: 0.000000000 seconds]

Then frame 2: Frame 2: 44 bytes on wire, 44 bytes captured on interface \Device\NPF_Loopback, id 0 Null/Loopback Family: IP (2) Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1) 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xc45b (50267) Flags: 0x40, Don't fragment 0... .... = Security flag: Not evil .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set ...0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 128 Protocol: TCP (6) Header Checksum: 0x0000 incorrect, should be 0x3872(may be caused by "IP checksum offload"?) [Expert Info (Error/Checksum): Bad checksum [should be 0x3872]] [Bad checksum [should be 0x3872]] <message: bad="" checksum="" [should="" be="" 0x3872]&gt;="" [severity="" level:="" error]="" [group:="" checksum]="" [header="" checksum="" status:="" bad]="" [calculated="" checksum:="" 0x3872]="" source="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[source="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[destination="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" transmission="" control="" protocol,="" src="" port:="" 5037="" (5037),="" dst="" port:="" 49688="" (49688),="" seq:="" 1,="" ack:="" 1,="" len:="" 0="" source="" port:="" 5037="" (5037)="" destination="" port:="" 49688="" (49688)="" <source="" or="" destination="" port:="" 5037="" (5037)&gt;="" <source="" or="" destination="" port:="" 49688="" (49688)&gt;="" [stream="" index:="" 0]="" [conversation="" completeness:="" incomplete="" (37)]="" [tcp="" segment="" len:="" 0]="" sequence="" number:="" 1="" (relative="" sequence="" number)="" sequence="" number="" (raw):="" 0="" [next="" sequence="" number:="" 1="" (relative="" sequence="" number)]="" acknowledgment="" number:="" 1="" (relative="" ack="" number)="" acknowledgment="" number="" (raw):="" 2276443806="" 0101="" ....="Header" length:="" 20="" bytes="" (5)="" flags:="" 0x014="" (rst,="" ack)="" 000.="" ....="" ....="Reserved:" not="" set="" ...0="" ....="" ....="Nonce:" not="" set="" ....="" 0...="" ....="Congestion" window="" reduced="" (cwr):="" not="" set="" ....="" .0..="" ....="ECN-Echo:" not="" set="" ....="" ..0.="" ....="Urgent:" not="" set="" ....="" ...1="" ....="Acknowledgment:" set="" ....="" ....="" 0...="Push:" not="" set="" ....="" ....="" .1..="Reset:" set="" [expert="" info="" (warning="" sequence):="" connection="" reset="" (rst)]="" [connection="" reset="" (rst)]="" <message:="" connection="" reset="" (rst)&gt;="" [severity="" level:="" warning]="" [group:="" sequence]="" ....="" ....="" ..0.="Syn:" not="" set="" ....="" ....="" ...0="Fin:" not="" set="" [tcp="" flags:="" ·······a·r··]="" window:="" 0="" [calculated="" window="" size:="" 0]="" [window="" size="" scaling="" factor:="" -1="" (unknown)]="" checksum:="" 0x8dba="" [correct]="" [checksum="" status:="" good]="" [calculated="" checksum:="" 0x8dba]="" urgent="" pointer:="" 0="" [timestamps]="" [time="" since="" first="" frame="" in="" this="" tcp="" stream:="" 0.000041000="" seconds]="" [time="" since="" previous="" frame="" in="" this="" tcp="" stream:="" 0.000041000="" seconds]="" [seq="" ack="" analysis]="" [this="" is="" an="" ack="" to="" the="" segment="" in="" frame:="" 1]="" [the="" rtt="" to="" ack="" the="" segment="" was:="" 0.000041000="" seconds]="" [irtt:="" 0.000041000="" seconds]<="" p="">

Thank You very much in advance!

Why Is My Laptop Loopback to Port (5037) Andriod Device

This is always happens offline, while opening up another Wireshark interface. So, I want to see the activity of the Loopback when I open up another Wireshark and connect online to view traffic. Therefore offline, while bring up the second Wireshark my computer does a loopback and is communicating offline with an Android device. I do not have one running, but I'm looking for the offline hacker, when I'm actually online to them as a control issue of theirs.

In the preview this looks like it is all jumbled together, but in my view of it as I have copied and pasted, it is not that way. Sorry, I cannot straighten it out.

60 Points needed to upload a picture. I do not have that yet.

Frame 1: 56 bytes on wire, 56 bytes captured on interface \Device\NPF_Loopback, id 0 Null/Loopback Family: IP (2) Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1) 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 52 Identification: 0xc45a (50266) Flags: 0x40, Don't fragment 0... .... = Security flag: Not evil .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set ...0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 128 Protocol: TCP (6) Header Checksum: 0x0000 incorrect, should be 0x3867(may be caused by "IP checksum offload"?) [Expert Info (Error/Checksum): Bad checksum [should be 0x3867]] [Header checksum status: Bad] [Calculated Checksum: 0x3867] Source Address: 127.0.0.1 (127.0.0.1) <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[source="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[destination="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" transmission="" control="" protocol,="" src="" port:="" 49688="" (49688),="" dst="" port:="" 5037="" (5037),="" seq:="" 0,="" len:="" 0="" source="" port:="" 49688="" (49688)="" destination="" port:="" 5037="" (5037)="" <source="" or="" destination="" port:="" 49688="" (49688)&gt;="" <source="" or="" destination="" port:="" 5037="" (5037)&gt;="" [stream="" index:="" 0]="" [conversation="" completeness:="" incomplete="" (37)]="" [tcp="" segment="" len:="" 0]="" sequence="" number:="" 0="" (relative="" sequence="" number)="" sequence="" number="" (raw):="" 2276443805="" [next="" sequence="" number:="" 1="" (relative="" sequence="" number)]="" acknowledgment="" number:="" 0="" acknowledgment="" number="" (raw):="" 0="" 1000="" ....="Header" length:="" 32="" bytes="" (8)="" flags:="" 0x002="" (syn)="" 000.="" ....="" ....="Reserved:" not="" set="" ...0="" ....="" ....="Nonce:" not="" set="" ....="" 0...="" ....="Congestion" window="" reduced="" (cwr):="" not="" set="" ....="" .0..="" ....="ECN-Echo:" not="" set="" ....="" ..0.="" ....="Urgent:" not="" set="" ....="" ...0="" ....="Acknowledgment:" not="" set="" ....="" ....="" 0...="Push:" not="" set="" ....="" ....="" .0..="Reset:" not="" set="" ....="" ....="" ..1.="Syn:" set="" [expert="" info="" (chat="" sequence):="" connection="" establish="" request="" (syn):="" server="" port="" 5037]="" [connection="" establish="" request="" (syn):="" server="" port="" 5037]="" <message:="" connection="" establish="" request="" (syn):="" server="" port="" 5037=""> [Severity level: Chat] [Group: Sequence] .... .... ...0 = Fin: Not set [TCP Flags: ··········S·] Window: 65535 [Calculated window size: 65535] Checksum: 0x52d7 [correct] [Checksum Status: Good] [Calculated Checksum: 0x52d7] Urgent Pointer: 0 Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted TCP Option - Maximum segment size: 65495 bytes TCP Option - No-Operation (NOP) TCP Option - Window scale: 8 (multiply by 256) TCP Option - No-Operation (NOP) TCP Option - No-Operation (NOP) TCP Option - SACK permitted [Timestamps] [Time since first frame in this TCP stream: 0.000000000 seconds] [Time since previous frame in this TCP stream: 0.000000000 seconds]

