The library now seems to be updating at a really slow rate. Here is a tcpdump of 100 entries
Again, there does not seem to be any reply frome the host at 10.0.0.6. I am limited by the 300000 characters.
Code:
Shell Output - tcpdump -ni vtnet1 -c 100
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vtnet1, link-type EN10MB (Ethernet), capture size 262144 bytes
17:15:30.479044 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 714840378:714840510, ack 170368836, win 4129, options [nop,nop,TS val 3010188392 ecr 2068321034], length 132: NFS request xid 2391642897 128 getattr fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000
17:15:30.479137 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 0:132, ack 1, win 4129, options [nop,nop,TS val 3010188392 ecr 2068321034], length 132: NFS request xid 2391642897 128 getattr fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000
17:15:30.482224 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 132:268, ack 117, win 4129, options [nop,nop,TS val 3010188395 ecr 2068321105], length 136: NFS request xid 2408420113 132 access fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 NFS_ACCESS_READ|NFS_ACCESS_MODIFY|NFS_ACCESS_EXTEND|NFS_ACCESS_EXECUTE
17:15:30.482318 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 132:268, ack 117, win 4129, options [nop,nop,TS val 3010188395 ecr 2068321105], length 136: NFS request xid 2408420113 132 access fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 NFS_ACCESS_READ|NFS_ACCESS_MODIFY|NFS_ACCESS_EXTEND|NFS_ACCESS_EXECUTE
17:15:30.483482 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 1299115368:1299116780, ack 1761602776, win 2227, length 1412: RTSP
17:15:30.483575 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 0:1412, ack 1, win 2227, length 1412: RTSP
17:15:30.483614 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 1412:1527, ack 1, win 2227, length 115: RTSP
17:15:30.483676 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 1412:1527, ack 1, win 2227, length 115: RTSP
17:15:30.484655 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [P.], seq 1305543910:1305544114, ack 462941018, win 502, options [nop,nop,TS val 3010188398 ecr 355536143], length 204
17:15:30.484749 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [P.], seq 0:204, ack 1, win 502, options [nop,nop,TS val 3010188398 ecr 355536143], length 204
17:15:30.485966 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 1527, win 1026, length 0
17:15:30.486057 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 1527, win 1026, length 0
17:15:30.486097 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [.], seq 1751519755:1751521215, ack 395482541, win 7836, length 1460: RTSP
17:15:30.486163 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [.], seq 0:1460, ack 1, win 7836, length 1460: RTSP
17:15:30.486189 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 1460:1880, ack 1, win 7836, length 420: RTSP
17:15:30.486250 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 1460:1880, ack 1, win 7836, length 420: RTSP
17:15:30.486911 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [.], ack 41, win 502, options [nop,nop,TS val 3010188400 ecr 355536280], length 0
17:15:30.487008 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [.], ack 41, win 502, options [nop,nop,TS val 3010188400 ecr 355536280], length 0
17:15:30.487047 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 268:412, ack 241, win 4129, options [nop,nop,TS val 3010188400 ecr 2068321108], length 144: NFS request xid 2425197329 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 16384 bytes @ 0
17:15:30.487111 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 268:412, ack 241, win 4129, options [nop,nop,TS val 3010188400 ecr 2068321108], length 144: NFS request xid 2425197329 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 16384 bytes @ 0
17:15:30.487138 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 1880, win 4106, length 0
17:15:30.487204 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 1880, win 4106, length 0
17:15:30.496100 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 16757, win 4061, options [nop,nop,TS val 3010188409 ecr 2068321119], length 0
17:15:30.496196 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 16757, win 4061, options [nop,nop,TS val 3010188409 ecr 2068321119], length 0
17:15:30.498837 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 412:556, ack 16757, win 4129, options [nop,nop,TS val 3010188411 ecr 2068321119], length 144: NFS request xid 2441974545 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 32768 bytes @ 16384
17:15:30.498930 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 412:556, ack 16757, win 4129, options [nop,nop,TS val 3010188411 ecr 2068321119], length 144: NFS request xid 2441974545 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 32768 bytes @ 16384
17:15:30.498970 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 556:700, ack 16757, win 4129, options [nop,nop,TS val 3010188412 ecr 2068321119], length 144: NFS request xid 2458751761 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 65536 bytes @ 49152
17:15:30.499031 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 556:700, ack 16757, win 4129, options [nop,nop,TS val 3010188412 ecr 2068321119], length 144: NFS request xid 2458751761 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 65536 bytes @ 49152
17:15:30.500895 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 23997, win 4073, options [nop,nop,TS val 3010188414 ecr 2068321125], length 0
17:15:30.500990 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 23997, win 4073, options [nop,nop,TS val 3010188414 ecr 2068321125], length 0
