initializing conntrack with timeouts tcp=60:300:60 udp=60 creating divert4 socket binding divert4 socket set_socket_buffers fd=3 rcvbuf=131072 sndbuf=65536 fd=3 SO_RCVBUF=131072 fd=3 SO_SNDBUF=65536 initializing raw sockets set_socket_buffers fd=4 rcvbuf=4096 sndbuf=65536 fd=4 SO_RCVBUF=4096 fd=4 SO_SNDBUF=65536 set_socket_buffers fd=5 rcvbuf=4096 sndbuf=65536 fd=5 SO_RCVBUF=4096 fd=5 SO_SNDBUF=65536 Running as UID=2147483647 GID=2147483647 packet: id=0 len=52 IP4: 192.168.3.10 => 104.21.48.18 proto=tcp sport=22588 dport=443 flags=S seq=3893491129 ack_seq=0 packet: id=0 reinject unmodified packet: id=1 len=52 IP4: 192.168.3.10 => 172.67.176.3 proto=tcp sport=22611 dport=443 flags=S seq=2253087264 ack_seq=0 packet: id=1 reinject unmodified packet: id=2 len=52 IP4: 192.168.3.10 => 172.67.176.3 proto=tcp sport=22612 dport=443 flags=S seq=1325138457 ack_seq=0 packet: id=2 reinject unmodified packet: id=3 len=52 IP4: 192.168.3.10 => 172.67.176.3 proto=tcp sport=22613 dport=443 flags=S seq=2790046544 ack_seq=0 packet: id=3 reinject unmodified packet: id=4 len=52 IP4: 192.168.3.10 => 172.67.176.3 proto=tcp sport=22614 dport=443 flags=S seq=4014557431 ack_seq=0 packet: id=4 reinject unmodified packet: id=5 len=52 IP4: 192.168.3.10 => 104.21.48.18 proto=tcp sport=22595 dport=443 flags=S seq=2960338618 ack_seq=0 packet: id=5 reinject unmodified packet: id=6 len=52 IP4: 192.168.3.10 => 104.21.48.18 proto=tcp sport=22594 dport=443 flags=S seq=1968014723 ack_seq=0 packet: id=6 reinject unmodified packet: id=7 len=52 IP4: 192.168.3.10 => 104.21.48.18 proto=tcp sport=22593 dport=443 flags=S seq=2897324331 ack_seq=0 packet: id=7 reinject unmodified packet: id=8 len=52 IP4: 192.168.3.10 => 104.21.48.18 proto=tcp sport=22592 dport=443 flags=S seq=3142600227 ack_seq=0 packet: id=8 reinject unmodified packet: id=9 len=52 IP4: 192.168.3.10 => 104.21.48.18 proto=tcp sport=22591 dport=443 flags=S seq=180688292 ack_seq=0 packet: id=9 reinject unmodified packet: id=10 len=52 IP4: 192.168.3.10 => 104.21.56.234 proto=tcp sport=22603 dport=443 flags=S seq=2503382259 ack_seq=0 packet: id=10 reinject unmodified packet: id=11 len=52 IP4: 192.168.3.10 => 104.21.56.234 proto=tcp sport=22604 dport=443 flags=S seq=3332527537 ack_seq=0 packet: id=11 reinject unmodified packet: id=12 len=52 IP4: 192.168.3.10 => 172.67.176.3 proto=tcp sport=22617 dport=443 flags=S seq=2767895251 ack_seq=0 packet: id=12 reinject unmodified packet: id=13 len=60 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=S seq=3504290323 ack_seq=0 packet: id=13 reinject unmodified packet: id=14 len=40 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=A seq=3504290324 ack_seq=887259107 packet: id=14 reinject unmodified packet: id=15 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 C1 4A 8A B7 B3 51 F6 C0 0E 7D 17 FB 62 A6 F2 DC 83 EF D9 EC AB ... : ............J...Q...}..b........ ... packet contains TLS ClientHello hostname: rutracker.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 C1 4A 8A B7 B3 51 F6 C0 0E 7D 17 FB 62 A6 F2 DC 83 EF D9 EC AB D7 F9 ... : ..........J...Q...}..b.......... ... packet: id=15 drop packet: id=16 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=16 drop packet: id=17 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=17 reinject unmodified packet: id=18 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=18 reinject unmodified packet: id=19 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=19 reinject unmodified packet: id=20 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 C1 4A 8A B7 B3 51 F6 C0 0E 7D 17 FB 62 A6 F2 DC 83 EF D9 EC AB D7 F9 ... : ..........J...Q...}..b.......... ... packet: id=20 reinject unmodified packet: id=21 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=21 drop packet: id=22 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=22 reinject unmodified packet: id=23 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=23 reinject unmodified packet: id=24 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=24 reinject unmodified packet: id=25 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=25 reinject unmodified packet: id=26 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=26 drop packet: id=27 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=27 reinject unmodified packet: id=28 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=28 reinject unmodified packet: id=29 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=29 reinject unmodified packet: id=30 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=30 reinject unmodified packet: id=31 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=31 drop packet: id=32 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=32 reinject unmodified packet: id=33 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=33 reinject unmodified packet: id=34 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=34 reinject unmodified packet: id=35 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=35 reinject unmodified packet: id=36 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=36 drop packet: id=37 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=37 reinject unmodified packet: id=38 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=38 reinject unmodified packet: id=39 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=39 reinject unmodified packet: id=40 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=40 reinject unmodified packet: id=41 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=41 drop packet: id=42 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=42 reinject unmodified packet: id=43 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=43 reinject unmodified packet: id=44 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=44 reinject unmodified packet: id=45 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=45 reinject unmodified packet: id=46 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=46 drop packet: id=47 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=47 reinject unmodified packet: id=48 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=48 reinject unmodified packet: id=49 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=49 reinject unmodified packet: