2025-01-01 Wireshark_DNS_v7.0

C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANVLTXZ2.pcapng 5601 total packets, 2 shown

No. Time Source Destination Protocol Length Info

820 2025-01-01 22:53:59.017525 192.168.124.23 8.8.8.8 DNS 68 Standard query 0xba72 HTTPS

ietf.org

Frame 820: 68 bytes on wire (544 bits), 68 bytes captured (544 bits) on interface \Device\NPF_{F5779BFB

AB97-4FDA-9AF9-2703F1ABD1CA}, id 0

Section number: 1

Interface id: 0 (\Device\NPF_{F5779BFB-AB97-4FDA-9AF9-2703F1ABD1CA})

Encapsulation type: Ethernet (1)

Arrival Time: Jan 1, 2025 22:53:59.017525000

UTC Arrival Time: Jan 1, 2025 14:53:59.017525000 UTC

Epoch Arrival Time: 1735743239.017525000

[Time shift for this packet: 0.000000000 seconds]

[Time delta from previous captured frame: 0.000267000 seconds]

[Time delta from previous displayed frame: 0.000267000 seconds]

[Time since reference or first frame: 104.033597000 seconds]

Frame Number: 820

Frame Length: 68 bytes (544 bits)

Capture Length: 68 bytes (544 bits)

[Frame is marked: False]

[Frame is ignored: False]

[Protocols in frame: eth:ethertype:ip:udp:dns]

[Coloring Rule Name: UDP]

[Coloring Rule String: udp]

Ethernet II, Src: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c), Dst: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Destination: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Source: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Type: IPv4 (0x0800)

[Stream index: 0]

Internet Protocol Version 4, Src: 192.168.124.23, Dst: 8.8.8.8

0100 .... = Version: 4

.... 0101 = Header Length: 20 bytes (5)

Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)

Total Length: 54

Identification: 0x50c6 (20678)

  1. .... = Flags: 0x0

...0 0000 0000 0000 = Fragment Offset: 0

Time to Live: 64

Protocol: UDP (17)

Header Checksum: 0xdd21 [validation disabled]

[Header checksum status: Unverified]

Source Address: 192.168.124.23

Destination Address: 8.8.8.8

[Stream index: 0]

User Datagram Protocol, Src Port: 60469, Dst Port: 53

Source Port: 60469

Destination Port: 53

Length: 34

Checksum: 0x6466 [unverified]

[Checksum Status: Unverified]

[Stream index: 60]

[Stream Packet Number: 1]

[Timestamps]

UDP payload (26 bytes)

Domain Name System (query)

Transaction ID: 0xba72

Flags: 0x0100 Standard query

0... .... .... .... = Response: Message is a query

.000 0... .... .... = Opcode: Standard query (0)

.... ..0. .... .... = Truncated: Message is not truncated

.... ...1 .... .... = Recursion desired: Do query recursively

.... .... .0.. .... = Z: reserved (0)

.... .... ...0 .... = Non-authenticated data: Unacceptable

Questions: 1

Answer RRs: 0

Authority RRs: 0

Additional RRs: 0

Queries

ietf.org: type HTTPS, class IN

Name: ietf.org

[Name Length: 8]

[Label Count: 2]

Type: HTTPS (65) (HTTPS Specific Service Endpoints)

Class: IN (0x0001)

[Response In: 822]

No. Time Source Destination Protocol Length Info

821 2025-01-01 22:53:59.081574 8.8.8.8 192.168.124.23 DNS 100 Standard query response

0x6342 A ietf.org A 104.16.44.99 A 104.16.45.99

Frame 821: 100 bytes on wire (800 bits), 100 bytes captured (800 bits) on interface \Device\NPF_{F5779BFB

AB97-4FDA-9AF9-2703F1ABD1CA}, id 0

Section number: 1

Interface id: 0 (\Device\NPF_{F5779BFB-AB97-4FDA-9AF9-2703F1ABD1CA})C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANVLTXZ2.pcapng 5601 total packets, 2 shown

Encapsulation type: Ethernet (1)

Arrival Time: Jan 1, 2025 22:53:59.081574000

UTC Arrival Time: Jan 1, 2025 14:53:59.081574000 UTC

Epoch Arrival Time: 1735743239.081574000

[Time shift for this packet: 0.000000000 seconds]

[Time delta from previous captured frame: 0.064049000 seconds]

[Time delta from previous displayed frame: 0.064049000 seconds]

[Time since reference or first frame: 104.097646000 seconds]

Frame Number: 821

Frame Length: 100 bytes (800 bits)

Capture Length: 100 bytes (800 bits)

[Frame is marked: False]

[Frame is ignored: False]

[Protocols in frame: eth:ethertype:ip:udp:dns]

[Coloring Rule Name: UDP]

[Coloring Rule String: udp]

Ethernet II, Src: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30), Dst: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Destination: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Source: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Type: IPv4 (0x0800)

[Stream index: 0]

Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.124.23

0100 .... = Version: 4

.... 0101 = Header Length: 20 bytes (5)

