Public IPv6 not shown on whatsmyip

Hi, I have a protectli router installed with openwrt. It's been great so far with configuration. However, I learnt that my ISP has a CGNAT so I cannot simply use IPv4 public IP to connect to router from outside directly. I wanted to explore the concept of new protocol - IPv6. I confirmed with my ISP that the IPv6 is public and available to me, and even confirmed on the router that came with ISP that when visiting whatismyip website, I can see that IPv6 is available and ready, but it's not available through OpenWRT router.

Now that I confirmed that I can use IPv6, I wanted to configure it on my OpenWRT router. I was working on this for a whole day and I cannot figure out why it is not working, does anyone know what the issue is and how to resolve it? I can successfully ping for example google ipv6 DNS, even from devices, its just ipv6 is not showing public ip address on whatsmyip, I need it to be accessible from internet

ping -6 2001:4860:4860::8888
PING 2001:4860:4860::8888 (2001:4860:4860::8888) 56 data bytes
64 bytes from 2001:4860:4860::8888: icmp_seq=1 ttl=56 time=18.1 ms

OpenWrt 23.05.4, r24012-d8dd03c46f

~ uci show network.wan
network.wan=interface
network.wan.device='eth0'
network.wan.proto='dhcp'
network.wan.delegate='0'
network.wan.peerdns='0

~ uci show network.wan6
network.wan6=interface
network.wan6.proto='dhcpv6'
network.wan6.device='@wan'
network.wan6.reqaddress='try'
network.wan6.reqprefix='auto'

~ uci show network.Fibre_Optic_102
network.Fibre_Optic_102=interface
network.Fibre_Optic_102.proto='static'
network.Fibre_Optic_102.device='radio0.network1'
network.Fibre_Optic_102.ipaddr='192.168.2.1'
network.Fibre_Optic_102.netmask='255.255.255.0'
network.Fibre_Optic_102.delegate='0'
network.Fibre_Optic_102.ip6assign='64'
network.Fibre_Optic_102.ip6ifaceid='::2'

~ uci show network.lan
network.lan=interface
network.lan.device='br-lan'
network.lan.proto='static'
network.lan.ipaddr='192.168.1.1'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='64'
network.lan.ip6ifaceid='::1'
network.lan.delegate='0'

~ ip -6 route show
default from 2a02:6b68:0:181::1a7 via fe80::d666:24ff:fe8e:38db dev eth0  metric 512 
default from 2a02:6b6f:ffa1:9c00::/56 via fe80::d666:24ff:fe8e:38db dev eth0  metric 512 
2a02:6b68:0:181::/64 dev eth0  metric 256 
2a02:6b6f:ffa1:9c00::/64 dev phy0-ap0  metric 256  expires 0sec
2a02:6b6f:ffa1:9c00::/64 dev phy0-ap0  metric 1024 
2a02:6b6f:ffa1:9c01::/64 dev br-lan  metric 256  expires 0sec
2a02:6b6f:ffa1:9c01::/64 dev br-lan  metric 1024 
unreachable 2a02:6b6f:ffa1:9c00::/56 dev lo  metric 2147483647 
fd75:2ef3:940b::/64 dev phy0-ap0  metric 1024 
fd75:2ef3:940b:1::/64 dev br-lan  metric 1024 
unreachable fd75:2ef3:940b::/48 dev lo  metric 2147483647 
fe80::/64 dev br-lan  metric 256 
fe80::/64 dev phy0-ap0  metric 256 
fe80::/64 dev eth0  metric 256 
anycast 2a02:6b6f:ffa1:9c00:: dev phy0-ap0  metric 0 
anycast 2a02:6b6f:ffa1:9c01:: dev br-lan  metric 0 
anycast fd75:2ef3:940b:: dev phy0-ap0  metric 0 
anycast fd75:2ef3:940b:1:: dev br-lan  metric 0 
anycast fe80:: dev br-lan  metric 0 
anycast fe80:: dev phy0-ap0  metric 0 
anycast fe80:: dev eth0  metric 0 
multicast ff00::/8 dev br-lan  metric 256 
multicast ff00::/8 dev phy0-ap0  metric 256 
multicast ff00::/8 dev eth0  metric 256

