If I use 2.0 it gets the proper ip - tcpdump from 2.0
tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
14:42:05.611391 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 2049: (tos 0x0, ttl 127, id 13171, offset 0, flags [DF], proto TCP (6), length 2035)
10.110.74.72.9061 > 139.59.210.197.443: Flags [P.], cksum 0xba9c (incorrect -> 0x4bd6), seq 4198346409:4198348404, ack 3741515707, win 1023, length 1995
14:42:05.632029 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 55, id 13542, offset 0, flags [DF], proto TCP (6), length 40)
139.59.210.197.443 > 10.110.74.72.9061: Flags [.], cksum 0x44af (correct), ack 1995, win 989, length 0
14:42:05.649275 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 721: (tos 0x0, ttl 55, id 13543, offset 0, flags [DF], proto TCP (6), length 707)
139.59.210.197.443 > 10.110.74.72.9061: Flags [P.], cksum 0x7b44 (correct), seq 1:668, ack 1995, win 989, length 667
14:42:05.690158 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 127, id 13173, offset 0, flags [DF], proto TCP (6), length 40)
10.110.74.72.9061 > 139.59.210.197.443: Flags [.], cksum 0x41f4 (correct), ack 668, win 1021, length 0
14:42:06.719383 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 58: (tos 0x0, ttl 127, id 61683, offset 0, flags [none], proto UDP (17), length 44)
10.110.74.72.51714 > 192.168.0.209.8612: UDP, length 16
14:42:07.056580 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 413: (tos 0x0, ttl 54, id 4748, offset 0, flags [DF], proto TCP (6), length 399)
66.203.125.12.443 > 10.110.74.72.9094: Flags [P.], cksum 0xad77 (correct), seq 1195519700:1195520059, ack 3489776361, win 42161, length 359
14:42:07.057106 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 397: (tos 0x0, ttl 127, id 14903, offset 0, flags [DF], proto TCP (6), length 383)
10.110.74.72.9094 > 66.203.125.12.443: Flags [P.], cksum 0x0e6b (correct), seq 1:344, ack 359, win 64240, length 343
14:42:07.081481 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 54, id 4749, offset 0, flags [DF], proto TCP (6), length 40)
66.203.125.12.443 > 10.110.74.72.9094: Flags [.], cksum 0xc594 (correct), ack 344, win 42161, length 0
14:42:07.611552 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 1817: (tos 0x0, ttl 127, id 13174, offset 0, flags [DF], proto TCP (6), length 1803)
10.110.74.72.9061 > 139.59.210.197.443: Flags [P.], cksum 0xb9b4 (incorrect -> 0x6b82), seq 1995:3758, ack 668, win 1021, length 1763
14:42:07.611572 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 1833: (tos 0x0, ttl 127, id 13176, offset 0, flags [DF], proto TCP (6), length 1819)
10.110.74.72.9089 > 139.59.210.197.443: Flags [P.], cksum 0xb9c4 (incorrect -> 0x69eb), seq 2652091810:2652093589, ack 3650931132, win 1022, length 1779
14:42:07.612488 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 1831: (tos 0x0, ttl 127, id 13178, offset 0, flags [DF], proto TCP (6), length 1817)
10.110.74.72.9069 > 139.59.210.197.443: Flags [P.], cksum 0xb9c2 (incorrect -> 0x1af9), seq 1785385088:1785386865, ack 1801176532, win 1026, length 1777
14:42:07.630742 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 55, id 43900, offset 0, flags [DF], proto TCP (6), length 40)
139.59.210.197.443 > 10.110.74.72.9089: Flags [.], cksum 0xd6a3 (correct), ack 1779, win 827, length 0
14:42:07.630956 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 310: (tos 0x0, ttl 127, id 13180, offset 0, flags [DF], proto TCP (6), length 296)
10.110.74.72.9089 > 139.59.210.197.443: Flags [P.], cksum 0x8b93 (correct), seq 1779:2035, ack 1, win 1022, length 256
14:42:07.631719 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 55, id 11912, offset 0, flags [DF], proto TCP (6), length 40)
139.59.210.197.443 > 10.110.74.72.9069: Flags [.], cksum 0x63c0 (correct), ack 1777, win 297, length 0
14:42:07.631744 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 55, id 13544, offset 0, flags [DF], proto TCP (6), length 40)
139.59.210.197.443 > 10.110.74.72.9061: Flags [.], cksum 0x3b16 (correct), ack 3758, win 1016, length 0
14:42:07.631950 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 310: (tos 0x0, ttl 127, id 13181, offset 0, flags [DF], proto TCP (6), length 296)
10.110.74.72.9069 > 139.59.210.197.443: Flags [P.], cksum 0xd71e (correct), seq 1777:2033, ack 1, win 1026, length 256
14:42:07.631968 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 310: (tos 0x0, ttl 127, id 13182, offset 0, flags [DF], proto TCP (6), length 296)
10.110.74.72.9061 > 139.59.210.197.443: Flags [P.], cksum 0x2d3a (correct), seq 3758:4014, ack 668, win 1021, length 256
14:42:07.688811 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 725: (tos 0x0, ttl 55, id 11913, offset 0, flags [DF], proto TCP (6), length 711)