17:15:30.501025 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 56897, win 3956, options [nop,nop,TS val 3010188414 ecr 2068321125], length 0
17:15:30.501087 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 56897, win 3956, options [nop,nop,TS val 3010188414 ecr 2068321125], length 0
17:15:30.502156 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 700:844, ack 56897, win 4129, options [nop,nop,TS val 3010188415 ecr 2068321125], length 144: NFS request xid 2475528977 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 131072 bytes @ 114688
17:15:30.502277 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 700:844, ack 56897, win 4129, options [nop,nop,TS val 3010188415 ecr 2068321125], length 144: NFS request xid 2475528977 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 131072 bytes @ 114688
17:15:30.502414 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 98889, win 4129, options [nop,nop,TS val 3010188416 ecr 2068321126], length 0
17:15:30.502480 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 98889, win 4129, options [nop,nop,TS val 3010188416 ecr 2068321126], length 0
17:15:30.504268 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 115325, win 4129, options [nop,nop,TS val 3010188417 ecr 2068321127], length 0
17:15:30.504363 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 115325, win 4129, options [nop,nop,TS val 3010188417 ecr 2068321127], length 0
17:15:30.504506 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 844:988, ack 115325, win 4129, options [nop,nop,TS val 3010188418 ecr 2068321127], length 144: NFS request xid 2492306193 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 131072 bytes @ 245760
17:15:30.504573 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 844:988, ack 115325, win 4129, options [nop,nop,TS val 3010188418 ecr 2068321127], length 144: NFS request xid 2492306193 140 read fh Unknown/4EF60AA1DE665B020A002A3100000000F01300000000000000000000 131072 bytes @ 245760
17:15:30.520145 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 157317, win 3954, options [nop,nop,TS val 3010188433 ecr 2068321143], length 0
17:15:30.520237 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 157317, win 3954, options [nop,nop,TS val 3010188433 ecr 2068321143], length 0
17:15:30.522027 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 199309, win 3956, options [nop,nop,TS val 3010188435 ecr 2068321146], length 0
17:15:30.522122 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 199309, win 3956, options [nop,nop,TS val 3010188435 ecr 2068321146], length 0
17:15:30.523873 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 241301, win 4129, options [nop,nop,TS val 3010188437 ecr 2068321147], length 0
17:15:30.523966 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 241301, win 4129, options [nop,nop,TS val 3010188437 ecr 2068321147], length 0
17:15:30.526111 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 283293, win 3956, options [nop,nop,TS val 3010188439 ecr 2068321149], length 0
17:15:30.526205 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 283293, win 3956, options [nop,nop,TS val 3010188439 ecr 2068321149], length 0
17:15:30.527983 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 325285, win 3956, options [nop,nop,TS val 3010188441 ecr 2068321152], length 0
17:15:30.528076 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 325285, win 3956, options [nop,nop,TS val 3010188441 ecr 2068321152], length 0
17:15:30.530597 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 367277, win 4129, options [nop,nop,TS val 3010188443 ecr 2068321154], length 0
17:15:30.530689 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 367277, win 4129, options [nop,nop,TS val 3010188443 ecr 2068321154], length 0
17:15:30.532550 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 377733, win 4129, options [nop,nop,TS val 3010188446 ecr 2068321156], length 0
17:15:30.532645 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 377733, win 4129, options [nop,nop,TS val 3010188446 ecr 2068321156], length 0
17:15:30.545816 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [.], seq 1880:3340, ack 1, win 7836, length 1460: RTSP
17:15:30.545910 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [.], seq 1880:3340, ack 1, win 7836, length 1460: RTSP
17:15:30.545950 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 3340:3436, ack 1, win 7836, length 96: RTSP
17:15:30.546011 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 3340:3436, ack 1, win 7836, length 96: RTSP
17:15:30.546992 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 3436, win 4106, length 0
17:15:30.547084 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 3436, win 4106, length 0
17:15:30.563372 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 1527:2939, ack 1, win 2227, length 1412: RTSP
17:15:30.563463 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 1527:2939, ack 1, win 2227, length 1412: RTSP
17:15:30.563501 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 2939:3106, ack 1, win 2227, length 167: RTSP
17:15:30.563584 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 2939:3106, ack 1, win 2227, length 167: RTSP
17:15:30.565152 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 3106, win 1026, length 0
17:15:30.565265 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 3106, win 1026, length 0
17:15:30.592271 IP 10.0.0.100.53803 > 170.114.15.43.443: Flags [P.], seq 1102121075:1102121292, ack 1200479586, win 1025, length 217
17:15:30.596468 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 988:1120, ack 377733, win 4129, options [nop,nop,TS val 3010188509 ecr 2068321156], length 132: NFS request xid 2509083409 128 getattr fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000