~ uci show firewall
firewall.@defaults[0]=defaults
firewall.@defaults[0].input='REJECT'
firewall.@defaults[0].output='ACCEPT'
firewall.@defaults[0].forward='REJECT'
firewall.@defaults[0].synflood_protect='1'
firewall.@zone[0]=zone
firewall.@zone[0].name='lan'
firewall.@zone[0].input='ACCEPT'
firewall.@zone[0].output='ACCEPT'
firewall.@zone[0].forward='ACCEPT'
firewall.@zone[0].network='lan'
firewall.@zone[1]=zone
firewall.@zone[1].name='wan'
firewall.@zone[1].input='REJECT'
firewall.@zone[1].output='ACCEPT'
firewall.@zone[1].forward='REJECT'
firewall.@zone[1].masq='1'
firewall.@zone[1].mtu_fix='1'
firewall.@zone[1].network='wan' 'wan6'
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src='lan'
firewall.@forwarding[0].dest='wan'
firewall.@rule[0]=rule
firewall.@rule[0].name='Allow-DHCP-Renew'
firewall.@rule[0].src='wan'
firewall.@rule[0].proto='udp'
firewall.@rule[0].dest_port='68'
firewall.@rule[0].target='ACCEPT'
firewall.@rule[0].family='ipv4'
firewall.@rule[1]=rule
firewall.@rule[1].name='Allow-Ping'
firewall.@rule[1].src='wan'
firewall.@rule[1].proto='icmp'
firewall.@rule[1].icmp_type='echo-request'
firewall.@rule[1].family='ipv4'
firewall.@rule[1].target='ACCEPT'
firewall.@rule[2]=rule
firewall.@rule[2].name='Allow-IGMP'
firewall.@rule[2].src='wan'
firewall.@rule[2].proto='igmp'
firewall.@rule[2].family='ipv4'
firewall.@rule[2].target='ACCEPT'
firewall.@rule[3]=rule
firewall.@rule[3].name='Allow-DHCPv6'
firewall.@rule[3].src='wan'
firewall.@rule[3].proto='udp'
firewall.@rule[3].dest_port='546'
firewall.@rule[3].family='ipv6'
firewall.@rule[3].target='ACCEPT'
firewall.@rule[4]=rule
firewall.@rule[4].name='Allow-MLD'
firewall.@rule[4].src='wan'
firewall.@rule[4].proto='icmp'
firewall.@rule[4].src_ip='fe80::/10'
firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
firewall.@rule[4].family='ipv6'
firewall.@rule[4].target='ACCEPT'
firewall.@rule[5]=rule
firewall.@rule[5].name='Allow-ICMPv6-Input'
firewall.@rule[5].src='wan'
firewall.@rule[5].proto='icmp'
firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' 'router-solicitation' 'neighbour-solicitation' 'router-advertisement' 'neighbour-advertisement'
firewall.@rule[5].limit='1000/sec'
firewall.@rule[5].family='ipv6'
firewall.@rule[5].target='ACCEPT'
firewall.@rule[6]=rule
firewall.@rule[6].name='Allow-ICMPv6-Forward'
firewall.@rule[6].src='wan'
firewall.@rule[6].dest='*'
firewall.@rule[6].proto='icmp'
firewall.@rule[6].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
firewall.@rule[6].limit='1000/sec'
firewall.@rule[6].family='ipv6'
firewall.@rule[6].target='ACCEPT'
firewall.@rule[7]=rule
firewall.@rule[7].name='Allow-IPSec-ESP'
firewall.@rule[7].src='wan'
firewall.@rule[7].dest='lan'
firewall.@rule[7].proto='esp'
firewall.@rule[7].target='ACCEPT'
firewall.@rule[8]=rule
firewall.@rule[8].name='Allow-ISAKMP'
firewall.@rule[8].src='wan'
firewall.@rule[8].dest='lan'
firewall.@rule[8].dest_port='500'
firewall.@rule[8].proto='udp'
firewall.@rule[8].target='ACCEPT'
firewall.@zone[2]=zone
firewall.@zone[2].name='WiFi_FW'
firewall.@zone[2].input='REJECT'
firewall.@zone[2].output='ACCEPT'
firewall.@zone[2].forward='REJECT'
firewall.@zone[2].family='ipv4'
firewall.@zone[2].network='Fibre_Optic_102'

~ ip -6 addr show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 state UNKNOWN qlen 1000
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 2a02:6b68:0:181::1a7/128 scope global dynamic noprefixroute 
       valid_lft 688911sec preferred_lft 602511sec
    inet6 fe80::6662:66ff:fe21:f9b7/64 scope link 
       valid_lft forever preferred_lft forever
7: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 2a02:6b6f:ffa1:9c01::1/64 scope global dynamic noprefixroute 
       valid_lft 688912sec preferred_lft 602512sec
    inet6 fd75:2ef3:940b:1::1/64 scope global noprefixroute 
       valid_lft forever preferred_lft forever
    inet6 fe80::6662:66ff:fe21:f9b8/64 scope link 
       valid_lft forever preferred_lft forever
8: phy0-ap0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 2a02:6b6f:ffa1:9c00::2/64 scope global dynamic noprefixroute 
       valid_lft 688912sec preferred_lft 602512sec
    inet6 fd75:2ef3:940b::2/64 scope global noprefixroute 
       valid_lft forever preferred_lft forever
    inet6 fe80::215:61ff:fe23:d27a/64 scope link 
       valid_lft forever preferred_lft forever

These are two separate questions.

  1. check with nslookup wimi.com a) from the router and b) from the client and show result;
  2. use an external scanner tool like http://www.ipv6scanner.com to generate incoming traffic and tcpdump on your router to see if you get anything from the outside

Hello thanks fo response, I am attaching additional logs

(router)

~ nslookup wimi.com
Server:         2a02:6b60::53:1
Address:        [2a02:6b60::53:1]:53

Non-authoritative answer:
Name:   wimi.com
Address: 2606:4700:3030::6815:bce
Name:   wimi.com
Address: 2606:4700:3032::ac43:c0a1

Non-authoritative answer:
Name:   wimi.com
Address: 104.21.11.206
Name:   wimi.com
Address: 172.67.192.161

(client)

nslookup wimi.com
Server:         192.168.2.1
Address:        192.168.2.1#53

Non-authoritative answer:
Name:   wimi.com
Address: 172.67.192.161
Name:   wimi.com
Address: 104.21.11.206

ipv6scanner output:

