Skip to content
This repository has been archived by the owner on Apr 21, 2023. It is now read-only.

ICMP Echo Request

Akihiro TAKASE edited this page Jun 23, 2021 · 2 revisions
[vagrant@ps app]$ ./bin/pstack ping -c 4 192.0.2.1
12:41:44.210 [I] icmp packet sent:     seq=0, id=25390
12:41:44.211 [E] ethernet address was not found: ARP_INCOMPLETE
12:41:44.211 [I] arp cache entry was renewed
                 spa: 192.0.2.1
                 sha: e2:20:76:2d:5d:2d
12:41:44.311 [W] icmp packet sent (dead letter): id=25390, seq=0
12:41:45.312 [I] icmp packet received: seq=0, id=25390
12:41:46.313 [I] icmp packet sent:     seq=1, id=50141
12:41:46.314 [I] icmp packet received: seq=1, id=50141
12:41:47.315 [I] icmp packet sent:     seq=2, id=17217
12:41:47.316 [I] icmp packet received: seq=2, id=17217
12:41:48.317 [I] icmp packet sent:     seq=3, id=40519
12:41:48.319 [I] icmp packet received: seq=3, id=40519

Verbose Output:

[vagrant@ps app]$ ./bin/pstack ping -c 4 192.0.2.1
12:45:43.403 [D] -------------------------------------------------------
                           I N I T I A L I Z E   D E V I C E S
                 -------------------------------------------------------
12:45:43.403 [D] device was registered
                 type: Loopback
                 name: net0 ()
                 addr: 00:00:00:00:00:00
12:45:43.403 [D] interface was attached
                 ip:     127.0.0.1
                 device: net0 ()
12:45:43.403 [D] route was registered
                 network:  127.0.0.0
                 netmask:  255.0.0.0
                 unicast:  127.0.0.1
                 next hop: 0.0.0.0
                 device:   net0 ()
12:45:43.403 [D] device was registered
                 type: Ethernet
                 name: net1 (tap0)
                 addr: 00:00:5e:00:53:01
12:45:43.403 [D] interface was attached
                 ip:     192.0.2.2
                 device: net1 (tap0)
12:45:43.403 [D] route was registered
                 network:  192.0.0.0
                 netmask:  255.255.255.0
                 unicast:  192.0.2.2
                 next hop: 0.0.0.0
                 device:   net1 (tap0)
12:45:43.403 [D] default gateway was registered
                 network:  0.0.0.0
                 netmask:  0.0.0.0
                 unicast:  192.0.2.2
                 next hop: 192.0.2.1
                 device:   net1 (tap0)
12:45:43.403 [D] -------------------------------------------------------
                               S T A R T   S E R V I C E S
                 -------------------------------------------------------
12:45:43.403 [D] arp service started
12:45:43.403 [D] ethernet service started
12:45:43.403 [D] icmp service started
12:45:43.403 [D] ip service started
12:45:43.403 [D] monitor service started
12:45:43.403 [D] device was opened
                 type: Loopback
                 name: net0 ()
12:45:43.403 [D] device was opened
                 type: Ethernet
                 name: net1 (tap0)
12:45:43.403 [D] tcp service started
12:45:43.409 [D] event occurred
                 events: 1
                 device: net1 (tap0)
12:45:43.507 [D] all service workers started
12:45:43.507 [D] ///////////////////////////////////////////////////////
                          A P P L I C A T I O N   S T A R T E D
                 ///////////////////////////////////////////////////////
12:45:43.507 [I] icmp packet sent:     seq=0, id=2297
12:45:43.507 [D] outgoing icmp packet
                 type:     Echo (8)
                 code:     0
                 checksum: 0x9adb
                 data:     50 79 38 8b e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0
                           f9 ed c3 c7 13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd
                           dd dc b3 bb ed 22 ff 03
12:45:43.508 [D] outgoing ip packet
                 version:             4
                 ihl:                 5
                 precedence:          Routine (0x0)
                 delay:               Normal (0x0)
                 throughput:          Normal (0x0)
                 relibility:          Normal (0x0)
                 total length:        84 bytes (data: 64 bytes)
                 id:                  0
                 flag (df):           May Fragment (0x0)
                 flag (mf):           Last Fragment (0x0)
                 fragment offset:     0
                 ttl:                 255
                 protocol:            ICMP (1)
                 checksum:            0x37a5
                 source address:      192.0.2.2
                 destination address: 192.0.2.1
                 data:                08 00 9a db 08 f9 00 00 ed 2f 94 76 b9 59 60 fa 50 79 38 8b
                                      e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0 f9 ed c3 c7
                                      13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd dd dc b3 bb
                                      ed 22 ff 03
12:45:43.508 [D] outgoing arp packet