17:15:30.596561 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 988:1120, ack 377733, win 4129, options [nop,nop,TS val 3010188509 ecr 2068321156], length 132: NFS request xid 2509083409 128 getattr fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000
17:15:30.597854 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1120:1256, ack 377849, win 4129, options [nop,nop,TS val 3010188511 ecr 2068321222], length 136: NFS request xid 2525860625 132 access fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 NFS_ACCESS_READ|NFS_ACCESS_MODIFY|NFS_ACCESS_EXTEND|NFS_ACCESS_EXECUTE
17:15:30.597949 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1120:1256, ack 377849, win 4129, options [nop,nop,TS val 3010188511 ecr 2068321222], length 136: NFS request xid 2525860625 132 access fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 NFS_ACCESS_READ|NFS_ACCESS_MODIFY|NFS_ACCESS_EXTEND|NFS_ACCESS_EXECUTE
17:15:30.599850 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [P.], seq 204:408, ack 41, win 502, options [nop,nop,TS val 3010188513 ecr 355536280], length 204
17:15:30.599960 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [P.], seq 204:408, ack 41, win 502, options [nop,nop,TS val 3010188513 ecr 355536280], length 204
17:15:30.600961 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [.], ack 81, win 502, options [nop,nop,TS val 3010188515 ecr 355536395], length 0
17:15:30.601063 IP 10.0.10.6.684 > 10.0.0.6.811: Flags [.], ack 81, win 502, options [nop,nop,TS val 3010188515 ecr 355536395], length 0
17:15:30.601915 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1256:1400, ack 377973, win 4129, options [nop,nop,TS val 3010188515 ecr 2068321223], length 144: NFS request xid 2542637841 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 16384 bytes @ 0
17:15:30.601984 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1256:1400, ack 377973, win 4129, options [nop,nop,TS val 3010188515 ecr 2068321223], length 144: NFS request xid 2542637841 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 16384 bytes @ 0
17:15:30.606594 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 3436:4756, ack 1, win 7836, length 1320: RTSP
17:15:30.606687 IP 10.0.40.10.554 > 10.0.0.100.50977: Flags [P.], seq 3436:4756, ack 1, win 7836, length 1320: RTSP
17:15:30.623893 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 3106:4518, ack 1, win 2227, length 1412: RTSP
17:15:30.623987 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 3106:4518, ack 1, win 2227, length 1412: RTSP
17:15:30.624027 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 4518:4611, ack 1, win 2227, length 93: RTSP
17:15:30.624088 IP 10.0.40.11.554 > 10.0.0.100.64139: Flags [P.], seq 4518:4611, ack 1, win 2227, length 93: RTSP
17:15:30.625802 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 4611, win 1026, length 0
17:15:30.625894 IP 10.0.0.100.64139 > 10.0.40.11.554: Flags [.], ack 4611, win 1026, length 0
17:15:30.629748 IP 170.114.15.43.443 > 10.0.0.100.53803: Flags [.], ack 217, win 49, length 0
17:15:30.630755 IP 170.114.15.43.443 > 10.0.0.100.53803: Flags [P.], seq 1:196, ack 217, win 49, length 195
17:15:30.653230 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 4756, win 4101, length 0
17:15:30.653318 IP 10.0.0.100.50977 > 10.0.40.10.554: Flags [.], ack 4756, win 4101, length 0
17:15:30.653356 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 394489, win 4061, options [nop,nop,TS val 3010188566 ecr 2068321276], length 0
17:15:30.653423 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 394489, win 4061, options [nop,nop,TS val 3010188566 ecr 2068321276], length 0
17:15:30.655871 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1400:1544, ack 394489, win 4129, options [nop,nop,TS val 3010188568 ecr 2068321276], length 144: NFS request xid 2559415057 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 32768 bytes @ 16384
17:15:30.655967 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1400:1544, ack 394489, win 4129, options [nop,nop,TS val 3010188568 ecr 2068321276], length 144: NFS request xid 2559415057 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 32768 bytes @ 16384
17:15:30.656007 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1544:1688, ack 394489, win 4129, options [nop,nop,TS val 3010188569 ecr 2068321276], length 144: NFS request xid 2576192273 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 65536 bytes @ 49152
17:15:30.656071 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1544:1688, ack 394489, win 4129, options [nop,nop,TS val 3010188569 ecr 2068321276], length 144: NFS request xid 2576192273 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 65536 bytes @ 49152
17:15:30.656763 IP 10.0.100.101.5353 > 224.0.0.251.5353: 0 A (QM)? BrotherA82CE850.local. (39)
17:15:30.658297 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 436077, win 3953, options [nop,nop,TS val 3010188571 ecr 2068321281], length 0
17:15:30.658393 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [.], ack 436077, win 3953, options [nop,nop,TS val 3010188571 ecr 2068321281], length 0
17:15:30.658698 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1688:1832, ack 436077, win 4129, options [nop,nop,TS val 3010188572 ecr 2068321281], length 144: NFS request xid 2592969489 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 131072 bytes @ 114688
17:15:30.658765 IP 10.0.10.6.986 > 10.0.0.6.2049: Flags [P.], seq 1688:1832, ack 436077, win 4129, options [nop,nop,TS val 3010188572 ecr 2068321281], length 144: NFS request xid 2592969489 140 read fh Unknown/4EF60AA1DE665B020A00682E00000000F01300000000000000000000 131072 bytes @ 114688
100 packets captured
441 packets received by filter
0 packets dropped by kernel