Differentiated Services Field: 0x74 (DSCP: Unknown, ECN: Not-ECT)

Total Length: 86

Identification: 0x6ac7 (27335)

  1. .... = Flags: 0x0

...0 0000 0000 0000 = Fragment Offset: 0

Time to Live: 51

Protocol: UDP (17)

Header Checksum: 0xcf8c [validation disabled]

[Header checksum status: Unverified]

Source Address: 8.8.8.8

Destination Address: 192.168.124.23

[Stream index: 0]

User Datagram Protocol, Src Port: 53, Dst Port: 60864

Source Port: 53

Destination Port: 60864

Length: 66

Checksum: 0x8d24 [unverified]

[Checksum Status: Unverified]

[Stream index: 59]

[Stream Packet Number: 2]

[Timestamps]

UDP payload (58 bytes)

Domain Name System (response)

Transaction ID: 0x6342

Flags: 0x8180 Standard query response, No error

1... .... .... .... = Response: Message is a response

.000 0... .... .... = Opcode: Standard query (0)

.... .0.. .... .... = Authoritative: Server is not an authority for domain

.... ..0. .... .... = Truncated: Message is not truncated

.... ...1 .... .... = Recursion desired: Do query recursively

.... .... 1... .... = Recursion available: Server can do recursive queries

.... .... .0.. .... = Z: reserved (0)

.... .... ..0. .... = Answer authenticated: Answer/authority portion was not authenticated by the server

.... .... ...0 .... = Non-authenticated data: Unacceptable

.... .... .... 0000 = Reply code: No error (0)

Questions: 1

Answer RRs: 2

Authority RRs: 0

Additional RRs: 0

Queries

ietf.org: type A, class IN

Name: ietf.org

[Name Length: 8]

[Label Count: 2]

Type: A (1) (Host Address)

Class: IN (0x0001)

Answers

ietf.org: type A, class IN, addr 104.16.44.99

Name: ietf.org

Type: A (1) (Host Address)

Class: IN (0x0001)

Time to live: 300 (5 minutes)

Data length: 4

Address: 104.16.44.99

ietf.org: type A, class IN, addr 104.16.45.99

Name: ietf.org

Type: A (1) (Host Address)C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANVLTXZ2.pcapng 5601 total packets, 2 shown

Class: IN (0x0001)

Time to live: 300 (5 minutes)

Data length: 4

Address: 104.16.45.99

[Request In: 819]

[Time: 0.064316000 seconds]


C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANHEOKZ2.pcapng 53 total packets, 4 shown

No. Time Source Destination Protocol Length Info

23 2025-01-01 23:27:23.779596 192.168.124.23 8.8.8.8 DNS 71 Standard query 0x0002

A www.mit.edu

Frame 23: 71 bytes on wire (568 bits), 71 bytes captured (568 bits) on interface \Device\NPF_{F5779BFB

AB97-4FDA-9AF9-2703F1ABD1CA}, id 0

Section number: 1

Interface id: 0 (\Device\NPF_{F5779BFB-AB97-4FDA-9AF9-2703F1ABD1CA})

Encapsulation type: Ethernet (1)

Arrival Time: Jan 1, 2025 23:27:23.779596000

UTC Arrival Time: Jan 1, 2025 15:27:23.779596000 UTC

Epoch Arrival Time: 1735745243.779596000

[Time shift for this packet: 0.000000000 seconds]

[Time delta from previous captured frame: 0.001413000 seconds]

[Time delta from previous displayed frame: 0.001413000 seconds]

[Time since reference or first frame: 6.708460000 seconds]

Frame Number: 23

Frame Length: 71 bytes (568 bits)

Capture Length: 71 bytes (568 bits)

[Frame is marked: False]

[Frame is ignored: False]

[Protocols in frame: eth:ethertype:ip:udp:dns]

[Coloring Rule Name: UDP]

[Coloring Rule String: udp]

Ethernet II, Src: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c), Dst: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Destination: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Source: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Type: IPv4 (0x0800)

[Stream index: 3]

Internet Protocol Version 4, Src: 192.168.124.23, Dst: 8.8.8.8

0100 .... = Version: 4

.... 0101 = Header Length: 20 bytes (5)

Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)

Total Length: 57

Identification: 0x538b (21387)

  1. .... = Flags: 0x0

...0 0000 0000 0000 = Fragment Offset: 0

Time to Live: 64

Protocol: UDP (17)

Header Checksum: 0xda59 [validation disabled]

[Header checksum status: Unverified]

Source Address: 192.168.124.23

Destination Address: 8.8.8.8

[Stream index: 6]

User Datagram Protocol, Src Port: 59166, Dst Port: 53

Source Port: 59166

Destination Port: 53

Length: 37

Checksum: 0x78d3 [unverified]

[Checksum Status: Unverified]

[Stream index: 8]

[Stream Packet Number: 1]

[Timestamps]

UDP payload (29 bytes)

Domain Name System (query)