tcpdump -i eth0
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
19:14:26.365487 IP 100.75.176.50.41929 > ivan.ns.cloudflare.com.53: 42016% [1au] A? www.ipv6scanner.com. (48)
19:14:26.370267 IP ivan.ns.cloudflare.com.53 > 100.75.176.50.41929: 42016*- 1/0/1 A 192.99.154.146 (64)
19:14:26.374808 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [S], seq 1915118547, win 64240, options [mss 1460,sackOK,TS val 3393932020 ecr 0,nop,wscale 7], length 0
19:14:26.454806 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [S.], seq 2747462274, ack 1915118548, win 28960, options [mss 1460,sackOK,TS val 4283679403 ecr 3393932020,nop,wscale 7], length 0
19:14:26.456893 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 1, win 502, options [nop,nop,TS val 3393932103 ecr 4283679403], length 0
19:14:26.457167 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [P.], seq 1:650, ack 1, win 502, options [nop,nop,TS val 3393932103 ecr 4283679403], length 649: HTTP: POST /cgi-bin/main.py HTTP/1.1
19:14:26.457378 IP6 2a02:6b68:0:181::1a7.48861 > dns.as201838.net.53: 58210+ PTR? 120.59.245.173.in-addr.arpa. (45)
19:14:26.468626 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.48861: 58210 1/0/0 PTR ivan.ns.cloudflare.com. (81)
19:14:26.469116 IP6 2a02:6b68:0:181::1a7.33333 > dns.as201838.net.53: 6697+ PTR? 50.176.75.100.in-addr.arpa. (44)
19:14:26.470956 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.33333: 6697 NXDomain* 0/1/0 (139)
19:14:26.471669 IP6 2a02:6b68:0:181::1a7.44490 > dns.as201838.net.53: 246+ PTR? 146.154.99.192.in-addr.arpa. (45)
19:14:26.472991 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.44490: 246 1/0/0 PTR 146.ip-192-99-154.net. (80)
19:14:26.536858 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [.], ack 650, win 237, options [nop,nop,TS val 4283679485 ecr 3393932103], length 0
19:14:26.567435 IP6 2a02:6b68:0:181::1a7.59727 > dns.as201838.net.53: 10171+ PTR? 1.0.0.0.3.5.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:26.569330 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.59727: 10171 1/0/0 PTR dns.as201838.net. (120)
19:14:26.569814 IP6 2a02:6b68:0:181::1a7.54977 > dns.as201838.net.53: 40756+ PTR? 7.a.1.0.0.0.0.0.0.0.0.0.0.0.0.0.1.8.1.0.0.0.0.0.8.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:26.571822 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.54977: 40756 NXDomain* 0/1/0 (172)
19:14:26.595742 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 1:3581, ack 650, win 237, options [nop,nop,TS val 4283679544 ecr 3393932103], length 3580: HTTP: HTTP/1.1 200 OK
19:14:26.598231 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 3581, win 475, options [nop,nop,TS val 3393932244 ecr 4283679544], length 0
19:14:26.639751 IP6 2607:5300:201:3100::7911.33818 > 2a02:6b68:0:181::1a7.21: Flags [S], seq 1214969446, win 28800, options [mss 1440,sackOK,TS val 4283679585 ecr 0,nop,wscale 7], length 0
19:14:26.639850 IP6 2a02:6b68:0:181::1a7.21 > 2607:5300:201:3100::7911.33818: Flags [R.], seq 0, ack 1214969447, win 0, length 0
19:14:26.677782 IP6 2a02:6b68:0:181::1a7.42057 > dns.as201838.net.53: 62202+ PTR? 1.1.9.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.3.1.0.2.0.0.0.3.5.7.0.6.2.ip6.arpa. (90)
19:14:26.679208 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.42057: 62202 NXDomain* 0/1/0 (174)
19:14:26.724604 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 3581:4161, ack 650, win 237, options [nop,nop,TS val 4283679672 ecr 3393932244], length 580: HTTP
19:14:26.727019 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4161, win 471, options [nop,nop,TS val 3393932373 ecr 4283679672], length 0
19:14:26.766675 IP6 2607:5300:201:3100::7911.36710 > 2a02:6b68:0:181::1a7.22: Flags [S], seq 3169472417, win 28800, options [mss 1440,sackOK,TS val 4283679711 ecr 0,nop,wscale 7], length 0
19:14:26.766795 IP6 2a02:6b68:0:181::1a7.22 > 2607:5300:201:3100::7911.36710: Flags [R.], seq 0, ack 3169472418, win 0, length 0
19:14:26.847818 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4161:4233, ack 650, win 237, options [nop,nop,TS val 4283679796 ecr 3393932373], length 72: HTTP
19:14:26.850580 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4233, win 471, options [nop,nop,TS val 3393932496 ecr 4283679796], length 0
19:14:26.884670 IP6 2607:5300:201:3100::7911.60486 > 2a02:6b68:0:181::1a7.23: Flags [S], seq 456401861, win 28800, options [mss 1440,sackOK,TS val 4283679832 ecr 0,nop,wscale 7], length 0
19:14:26.884769 IP6 2a02:6b68:0:181::1a7.23 > 2607:5300:201:3100::7911.60486: Flags [R.], seq 0, ack 456401862, win 0, length 0
19:14:26.966109 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4233:4308, ack 650, win 237, options [nop,nop,TS val 4283679914 ecr 3393932496], length 75: HTTP
19:14:26.968701 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4308, win 471, options [nop,nop,TS val 3393932614 ecr 4283679914], length 0
19:14:27.003154 IP6 2607:5300:201:3100::7911.60730 > 2a02:6b68:0:181::1a7.25: Flags [S], seq 4229071395, win 28800, options [mss 1440,sackOK,TS val 4283679949 ecr 0,nop,wscale 7], length 0
19:14:27.003253 IP6 2a02:6b68:0:181::1a7.25 > 2607:5300:201:3100::7911.60730: Flags [R.], seq 0, ack 4229071396, win 0, length 0
19:14:27.084184 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4308:4381, ack 650, win 237, options [nop,nop,TS val 4283680032 ecr 3393932614], length 73: HTTP
19:14:27.086824 IP 165.225.80.40.443 > 100.75.176.50.49776: Flags [.], ack 2507355221, win 2064, length 0
19:14:27.087006 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4381, win 471, options [nop,nop,TS val 3393932732 ecr 4283680032], length 0
19:14:27.117407 IP6 2a02:6b68:0:181::1a7.45238 > dns.as201838.net.53: 15035+ PTR? 40.80.225.165.in-addr.arpa. (44)
19:14:27.118858 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.45238: 15035 NXDomain* 0/1/0 (104)
19:14:27.123978 IP6 2607:5300:201:3100::7911.47480 > 2a02:6b68:0:181::1a7.53: Flags [S], seq 3995120458, win 28800, options [mss 1440,sackOK,TS val 4283680070 ecr 0,nop,wscale 7], length 0
19:14:27.124050 IP6 2a02:6b68:0:181::1a7.53 > 2607:5300:201:3100::7911.47480: Flags [R.], seq 0, ack 3995120459, win 0, length 0