                 hardware type:           Ethernet (10Mb)
                 protocol Type:           IPv4
                 hardware address length: 6
                 protocol address length: 4
                 opcode:                  REQUEST (1)
                 sender hardware address: 00:00:5e:00:53:01
                 sender protocol address: 192.0.2.2
                 target hardware address: 00:00:00:00:00:00
                 target protocol address: 192.0.2.1
12:45:43.508 [D] outgoing ethernet frame (42 bytes)
                 type:    ARP (0x0806)
                 dst:     ff:ff:ff:ff:ff:ff
                 src:     00:00:5e:00:53:01
                 payload: 00 01 08 00 06 04 00 01 00 00 5e 00 53 01 c0 00 02 02 00 00
                          00 00 00 00 c0 00 02 01 00 00 00 00 00 00 00 00 00 00 00 00
                          00 00 00 00 00 00
12:45:43.508 [E] ethernet address was not found: ARP_INCOMPLETE
12:45:43.508 [D] event occurred
                 events: 1
                 device: net1 (tap0)
12:45:43.508 [D] incoming ethernet frame (42 bytes)
                 type:    ARP (0x0806)
                 dst:     00:00:5e:00:53:01
                 src:     e2:20:76:2d:5d:2d
                 payload: 00 01 08 00 06 04 00 02 e2 20 76 2d 5d 2d c0 00 02 01 00 00
                          5e 00 53 01 c0 00 02 02
12:45:43.509 [D] incoming arp packet
                 hardware type:           Ethernet (10Mb)
                 protocol Type:           IPv4
                 hardware address length: 6
                 protocol address length: 4
                 opcode:                  REPLY (2)
                 sender hardware address: e2:20:76:2d:5d:2d
                 sender protocol address: 192.0.2.1
                 target hardware address: 00:00:5e:00:53:01
                 target protocol address: 192.0.2.2
12:45:43.509 [I] arp cache entry was renewed
                 spa: 192.0.2.1
                 sha: e2:20:76:2d:5d:2d
12:45:43.608 [W] icmp packet sent (dead letter): id=2297, seq=0
12:45:43.609 [D] outgoing icmp packet
                 type:     Echo (8)
                 code:     0
                 checksum: 0x9adb
                 data:     50 79 38 8b e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0
                           f9 ed c3 c7 13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd
                           dd dc b3 bb ed 22 ff 03
12:45:43.609 [D] outgoing ip packet
                 version:             4
                 ihl:                 5
                 precedence:          Routine (0x0)
                 delay:               Normal (0x0)
                 throughput:          Normal (0x0)
                 relibility:          Normal (0x0)
                 total length:        84 bytes (data: 64 bytes)
                 id:                  1
                 flag (df):           May Fragment (0x0)
                 flag (mf):           Last Fragment (0x0)
                 fragment offset:     0
                 ttl:                 255
                 protocol:            ICMP (1)
                 checksum:            0x37a4
                 source address:      192.0.2.2
                 destination address: 192.0.2.1
                 data:                08 00 9a db 08 f9 00 00 ed 2f 94 76 b9 59 60 fa 50 79 38 8b
                                      e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0 f9 ed c3 c7
                                      13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd dd dc b3 bb
                                      ed 22 ff 03
12:45:43.609 [D] outgoing ethernet frame (98 bytes)
                 type:    IPv4 (0x0800)
                 dst:     e2:20:76:2d:5d:2d
                 src:     00:00:5e:00:53:01
                 payload: 45 00 00 54 00 01 00 00 ff 01 37 a4 c0 00 02 02 c0 00 02 01
                          08 00 9a db 08 f9 00 00 ed 2f 94 76 b9 59 60 fa 50 79 38 8b
                          e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0 f9 ed c3 c7
                          13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd dd dc b3 bb
                          ed 22 ff 03
12:45:43.610 [D] event occurred
                 events: 1
                 device: net1 (tap0)
12:45:43.610 [D] incoming ethernet frame (98 bytes)
                 type:    IPv4 (0x0800)
                 dst:     00:00:5e:00:53:01
                 src:     e2:20:76:2d:5d:2d
                 payload: 45 00 00 54 af 89 00 00 40 01 47 1c c0 00 02 01 c0 00 02 02
                          00 00 a2 db 08 f9 00 00 ed 2f 94 76 b9 59 60 fa 50 79 38 8b
                          e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0 f9 ed c3 c7
                          13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd dd dc b3 bb
                          ed 22 ff 03
12:45:43.610 [D] incoming ip packet
                 version:             4
                 ihl:                 5
                 precedence:          Routine (0x0)
                 delay:               Normal (0x0)