Transaction ID: 0x0002

Flags: 0x0100 Standard query

0... .... .... .... = Response: Message is a query

.000 0... .... .... = Opcode: Standard query (0)

.... ..0. .... .... = Truncated: Message is not truncated

.... ...1 .... .... = Recursion desired: Do query recursively

.... .... .0.. .... = Z: reserved (0)

.... .... ...0 .... = Non-authenticated data: Unacceptable

Questions: 1

Answer RRs: 0

Authority RRs: 0

Additional RRs: 0

Queries

www.mit.edu: type A, class IN

Name: www.mit.edu

[Name Length: 11]

[Label Count: 3]

Type: A (1) (Host Address)

Class: IN (0x0001)

[Response In: 24]

No. Time Source Destination Protocol Length Info

24 2025-01-01 23:27:23.843432 8.8.8.8 192.168.124.23 DNS 160 Standard query response

0x0002 A www.mit.edu CNAME www.mit.edu.edgekey.net CNAME e9566.dscb.akamaiedge.net A 23.49.120.120

Frame 24: 160 bytes on wire (1280 bits), 160 bytes captured (1280 bits) on interface \Device\NPF_{F5779BFB

AB97-4FDA-9AF9-2703F1ABD1CA}, id 0

Section number: 1

Interface id: 0 (\Device\NPF_{F5779BFB-AB97-4FDA-9AF9-2703F1ABD1CA})C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANHEOKZ2.pcapng 53 total packets, 4 shown

Encapsulation type: Ethernet (1)

Arrival Time: Jan 1, 2025 23:27:23.843432000

UTC Arrival Time: Jan 1, 2025 15:27:23.843432000 UTC

Epoch Arrival Time: 1735745243.843432000

[Time shift for this packet: 0.000000000 seconds]

[Time delta from previous captured frame: 0.063836000 seconds]

[Time delta from previous displayed frame: 0.063836000 seconds]

[Time since reference or first frame: 6.772296000 seconds]

Frame Number: 24

Frame Length: 160 bytes (1280 bits)

Capture Length: 160 bytes (1280 bits)

[Frame is marked: False]

[Frame is ignored: False]

[Protocols in frame: eth:ethertype:ip:udp:dns]

[Coloring Rule Name: UDP]

[Coloring Rule String: udp]

Ethernet II, Src: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30), Dst: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Destination: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Source: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Type: IPv4 (0x0800)

[Stream index: 3]

Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.124.23

0100 .... = Version: 4

.... 0101 = Header Length: 20 bytes (5)

Differentiated Services Field: 0x74 (DSCP: Unknown, ECN: Not-ECT)

Total Length: 146

Identification: 0x4ded (19949)

  1. .... = Flags: 0x0

...0 0000 0000 0000 = Fragment Offset: 0

Time to Live: 51

Protocol: UDP (17)

Header Checksum: 0xec2a [validation disabled]

[Header checksum status: Unverified]

Source Address: 8.8.8.8

Destination Address: 192.168.124.23

[Stream index: 6]

User Datagram Protocol, Src Port: 53, Dst Port: 59166

Source Port: 53

Destination Port: 59166

Length: 126

Checksum: 0x4067 [unverified]

[Checksum Status: Unverified]

[Stream index: 8]

[Stream Packet Number: 2]

[Timestamps]

UDP payload (118 bytes)

Domain Name System (response)

Transaction ID: 0x0002

Flags: 0x8180 Standard query response, No error

1... .... .... .... = Response: Message is a response

.000 0... .... .... = Opcode: Standard query (0)

.... .0.. .... .... = Authoritative: Server is not an authority for domain

.... ..0. .... .... = Truncated: Message is not truncated

.... ...1 .... .... = Recursion desired: Do query recursively

.... .... 1... .... = Recursion available: Server can do recursive queries

.... .... .0.. .... = Z: reserved (0)

.... .... ..0. .... = Answer authenticated: Answer/authority portion was not authenticated by the server

.... .... ...0 .... = Non-authenticated data: Unacceptable

.... .... .... 0000 = Reply code: No error (0)

Questions: 1

Answer RRs: 3

Authority RRs: 0

Additional RRs: 0

Queries

www.mit.edu: type A, class IN

Name: www.mit.edu

[Name Length: 11]

[Label Count: 3]

Type: A (1) (Host Address)

Class: IN (0x0001)

Answers

www.mit.edu: type CNAME, class IN, cname www.mit.edu.edgekey.net

Name: www.mit.edu

Type: CNAME (5) (Canonical NAME for an alias)

Class: IN (0x0001)

Time to live: 1341 (22 minutes, 21 seconds)

Data length: 25

CNAME: www.mit.edu.edgekey.net

www.mit.edu.edgekey.net: type CNAME, class IN, cname e9566.dscb.akamaiedge.net

Name: www.mit.edu.edgekey.net

Type: CNAME (5) (Canonical NAME for an alias)C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANHEOKZ2.pcapng 53 total packets, 4 shown

Class: IN (0x0001)

Time to live: 60 (1 minute)