Then frame 2: Frame 2: 44 bytes on wire, 44 bytes captured on interface \Device\NPF_Loopback, id 0 Null/Loopback Family: IP (2) Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1) 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xc45b (50267) Flags: 0x40, Don't fragment 0... .... = Security flag: Not evil .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set ...0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 128 Protocol: TCP (6) Header Checksum: 0x0000 incorrect, should be 0x3872(may be caused by "IP checksum offload"?) [Expert Info (Error/Checksum): Bad checksum [should be 0x3872]] [Bad checksum [should be 0x3872]] <message: bad="" checksum="" [should="" be="" 0x3872]&gt;="" [severity="" level:="" error]="" [group:="" checksum]="" [header="" checksum="" status:="" bad]="" [calculated="" checksum:="" 0x3872]="" source="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[source="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[destination="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" transmission="" control="" protocol,="" src="" port:="" 5037="" (5037),="" dst="" port:="" 49688="" (49688),="" seq:="" 1,="" ack:="" 1,="" len:="" 0="" source="" port:="" 5037="" (5037)="" destination="" port:="" 49688="" (49688)="" <source="" or="" destination="" port:="" 5037="" (5037)&gt;="" <source="" or="" destination="" port:="" 49688="" (49688)&gt;="" [stream="" index:="" 0]="" [conversation="" completeness:="" incomplete="" (37)]="" [tcp="" segment="" len:="" 0]="" sequence="" number:="" 1="" (relative="" sequence="" number)="" sequence="" number="" (raw):="" 0="" [next="" sequence="" number:="" 1="" (relative="" sequence="" number)]="" acknowledgment="" number:="" 1="" (relative="" ack="" number)="" acknowledgment="" number="" (raw):="" 2276443806="" 0101="" ....="Header" length:="" 20="" bytes="" (5)="" flags:="" 0x014="" (rst,="" ack)="" 000.="" ....="" ....="Reserved:" not="" set="" ...0="" ....="" ....="Nonce:" not="" set="" ....="" 0...="" ....="Congestion" window="" reduced="" (cwr):="" not="" set="" ....="" .0..="" ....="ECN-Echo:" not="" set="" ....="" ..0.="" ....="Urgent:" not="" set="" ....="" ...1="" ....="Acknowledgment:" set="" ....="" ....="" 0...="Push:" not="" set="" ....="" ....="" .1..="Reset:" set="" [expert="" info="" (warning="" sequence):="" connection="" reset="" (rst)]="" [connection="" reset="" (rst)]="" <message:="" connection="" reset="" (rst)&gt;="" [severity="" level:="" warning]="" [group:="" sequence]="" ....="" ....="" ..0.="Syn:" not="" set="" ....="" ....="" ...0="Fin:" not="" set="" [tcp="" flags:="" ·······a·r··]="" window:="" 0="" [calculated="" window="" size:="" 0]="" [window="" size="" scaling="" factor:="" -1="" (unknown)]="" checksum:="" 0x8dba="" [correct]="" [checksum="" status:="" good]="" [calculated="" checksum:="" 0x8dba]="" urgent="" pointer:="" 0="" [timestamps]="" [time="" since="" first="" frame="" in="" this="" tcp="" stream:="" 0.000041000="" seconds]="" [time="" since="" previous="" frame="" in="" this="" tcp="" stream:="" 0.000041000="" seconds]="" [seq="" ack="" analysis]="" [this="" is="" an="" ack="" to="" the="" segment="" in="" frame:="" 1]="" [the="" rtt="" to="" ack="" the="" segment="" was:="" 0.000041000="" seconds]="" [irtt:="" 0.000041000="" seconds]<="" p="">

Thank You very much in advance!

Why Is My Laptop Loopback to Port (5037) Andriod Device

This is always happens offline, offline while opening up another Wireshark interface. So, I want to see the activity of the Loopback when I open up another Wireshark and connect online to view traffic. Therefore offline, while bring up the second Wireshark my computer does a loopback and is communicating offline with an Android device. I do not have one running, but I'm looking for the offline hacker, when I'm actually online to them as a control issue of theirs.

In the preview this looks like it is all jumbled together, but in my view of it as I have copied and pasted, it is not that way. Sorry, I cannot straighten it out.