                 throughput:          Normal (0x0)
                 relibility:          Normal (0x0)
                 total length:        84 bytes (data: 64 bytes)
                 id:                  44937
                 flag (df):           May Fragment (0x0)
                 flag (mf):           Last Fragment (0x0)
                 fragment offset:     0
                 ttl:                 64
                 protocol:            ICMP (1)
                 checksum:            0x471c
                 source address:      192.0.2.1
                 destination address: 192.0.2.2
                 data:                00 00 a2 db 08 f9 00 00 ed 2f 94 76 b9 59 60 fa 50 79 38 8b
                                      e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0 f9 ed c3 c7
                                      13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd dd dc b3 bb
                                      ed 22 ff 03
12:45:43.610 [D] incoming icmp packet
                 type:     Echo Reply (0)
                 code:     0
                 checksum: 0xa2db
                 id:       2297
                 seq:      0
                 data:     50 79 38 8b e5 fe d5 05 ee 28 ca 7f a3 67 4c 36 62 c4 5f c0
                           f9 ed c3 c7 13 40 4c dc c8 9a 44 f5 c9 e7 c6 0f 4b 75 84 cd
                           dd dc b3 bb ed 22 ff 03
12:45:44.343 [D] event occurred
                 events: 1
                 device: net1 (tap0)
12:45:44.609 [I] icmp packet received: seq=0, id=2297
12:45:45.610 [I] icmp packet sent:     seq=1, id=56131
12:45:45.610 [D] outgoing icmp packet
                 type:     Echo (8)
                 code:     0
                 checksum: 0x92dc
                 data:     d7 d8 db d6 bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0
                           a1 59 73 06 2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05
                           83 73 93 86 d9 71 18 fa
12:45:45.610 [D] outgoing ip packet
                 version:             4
                 ihl:                 5
                 precedence:          Routine (0x0)
                 delay:               Normal (0x0)
                 throughput:          Normal (0x0)
                 relibility:          Normal (0x0)
                 total length:        84 bytes (data: 64 bytes)
                 id:                  2
                 flag (df):           May Fragment (0x0)
                 flag (mf):           Last Fragment (0x0)
                 fragment offset:     0
                 ttl:                 255
                 protocol:            ICMP (1)
                 checksum:            0x37a3
                 source address:      192.0.2.2
                 destination address: 192.0.2.1
                 data:                08 00 92 dc db 43 00 01 0e 20 b4 a5 25 47 1a 6a d7 d8 db d6
                                      bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0 a1 59 73 06
                                      2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05 83 73 93 86
                                      d9 71 18 fa
12:45:45.610 [D] outgoing ethernet frame (98 bytes)
                 type:    IPv4 (0x0800)
                 dst:     e2:20:76:2d:5d:2d
                 src:     00:00:5e:00:53:01
                 payload: 45 00 00 54 00 02 00 00 ff 01 37 a3 c0 00 02 02 c0 00 02 01
                          08 00 92 dc db 43 00 01 0e 20 b4 a5 25 47 1a 6a d7 d8 db d6
                          bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0 a1 59 73 06
                          2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05 83 73 93 86
                          d9 71 18 fa
12:45:45.610 [D] event occurred
                 events: 1
                 device: net1 (tap0)
12:45:45.611 [D] incoming ethernet frame (98 bytes)
                 type:    IPv4 (0x0800)
                 dst:     00:00:5e:00:53:01
                 src:     e2:20:76:2d:5d:2d
                 payload: 45 00 00 54 b1 9b 00 00 40 01 45 0a c0 00 02 01 c0 00 02 02
                          00 00 9a dc db 43 00 01 0e 20 b4 a5 25 47 1a 6a d7 d8 db d6
                          bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0 a1 59 73 06
                          2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05 83 73 93 86
                          d9 71 18 fa
12:45:45.612 [D] incoming ip packet
                 version:             4
                 ihl:                 5
                 precedence:          Routine (0x0)
                 delay:               Normal (0x0)
                 throughput:          Normal (0x0)
                 relibility:          Normal (0x0)
                 total length:        84 bytes (data: 64 bytes)
                 id:                  45467
                 flag (df):           May Fragment (0x0)
                 flag (mf):           Last Fragment (0x0)
                 fragment offset:     0
                 ttl:                 64