Data length: 24

CNAME: e9566.dscb.akamaiedge.net

e9566.dscb.akamaiedge.net: type A, class IN, addr 23.49.120.120

Name: e9566.dscb.akamaiedge.net

Type: A (1) (Host Address)

Class: IN (0x0001)

Time to live: 20 (20 seconds)

Data length: 4

Address: 23.49.120.120

[Request In: 23]

[Time: 0.063836000 seconds]

No. Time Source Destination Protocol Length Info

25 2025-01-01 23:27:23.846554 192.168.124.23 8.8.8.8 DNS 71 Standard query 0x0003

AAAA www.mit.edu

Frame 25: 71 bytes on wire (568 bits), 71 bytes captured (568 bits) on interface \Device\NPF_{F5779BFB

AB97-4FDA-9AF9-2703F1ABD1CA}, id 0

Section number: 1

Interface id: 0 (\Device\NPF_{F5779BFB-AB97-4FDA-9AF9-2703F1ABD1CA})

Encapsulation type: Ethernet (1)

Arrival Time: Jan 1, 2025 23:27:23.846554000

UTC Arrival Time: Jan 1, 2025 15:27:23.846554000 UTC

Epoch Arrival Time: 1735745243.846554000

[Time shift for this packet: 0.000000000 seconds]

[Time delta from previous captured frame: 0.003122000 seconds]

[Time delta from previous displayed frame: 0.003122000 seconds]

[Time since reference or first frame: 6.775418000 seconds]

Frame Number: 25

Frame Length: 71 bytes (568 bits)

Capture Length: 71 bytes (568 bits)

[Frame is marked: False]

[Frame is ignored: False]

[Protocols in frame: eth:ethertype:ip:udp:dns]

[Coloring Rule Name: UDP]

[Coloring Rule String: udp]

Ethernet II, Src: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c), Dst: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Destination: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Source: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Type: IPv4 (0x0800)

[Stream index: 3]

Internet Protocol Version 4, Src: 192.168.124.23, Dst: 8.8.8.8

0100 .... = Version: 4

.... 0101 = Header Length: 20 bytes (5)

Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)

Total Length: 57

Identification: 0x538c (21388)

  1. .... = Flags: 0x0

...0 0000 0000 0000 = Fragment Offset: 0

Time to Live: 64

Protocol: UDP (17)

Header Checksum: 0xda58 [validation disabled]

[Header checksum status: Unverified]

Source Address: 192.168.124.23

Destination Address: 8.8.8.8

[Stream index: 6]

User Datagram Protocol, Src Port: 59167, Dst Port: 53

Source Port: 59167

Destination Port: 53

Length: 37

Checksum: 0x5dd1 [unverified]

[Checksum Status: Unverified]

[Stream index: 9]

[Stream Packet Number: 1]

[Timestamps]

UDP payload (29 bytes)

Domain Name System (query)

Transaction ID: 0x0003

Flags: 0x0100 Standard query

0... .... .... .... = Response: Message is a query

.000 0... .... .... = Opcode: Standard query (0)

.... ..0. .... .... = Truncated: Message is not truncated

.... ...1 .... .... = Recursion desired: Do query recursively

.... .... .0.. .... = Z: reserved (0)

.... .... ...0 .... = Non-authenticated data: Unacceptable

Questions: 1

Answer RRs: 0

Authority RRs: 0

Additional RRs: 0

Queries

www.mit.edu: type AAAA, class INC:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANHEOKZ2.pcapng 53 total packets, 4 shown

Name: www.mit.edu

[Name Length: 11]

[Label Count: 3]

Type: AAAA (28) (IP6 Address)

Class: IN (0x0001)

[Response In: 26]

No. Time Source Destination Protocol Length Info

26 2025-01-01 23:27:23.904207 8.8.8.8 192.168.124.23 DNS 200 Standard query response

0x0003 AAAA www.mit.edu CNAME www.mit.edu.edgekey.net CNAME e9566.dscb.akamaiedge.net AAAA 2600:1417:76:480::255e AAAA

2600:1417:76:4a0::255e

Frame 26: 200 bytes on wire (1600 bits), 200 bytes captured (1600 bits) on interface \Device\NPF_{F5779BFB

AB97-4FDA-9AF9-2703F1ABD1CA}, id 0

Section number: 1

Interface id: 0 (\Device\NPF_{F5779BFB-AB97-4FDA-9AF9-2703F1ABD1CA})

Encapsulation type: Ethernet (1)

Arrival Time: Jan 1, 2025 23:27:23.904207000

UTC Arrival Time: Jan 1, 2025 15:27:23.904207000 UTC

Epoch Arrival Time: 1735745243.904207000

[Time shift for this packet: 0.000000000 seconds]

[Time delta from previous captured frame: 0.057653000 seconds]

[Time delta from previous displayed frame: 0.057653000 seconds]

[Time since reference or first frame: 6.833071000 seconds]

Frame Number: 26

Frame Length: 200 bytes (1600 bits)

Capture Length: 200 bytes (1600 bits)

[Frame is marked: False]

[Frame is ignored: False]