60 Points needed to upload a picture. I do not have that yet.

Frame 1: 56 bytes on wire, 56 bytes captured on interface \Device\NPF_Loopback, id 0
Null/Loopback
    Family: IP (2)
Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1)
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
        0000 00.. = Differentiated Services Codepoint: Default (0)
        .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
    Total Length: 52
    Identification: 0xc45a (50266)
    Flags: 0x40, Don't fragment
        0... .... = Security flag: Not evil
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 128
    Protocol: TCP (6)
    Header Checksum: 0x0000 incorrect, should be 0x3867(may be caused by "IP checksum offload"?)
        [Expert Info (Error/Checksum): Bad checksum [should be 0x3867]]
    [Header checksum status: Bad]
    [Calculated Checksum: 0x3867]
    Source Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[source="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" (127.0.0.1)="">
    <[Source Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
    Destination Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[destination="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" transmission="" control="" protocol,="" src="" port:="" 49688="" (49688),="" dst="" port:="" 5037="" (5037),="" seq:="" 0,="" len:="" 0="" source="" port:="" 49688="" (49688)="" destination="" port:="" 5037="" (5037)="" <source="" (127.0.0.1)="">
    <[Destination Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
Transmission Control Protocol, Src Port: 49688 (49688), Dst Port: 5037 (5037), Seq: 0, Len: 0
    Source Port: 49688 (49688)
    Destination Port: 5037 (5037)
    <source or="" destination="" port:="" 49688="" (49688)&gt;="" <source="" (49688)="">
    <source or="" destination="" port:="" 5037="" (5037)&gt;="" [stream="" index:="" 0]="" [conversation="" completeness:="" incomplete="" (37)]="" [tcp="" segment="" len:="" 0]="" sequence="" number:="" 0="" (relative="" sequence="" number)="" sequence="" number="" (raw):="" 2276443805="" [next="" sequence="" number:="" 1="" (relative="" sequence="" number)]="" acknowledgment="" number:="" 0="" acknowledgment="" number="" (raw):="" 0="" 1000="" ....="Header" length:="" 32="" bytes="" (8)="" flags:="" 0x002="" (syn)="" 000.="" ....="" ....="Reserved:" not="" set="" ...0="" ....="" ....="Nonce:" not="" set="" ....="" 0...="" ....="Congestion" window="" reduced="" (cwr):="" not="" set="" ....="" .0..="" ....="ECN-Echo:" not="" set="" ....="" ..0.="" ....="Urgent:" not="" set="" ....="" ...0="" ....="Acknowledgment:" not="" set="" ....="" ....="" 0...="Push:" not="" set="" ....="" ....="" .0..="Reset:" not="" set="" ....="" ....="" ..1.="Syn:" set="" [expert="" info="" (chat="" sequence):="" connection="" establish="" request="" (syn):="" server="" port="" 5037]="" [connection="" establish="" request="" (syn):="" server="" port="" 5037]="" <message:="" (5037)="">
    [Stream index: 0]
    [Conversation completeness: Incomplete (37)]
    [TCP Segment Len: 0]
    Sequence Number: 0    (relative sequence number)
    Sequence Number (raw): 2276443805
    [Next Sequence Number: 1    (relative sequence number)]
    Acknowledgment Number: 0
    Acknowledgment number (raw): 0
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x002 (SYN)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...0 .... = Acknowledgment: Not set
        .... .... 0... = Push: Not set
        .... .... .0.. = Reset: Not set
        .... .... ..1. = Syn: Set
            [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 5037]
                [Connection establish request (SYN): server port 5037]
                <message: connection="" establish="" request="" (syn):="" server="" port="" 5037="">
                [Severity level: Chat]
                [Group: Sequence]
        .... .... ...0 = Fin: Not set
        [TCP Flags: ··········S·]
    Window: 65535
    [Calculated window size: 65535]
    Checksum: 0x52d7 [correct]
    [Checksum Status: Good]
    [Calculated Checksum: 0x52d7]
    Urgent Pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
        TCP Option - Maximum segment size: 65495 bytes
        TCP Option - No-Operation (NOP)
        TCP Option - Window scale: 8 (multiply by 256)
        TCP Option - No-Operation (NOP)
        TCP Option - No-Operation (NOP)
        TCP Option - SACK permitted
    [Timestamps]
        [Time since first frame in this TCP stream: 0.000000000 seconds]
        [Time since previous frame in this TCP stream: 0.000000000 seconds]

seconds]