                 protocol:            ICMP (1)
                 checksum:            0x450a
                 source address:      192.0.2.1
                 destination address: 192.0.2.2
                 data:                00 00 9a dc db 43 00 01 0e 20 b4 a5 25 47 1a 6a d7 d8 db d6
                                      bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0 a1 59 73 06
                                      2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05 83 73 93 86
                                      d9 71 18 fa
12:45:45.612 [D] incoming icmp packet
                 type:     Echo Reply (0)
                 code:     0
                 checksum: 0x9adc
                 id:       56131
                 seq:      1
                 data:     d7 d8 db d6 bf f6 24 dd bd fc 37 d3 8d 6b 14 e5 6e 26 a4 d0
                           a1 59 73 06 2b 93 8a 38 ca da 90 c3 b3 4f 9f 0b 3c 3b 86 05
                           83 73 93 86 d9 71 18 fa
12:45:45.612 [I] icmp packet received: seq=1, id=56131
12:45:46.613 [I] icmp packet sent:     seq=2, id=45956
12:45:46.614 [D] outgoing icmp packet
                 type:     Echo (8)
                 code:     0
                 checksum: 0xc153
                 data:     15 ad 39 fd 8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34
                           23 18 e6 1e e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca
                           73 f2 7c 5e 0f 74 38 97
12:45:46.614 [D] outgoing ip packet
                 version:             4
                 ihl:                 5
                 precedence:          Routine (0x0)
                 delay:               Normal (0x0)
                 throughput:          Normal (0x0)
                 relibility:          Normal (0x0)
                 total length:        84 bytes (data: 64 bytes)
                 id:                  3
                 flag (df):           May Fragment (0x0)
                 flag (mf):           Last Fragment (0x0)
                 fragment offset:     0
                 ttl:                 255
                 protocol:            ICMP (1)
                 checksum:            0x37a2
                 source address:      192.0.2.2
                 destination address: 192.0.2.1
                 data:                08 00 c1 53 b3 84 00 02 4b 15 a4 6a 69 5a b7 7e 15 ad 39 fd
                                      8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34 23 18 e6 1e
                                      e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca 73 f2 7c 5e
                                      0f 74 38 97
12:45:46.614 [D] outgoing ethernet frame (98 bytes)
                 type:    IPv4 (0x0800)
                 dst:     e2:20:76:2d:5d:2d
                 src:     00:00:5e:00:53:01
                 payload: 45 00 00 54 00 03 00 00 ff 01 37 a2 c0 00 02 02 c0 00 02 01
                          08 00 c1 53 b3 84 00 02 4b 15 a4 6a 69 5a b7 7e 15 ad 39 fd
                          8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34 23 18 e6 1e
                          e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca 73 f2 7c 5e
                          0f 74 38 97
12:45:46.615 [D] event occurred
                 events: 1
                 device: net1 (tap0)
12:45:46.615 [D] incoming ethernet frame (98 bytes)
                 type:    IPv4 (0x0800)
                 dst:     00:00:5e:00:53:01
                 src:     e2:20:76:2d:5d:2d
                 payload: 45 00 00 54 b3 16 00 00 40 01 43 8f c0 00 02 01 c0 00 02 02
                          00 00 c9 53 b3 84 00 02 4b 15 a4 6a 69 5a b7 7e 15 ad 39 fd
                          8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34 23 18 e6 1e
                          e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca 73 f2 7c 5e
                          0f 74 38 97
12:45:46.616 [D] incoming ip packet
                 version:             4
                 ihl:                 5
                 precedence:          Routine (0x0)
                 delay:               Normal (0x0)
                 throughput:          Normal (0x0)
                 relibility:          Normal (0x0)
                 total length:        84 bytes (data: 64 bytes)
                 id:                  45846
                 flag (df):           May Fragment (0x0)
                 flag (mf):           Last Fragment (0x0)
                 fragment offset:     0
                 ttl:                 64
                 protocol:            ICMP (1)
                 checksum:            0x438f
                 source address:      192.0.2.1
                 destination address: 192.0.2.2
                 data:                00 00 c9 53 b3 84 00 02 4b 15 a4 6a 69 5a b7 7e 15 ad 39 fd
                                      8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34 23 18 e6 1e
                                      e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca 73 f2 7c 5e
                                      0f 74 38 97