19:14:27.205752 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4381:4456, ack 650, win 237, options [nop,nop,TS val 4283680154 ecr 3393932732], length 75: HTTP
19:14:27.209188 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4456, win 471, options [nop,nop,TS val 3393932855 ecr 4283680154], length 0
19:14:27.261340 IP6 2607:5300:201:3100::7911.58154 > 2a02:6b68:0:181::1a7.80: Flags [S], seq 1637026851, win 28800, options [mss 1440,sackOK,TS val 4283680209 ecr 0,nop,wscale 7], length 0
19:14:27.261442 IP6 2a02:6b68:0:181::1a7.80 > 2607:5300:201:3100::7911.58154: Flags [R.], seq 0, ack 1637026852, win 0, length 0
19:14:27.349341 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4456:4529, ack 650, win 237, options [nop,nop,TS val 4283680297 ecr 3393932855], length 73: HTTP
19:14:27.403204 IP6 2607:5300:201:3100::7911.49820 > 2a02:6b68:0:181::1a7.110: Flags [S], seq 2341191605, win 28800, options [mss 1440,sackOK,TS val 4283680350 ecr 0,nop,wscale 7], length 0
19:14:27.403303 IP6 2a02:6b68:0:181::1a7.110 > 2607:5300:201:3100::7911.49820: Flags [R.], seq 0, ack 2341191606, win 0, length 0
19:14:27.445694 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4529, win 471, options [nop,nop,TS val 3393933091 ecr 4283680297], length 0
19:14:27.486949 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4529:4603, ack 650, win 237, options [nop,nop,TS val 4283680435 ecr 3393932855], length 74: HTTP
19:14:27.489006 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4603, win 471, options [nop,nop,TS val 3393933135 ecr 4283680435], length 0
19:14:27.536770 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 14075+ PTR? 1.2.168.192.in-addr.arpa. (42)
19:14:27.536779 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 44453+ PTR? 118.1.168.192.in-addr.arpa. (44)
19:14:27.536785 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 50615+ PTR? 5.7.c.0.c.c.e.f.f.f.6.0.0.d.4.3.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:27.536789 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 55332+ PTR? 1.e.4.f.c.7.1.b.c.a.e.0.f.6.d.4.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:27.536794 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 60471+ PTR? 134.1.168.192.in-addr.arpa. (44)
19:14:27.536798 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 64893+ PTR? 1.1.1.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:27.536803 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 4119+ PTR? 133.1.168.192.in-addr.arpa. (44)
19:14:27.536807 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 8172+ PTR? f.b.3.1.3.e.e.f.f.f.7.2.e.8.4.5.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:27.536812 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 12405+ PTR? a.2.a.f.0.6.f.7.7.7.f.0.b.1.2.d.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:27.536817 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 17301+ PTR? 50.176.75.100.in-addr.arpa. (44)
19:14:27.536822 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 22733+ PTR? 1.1.168.192.in-addr.arpa. (42)
19:14:27.536827 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 27584+ PTR? 114.1.168.192.in-addr.arpa. (44)
19:14:27.536831 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 31907+ PTR? 2.e.5.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:27.536836 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 36645+ PTR? 176.1.168.192.in-addr.arpa. (44)
19:14:27.536840 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 41244+ PTR? 184.1.168.192.in-addr.arpa. (44)
19:14:27.536845 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 45423+ PTR? d.0.4.a.5.e.e.f.f.f.8.d.3.e.8.c.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:27.536849 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 49481+ PTR? 5.b.f.f.5.f.c.c.b.3.b.2.2.6.d.e.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:27.536861 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 59132+ PTR? 1.176.75.100.in-addr.arpa. (43)
19:14:27.536866 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 759+ PTR? 132.1.168.192.in-addr.arpa. (44)
19:14:27.536870 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 5516+ PTR? 120.1.168.192.in-addr.arpa. (44)
19:14:27.536882 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 9819+ PTR? 4.3.8.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:27.536884 IP6 2a02:6b68:0:181::1a7.52983 > dns.as201838.net.53: 13928+ PTR? a.f.1.b.2.8.8.8.a.e.7.4.2.0.9.5.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:27.538585 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 14075 NXDomain* 0/1/0 (138)
19:14:27.540386 IP6 2607:5300:201:3100::7911.36672 > 2a02:6b68:0:181::1a7.137: Flags [S], seq 3478219671, win 28800, options [mss 1440,sackOK,TS val 4283680488 ecr 0,nop,wscale 7], length 0
19:14:27.540435 IP6 2a02:6b68:0:181::1a7.137 > 2607:5300:201:3100::7911.36672: Flags [R.], seq 0, ack 3478219672, win 0, length 0
19:14:27.541439 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 44453 NXDomain* 0/1/0 (140)
19:14:27.541439 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 50615 NXDomain*$ 0/1/0 (172)
19:14:27.541440 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 55332 NXDomain*$ 0/1/0 (172)
19:14:27.541440 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 60471 NXDomain* 0/1/0 (140)
19:14:27.541440 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 64893 NXDomain*$ 0/1/0 (172)
19:14:27.541440 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 4119 NXDomain* 0/1/0 (140)
19:14:27.541441 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 8172 NXDomain*$ 0/1/0 (172)
19:14:27.541441 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 12405 NXDomain*$ 0/1/0 (172)
19:14:27.541485 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 17301 NXDomain* 0/1/0 (139)
19:14:27.541485 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 22733 NXDomain* 0/1/0 (138)
19:14:27.541485 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 27584 NXDomain* 0/1/0 (140)
19:14:27.541485 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 31907 NXDomain*$ 0/1/0 (172)
19:14:27.541486 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 36645 NXDomain* 0/1/0 (140)