Then frame 2: Frame 2: 44 bytes on wire, 44 bytes captured on interface \Device\NPF_Loopback, id 0 Null/Loopback Family: IP (2) Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1) 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 40 Identification: 0xc45b (50267) Flags: 0x40, Don't fragment 0... .... = Security flag: Not evil .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set ...0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 128 Protocol: TCP (6) Header Checksum: 0x0000 incorrect, should be 0x3872(may be caused by "IP checksum offload"?) [Expert Info (Error/Checksum): Bad checksum [should be 0x3872]] [Bad checksum [should be 0x3872]] <message: bad="" checksum="" [should="" be="" 0x3872]&gt;="" [severity="" level:="" error]="" [group:="" checksum]="" [header="" checksum="" status:="" bad]="" [calculated="" checksum:="" 0x3872]="" source="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" 0x3872]=""> [Severity level: Error] [Group: Checksum] [Header checksum status: Bad] [Calculated Checksum: 0x3872] Source Address: 127.0.0.1 (127.0.0.1) <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[source="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="" <source="" (127.0.0.1)=""> <[Source Host: 127.0.0.1]> <[Source or Destination Host: 127.0.0.1]> Destination Address: 127.0.0.1 (127.0.0.1) <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)&gt;="" &lt;[destination="" host:="" 127.0.0.1]&gt;="" &lt;[source="" or="" destination="" host:="" 127.0.0.1]&gt;="" transmission="" control="" protocol,="" src="" port:="" 5037="" (5037),="" dst="" port:="" 49688="" (49688),="" seq:="" 1,="" ack:="" 1,="" len:="" 0="" source="" port:="" 5037="" (5037)="" destination="" port:="" 49688="" (49688)="" <source="" (127.0.0.1)=""> <[Destination Host: 127.0.0.1]> <[Source or Destination Host: 127.0.0.1]> Transmission Control Protocol, Src Port: 5037 (5037), Dst Port: 49688 (49688), Seq: 1, Ack: 1, Len: 0 Source Port: 5037 (5037) Destination Port: 49688 (49688) <source or="" destination="" port:="" 5037="" (5037)&gt;="" <source="" (5037)=""> <source or="" destination="" port:="" 49688="" (49688)&gt;="" [stream="" index:="" 0]="" [conversation="" completeness:="" incomplete="" (37)]="" [tcp="" segment="" len:="" 0]="" sequence="" number:="" 1="" (relative="" sequence="" number)="" sequence="" number="" (raw):="" 0="" [next="" sequence="" number:="" 1="" (relative="" sequence="" number)]="" acknowledgment="" number:="" 1="" (relative="" ack="" number)="" acknowledgment="" number="" (raw):="" 2276443806="" 0101="" ....="Header" length:="" 20="" bytes="" (5)="" flags:="" 0x014="" (rst,="" ack)="" 000.="" ....="" ....="Reserved:" not="" set="" ...0="" ....="" ....="Nonce:" not="" set="" ....="" 0...="" ....="Congestion" window="" reduced="" (cwr):="" not="" set="" ....="" .0..="" ....="ECN-Echo:" not="" set="" ....="" ..0.="" ....="Urgent:" not="" set="" ....="" ...1="" ....="Acknowledgment:" set="" ....="" ....="" 0...="Push:" not="" set="" ....="" ....="" .1..="Reset:" set="" [expert="" info="" (warning="" sequence):="" (49688)=""> [Stream index: 0] [Conversation completeness: Incomplete (37)] [TCP Segment Len: 0] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 0 [Next Sequence Number: 1 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 2276443806 0101 .... = Header Length: 20 bytes (5) Flags: 0x014 (RST, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 0... = Push: Not set .... .... .1.. = Reset: Set [Expert Info (Warning/Sequence): Connection reset (RST)] [Connection reset (RST)] <message: connection="" reset="" (rst)]="" [connection="" reset="" (rst)]="" <message:="" connection="" reset="" (rst)&gt;="" [severity="" level:="" warning]="" [group:="" sequence]="" ....="" ....="" ..0.="Syn:" not="" set="" ....="" ....="" ...0="Fin:" not="" set="" [tcp="" flags:="" ·······a·r··]="" window:="" 0="" [calculated="" window="" size:="" 0]="" [window="" size="" scaling="" factor:="" -1="" (unknown)]="" checksum:="" 0x8dba="" [correct]="" [checksum="" status:="" good]="" [calculated="" checksum:="" 0x8dba]="" urgent="" pointer:="" 0="" [timestamps]="" [time="" since="" first="" frame="" in="" this="" tcp="" stream:="" 0.000041000="" seconds]="" [time="" since="" previous="" frame="" in="" this="" tcp="" stream:="" 0.000041000="" seconds]="" [seq="" ack="" analysis]="" [this="" is="" an="" ack="" to="" the="" segment="" in="" frame:="" 1]="" [the="" rtt="" to="" ack="" the="" segment="" was:="" 0.000041000="" seconds]="" [irtt:="" 0.000041000="" seconds]<="" p=""> (rst)=""> [Severity level: Warning] [Group: Sequence] .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······A·R··] Window: 0 [Calculated window size: 0] [Window size scaling factor: -1 (unknown)] Checksum: 0x8dba [correct] [Checksum Status: Good] [Calculated Checksum: 0x8dba] Urgent Pointer: 0 [Timestamps] [Time since first frame in this TCP stream: 0.000041000 seconds] [Time since previous frame in this TCP stream: 0.000041000 seconds] [SEQ/ACK analysis] [This is an ACK to the segment in frame: 1] [The RTT to ACK the segment was: 0.000041000 seconds] [iRTT: 0.000041000 seconds]

Thank You very much in advance!

Why Is My Laptop Loopback to Port (5037) Andriod Device

This always happens offline while opening I start up the Loopback Adapter on Wireshark, then I will start another Wireshark capture for my ethernet interface. So, When I want to see do this, the activity Loopback Adapter will have at least 2 frames, with port (5037). This is an Android device and I'm on Windows 10. In Resource Monitor on my Windows 10, I have an extra Network name that gets most of the Loopback when I open up another Wireshark and connect online traffic. Is there anyway to view traffic. Therefore offline, while bring up the second Wireshark my computer does a loopback and is communicating offline with an Android device. I do not have one running, but I'm looking for the offline hacker, when I'm actually online to them as a control issue of theirs. find out if these are connected?

Thank you so very much,

Vtechie

In the preview this looks like it is all jumbled together, but in my view of it as I have copied and pasted, it is not that way. Sorry, I cannot straighten it out.