12:45:46.616 [D] incoming icmp packet
                 type:     Echo Reply (0)
                 code:     0
                 checksum: 0xc953
                 id:       45956
                 seq:      2
                 data:     15 ad 39 fd 8b 0a f5 86 1d f3 e0 45 e2 33 53 3d ee 4c e8 34
                           23 18 e6 1e e1 e4 99 13 00 22 c0 00 cc ca 3a 77 5e a9 b5 ca
                           73 f2 7c 5e 0f 74 38 97
12:45:46.616 [I] icmp packet received: seq=2, id=45956
12:45:47.616 [I] icmp packet sent:     seq=3, id=44940
12:45:47.616 [D] outgoing icmp packet
                 type:     Echo (8)
                 code:     0
                 checksum: 0xb270
                 data:     1c fd 2d 95 ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0
                           5b ce 22 d4 c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c
                           ba 9d 30 0f b6 ee 7b b7
12:45:47.617 [D] outgoing ip packet
                 version:             4
                 ihl:                 5
                 precedence:          Routine (0x0)
                 delay:               Normal (0x0)
                 throughput:          Normal (0x0)
                 relibility:          Normal (0x0)
                 total length:        84 bytes (data: 64 bytes)
                 id:                  4
                 flag (df):           May Fragment (0x0)
                 flag (mf):           Last Fragment (0x0)
                 fragment offset:     0
                 ttl:                 255
                 protocol:            ICMP (1)
                 checksum:            0x37a1
                 source address:      192.0.2.2
                 destination address: 192.0.2.1
                 data:                08 00 b2 70 af 8c 00 03 49 2a c6 7e bc 6d c3 d2 1c fd 2d 95
                                      ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0 5b ce 22 d4
                                      c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c ba 9d 30 0f
                                      b6 ee 7b b7
12:45:47.617 [D] outgoing ethernet frame (98 bytes)
                 type:    IPv4 (0x0800)
                 dst:     e2:20:76:2d:5d:2d
                 src:     00:00:5e:00:53:01
                 payload: 45 00 00 54 00 04 00 00 ff 01 37 a1 c0 00 02 02 c0 00 02 01
                          08 00 b2 70 af 8c 00 03 49 2a c6 7e bc 6d c3 d2 1c fd 2d 95
                          ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0 5b ce 22 d4
                          c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c ba 9d 30 0f
                          b6 ee 7b b7
12:45:47.617 [D] event occurred
                 events: 1
                 device: net1 (tap0)
12:45:47.617 [D] incoming ethernet frame (98 bytes)
                 type:    IPv4 (0x0800)
                 dst:     00:00:5e:00:53:01
                 src:     e2:20:76:2d:5d:2d
                 payload: 45 00 00 54 b5 72 00 00 40 01 41 33 c0 00 02 01 c0 00 02 02
                          00 00 ba 70 af 8c 00 03 49 2a c6 7e bc 6d c3 d2 1c fd 2d 95
                          ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0 5b ce 22 d4
                          c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c ba 9d 30 0f
                          b6 ee 7b b7
12:45:47.618 [D] incoming ip packet
                 version:             4
                 ihl:                 5
                 precedence:          Routine (0x0)
                 delay:               Normal (0x0)
                 throughput:          Normal (0x0)
                 relibility:          Normal (0x0)
                 total length:        84 bytes (data: 64 bytes)
                 id:                  46450
                 flag (df):           May Fragment (0x0)
                 flag (mf):           Last Fragment (0x0)
                 fragment offset:     0
                 ttl:                 64
                 protocol:            ICMP (1)
                 checksum:            0x4133
                 source address:      192.0.2.1
                 destination address: 192.0.2.2
                 data:                00 00 ba 70 af 8c 00 03 49 2a c6 7e bc 6d c3 d2 1c fd 2d 95
                                      ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0 5b ce 22 d4
                                      c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c ba 9d 30 0f
                                      b6 ee 7b b7
12:45:47.618 [D] incoming icmp packet
                 type:     Echo Reply (0)
                 code:     0
                 checksum: 0xba70
                 id:       44940
                 seq:      3
                 data:     1c fd 2d 95 ed 19 4e 27 e8 8e 91 bb 81 d3 93 49 09 8c a5 b0
                           5b ce 22 d4 c6 31 0e df 98 64 89 99 7e 23 af 01 39 e8 47 8c
                           ba 9d 30 0f b6 ee 7b b7
12:45:47.618 [I] icmp packet received: seq=3, id=44940
Clone this wiki locally