19:14:27.541486 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 41244 NXDomain* 0/1/0 (140)
19:14:27.541486 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 45423 NXDomain*$ 0/1/0 (172)
19:14:27.541486 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 49481 NXDomain*$ 0/1/0 (172)
19:14:27.541500 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 59132 NXDomain* 0/1/0 (138)
19:14:27.541500 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 759 NXDomain* 0/1/0 (140)
19:14:27.541501 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 5516 NXDomain* 0/1/0 (140)
19:14:27.541501 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 9819 NXDomain*$ 0/1/0 (172)
19:14:27.541501 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.52983: 13928 NXDomain*$ 0/1/0 (172)
19:14:27.626585 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4603:4683, ack 650, win 237, options [nop,nop,TS val 4283680574 ecr 3393933135], length 80: HTTP
19:14:27.628650 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4683, win 471, options [nop,nop,TS val 3393933274 ecr 4283680574], length 0
19:14:27.679630 IP6 2607:5300:201:3100::7911.55696 > 2a02:6b68:0:181::1a7.138: Flags [S], seq 2269255570, win 28800, options [mss 1440,sackOK,TS val 4283680627 ecr 0,nop,wscale 7], length 0
19:14:27.679728 IP6 2a02:6b68:0:181::1a7.138 > 2607:5300:201:3100::7911.55696: Flags [R.], seq 0, ack 2269255571, win 0, length 0
19:14:27.725929 IP 165.225.80.40.443 > 100.75.176.50.49841: Flags [FP.], seq 1661658081:1661658112, ack 231695836, win 2064, options [nop,nop,TS val 291303154 ecr 3143364662], length 31
19:14:27.766452 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4683:4764, ack 650, win 237, options [nop,nop,TS val 4283680714 ecr 3393933274], length 81: HTTP
19:14:27.768568 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4764, win 471, options [nop,nop,TS val 3393933414 ecr 4283680714], length 0
19:14:28.452414 IP6 2607:5300:201:3100::7911.53792 > 2a02:6b68:0:181::1a7.139: Flags [S], seq 4013149805, win 28800, options [mss 1440,sackOK,TS val 4283681400 ecr 0,nop,wscale 7], length 0
19:14:28.452513 IP6 2a02:6b68:0:181::1a7.139 > 2607:5300:201:3100::7911.53792: Flags [R.], seq 0, ack 4013149806, win 0, length 0
19:14:28.527167 IP 165.225.80.40.443 > 100.75.176.50.49796: Flags [.], ack 728314410, win 2064, length 0
19:14:28.537249 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4764:4845, ack 650, win 237, options [nop,nop,TS val 4283681485 ecr 3393933414], length 81: HTTP
19:14:28.539168 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4845, win 471, options [nop,nop,TS val 3393934185 ecr 4283681485], length 0
19:14:28.573961 IP6 2607:5300:201:3100::7911.43322 > 2a02:6b68:0:181::1a7.443: Flags [S], seq 215700636, win 28800, options [mss 1440,sackOK,TS val 4283681522 ecr 0,nop,wscale 7], length 0
19:14:28.574060 IP6 2a02:6b68:0:181::1a7.443 > 2607:5300:201:3100::7911.43322: Flags [R.], seq 0, ack 215700637, win 0, length 0
19:14:28.655150 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4845:4920, ack 650, win 237, options [nop,nop,TS val 4283681603 ecr 3393934185], length 75: HTTP
19:14:28.674166 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 4920, win 471, options [nop,nop,TS val 3393934320 ecr 4283681603], length 0
19:14:28.691794 IP6 2607:5300:201:3100::7911.48966 > 2a02:6b68:0:181::1a7.445: Flags [S], seq 1545841969, win 28800, options [mss 1440,sackOK,TS val 4283681639 ecr 0,nop,wscale 7], length 0
19:14:28.691894 IP6 2a02:6b68:0:181::1a7.445 > 2607:5300:201:3100::7911.48966: Flags [R.], seq 0, ack 1545841970, win 0, length 0
19:14:28.775925 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 4920:5002, ack 650, win 237, options [nop,nop,TS val 4283681724 ecr 3393934320], length 82: HTTP
19:14:28.778267 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5002, win 471, options [nop,nop,TS val 3393934424 ecr 4283681724], length 0
19:14:28.833934 IP6 2607:5300:201:3100::7911.55842 > 2a02:6b68:0:181::1a7.587: Flags [S], seq 107009018, win 28800, options [mss 1440,sackOK,TS val 4283681778 ecr 0,nop,wscale 7], length 0
19:14:28.834032 IP6 2a02:6b68:0:181::1a7.587 > 2607:5300:201:3100::7911.55842: Flags [R.], seq 0, ack 107009019, win 0, length 0
19:14:28.921972 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5002:5082, ack 650, win 237, options [nop,nop,TS val 4283681870 ecr 3393934424], length 80: HTTP
19:14:28.975527 IP6 2607:5300:201:3100::7911.44874 > 2a02:6b68:0:181::1a7.993: Flags [S], seq 1218500637, win 28800, options [mss 1440,sackOK,TS val 4283681922 ecr 0,nop,wscale 7], length 0
19:14:28.975625 IP6 2a02:6b68:0:181::1a7.993 > 2607:5300:201:3100::7911.44874: Flags [R.], seq 0, ack 1218500638, win 0, length 0
19:14:28.981392 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5082, win 471, options [nop,nop,TS val 3393934627 ecr 4283681870], length 0
19:14:29.061588 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5082:5157, ack 650, win 237, options [nop,nop,TS val 4283682009 ecr 3393934627], length 75: HTTP
19:14:29.063651 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5157, win 471, options [nop,nop,TS val 3393934709 ecr 4283682009], length 0
19:14:29.116600 IP6 2607:5300:201:3100::7911.47674 > 2a02:6b68:0:181::1a7.995: Flags [S], seq 1828003297, win 28800, options [mss 1440,sackOK,TS val 4283682065 ecr 0,nop,wscale 7], length 0
19:14:29.116699 IP6 2a02:6b68:0:181::1a7.995 > 2607:5300:201:3100::7911.47674: Flags [R.], seq 0, ack 1828003298, win 0, length 0
19:14:29.199517 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5157:5232, ack 650, win 237, options [nop,nop,TS val 4283682147 ecr 3393934709], length 75: HTTP
19:14:29.201610 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5232, win 471, options [nop,nop,TS val 3393934847 ecr 4283682147], length 0
19:14:29.257894 IP6 2607:5300:201:3100::7911.46388 > 2a02:6b68:0:181::1a7.1080: Flags [S], seq 1397082413, win 28800, options [mss 1440,sackOK,TS val 4283682200 ecr 0,nop,wscale 7], length 0
19:14:29.257993 IP6 2a02:6b68:0:181::1a7.1080 > 2607:5300:201:3100::7911.46388: Flags [R.], seq 0, ack 1397082414, win 0, length 0
19:14:29.342863 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5232:5308, ack 650, win 237, options [nop,nop,TS val 4283682291 ecr 3393934847], length 76: HTTP