60 Points needed to upload a picture. I do not have that yet.

Frame 1: 56 bytes on wire, 56 bytes captured on interface \Device\NPF_Loopback, id 0
Null/Loopback
    Family: IP (2)
Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1)
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
        0000 00.. = Differentiated Services Codepoint: Default (0)
        .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
    Total Length: 52
    Identification: 0xc45a (50266)
    Flags: 0x40, Don't fragment
        0... .... = Security flag: Not evil
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 128
    Protocol: TCP (6)
    Header Checksum: 0x0000 incorrect, should be 0x3867(may be caused by "IP checksum offload"?)
        [Expert Info (Error/Checksum): Bad checksum [should be 0x3867]]
    [Header checksum status: Bad]
    [Calculated Checksum: 0x3867]
    Source Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Source Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
    Destination Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Destination Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
Transmission Control Protocol, Src Port: 49688 (49688), Dst Port: 5037 (5037), Seq: 0, Len: 0
    Source Port: 49688 (49688)
    Destination Port: 5037 (5037)
    <source or="" destination="" port:="" 49688="" (49688)="">
    <source or="" destination="" port:="" 5037="" (5037)="">
    [Stream index: 0]
    [Conversation completeness: Incomplete (37)]
    [TCP Segment Len: 0]
    Sequence Number: 0    (relative sequence number)
    Sequence Number (raw): 2276443805
    [Next Sequence Number: 1    (relative sequence number)]
    Acknowledgment Number: 0
    Acknowledgment number (raw): 0
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x002 (SYN)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...0 .... = Acknowledgment: Not set
        .... .... 0... = Push: Not set
        .... .... .0.. = Reset: Not set
        .... .... ..1. = Syn: Set
            [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 5037]
                [Connection establish request (SYN): server port 5037]
                <message: connection="" establish="" request="" (syn):="" server="" port="" 5037="">
                [Severity level: Chat]
                [Group: Sequence]
        .... .... ...0 = Fin: Not set
        [TCP Flags: ··········S·]
    Window: 65535
    [Calculated window size: 65535]
    Checksum: 0x52d7 [correct]
    [Checksum Status: Good]
    [Calculated Checksum: 0x52d7]
    Urgent Pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
        TCP Option - Maximum segment size: 65495 bytes
        TCP Option - No-Operation (NOP)
        TCP Option - Window scale: 8 (multiply by 256)
        TCP Option - No-Operation (NOP)
        TCP Option - No-Operation (NOP)
        TCP Option - SACK permitted
    [Timestamps]
        [Time since first frame in this TCP stream: 0.000000000 seconds]
        [Time since previous frame in this TCP stream: 0.000000000 seconds]

Then frame 2:
Frame 2: 44 bytes on wire, 44 bytes captured on interface \Device\NPF_Loopback, id 0
Null/Loopback
    Family: IP (2)
Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1)
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
        0000 00.. = Differentiated Services Codepoint: Default (0)
        .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
    Total Length: 40
    Identification: 0xc45b (50267)
    Flags: 0x40, Don't fragment
        0... .... = Security flag: Not evil
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 128
    Protocol: TCP (6)
    Header Checksum: 0x0000 incorrect, should be 0x3872(may be caused by "IP checksum offload"?)
        [Expert Info (Error/Checksum): Bad checksum [should be 0x3872]]
            [Bad checksum [should be 0x3872]]
            <message: bad="" checksum="" [should="" be="" 0x3872]="">
            [Severity level: Error]
            [Group: Checksum]
    [Header checksum status: Bad]
    [Calculated Checksum: 0x3872]
    Source Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Source Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
    Destination Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Destination Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
Transmission Control Protocol, Src Port: 5037 (5037), Dst Port: 49688 (49688), Seq: 1, Ack: 1, Len: 0
    Source Port: 5037 (5037)
    Destination Port: 49688 (49688)
    <source or="" destination="" port:="" 5037="" (5037)="">
    <source or="" destination="" port:="" 49688="" (49688)="">
    [Stream index: 0]
    [Conversation completeness: Incomplete (37)]
    [TCP Segment Len: 0]
    Sequence Number: 1    (relative sequence number)
    Sequence Number (raw): 0
    [Next Sequence Number: 1    (relative sequence number)]
    Acknowledgment Number: 1    (relative ack number)
    Acknowledgment number (raw): 2276443806
    0101 .... = Header Length: 20 bytes (5)
    Flags: 0x014 (RST, ACK)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...1 .... = Acknowledgment: Set
        .... .... 0... = Push: Not set
        .... .... .1.. = Reset: Set
            [Expert Info (Warning/Sequence): Connection reset (RST)]
                [Connection reset (RST)]
                <message: connection="" reset="" (rst)="">
                [Severity level: Warning]
                [Group: Sequence]
        .... .... ..0. = Syn: Not set
        .... .... ...0 = Fin: Not set
        [TCP Flags: ·······A·R··]
    Window: 0
    [Calculated window size: 0]
    [Window size scaling factor: -1 (unknown)]
    Checksum: 0x8dba [correct]
    [Checksum Status: Good]
    [Calculated Checksum: 0x8dba]
    Urgent Pointer: 0
    [Timestamps]
        [Time since first frame in this TCP stream: 0.000041000 seconds]
        [Time since previous frame in this TCP stream: 0.000041000 seconds]
    [SEQ/ACK analysis]
        [This is an ACK to the segment in frame: 1]
        [The RTT to ACK the segment was: 0.000041000 seconds]
        [iRTT: 0.000041000 seconds]

Thank You very much in advance!

Why Is My Laptop Loopback to Port (5037) Andriod Device

I start up the Loopback Adapter on Wireshark, then I will start another Wireshark capture for my ethernet interface. When I do this, the Loopback Adapter will have at least 2 frames, with port (5037). This is an Android device and I'm on Windows 10. In Resource Monitor on my Windows 10, I have an extra Network name that gets most of the traffic. Is there anyway to find out if these are connected?

Thank you so very much,

Vtechie

In the preview this looks like it is all jumbled together, but in my view of it as I have copied and pasted, it is not that way. Sorry, I cannot straighten it out.