id=50 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=50 reinject unmodified packet: id=51 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=51 drop packet: id=52 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=52 reinject unmodified packet: id=53 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=53 reinject unmodified packet: id=54 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=54 reinject unmodified packet: id=55 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=55 reinject unmodified packet: id=56 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=56 drop packet: id=57 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=57 reinject unmodified packet: id=58 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=58 reinject unmodified packet: id=59 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=59 reinject unmodified packet: id=60 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=60 reinject unmodified packet: id=61 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=61 drop packet: id=62 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=62 reinject unmodified packet: id=63 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=63 reinject unmodified packet: id=64 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=64 reinject unmodified packet: id=65 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=65 reinject unmodified packet: id=66 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=66 drop packet: id=67 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=67 reinject unmodified packet: id=68 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=68 reinject unmodified packet: id=69 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=69 reinject unmodified packet: id=70 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=70 reinject unmodified packet: id=71 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=71 drop packet: id=72 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=72 reinject unmodified packet: id=73 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=73 reinject unmodified packet: id=74 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=74 reinject unmodified packet: id=75 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=75 reinject unmodified packet: id=76 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=76 drop packet: id=77 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=77 reinject unmodified packet: id=78 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=78 reinject unmodified packet: id=79 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=79 reinject unmodified packet: id=80 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=80 reinject unmodified packet: id=81 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=81 drop packet: id=82 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=82 reinject unmodified packet: id=83 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=83 reinject unmodified packet: id=84 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=84 reinject unmodified packet: id=85 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=85 reinject unmodified packet: id=86 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=86 drop packet: id=87 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=87 reinject unmodified packet: id=88 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=88 reinject unmodified packet: id=89 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=89 reinject unmodified packet: id=90 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=90 reinject unmodified packet: id=91 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=91 drop packet: id=92 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=92 reinject unmodified packet: id=93 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=93 reinject unmodified packet: id=94 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=94 reinject unmodified packet: id=95 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=95 reinject unmodified packet: id=96 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=96 drop packet: id=97 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=97 reinject unmodified packet: id=98 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=98 reinject unmodified packet: id=99 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=99 reinject unmodified packet: id=100 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=100 reinject unmodified packet: id=101 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=101 drop packet: id=102 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=102 reinject unmodified packet: id=103 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=103 reinject unmodified packet: id=104 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=104 reinject unmodified packet: id=105 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=105 reinject unmodified packet: id=106 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=106 drop packet: id=107 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=107 reinject unmodified packet: id=108 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=108 reinject unmodified packet: id=109 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=109 reinject unmodified packet: id=110 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=110 reinject unmodified packet: id=111 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=111 drop packet: id=112 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=112 reinject unmodified packet: id=113 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=113 reinject unmodified packet: id=114 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=114 reinject unmodified packet: id=115 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=115 reinject unmodified packet: id=116 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=116 drop packet: id=117 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=117 reinject unmodified packet: id=118 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=118 reinject unmodified packet: id=119 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=119 reinject unmodified packet: id=120 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=120 