19:14:29.377849 IP6 2607:5300:201:3100::7911.36406 > 2a02:6b68:0:181::1a7.1433: Flags [S], seq 2755467142, win 28800, options [mss 1440,sackOK,TS val 4283682324 ecr 0,nop,wscale 7], length 0
19:14:29.377948 IP6 2a02:6b68:0:181::1a7.1433 > 2607:5300:201:3100::7911.36406: Flags [R.], seq 0, ack 2755467143, win 0, length 0
19:14:29.391768 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5308, win 471, options [nop,nop,TS val 3393935037 ecr 4283682291], length 0
19:14:29.458463 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5308:5387, ack 650, win 237, options [nop,nop,TS val 4283682406 ecr 3393934847], length 79: HTTP
19:14:29.460411 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5387, win 471, options [nop,nop,TS val 3393935106 ecr 4283682406], length 0
19:14:29.495681 IP6 2607:5300:201:3100::7911.50230 > 2a02:6b68:0:181::1a7.1701: Flags [S], seq 4021189042, win 28800, options [mss 1440,sackOK,TS val 4283682443 ecr 0,nop,wscale 7], length 0
19:14:29.495780 IP6 2a02:6b68:0:181::1a7.1701 > 2607:5300:201:3100::7911.50230: Flags [R.], seq 0, ack 4021189043, win 0, length 0
19:14:29.553110 IP 165.225.80.40.443 > 100.75.176.50.49811: Flags [.], ack 1725553390, win 2064, length 0
19:14:29.576891 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5387:5461, ack 650, win 237, options [nop,nop,TS val 4283682525 ecr 3393935106], length 74: HTTP
19:14:29.578943 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5461, win 471, options [nop,nop,TS val 3393935225 ecr 4283682525], length 0
19:14:29.614270 IP6 2607:5300:201:3100::7911.50882 > 2a02:6b68:0:181::1a7.1723: Flags [S], seq 3777277421, win 28800, options [mss 1440,sackOK,TS val 4283682558 ecr 0,nop,wscale 7], length 0
19:14:29.614369 IP6 2a02:6b68:0:181::1a7.1723 > 2607:5300:201:3100::7911.50882: Flags [R.], seq 0, ack 3777277422, win 0, length 0
19:14:29.696935 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5461:5536, ack 650, win 237, options [nop,nop,TS val 4283682645 ecr 3393935225], length 75: HTTP
19:14:29.698964 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5536, win 471, options [nop,nop,TS val 3393935345 ecr 4283682645], length 0
19:14:29.750940 IP6 2607:5300:201:3100::7911.54622 > 2a02:6b68:0:181::1a7.3306: Flags [S], seq 50648676, win 28800, options [mss 1440,sackOK,TS val 4283682697 ecr 0,nop,wscale 7], length 0
19:14:29.751039 IP6 2a02:6b68:0:181::1a7.3306 > 2607:5300:201:3100::7911.54622: Flags [R.], seq 0, ack 50648677, win 0, length 0
19:14:29.832354 IP 165.225.80.40.443 > 100.75.176.50.49814: Flags [.], ack 3519623947, win 2064, length 0
19:14:29.833240 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5536:5612, ack 650, win 237, options [nop,nop,TS val 4283682781 ecr 3393935345], length 76: HTTP
19:14:29.835315 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5612, win 471, options [nop,nop,TS val 3393935481 ecr 4283682781], length 0
19:14:29.885298 IP6 2607:5300:201:3100::7911.46738 > 2a02:6b68:0:181::1a7.5432: Flags [S], seq 1825675665, win 28800, options [mss 1440,sackOK,TS val 4283682833 ecr 0,nop,wscale 7], length 0
19:14:29.885396 IP6 2a02:6b68:0:181::1a7.5432 > 2607:5300:201:3100::7911.46738: Flags [R.], seq 0, ack 1825675666, win 0, length 0
19:14:29.971798 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5612:5693, ack 650, win 237, options [nop,nop,TS val 4283682920 ecr 3393935481], length 81: HTTP
19:14:30.005397 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5693, win 471, options [nop,nop,TS val 3393935651 ecr 4283682920], length 0
19:14:30.006836 IP6 2607:5300:201:3100::7911.36684 > 2a02:6b68:0:181::1a7.8000: Flags [S], seq 492757116, win 28800, options [mss 1440,sackOK,TS val 4283682954 ecr 0,nop,wscale 7], length 0
19:14:30.006935 IP6 2a02:6b68:0:181::1a7.8000 > 2607:5300:201:3100::7911.36684: Flags [R.], seq 0, ack 492757117, win 0, length 0
19:14:30.087022 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5693:5772, ack 650, win 237, options [nop,nop,TS val 4283683035 ecr 3393935651], length 79: HTTP
19:14:30.089043 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5772, win 471, options [nop,nop,TS val 3393935735 ecr 4283683035], length 0
19:14:30.121516 IP6 2607:5300:201:3100::7911.32828 > 2a02:6b68:0:181::1a7.8080: Flags [S], seq 4024701326, win 28800, options [mss 1440,sackOK,TS val 4283683069 ecr 0,nop,wscale 7], length 0
19:14:30.121615 IP6 2a02:6b68:0:181::1a7.8080 > 2607:5300:201:3100::7911.32828: Flags [R.], seq 0, ack 4024701327, win 0, length 0
19:14:30.205636 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5772:5853, ack 650, win 237, options [nop,nop,TS val 4283683153 ecr 3393935735], length 81: HTTP
19:14:30.211039 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 5853, win 471, options [nop,nop,TS val 3393935856 ecr 4283683153], length 0
19:14:30.239927 IP6 2607:5300:201:3100::7911.36910 > 2a02:6b68:0:181::1a7.11211: Flags [S], seq 336530906, win 28800, options [mss 1440,sackOK,TS val 4283683188 ecr 0,nop,wscale 7], length 0
19:14:30.240028 IP6 2a02:6b68:0:181::1a7.11211 > 2607:5300:201:3100::7911.36910: Flags [R.], seq 0, ack 336530907, win 0, length 0
19:14:30.333678 IP 146.ip-192-99-154.net.80 > 100.75.176.50.37000: Flags [P.], seq 5853:6078, ack 650, win 237, options [nop,nop,TS val 4283683282 ecr 3393935856], length 225: HTTP
19:14:30.342154 IP 100.75.176.50.37000 > 146.ip-192-99-154.net.80: Flags [.], ack 6078, win 470, options [nop,nop,TS val 3393935988 ecr 4283683282], length 0
19:14:30.398889 IP 100.75.176.50.50276 > ac88393aca5853df7.awsglobalaccelerator.com.443: Flags [P.], seq 3851636142:3851636196, ack 828190534, win 475, options [nop,nop,TS val 2062216186 ecr 1113826108], length 54
19:14:30.403267 IP ac88393aca5853df7.awsglobalaccelerator.com.443 > 100.75.176.50.50276: Flags [.], ack 54, win 265, options [nop,nop,TS val 1113836061 ecr 2062216186], length 0
19:14:30.417435 IP6 2a02:6b68:0:181::1a7.60811 > dns.as201838.net.53: 21854+ PTR? 111.212.248.13.in-addr.arpa. (45)
19:14:30.421847 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.60811: 21854 1/0/0 PTR ac88393aca5853df7.awsglobalaccelerator.com. (101)