60 Points needed to upload a picture. I do not have that yet.

Frame 1: 56 bytes on wire, 56 bytes captured on interface \Device\NPF_Loopback, id 0
Null/Loopback
    Family: IP (2)
Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1)
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
        0000 00.. = Differentiated Services Codepoint: Default (0)
        .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
    Total Length: 52
    Identification: 0xc45a (50266)
    Flags: 0x40, Don't fragment
        0... .... = Security flag: Not evil
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 128
    Protocol: TCP (6)
    Header Checksum: 0x0000 incorrect, should be 0x3867(may be caused by "IP checksum offload"?)
        [Expert Info (Error/Checksum): Bad checksum [should be 0x3867]]
    [Header checksum status: Bad]
    [Calculated Checksum: 0x3867]
    Source Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Source Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
    Destination Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Destination Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
Transmission Control Protocol, Src Port: 49688 (49688), Dst Port: 5037 (5037), Seq: 0, Len: 0
    Source Port: 49688 (49688)
    Destination Port: 5037 (5037)
    <source or="" destination="" port:="" 49688="" (49688)="">
    <source or="" destination="" port:="" 5037="" (5037)="">
    [Stream index: 0]
    [Conversation completeness: Incomplete (37)]
    [TCP Segment Len: 0]
    Sequence Number: 0    (relative sequence number)
    Sequence Number (raw): 2276443805
    [Next Sequence Number: 1    (relative sequence number)]
    Acknowledgment Number: 0
    Acknowledgment number (raw): 0
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x002 (SYN)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...0 .... = Acknowledgment: Not set
        .... .... 0... = Push: Not set
        .... .... .0.. = Reset: Not set
        .... .... ..1. = Syn: Set
            [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 5037]
                [Connection establish request (SYN): server port 5037]
                <message: connection="" establish="" request="" (syn):="" server="" port="" 5037="">
                [Severity level: Chat]
                [Group: Sequence]
        .... .... ...0 = Fin: Not set
        [TCP Flags: ··········S·]
    Window: 65535
    [Calculated window size: 65535]
    Checksum: 0x52d7 [correct]
    [Checksum Status: Good]
    [Calculated Checksum: 0x52d7]
    Urgent Pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
        TCP Option - Maximum segment size: 65495 bytes
        TCP Option - No-Operation (NOP)
        TCP Option - Window scale: 8 (multiply by 256)
        TCP Option - No-Operation (NOP)
        TCP Option - No-Operation (NOP)
        TCP Option - SACK permitted
    [Timestamps]
        [Time since first frame in this TCP stream: 0.000000000 seconds]
        [Time since previous frame in this TCP stream: 0.000000000 seconds]

Then frame 2:
Frame 2: 44 bytes on wire, 44 bytes captured on interface \Device\NPF_Loopback, id 0
Null/Loopback
    Family: IP (2)
Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1)
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
        0000 00.. = Differentiated Services Codepoint: Default (0)
        .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
    Total Length: 40
    Identification: 0xc45b (50267)
    Flags: 0x40, Don't fragment
        0... .... = Security flag: Not evil
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 128
    Protocol: TCP (6)
    Header Checksum: 0x0000 incorrect, should be 0x3872(may be caused by "IP checksum offload"?)
        [Expert Info (Error/Checksum): Bad checksum [should be 0x3872]]
            [Bad checksum [should be 0x3872]]
            <message: bad="" checksum="" [should="" be="" 0x3872]="">
            [Severity level: Error]
            [Group: Checksum]
    [Header checksum status: Bad]
    [Calculated Checksum: 0x3872]
    Source Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Source Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
    Destination Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Destination Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
Transmission Control Protocol, Src Port: 5037 (5037), Dst Port: 49688 (49688), Seq: 1, Ack: 1, Len: 0
    Source Port: 5037 (5037)
    Destination Port: 49688 (49688)
    <source or="" destination="" port:="" 5037="" (5037)="">
    <source or="" destination="" port:="" 49688="" (49688)="">
    [Stream index: 0]
    [Conversation completeness: Incomplete (37)]
    [TCP Segment Len: 0]
    Sequence Number: 1    (relative sequence number)
    Sequence Number (raw): 0
    [Next Sequence Number: 1    (relative sequence number)]
    Acknowledgment Number: 1    (relative ack number)
    Acknowledgment number (raw): 2276443806
    0101 .... = Header Length: 20 bytes (5)
    Flags: 0x014 (RST, ACK)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...1 .... = Acknowledgment: Set
        .... .... 0... = Push: Not set
        .... .... .1.. = Reset: Set
            [Expert Info (Warning/Sequence): Connection reset (RST)]
                [Connection reset (RST)]
                <message: connection="" reset="" (rst)="">
                [Severity level: Warning]
                [Group: Sequence]
        .... .... ..0. = Syn: Not set
        .... .... ...0 = Fin: Not set
        [TCP Flags: ·······A·R··]
    Window: 0
    [Calculated window size: 0]
    [Window size scaling factor: -1 (unknown)]
    Checksum: 0x8dba [correct]
    [Checksum Status: Good]
    [Calculated Checksum: 0x8dba]
    Urgent Pointer: 0
    [Timestamps]
        [Time since first frame in this TCP stream: 0.000041000 seconds]
        [Time since previous frame in this TCP stream: 0.000041000 seconds]
    [SEQ/ACK analysis]
        [This is an ACK to the segment in frame: 1]
        [The RTT to ACK the segment was: 0.000041000 seconds]
        [iRTT: 0.000041000 seconds]

Thank You very much in advance!

Why Is My Laptop Loopback to is Port (5037) Andriod DeviceActive on Loopback?

I start up the Loopback Adapter on Wireshark, then I will start another Wireshark capture for my ethernet interface. When I do this, the Loopback Adapter will have at least 2 frames, with port (5037). This is an Android device and I'm on Windows 10. In Resource Monitor on my Windows 10, I have an extra Network name that gets most of the traffic. Is there anyway to find out if these are connected?

Thank you so very much,

Vtechie

In the preview this looks like it is all jumbled together, but in my view of it as I have copied and pasted, it is not that way. Sorry, I cannot straighten it out.