[Protocols in frame: eth:ethertype:ip:udp:dns]

[Coloring Rule Name: UDP]

[Coloring Rule String: udp]

Ethernet II, Src: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30), Dst: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Destination: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Source: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Type: IPv4 (0x0800)

[Stream index: 3]

Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.124.23

0100 .... = Version: 4

.... 0101 = Header Length: 20 bytes (5)

Differentiated Services Field: 0x74 (DSCP: Unknown, ECN: Not-ECT)

Total Length: 186

Identification: 0xde4d (56909)

  1. .... = Flags: 0x0

...0 0000 0000 0000 = Fragment Offset: 0

Time to Live: 51

Protocol: UDP (17)

Header Checksum: 0x5ba2 [validation disabled]

[Header checksum status: Unverified]

Source Address: 8.8.8.8

Destination Address: 192.168.124.23

[Stream index: 6]

User Datagram Protocol, Src Port: 53, Dst Port: 59167

Source Port: 53

Destination Port: 59167

Length: 166

Checksum: 0x2b10 [unverified]

[Checksum Status: Unverified]

[Stream index: 9]

[Stream Packet Number: 2]

[Timestamps]

UDP payload (158 bytes)

Domain Name System (response)

Transaction ID: 0x0003

Flags: 0x8180 Standard query response, No error

1... .... .... .... = Response: Message is a response

.000 0... .... .... = Opcode: Standard query (0)

.... .0.. .... .... = Authoritative: Server is not an authority for domain

.... ..0. .... .... = Truncated: Message is not truncated

.... ...1 .... .... = Recursion desired: Do query recursively

.... .... 1... .... = Recursion available: Server can do recursive queries

.... .... .0.. .... = Z: reserved (0)

.... .... ..0. .... = Answer authenticated: Answer/authority portion was not authenticated by the server

.... .... ...0 .... = Non-authenticated data: Unacceptable

.... .... .... 0000 = Reply code: No error (0)

Questions: 1

Answer RRs: 4

Authority RRs: 0

Additional RRs: 0

Queries

www.mit.edu: type AAAA, class IN

Name: www.mit.edu

[Name Length: 11]C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANHEOKZ2.pcapng 53 total packets, 4 shown

[Label Count: 3]

Type: AAAA (28) (IP6 Address)

Class: IN (0x0001)

Answers

www.mit.edu: type CNAME, class IN, cname www.mit.edu.edgekey.net

Name: www.mit.edu

Type: CNAME (5) (Canonical NAME for an alias)

Class: IN (0x0001)

Time to live: 1341 (22 minutes, 21 seconds)

Data length: 25

CNAME: www.mit.edu.edgekey.net

www.mit.edu.edgekey.net: type CNAME, class IN, cname e9566.dscb.akamaiedge.net

Name: www.mit.edu.edgekey.net

Type: CNAME (5) (Canonical NAME for an alias)

Class: IN (0x0001)

Time to live: 60 (1 minute)

Data length: 24

CNAME: e9566.dscb.akamaiedge.net

e9566.dscb.akamaiedge.net: type AAAA, class IN, addr 2600:1417:76:480::255e

Name: e9566.dscb.akamaiedge.net

Type: AAAA (28) (IP6 Address)

Class: IN (0x0001)

Time to live: 20 (20 seconds)

Data length: 16

AAAA Address: 2600:1417:76:480::255e

e9566.dscb.akamaiedge.net: type AAAA, class IN, addr 2600:1417:76:4a0::255e

Name: e9566.dscb.akamaiedge.net

Type: AAAA (28) (IP6 Address)

Class: IN (0x0001)

Time to live: 20 (20 seconds)

Data length: 16

AAAA Address: 2600:1417:76:4a0::255e

[Request In: 25]

[Time: 0.057653000 seconds]


C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANOJYQZ2.pcapng 73 total packets, 2 shown

No. Time Source Destination Protocol Length Info

63 2025-01-01 23:34:54.855538 192.168.124.23 8.8.8.8 DNS 71 Standard query 0x0002 NS

www.mit.edu

Frame 63: 71 bytes on wire (568 bits), 71 bytes captured (568 bits) on interface \Device\NPF_{F5779BFB

AB97-4FDA-9AF9-2703F1ABD1CA}, id 0

Section number: 1

Interface id: 0 (\Device\NPF_{F5779BFB-AB97-4FDA-9AF9-2703F1ABD1CA})

Encapsulation type: Ethernet (1)

Arrival Time: Jan 1, 2025 23:34:54.855538000

UTC Arrival Time: Jan 1, 2025 15:34:54.855538000 UTC

Epoch Arrival Time: 1735745694.855538000

[Time shift for this packet: 0.000000000 seconds]

[Time delta from previous captured frame: 0.001665000 seconds]

[Time delta from previous displayed frame: 0.001665000 seconds]

[Time since reference or first frame: 16.354228000 seconds]

Frame Number: 63

Frame Length: 71 bytes (568 bits)

Capture Length: 71 bytes (568 bits)

[Frame is marked: False]