19:14:30.478384 IP ac88393aca5853df7.awsglobalaccelerator.com.443 > 100.75.176.50.50276: Flags [P.], seq 1:72, ack 54, win 265, options [nop,nop,TS val 1113836137 ecr 2062216186], length 71
19:14:30.481544 IP 100.75.176.50.50276 > ac88393aca5853df7.awsglobalaccelerator.com.443: Flags [.], ack 72, win 475, options [nop,nop,TS val 2062216269 ecr 1113836137], length 0
19:14:30.887807 IP 100.75.176.50.53732 > ac88393aca5853df7.awsglobalaccelerator.com.443: Flags [P.], seq 3523938746:3523938800, ack 3321964371, win 452, options [nop,nop,TS val 4267869148 ecr 599124507], length 54
19:14:30.891153 IP ac88393aca5853df7.awsglobalaccelerator.com.443 > 100.75.176.50.53732: Flags [.], ack 54, win 852, options [nop,nop,TS val 599134308 ecr 4267869148], length 0
19:14:30.965333 IP ac88393aca5853df7.awsglobalaccelerator.com.443 > 100.75.176.50.53732: Flags [P.], seq 1:72, ack 54, win 852, options [nop,nop,TS val 599134382 ecr 4267869148], length 71
19:14:30.967288 IP6 2a02:6b68:0:181::1a7.41212 > dns.as201838.net.53: 25362+ PTR? 165.92.223.76.in-addr.arpa. (44)
19:14:30.968085 IP 100.75.176.50.53732 > ac88393aca5853df7.awsglobalaccelerator.com.443: Flags [.], ack 72, win 452, options [nop,nop,TS val 4267869230 ecr 599134382], length 0
19:14:30.970629 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.41212: 25362 1/0/0 PTR ac88393aca5853df7.awsglobalaccelerator.com. (100)
19:14:31.479218 IP 165.225.80.40.443 > 100.75.176.50.49842: Flags [F.], seq 1223908831, ack 1418164282, win 2064, options [nop,nop,TS val 3179826175 ecr 4204248501], length 0
19:14:32.118146 IP 165.225.80.40.443 > 100.75.176.50.49778: Flags [.], ack 4018541652, win 2064, length 0
19:14:32.253127 IP 165.225.80.40.443 > 100.75.176.50.49822: Flags [.], ack 737597502, win 2064, length 0
19:14:32.552114 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 65490+ PTR? 1.2.168.192.in-addr.arpa. (42)
19:14:32.552132 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 57257+ PTR? 118.1.168.192.in-addr.arpa. (44)
19:14:32.552142 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 3980+ PTR? 5.7.c.0.c.c.e.f.f.f.6.0.0.d.4.3.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:32.552152 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 14187+ PTR? 1.e.4.f.c.7.1.b.c.a.e.0.f.6.d.4.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:32.552165 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 25800+ PTR? 134.1.168.192.in-addr.arpa. (44)
19:14:32.552174 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 36162+ PTR? 1.1.1.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:32.552184 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 46314+ PTR? 133.1.168.192.in-addr.arpa. (44)
19:14:32.552193 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 55247+ PTR? f.b.3.1.3.e.e.f.f.f.7.2.e.8.4.5.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:32.552238 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 64407+ PTR? a.2.a.f.0.6.f.7.7.7.f.0.b.1.2.d.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:32.552242 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 9439+ PTR? 50.176.75.100.in-addr.arpa. (44)
19:14:32.552243 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 18987+ PTR? 1.1.168.192.in-addr.arpa. (42)
19:14:32.552244 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 27218+ PTR? 114.1.168.192.in-addr.arpa. (44)
19:14:32.552285 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 34530+ PTR? 2.e.5.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:32.552286 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 43808+ PTR? 176.1.168.192.in-addr.arpa. (44)
19:14:32.552286 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 52662+ PTR? 184.1.168.192.in-addr.arpa. (44)
19:14:32.552287 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 60123+ PTR? d.0.4.a.5.e.e.f.f.f.8.d.3.e.8.c.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:32.552288 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 1588+ PTR? 5.b.f.f.5.f.c.c.b.3.b.2.2.6.d.e.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:32.552291 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 20347+ PTR? 1.176.75.100.in-addr.arpa. (43)
19:14:32.552301 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 32874+ PTR? 132.1.168.192.in-addr.arpa. (44)
19:14:32.552311 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 42924+ PTR? 120.1.168.192.in-addr.arpa. (44)
19:14:32.552340 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 51860+ PTR? 4.3.8.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:32.552342 IP6 2a02:6b68:0:181::1a7.50518 > dns.as201838.net.53: 59575+ PTR? a.f.1.b.2.8.8.8.a.e.7.4.2.0.9.5.1.0.c.9.1.a.f.f.f.6.b.6.2.0.a.2.ip6.arpa. (90)
19:14:32.553861 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.50518: 65490 NXDomain* 0/1/0 (138)
19:14:32.556478 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.50518: 57257 NXDomain* 0/1/0 (140)
19:14:32.556479 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.50518: 3980 NXDomain*$ 0/1/0 (172)
19:14:32.556480 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.50518: 14187 NXDomain*$ 0/1/0 (172)
19:14:32.556480 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.50518: 25800 NXDomain* 0/1/0 (140)
19:14:32.556481 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.50518: 36162 NXDomain*$ 0/1/0 (172)
19:14:32.556481 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.50518: 46314 NXDomain* 0/1/0 (140)
19:14:32.556482 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.50518: 55247 NXDomain*$ 0/1/0 (172)
19:14:32.556482 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.50518: 64407 NXDomain*$ 0/1/0 (172)
19:14:32.556524 IP6 dns.as201838.net.53 > 2a02:6b68:0:181::1a7.50518: 9439 NXDomain* 0/1/0 (139)
... (truncated for character limit)
  1. There is no AAAA answer in DNS response on the client, check what's going on with DNS on this client.
  2. It looks you're receiving packets from the scanner on well-known ports (138, 139, etc.):
19:14:27.679630 IP6 2607:5300:201:3100::7911.55696 > 2a02:6b68:0:181::1a7.138
19:14:28.452414 IP6 2607:5300:201:3100::7911.53792 > 2a02:6b68:0:181::1a7.139
19:14:28.573961 IP6 2607:5300:201:3100::7911.43322 > 2a02:6b68:0:181::1a7.443
[...]