60 Points needed to upload a picture. I do not have that yet.

Frame 1: 56 bytes on wire, 56 bytes captured on interface \Device\NPF_Loopback, id 0
Null/Loopback
    Family: IP (2)
Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1)
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
        0000 00.. = Differentiated Services Codepoint: Default (0)
        .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
    Total Length: 52
    Identification: 0xc45a (50266)
    Flags: 0x40, Don't fragment
        0... .... = Security flag: Not evil
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 128
    Protocol: TCP (6)
    Header Checksum: 0x0000 incorrect, should be 0x3867(may be caused by "IP checksum offload"?)
        [Expert Info (Error/Checksum): Bad checksum [should be 0x3867]]
    [Header checksum status: Bad]
    [Calculated Checksum: 0x3867]
    Source Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Source Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
    Destination Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Destination Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
Transmission Control Protocol, Src Port: 49688 (49688), Dst Port: 5037 (5037), Seq: 0, Len: 0
    Source Port: 49688 (49688)
    Destination Port: 5037 (5037)
    <source or="" destination="" port:="" 49688="" (49688)="">
    <source or="" destination="" port:="" 5037="" (5037)="">
    [Stream index: 0]
    [Conversation completeness: Incomplete (37)]
    [TCP Segment Len: 0]
    Sequence Number: 0    (relative sequence number)
    Sequence Number (raw): 2276443805
    [Next Sequence Number: 1    (relative sequence number)]
    Acknowledgment Number: 0
    Acknowledgment number (raw): 0
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x002 (SYN)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...0 .... = Acknowledgment: Not set
        .... .... 0... = Push: Not set
        .... .... .0.. = Reset: Not set
        .... .... ..1. = Syn: Set
            [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 5037]
                [Connection establish request (SYN): server port 5037]
                <message: connection="" establish="" request="" (syn):="" server="" port="" 5037="">
                [Severity level: Chat]
                [Group: Sequence]
        .... .... ...0 = Fin: Not set
        [TCP Flags: ··········S·]
    Window: 65535
    [Calculated window size: 65535]
    Checksum: 0x52d7 [correct]
    [Checksum Status: Good]
    [Calculated Checksum: 0x52d7]
    Urgent Pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
        TCP Option - Maximum segment size: 65495 bytes
        TCP Option - No-Operation (NOP)
        TCP Option - Window scale: 8 (multiply by 256)
        TCP Option - No-Operation (NOP)
        TCP Option - No-Operation (NOP)
        TCP Option - SACK permitted
    [Timestamps]
        [Time since first frame in this TCP stream: 0.000000000 seconds]
        [Time since previous frame in this TCP stream: 0.000000000 seconds]

Then frame 2:
Frame 2: 44 bytes on wire, 44 bytes captured on interface \Device\NPF_Loopback, id 0
Null/Loopback
    Family: IP (2)
Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1)
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
        0000 00.. = Differentiated Services Codepoint: Default (0)
        .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
    Total Length: 40
    Identification: 0xc45b (50267)
    Flags: 0x40, Don't fragment
        0... .... = Security flag: Not evil
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 128
    Protocol: TCP (6)
    Header Checksum: 0x0000 incorrect, should be 0x3872(may be caused by "IP checksum offload"?)
        [Expert Info (Error/Checksum): Bad checksum [should be 0x3872]]
            [Bad checksum [should be 0x3872]]
            <message: bad="" checksum="" [should="" be="" 0x3872]="">
            [Severity level: Error]
            [Group: Checksum]
    [Header checksum status: Bad]
    [Calculated Checksum: 0x3872]
    Source Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Source Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
    Destination Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
    <[Destination Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
Transmission Control Protocol, Src Port: 5037 (5037), Dst Port: 49688 (49688), Seq: 1, Ack: 1, Len: 0
    Source Port: 5037 (5037)
    Destination Port: 49688 (49688)
    <source or="" destination="" port:="" 5037="" (5037)="">
    <source or="" destination="" port:="" 49688="" (49688)="">
    [Stream index: 0]
    [Conversation completeness: Incomplete (37)]
    [TCP Segment Len: 0]
    Sequence Number: 1    (relative sequence number)
    Sequence Number (raw): 0
    [Next Sequence Number: 1    (relative sequence number)]
    Acknowledgment Number: 1    (relative ack number)
    Acknowledgment number (raw): 2276443806
    0101 .... = Header Length: 20 bytes (5)
    Flags: 0x014 (RST, ACK)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...1 .... = Acknowledgment: Set
        .... .... 0... = Push: Not set
        .... .... .1.. = Reset: Set
            [Expert Info (Warning/Sequence): Connection reset (RST)]
                [Connection reset (RST)]
                <message: connection="" reset="" (rst)="">
                [Severity level: Warning]
                [Group: Sequence]
        .... .... ..0. = Syn: Not set
        .... .... ...0 = Fin: Not set
        [TCP Flags: ·······A·R··]
    Window: 0
    [Calculated window size: 0]
    [Window size scaling factor: -1 (unknown)]
    Checksum: 0x8dba [correct]
    [Checksum Status: Good]
    [Calculated Checksum: 0x8dba]
    Urgent Pointer: 0
    [Timestamps]
        [Time since first frame in this TCP stream: 0.000041000 seconds]
        [Time since previous frame in this TCP stream: 0.000041000 seconds]
    [SEQ/ACK analysis]
        [This is an ACK to the segment in frame: 1]
        [The RTT to ACK the segment was: 0.000041000 seconds]
        [iRTT: 0.000041000 seconds]

Thank You very much in advance!

Why is Port (5037) Active on Loopback?

I start up the Loopback Adapter on Wireshark, then I will start another Wireshark capture for my ethernet interface. When I do this, the Loopback Adapter will have at least 2 frames, with port (5037). This is an Android device and I'm on Windows 10. In Resource Monitor on my Windows 10, I have an extra Network name that gets most of the traffic. Is there anyway to find out if these are connected?

Thank you so very much,

Vtechie

In the preview this looks like it is all jumbled together, but in my view of it as I have copied and pasted, it is not that way. Sorry, I cannot straighten it out.