[Frame is ignored: False]

[Protocols in frame: eth:ethertype:ip:udp:dns]

[Coloring Rule Name: UDP]

[Coloring Rule String: udp]

Ethernet II, Src: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c), Dst: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Destination: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Source: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Type: IPv4 (0x0800)

[Stream index: 0]

Internet Protocol Version 4, Src: 192.168.124.23, Dst: 8.8.8.8

0100 .... = Version: 4

.... 0101 = Header Length: 20 bytes (5)

Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)

Total Length: 57

Identification: 0x53a2 (21410)

  1. .... = Flags: 0x0

...0 0000 0000 0000 = Fragment Offset: 0

Time to Live: 64

Protocol: UDP (17)

Header Checksum: 0xda42 [validation disabled]

[Header checksum status: Unverified]

Source Address: 192.168.124.23

Destination Address: 8.8.8.8

[Stream index: 7]

User Datagram Protocol, Src Port: 64530, Dst Port: 53

Source Port: 64530

Destination Port: 53

Length: 37

Checksum: 0x62df [unverified]

[Checksum Status: Unverified]

[Stream index: 8]

[Stream Packet Number: 1]

[Timestamps]

UDP payload (29 bytes)

Domain Name System (query)

Transaction ID: 0x0002

Flags: 0x0100 Standard query

0... .... .... .... = Response: Message is a query

.000 0... .... .... = Opcode: Standard query (0)

.... ..0. .... .... = Truncated: Message is not truncated

.... ...1 .... .... = Recursion desired: Do query recursively

.... .... .0.. .... = Z: reserved (0)

.... .... ...0 .... = Non-authenticated data: Unacceptable

Questions: 1

Answer RRs: 0

Authority RRs: 0

Additional RRs: 0

Queries

www.mit.edu: type NS, class IN

Name: www.mit.edu

[Name Length: 11]

[Label Count: 3]

Type: NS (2) (authoritative Name Server)

Class: IN (0x0001)

[Response In: 64]

No. Time Source Destination Protocol Length Info

64 2025-01-01 23:34:54.917158 8.8.8.8 192.168.124.23 DNS 208 Standard query response

0x0002 NS www.mit.edu CNAME www.mit.edu.edgekey.net CNAME e9566.dscb.akamaiedge.net SOA n0dscb.akamaiedge.net

Frame 64: 208 bytes on wire (1664 bits), 208 bytes captured (1664 bits) on interface \Device\NPF_{F5779BFB

AB97-4FDA-9AF9-2703F1ABD1CA}, id 0

Section number: 1

Interface id: 0 (\Device\NPF_{F5779BFB-AB97-4FDA-9AF9-2703F1ABD1CA})C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANOJYQZ2.pcapng 73 total packets, 2 shown

Encapsulation type: Ethernet (1)

Arrival Time: Jan 1, 2025 23:34:54.917158000

UTC Arrival Time: Jan 1, 2025 15:34:54.917158000 UTC

Epoch Arrival Time: 1735745694.917158000

[Time shift for this packet: 0.000000000 seconds]

[Time delta from previous captured frame: 0.061620000 seconds]

[Time delta from previous displayed frame: 0.061620000 seconds]

[Time since reference or first frame: 16.415848000 seconds]

Frame Number: 64

Frame Length: 208 bytes (1664 bits)

Capture Length: 208 bytes (1664 bits)

[Frame is marked: False]

[Frame is ignored: False]

[Protocols in frame: eth:ethertype:ip:udp:dns]

[Coloring Rule Name: UDP]

[Coloring Rule String: udp]

Ethernet II, Src: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30), Dst: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Destination: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Source: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Type: IPv4 (0x0800)

[Stream index: 0]

Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.124.23

0100 .... = Version: 4

.... 0101 = Header Length: 20 bytes (5)

Differentiated Services Field: 0x74 (DSCP: Unknown, ECN: Not-ECT)

Total Length: 194

Identification: 0x1d09 (7433)

  1. .... = Flags: 0x0

...0 0000 0000 0000 = Fragment Offset: 0

Time to Live: 51

Protocol: UDP (17)

Header Checksum: 0x1cdf [validation disabled]

[Header checksum status: Unverified]

Source Address: 8.8.8.8

Destination Address: 192.168.124.23

[Stream index: 7]

User Datagram Protocol, Src Port: 53, Dst Port: 64530

Source Port: 53

Destination Port: 64530

Length: 174

Checksum: 0x281e [unverified]

[Checksum Status: Unverified]

[Stream index: 8]

[Stream Packet Number: 2]

[Timestamps]

UDP payload (166 bytes)

Domain Name System (response)

Transaction ID: 0x0002

Flags: 0x8180 Standard query response, No error

1... .... .... .... = Response: Message is a response

.000 0... .... .... = Opcode: Standard query (0)

.... .0.. .... .... = Authoritative: Server is not an authority for domain

.... ..0. .... .... = Truncated: Message is not truncated

.... ...1 .... .... = Recursion desired: Do query recursively

.... .... 1... .... = Recursion available: Server can do recursive queries

.... .... .0.. .... = Z: reserved (0)