So there is no issue with incoming traffic yet.

It appears the DNS issue is due to the fact I am using unbound. It returns only IPv4 results.. this is something for me to figure out.. most likely tomorrow

Here are the results for the curious

nslookup shows different results

(router)

~ nslookup wimi.com
Server:         127.0.0.1
Address:        127.0.0.1:53

Non-authoritative answer:

Non-authoritative answer:
Name:   wimi.com
Address: 172.67.192.161
Name:   wimi.com
Address: 104.21.11.206

~ nslookup wimi.com ::1
Server:         ::1
Address:        [::1]:53

Non-authoritative answer:

Non-authoritative answer:
Name:   wimi.com
Address: 172.67.192.161
Name:   wimi.com
Address: 104.21.11.206

when LuCI (OpenWRT) checkbox 'Use DNS servers advertised by peer' selected, the default nslookup shows both IPv4 and IPv6

~ nslookup wimi.com
Server:         2a02:6b60::53:1 - CommunityFibre
Address:        [2a02:6b60::53:1]:53

Non-authoritative answer:
Name:   wimi.com
Address: 104.21.11.206
Name:   wimi.com
Address: 172.67.192.161

Non-authoritative answer:
Name:   wimi.com
Address: 2606:4700:3032::ac43:c0a1
Name:   wimi.com
Address: 2606:4700:3030::6815:bce

we can replicate the same thing by simply routing through our ISP DNS

~ nslookup wimi.com 2a02:6b60::53:1
Server:         2a02:6b60::53:1
Address:        [2a02:6b60::53:1]:53

Non-authoritative answer:
Name:   wimi.com
Address: 2606:4700:3030::6815:bce
Name:   wimi.com
Address: 2606:4700:3032::ac43:c0a1

Non-authoritative answer:
Name:   wimi.com
Address: 104.21.11.206
Name:   wimi.com
Address: 172.67.192.161
1 Like

just to update. Short answers, I managed to get IPv6 to show up on my nslookup by doing solution number 1 below. Then once that was sorted I fixed the 'whatsmyip' website by doing solution number 2

  1. I have Unbound + Adguard running so adguard was blocking IPv6. There is a checkbox in settings to enable IPv6 inside adguard UI, also should be present in config files
  2. My Firefox had IPv6 disabled, I had to enable it. I must have disabled it when I was setting up IPv4 only

thanks all

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.