> Покажи вывод команды:
> tcpdump -ni eth0 host 217.117.79.68 -c 25tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
09:30:39.997153 IP 91.211.96.15.443 > 217.117.79.68.3130: Flags [P.], seq 1767272963:1767273261, ack 4071453296, win 64681, length 298
09:30:39.999098 IP 93.191.193.6.443 > 217.117.79.68.4937: Flags [.], ack 3444972850, win 7504, length 0
09:30:40.004193 IP 84.233.144.63.443 > 217.117.79.68.2359: Flags [.], ack 416846606, win 7504, length 0
09:30:40.007736 IP 77.87.178.130.26002 > 217.117.79.68.1102: Flags [P.], seq 2317408417:2317408651, ack 3220796736, win 64343, length 234
09:30:40.012992 IP 66.212.241.210.4440 > 217.117.79.68.3354: Flags [P.], seq 1100620319:1100620761, ack 2629395429, win 49640, length 442
09:30:40.023153 IP 66.212.241.210.4440 > 217.117.79.68.3354: Flags [P.], seq 442:777, ack 1, win 49640, length 335
09:30:40.024688 IP 62.23.231.171.8018 > 217.117.79.68.3997: Flags [P.], seq 3235981434:3235981442, ack 262247787, win 65032, length 8
09:30:40.029686 IP 91.211.96.25.443 > 217.117.79.68.1402: Flags [P.], seq 3345256109:3345256466, ack 1802150078, win 65413, length 357
09:30:40.037440 IP 217.168.162.209.443 > 217.117.79.68.2023: Flags [P.], seq 397095052:397096415, ack 1171744985, win 11739, length 1363
09:30:40.043501 IP 77.87.178.74.26002 > 217.117.79.68.1411: Flags [P.], seq 2578838904:2578839218, ack 1956580248, win 63966, length 314
09:30:40.067101 IP 91.211.96.58.443 > 217.117.79.68.1773: Flags [P.], seq 9921594:9922367, ack 2333263988, win 65111, length 773
09:30:40.075192 IP 213.52.253.139.4095 > 217.117.79.68.3049: Flags [P.], seq 3615097637:3615097677, ack 3337010646, win 65507, length 40
09:30:40.080824 IP 91.211.96.16.443 > 217.117.79.68.1489: Flags [P.], seq 2372569014:2372569963, ack 3466640446, win 64369, length 949
09:30:40.088485 IP 66.212.245.191.80 > 217.117.79.68.2923: Flags [P.], seq 3011811624:3011811741, ack 1814421262, win 21989, length 117
09:30:40.090799 IP 66.212.235.26.443 > 217.117.79.68.1298: Flags [.], seq 821807999:821809459, ack 4041011401, win 65535, length 1460
09:30:40.095871 IP 66.212.245.191.80 > 217.117.79.68.4872: Flags [P.], seq 3930579863:3930580218, ack 2341730204, win 22404, length 355
09:30:40.103145 IP 194.158.61.166.443 > 217.117.79.68.3493: Flags [P.], seq 2040567198:2040567267, ack 2717703627, win 58638, length 69
09:30:40.103756 IP 88.81.149.32.8018 > 217.117.79.68.4649: Flags [P.], seq 3060161823:3060161833, ack 2632117844, win 64651, length 10
09:30:40.104269 IP 77.87.179.65.26002 > 217.117.79.68.3580: Flags [P.], seq 3597561595:3597561877, ack 181793934, win 64490, length 282
09:30:40.104292 IP 77.87.179.65.26002 > 217.117.79.68.1083: Flags [P.], seq 2961367157:2961367487, ack 4218150753, win 64488, length 330
09:30:40.104296 IP 77.87.179.66.26002 > 217.117.79.68.1131: Flags [P.], seq 3610285061:3610285375, ack 2064533349, win 64449, length 314
09:30:40.106876 IP 66.212.249.153.7997 > 217.117.79.68.4029: Flags [P.], seq 2107047613:2107047662, ack 3247317300, win 65535, length 49
09:30:40.107396 IP 77.87.178.66.443 > 217.117.79.68.1790: Flags [P.], seq 4058177542:4058177824, ack 495624267, win 17446, length 282
09:30:40.107416 IP 77.87.178.64.26002 > 217.117.79.68.3745: Flags [P.], seq 1380499460:1380499774, ack 1577877545, win 64438, length 314
09:30:40.107708 IP 77.87.178.130.26002 > 217.117.79.68.3413: Flags [P.], seq 114686550:114686832, ack 4086536712, win 64481, length 282