.... .... ..0. .... = Answer authenticated: Answer/authority portion was not authenticated by the server

.... .... ...0 .... = Non-authenticated data: Unacceptable

.... .... .... 0000 = Reply code: No error (0)

Questions: 1

Answer RRs: 2

Authority RRs: 1

Additional RRs: 0

Queries

www.mit.edu: type NS, class IN

Name: www.mit.edu

[Name Length: 11]

[Label Count: 3]

Type: NS (2) (authoritative Name Server)

Class: IN (0x0001)

Answers

www.mit.edu: type CNAME, class IN, cname www.mit.edu.edgekey.net

Name: www.mit.edu

Type: CNAME (5) (Canonical NAME for an alias)

Class: IN (0x0001)

Time to live: 1359 (22 minutes, 39 seconds)

Data length: 25

CNAME: www.mit.edu.edgekey.net

www.mit.edu.edgekey.net: type CNAME, class IN, cname e9566.dscb.akamaiedge.net

Name: www.mit.edu.edgekey.net

Type: CNAME (5) (Canonical NAME for an alias)C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANOJYQZ2.pcapng 73 total packets, 2 shown

Class: IN (0x0001)

Time to live: 51 (51 seconds)

Data length: 24

CNAME: e9566.dscb.akamaiedge.net

Authoritative nameservers

dscb.akamaiedge.net: type SOA, class IN, mname n0dscb.akamaiedge.net

Name: dscb.akamaiedge.net

Type: SOA (6) (Start Of a zone of Authority)

Class: IN (0x0001)

Time to live: 1000 (16 minutes, 40 seconds)

Data length: 52

Primary name server: n0dscb.akamaiedge.net

Responsible authority's mailbox: hostmaster.akamai.com

Serial Number: 1735745695

Refresh Interval: 1000 (16 minutes, 40 seconds)

Retry Interval: 1000 (16 minutes, 40 seconds)

Expire limit: 1000 (16 minutes, 40 seconds)

Minimum TTL: 1800 (30 minutes)

[Request In: 63]

[Time: 0.061620000 seconds]


C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANRMDPZ2.pcapng 244 total packets, 2 shown

No. Time Source Destination Protocol Length Info

62 2025-01-01 23:40:54.442752 192.168.124.23 8.8.8.8 DNS 73 Standard query 0x4f26

A bitsy.mit.edu

Frame 62: 73 bytes on wire (584 bits), 73 bytes captured (584 bits) on interface \Device\NPF_{F5779BFB

AB97-4FDA-9AF9-2703F1ABD1CA}, id 0

Section number: 1

Interface id: 0 (\Device\NPF_{F5779BFB-AB97-4FDA-9AF9-2703F1ABD1CA})

Encapsulation type: Ethernet (1)

Arrival Time: Jan 1, 2025 23:40:54.442752000

UTC Arrival Time: Jan 1, 2025 15:40:54.442752000 UTC

Epoch Arrival Time: 1735746054.442752000

[Time shift for this packet: 0.000000000 seconds]

[Time delta from previous captured frame: 0.103774000 seconds]

[Time delta from previous displayed frame: 0.000000000 seconds]

[Time since reference or first frame: 11.255325000 seconds]

Frame Number: 62

Frame Length: 73 bytes (584 bits)

Capture Length: 73 bytes (584 bits)

[Frame is marked: False]

[Frame is ignored: False]

[Protocols in frame: eth:ethertype:ip:udp:dns]

[Coloring Rule Name: UDP]

[Coloring Rule String: udp]

Ethernet II, Src: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c), Dst: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Destination: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Source: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Type: IPv4 (0x0800)

[Stream index: 0]

Internet Protocol Version 4, Src: 192.168.124.23, Dst: 8.8.8.8

0100 .... = Version: 4

.... 0101 = Header Length: 20 bytes (5)

Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)

Total Length: 59

Identification: 0x53e8 (21480)

  1. .... = Flags: 0x0

...0 0000 0000 0000 = Fragment Offset: 0

Time to Live: 64

Protocol: UDP (17)

Header Checksum: 0xd9fa [validation disabled]

[Header checksum status: Unverified]

Source Address: 192.168.124.23

Destination Address: 8.8.8.8

[Stream index: 9]

User Datagram Protocol, Src Port: 56360, Dst Port: 53

Source Port: 56360

Destination Port: 53

Length: 39

Checksum: 0xcd3f [unverified]

[Checksum Status: Unverified]

[Stream index: 8]

[Stream Packet Number: 1]

[Timestamps]

UDP payload (31 bytes)

Domain Name System (query)

Transaction ID: 0x4f26

Flags: 0x0100 Standard query

0... .... .... .... = Response: Message is a query

.000 0... .... .... = Opcode: Standard query (0)

.... ..0. .... .... = Truncated: Message is not truncated

.... ...1 .... .... = Recursion desired: Do query recursively

.... .... .0.. .... = Z: reserved (0)

