root@OpenWrt:~# tcpdump -ni any port 1113 or port 7
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
13:15:25.289305 ethertype IPv4, IP 212.159.110.168.47570 > 176.26.147.103.1113: UDP, length 102
13:15:25.289305 IP 212.159.110.168.47570 > 176.26.147.103.1113: UDP, length 102
13:15:25.289611 IP 212.159.110.168.47570 > 192.168.1.85.7: UDP, length 102
13:15:25.289669 IP 212.159.110.168.47570 > 192.168.1.85.7: UDP, length 102
13:15:40.797274 ethertype IPv4, IP 198.199.98.246.50961 > 176.26.147.103.1113: Flags [S], seq 1087738189, win 14600, options [mss 1460,sackOK,TS val 3260533066 ecr 0,nop,wscale 8], length 0
13:15:40.797274 IP 198.199.98.246.50961 > 176.26.147.103.1113: Flags [S], seq 1087738189, win 14600, options [mss 1460,sackOK,TS val 3260533066 ecr 0,nop,wscale 8], length 0
13:15:40.797572 IP 198.199.98.246.50961 > 192.168.1.85.7: Flags [S], seq 1087738189, win 14600, options [mss 1460,sackOK,TS val 3260533066 ecr 0,nop,wscale 8], length 0
13:15:40.797636 IP 198.199.98.246.50961 > 192.168.1.85.7: Flags [S], seq 1087738189, win 14600, options [mss 1460,sackOK,TS val 3260533066 ecr 0,nop,wscale 8], length 0
13:15:41.796941 ethertype IPv4, IP 198.199.98.246.50961 > 176.26.147.103.1113: Flags [S], seq 1087738189, win 14600, options [mss 1460,sackOK,TS val 3260533316 ecr 0,nop,wscale 8], length 0
13:15:41.796941 IP 198.199.98.246.50961 > 176.26.147.103.1113: Flags [S], seq 1087738189, win 14600, options [mss 1460,sackOK,TS val 3260533316 ecr 0,nop,wscale 8], length 0
13:15:41.797174 IP 198.199.98.246.50961 > 192.168.1.85.7: Flags [S], seq 1087738189, win 14600, options [mss 1460,sackOK,TS val 3260533316 ecr 0,nop,wscale 8], length 0
13:15:41.797223 IP 198.199.98.246.50961 > 192.168.1.85.7: Flags [S], seq 1087738189, win 14600, options [mss 1460,sackOK,TS val 3260533316 ecr 0,nop,wscale 8], length 0
13:15:41.798304 ethertype IPv4, IP 198.199.98.246.50964 > 176.26.147.103.1113: Flags [S], seq 3504779838, win 14600, options [mss 1460,sackOK,TS val 3260533316 ecr 0,nop,wscale 8], length 0
13:15:41.798304 IP 198.199.98.246.50964 > 176.26.147.103.1113: Flags [S], seq 3504779838, win 14600, options [mss 1460,sackOK,TS val 3260533316 ecr 0,nop,wscale 8], length 0
13:15:41.798616 IP 198.199.98.246.50964 > 192.168.1.85.7: Flags [S], seq 3504779838, win 14600, options [mss 1460,sackOK,TS val 3260533316 ecr 0,nop,wscale 8], length 0
13:15:41.798668 IP 198.199.98.246.50964 > 192.168.1.85.7: Flags [S], seq 3504779838, win 14600, options [mss 1460,sackOK,TS val 3260533316 ecr 0,nop,wscale 8], length 0
13:15:42.796394 ethertype IPv4, IP 198.199.98.246.50964 > 176.26.147.103.1113: Flags [S], seq 3504779838, win 14600, options [mss 1460,sackOK,TS val 3260533566 ecr 0,nop,wscale 8], length 0
13:15:42.796394 IP 198.199.98.246.50964 > 176.26.147.103.1113: Flags [S], seq 3504779838, win 14600, options [mss 1460,sackOK,TS val 3260533566 ecr 0,nop,wscale 8], length 0
13:15:42.796660 IP 198.199.98.246.50964 > 192.168.1.85.7: Flags [S], seq 3504779838, win 14600, options [mss 1460,sackOK,TS val 3260533566 ecr 0,nop,wscale 8], length 0
13:15:42.796716 IP 198.199.98.246.50964 > 192.168.1.85.7: Flags [S], seq 3504779838, win 14600, options [mss 1460,sackOK,TS val 3260533566 ecr 0,nop,wscale 8], length 0
13:15:42.801180 ethertype IPv4, IP 198.199.98.246.50971 > 176.26.147.103.1113: Flags [S], seq 2705694570, win 14600, options [mss 1460,sackOK,TS val 3260533566 ecr 0,nop,wscale 8], length 0
13:15:42.801180 IP 198.199.98.246.50971 > 176.26.147.103.1113: Flags [S], seq 2705694570, win 14600, options [mss 1460,sackOK,TS val 3260533566 ecr 0,nop,wscale 8], length 0
13:15:42.801450 IP 198.199.98.246.50971 > 192.168.1.85.7: Flags [S], seq 2705694570, win 14600, options [mss 1460,sackOK,TS val 3260533566 ecr 0,nop,wscale 8], length 0
13:15:42.801489 IP 198.199.98.246.50971 > 192.168.1.85.7: Flags [S], seq 2705694570, win 14600, options [mss 1460,sackOK,TS val 3260533566 ecr 0,nop,wscale 8], length 0
13:15:43.798554 ethertype IPv4, IP 198.199.98.246.50971 > 176.26.147.103.1113: Flags [S], seq 2705694570, win 14600, options [mss 1460,sackOK,TS val 3260533816 ecr 0,nop,wscale 8], length 0
13:15:43.798554 IP 198.199.98.246.50971 > 176.26.147.103.1113: Flags [S], seq 2705694570, win 14600, options [mss 1460,sackOK,TS val 3260533816 ecr 0,nop,wscale 8], length 0
13:15:43.798768 IP 198.199.98.246.50971 > 192.168.1.85.7: Flags [S], seq 2705694570, win 14600, options [mss 1460,sackOK,TS val 3260533816 ecr 0,nop,wscale 8], length 0
13:15:43.798805 IP 198.199.98.246.50971 > 192.168.1.85.7: Flags [S], seq 2705694570, win 14600, options [mss 1460,sackOK,TS val 3260533816 ecr 0,nop,wscale 8], length 0
^C
28 packets captured
28 packets received by filter
0 packets dropped by kernel
root@OpenWrt:~#