60 Points needed to upload a picture. I do not have that yet.

Frame 1: 56 bytes on wire, 56 bytes captured on interface \Device\NPF_Loopback, id 0
Null/Loopback
    Family: IP (2)
Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1)
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
        0000 00.. = Differentiated Services Codepoint: Default (0)
        .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
    Total Length: 52
    Identification: 0xc45a (50266)
    Flags: 0x40, Don't fragment
        0... .... = Security flag: Not evil
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 128
    Protocol: TCP (6)
    Header Checksum: 0x0000 incorrect, should be 0x3867(may be caused by "IP checksum offload"?)
        [Expert Info (Error/Checksum): Bad checksum [should be 0x3867]]
    [Header checksum status: Bad]
    [Calculated Checksum: 0x3867]
    Source Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
<Source or Destination Address: 127.0.0.1 (127.0.0.1)>
    <[Source Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
    Destination Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
<Source or Destination Address: 127.0.0.1 (127.0.0.1)>
    <[Destination Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
Transmission Control Protocol, Src Port: 49688 (49688), Dst Port: 5037 (5037), Seq: 0, Len: 0
    Source Port: 49688 (49688)
    Destination Port: 5037 (5037)
    <source or="" destination="" port:="" 49688="" (49688)="">
    <source or="" destination="" port:="" 5037="" (5037)="">
<Source or Destination Port: 49688 (49688)>
    <Source or Destination Port: 5037 (5037)>
    [Stream index: 0]
    [Conversation completeness: Incomplete (37)]
    [TCP Segment Len: 0]
    Sequence Number: 0    (relative sequence number)
    Sequence Number (raw): 2276443805
    [Next Sequence Number: 1    (relative sequence number)]
    Acknowledgment Number: 0
    Acknowledgment number (raw): 0
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x002 (SYN)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...0 .... = Acknowledgment: Not set
        .... .... 0... = Push: Not set
        .... .... .0.. = Reset: Not set
        .... .... ..1. = Syn: Set
            [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 5037]
                [Connection establish request (SYN): server port 5037]
                <message: connection="" establish="" request="" (syn):="" server="" port="" 5037="">
<Message: Connection establish request (SYN): server port 5037>
                [Severity level: Chat]
                [Group: Sequence]
        .... .... ...0 = Fin: Not set
        [TCP Flags: ··········S·]
    Window: 65535
    [Calculated window size: 65535]
    Checksum: 0x52d7 [correct]
    [Checksum Status: Good]
    [Calculated Checksum: 0x52d7]
    Urgent Pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
        TCP Option - Maximum segment size: 65495 bytes
        TCP Option - No-Operation (NOP)
        TCP Option - Window scale: 8 (multiply by 256)
        TCP Option - No-Operation (NOP)
        TCP Option - No-Operation (NOP)
        TCP Option - SACK permitted
    [Timestamps]
        [Time since first frame in this TCP stream: 0.000000000 seconds]
        [Time since previous frame in this TCP stream: 0.000000000 seconds]

Then frame 2: 2:

Frame 2: 44 bytes on wire, 44 bytes captured on interface \Device\NPF_Loopback, id 0
Null/Loopback
    Family: IP (2)
Internet Protocol Version 4, Src: 127.0.0.1 (127.0.0.1), Dst: 127.0.0.1 (127.0.0.1)
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
        0000 00.. = Differentiated Services Codepoint: Default (0)
        .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
    Total Length: 40
    Identification: 0xc45b (50267)
    Flags: 0x40, Don't fragment
        0... .... = Security flag: Not evil
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 128
    Protocol: TCP (6)
    Header Checksum: 0x0000 incorrect, should be 0x3872(may be caused by "IP checksum offload"?)
        [Expert Info (Error/Checksum): Bad checksum [should be 0x3872]]
            [Bad checksum [should be 0x3872]]
            <message: bad="" checksum="" [should="" be="" 0x3872]="">
<Message: Bad checksum [should be 0x3872]>
            [Severity level: Error]
            [Group: Checksum]
    [Header checksum status: Bad]
    [Calculated Checksum: 0x3872]
    Source Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
<Source or Destination Address: 127.0.0.1 (127.0.0.1)>
    <[Source Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
    Destination Address: 127.0.0.1 (127.0.0.1)
    <source or="" destination="" address:="" 127.0.0.1="" (127.0.0.1)="">
<Source or Destination Address: 127.0.0.1 (127.0.0.1)>
    <[Destination Host: 127.0.0.1]>
    <[Source or Destination Host: 127.0.0.1]>
Transmission Control Protocol, Src Port: 5037 (5037), Dst Port: 49688 (49688), Seq: 1, Ack: 1, Len: 0
    Source Port: 5037 (5037)
    Destination Port: 49688 (49688)
    <source or="" destination="" port:="" 5037="" (5037)="">
    <source or="" destination="" port:="" 49688="" (49688)="">
<Source or Destination Port: 5037 (5037)>
    <Source or Destination Port: 49688 (49688)>
    [Stream index: 0]
    [Conversation completeness: Incomplete (37)]
    [TCP Segment Len: 0]
    Sequence Number: 1    (relative sequence number)
    Sequence Number (raw): 0
    [Next Sequence Number: 1    (relative sequence number)]
    Acknowledgment Number: 1    (relative ack number)
    Acknowledgment number (raw): 2276443806
    0101 .... = Header Length: 20 bytes (5)
    Flags: 0x014 (RST, ACK)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...1 .... = Acknowledgment: Set
        .... .... 0... = Push: Not set
        .... .... .1.. = Reset: Set
            [Expert Info (Warning/Sequence): Connection reset (RST)]
                [Connection reset (RST)]
                <message: connection="" reset="" (rst)="">
<Message: Connection reset (RST)>
                [Severity level: Warning]
                [Group: Sequence]
        .... .... ..0. = Syn: Not set
        .... .... ...0 = Fin: Not set
        [TCP Flags: ·······A·R··]
    Window: 0
    [Calculated window size: 0]
    [Window size scaling factor: -1 (unknown)]
    Checksum: 0x8dba [correct]
    [Checksum Status: Good]
    [Calculated Checksum: 0x8dba]
    Urgent Pointer: 0
    [Timestamps]
        [Time since first frame in this TCP stream: 0.000041000 seconds]
        [Time since previous frame in this TCP stream: 0.000041000 seconds]
    [SEQ/ACK analysis]
        [This is an ACK to the segment in frame: 1]
        [The RTT to ACK the segment was: 0.000041000 seconds]
        [iRTT: 0.000041000 seconds]

Thank You very much in advance!