reinject unmodified packet: id=121 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=121 drop packet: id=122 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=122 reinject unmodified packet: id=123 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=123 reinject unmodified packet: id=124 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=124 reinject unmodified packet: id=125 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=125 reinject unmodified packet: id=126 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=126 drop packet: id=127 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=127 reinject unmodified packet: id=128 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=128 reinject unmodified packet: id=129 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=129 reinject unmodified packet: id=130 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=130 reinject unmodified packet: id=131 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=131 drop packet: id=132 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=132 reinject unmodified packet: id=133 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=133 reinject unmodified packet: id=134 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=134 reinject unmodified packet: id=135 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=135 reinject unmodified packet: id=136 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=136 drop packet: id=137 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=137 reinject unmodified packet: id=138 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=138 reinject unmodified packet: id=139 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=139 reinject unmodified packet: id=140 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=140 reinject unmodified packet: id=141 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=141 drop packet: id=142 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=142 reinject unmodified packet: id=143 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=143 reinject unmodified packet: id=144 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=144 reinject unmodified packet: id=145 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=145 reinject unmodified packet: id=146 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=146 drop packet: id=147 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=147 reinject unmodified packet: id=148 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=148 reinject unmodified packet: id=149 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=149 reinject unmodified packet: id=150 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=150 reinject unmodified packet: id=151 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=151 drop packet: id=152 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=152 reinject unmodified packet: id=153 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=153 reinject unmodified packet: id=154 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=154 reinject unmodified packet: id=155 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=155 reinject unmodified packet: id=156 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=156 drop packet: id=157 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=157 reinject unmodified packet: id=158 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=158 reinject unmodified packet: id=159 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=159 reinject unmodified packet: id=160 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=160 reinject unmodified packet: id=161 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=161 drop packet: id=162 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=162 reinject unmodified packet: id=163 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=163 reinject unmodified packet: id=164 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=164 reinject unmodified packet: id=165 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=165 reinject unmodified packet: id=166 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=166 drop packet: id=167 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=167 reinject unmodified packet: id=168 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=168 reinject unmodified packet: id=169 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=169 reinject unmodified packet: id=170 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=170 reinject unmodified packet: id=171 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=171 drop packet: id=172 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=172 reinject unmodified packet: id=173 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=173 reinject unmodified packet: id=174 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=174 reinject unmodified packet: id=175 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=175 reinject unmodified packet: id=176 len=557 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... packet contains TLS ClientHello hostname: www.w3.org dpi desync src=192.168.1.84:33784 dst=104.21.56.234:443 sending fake request : 16 03 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 ... : ..............j]W.b..F.E.Y\.H1.. ... sending fake(1) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 1st tcp segment 0-1 len=2 : 16 03 : .. sending fake(2) 1st tcp segment 0-1 len=2 : 00 00 : .. sending 2nd tcp segment 2-516 len=515 : 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=176 drop packet: id=177 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=177 reinject unmodified packet: id=178 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 16 03 : .. packet: id=178 reinject unmodified packet: id=179 len=42 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290324 ack_seq=887259107 TCP: 00 00 : .. packet: id=179 reinject unmodified packet: id=180 len=555 IP4: 192.168.1.84 => 104.21.56.234 proto=tcp sport=33784 dport=443 flags=AP seq=3504290326 ack_seq=887259107 TCP: 01 02 00 01 00 01 FC 03 03 9A 8F A7 6A 5D 57 F3 62 19 BE 46 82 45 E2 59 5C B4 48 31 12 15 14 79 ... : ............j]W.b..F.E.Y\.H1...y ... packet: id=180 reinject unmodified