.... .... ...0 .... = Non-authenticated data: Unacceptable

Questions: 1

Answer RRs: 0

Authority RRs: 0

Additional RRs: 0

Queries

bitsy.mit.edu: type A, class IN

Name: bitsy.mit.edu

[Name Length: 13]

[Label Count: 3]

Type: A (1) (Host Address)

Class: IN (0x0001)

[Response In: 63]

No. Time Source Destination Protocol Length Info

63 2025-01-01 23:40:54.548338 8.8.8.8 192.168.124.23 DNS 89 Standard query response

0x4f26 A bitsy.mit.edu A 18.0.72.3

Frame 63: 89 bytes on wire (712 bits), 89 bytes captured (712 bits) on interface \Device\NPF_{F5779BFB

AB97-4FDA-9AF9-2703F1ABD1CA}, id 0

Section number: 1

Interface id: 0 (\Device\NPF_{F5779BFB-AB97-4FDA-9AF9-2703F1ABD1CA})C:\Users\LITTLE~1\AppData\Local\Temp\wireshark_WLANRMDPZ2.pcapng 244 total packets, 2 shown

Encapsulation type: Ethernet (1)

Arrival Time: Jan 1, 2025 23:40:54.548338000

UTC Arrival Time: Jan 1, 2025 15:40:54.548338000 UTC

Epoch Arrival Time: 1735746054.548338000

[Time shift for this packet: 0.000000000 seconds]

[Time delta from previous captured frame: 0.105586000 seconds]

[Time delta from previous displayed frame: 0.105586000 seconds]

[Time since reference or first frame: 11.360911000 seconds]

Frame Number: 63

Frame Length: 89 bytes (712 bits)

Capture Length: 89 bytes (712 bits)

[Frame is marked: False]

[Frame is ignored: False]

[Protocols in frame: eth:ethertype:ip:udp:dns]

[Coloring Rule Name: UDP]

[Coloring Rule String: udp]

Ethernet II, Src: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30), Dst: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Destination: Intel_7a:ef:7c (30:e3:7a:7a:ef:7c)

Source: NewH3CTechno_b7:63:30 (a0:69:d9:b7:63:30)

Type: IPv4 (0x0800)

[Stream index: 0]

Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.124.23

0100 .... = Version: 4

.... 0101 = Header Length: 20 bytes (5)

Differentiated Services Field: 0x74 (DSCP: Unknown, ECN: Not-ECT)

Total Length: 75

Identification: 0xe8c1 (59585)

  1. .... = Flags: 0x0

...0 0000 0000 0000 = Fragment Offset: 0

Time to Live: 51

Protocol: UDP (17)

Header Checksum: 0x519d [validation disabled]

[Header checksum status: Unverified]

Source Address: 8.8.8.8

Destination Address: 192.168.124.23

[Stream index: 9]

User Datagram Protocol, Src Port: 53, Dst Port: 56360

Source Port: 53

Destination Port: 56360

Length: 55

Checksum: 0x2e7d [unverified]

[Checksum Status: Unverified]

[Stream index: 8]

[Stream Packet Number: 2]

[Timestamps]

UDP payload (47 bytes)

Domain Name System (response)

Transaction ID: 0x4f26

Flags: 0x8180 Standard query response, No error

1... .... .... .... = Response: Message is a response

.000 0... .... .... = Opcode: Standard query (0)

.... .0.. .... .... = Authoritative: Server is not an authority for domain

.... ..0. .... .... = Truncated: Message is not truncated

.... ...1 .... .... = Recursion desired: Do query recursively

.... .... 1... .... = Recursion available: Server can do recursive queries

.... .... .0.. .... = Z: reserved (0)

.... .... ..0. .... = Answer authenticated: Answer/authority portion was not authenticated by the server

.... .... ...0 .... = Non-authenticated data: Unacceptable

.... .... .... 0000 = Reply code: No error (0)

Questions: 1

Answer RRs: 1

Authority RRs: 0

Additional RRs: 0

Queries

bitsy.mit.edu: type A, class IN

Name: bitsy.mit.edu

[Name Length: 13]

[Label Count: 3]

Type: A (1) (Host Address)

Class: IN (0x0001)

Answers

bitsy.mit.edu: type A, class IN, addr 18.0.72.3

Name: bitsy.mit.edu

Type: A (1) (Host Address)

Class: IN (0x0001)

Time to live: 1800 (30 minutes)

Data length: 4

Address: 18.0.72.3

[Request In: 62]

[Time: 0.105586000 seconds]

posted @   诸葛蛋蛋  阅读(21)  评论(0编辑  收藏  举报
相关博文:
阅读排行:
· 25岁的心里话
· 闲置电脑爆改个人服务器(超详细) #公网映射 #Vmware虚拟网络编辑器
· 零经验选手,Compose 一天开发一款小游戏!
· 通过 API 将Deepseek响应流式内容输出到前端
· AI Agent开发,如何调用三方的API Function,是通过提示词来发起调用的吗
点击右上角即可分享
微信分享提示