Let me format your log for you (Kindly try to give packets in formatted form)
192.168.1.2 173.194.112.111 TCP 54 aker-cdp > https [ACK] Seq=682 Ack=76019 Win=65536 Len=0
192.168.1.2 173.194.112.104 TCP 54 qadmifevent > https [FIN, ACK] Seq=357 Ack=4604 Win=65266 Len=0
192.168.1.2 173.194.112.104 TCP 54 qadmifevent > https [RST, ACK] Seq=358 Ack=4604 Win=0 Len=0
192.168.1.2 173.194.112.111 TCP 54 lsi-raid-mgmt > https [FIN, ACK] Seq=357 Ack=3828 Win=65266 Len=0
192.168.1.2 173.194.112.111 TCP 54 lsi-raid-mgmt > https [RST, ACK] Seq=358 Ack=3828 Win=0 Len=0
192.168.1.2 173.194.112.119 TCP 54 seaodbc > https [FIN, ACK] Seq=357 Ack=3828 Win=64568 Len=0
192.168.1.2 173.194.112.119 TCP 54 seaodbc > https [RST, ACK] Seq=358 Ack=3828 Win=0 Len=0
173.194.112.104 192.168.1.2 TCP 60 https > qadmifevent [FIN, ACK] Seq=4604 Ack=358 Win=45056 Len=0
173.194.112.111 192.168.1.2 TCP 60 https > lsi-raid-mgmt [FIN, ACK] Seq=3828 Ack=358 Win=45056 Len=0
This behavior is not RFC compliant but seems that google.com(Dst IPs belong to google) is not willing to terminate connection gracefully, may be because of excessive load on its servers. This behavior is tolerable
answered 24 Dec '15, 11:06
Muhammad Irshad
16●1●1●5
accept rate: 0%
edited 24 Dec '15, 14:01
grahamb ♦
19.8k●3●30●206
Thanks so much and sorry for my format. I noticed this behavior with Facebook Ip Dst.
To use a fix width format for code or packet dump, either use the code button on the toolbar, add < code>,< /code> tags or indent by 4 spaces.