139.59.210.197.443 > 10.110.74.72.9069: Flags [P.], cksum 0x0070 (correct), seq 1:672, ack 2033, win 319, length 671
14:42:07.695741 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 55, id 43901, offset 0, flags [DF], proto TCP (6), length 40)
139.59.210.197.443 > 10.110.74.72.9089: Flags [.], cksum 0xd58c (correct), ack 2035, win 850, length 0
14:42:07.696953 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 55, id 13545, offset 0, flags [DF], proto TCP (6), length 40)
139.59.210.197.443 > 10.110.74.72.9061: Flags [.], cksum 0x39ff (correct), ack 4014, win 1039, length 0
14:42:07.698182 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 725: (tos 0x0, ttl 55, id 43902, offset 0, flags [DF], proto TCP (6), length 711)
139.59.210.197.443 > 10.110.74.72.9089: Flags [P.], cksum 0xf2e1 (correct), seq 1:672, ack 2035, win 850, length 671
14:42:07.701181 00:00:5e:00:01:0a > d0:37:45:28:e0:1a, ethertype IPv4 (0x0800), length 725: (tos 0x0, ttl 55, id 13546, offset 0, flags [DF], proto TCP (6), length 711)
139.59.210.197.443 > 10.110.74.72.9061: Flags [P.], cksum 0x646f (correct), seq 668:1339, ack 4014, win 1039, length 671
14:42:07.729650 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 127, id 13183, offset 0, flags [DF], proto TCP (6), length 40)
10.110.74.72.9069 > 139.59.210.197.443: Flags [.], cksum 0x5d4b (correct), ack 672, win 1023, length 0
14:42:07.738556 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 127, id 13184, offset 0, flags [DF], proto TCP (6), length 40)
10.110.74.72.9089 > 139.59.210.197.443: Flags [.], cksum 0xd23d (correct), ack 672, win 1026, length 0
14:42:07.742472 d0:37:45:28:e0:1a > 00:00:5e:00:01:0a, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 127, id 13185, offset 0, flags [DF], proto TCP (6), length 40)
10.110.74.72.9061 > 139.59.210.197.443: Flags [.], cksum 0x376d (correct), ack 1339, win 1026, length 0
TCP Dump from 3.0
tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
14:42:26.982009 d0:37:45:28:e0:1a > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 130: (hlim 1, next-header Options (0) payload length: 76) fe80::d237:45ff:fe28:e01a > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 3 group record(s) [gaddr ff02::1:ff00:0 to_ex, 0 source(s)] [gaddr ff02::1:ff28:e01a to_ex, 0 source(s)] [gaddr ff02::2 to_ex, 0 source(s)]
14:42:27.142003 d0:37:45:28:e0:1a > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: (hlim 1, next-header Options (0) payload length: 36) fe80::d237:45ff:fe28:e01a > ff02::16: HBH (rtalert: 0x0000) (padn) [icmp6 sum ok] ICMP6, multicast listener report v2, 1 group record(s) [gaddr ff02::1:ff00:0 to_ex, 0 source(s)]
14:42:28.102017 d0:37:45:28:e0:1a > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 342: (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 328)
0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from d0:37:45:28:e0:1a, length 300, xid 0x72c4696b, secs 4, Flags [none]
Client-Ethernet-Address d0:37:45:28:e0:1a
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: Discover
MSZ Option 57, length 2: 576
Parameter-Request Option 55, length 8:
Subnet-Mask, Default-Gateway, Domain-Name-Server, Hostname
Domain-Name, BR, NTP, Classless-Static-Route
Vendor-Class Option 60, length 12: "udhcp 1.30.1"
Hostname Option 12, length 7: "OpenWrt"
14:42:31.192017 d0:37:45:28:e0:1a > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 342: (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 328)
0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from d0:37:45:28:e0:1a, length 300, xid 0x72c4696b, secs 7, Flags [none]
Client-Ethernet-Address d0:37:45:28:e0:1a
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: Discover
MSZ Option 57, length 2: 576
Parameter-Request Option 55, length 8:
Subnet-Mask, Default-Gateway, Domain-Name-Server, Hostname
Domain-Name, BR, NTP, Classless-Static-Route
Vendor-Class Option 60, length 12: "udhcp 1.30.1"
Hostname Option 12, length 7: "OpenWrt"
14:42:34.271996 d0:37:45:28:e0:1a > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 342: (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 328)
0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from d0:37:45:28:e0:1a, length 300, xid 0x72c4696b, secs 10, Flags [none]
Client-Ethernet-Address d0:37:45:28:e0:1a
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: Discover
MSZ Option 57, length 2: 576
Parameter-Request Option 55, length 8:
Subnet-Mask, Default-Gateway, Domain-Name-Server, Hostname
Domain-Name, BR, NTP, Classless-Static-Route
Vendor-Class Option 60, length 12: "udhcp 1.30.1"
Hostname Option 12, length 7: "OpenWrt"