[key-real@koshka upnp]$ sudo tcpdump -n dst port 49155
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on enp7s0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
14:54:09.934291 IP 192.168.0.4.46338 > 192.168.0.1.49155: Flags [S], seq 1933787470, win 64240, options [mss 1460,sackOK,TS val 622119008 ecr 0,nop,wscale 7], length 0
14:54:09.935723 IP 192.168.0.4.46338 > 192.168.0.1.49155: Flags [.], ack 1769740677, win 502, options [nop,nop,TS val 622119009 ecr 145991940], length 0
14:54:09.935835 IP 192.168.0.4.46338 > 192.168.0.1.49155: Flags [P.], seq 0:139, ack 1, win 502, options [nop,nop,TS val 622119009 ecr 145991940], length 139
14:54:09.937388 IP 192.168.0.4.46338 > 192.168.0.1.49155: Flags [.], ack 273, win 500, options [nop,nop,TS val 622119011 ecr 145991941], length 0
14:54:09.937454 IP 192.168.0.4.46338 > 192.168.0.1.49155: Flags [.], ack 1721, win 499, options [nop,nop,TS val 622119011 ecr 145991942], length 0
14:54:09.937496 IP 192.168.0.4.46338 > 192.168.0.1.49155: Flags [.], ack 3169, win 499, options [nop,nop,TS val 622119011 ecr 145991942], length 0
14:54:09.937550 IP 192.168.0.4.46338 > 192.168.0.1.49155: Flags [F.], seq 139, ack 3298, win 501, options [nop,nop,TS val 622119011 ecr 145991942], length 0
14:54:09.937590 IP 192.168.0.4.46342 > 192.168.0.1.49155: Flags [S], seq 3418843113, win 64240, options [mss 1460,sackOK,TS val 622119011 ecr 0,nop,wscale 7], length 0
14:54:09.938823 IP 192.168.0.4.46342 > 192.168.0.1.49155: Flags [.], ack 2029789123, win 502, options [nop,nop,TS val 622119012 ecr 145991943], length 0
14:54:09.938845 IP 192.168.0.4.46342 > 192.168.0.1.49155: Flags [P.], seq 0:580, ack 1, win 502, options [nop,nop,TS val 622119012 ecr 145991943], length 580
14:54:09.940798 IP 192.168.0.4.46342 > 192.168.0.1.49155: Flags [.], ack 230, win 501, options [nop,nop,TS val 622119014 ecr 145991945], length 0
14:54:09.940853 IP 192.168.0.4.46342 > 192.168.0.1.49155: Flags [F.], seq 580, ack 640, win 501, options [nop,nop,TS val 622119014 ecr 145991945], length 0
14:54:09.940870 IP 192.168.0.4.46350 > 192.168.0.1.49155: Flags [S], seq 1096853470, win 64240, options [mss 1460,sackOK,TS val 622119014 ecr 0,nop,wscale 7], length 0
14:54:09.942167 IP 192.168.0.4.46350 > 192.168.0.1.49155: Flags [.], ack 137316309, win 502, options [nop,nop,TS val 622119015 ecr 145991946], length 0
14:54:09.942183 IP 192.168.0.4.46350 > 192.168.0.1.49155: Flags [P.], seq 0:601, ack 1, win 502, options [nop,nop,TS val 622119015 ecr 145991946], length 601
14:54:09.944014 IP 192.168.0.4.46350 > 192.168.0.1.49155: Flags [.], ack 230, win 501, options [nop,nop,TS val 622119017 ecr 145991948], length 0
14:54:09.944119 IP 192.168.0.4.46350 > 192.168.0.1.49155: Flags [F.], seq 601, ack 572, win 501, options [nop,nop,TS val 622119017 ecr 145991948], length 0
14:54:09.944132 IP 192.168.0.4.46360 > 192.168.0.1.49155: Flags [S], seq 3406302317, win 64240, options [mss 1460,sackOK,TS val 622119017 ecr 0,nop,wscale 7], length 0
14:54:09.945429 IP 192.168.0.4.46360 > 192.168.0.1.49155: Flags [.], ack 3279800914, win 502, options [nop,nop,TS val 622119019 ecr 145991950], length 0
14:54:09.945440 IP 192.168.0.4.46360 > 192.168.0.1.49155: Flags [P.], seq 0:601, ack 1, win 502, options [nop,nop,TS val 622119019 ecr 145991950], length 601
14:54:09.947547 IP 192.168.0.4.46360 > 192.168.0.1.49155: Flags [.], ack 230, win 501, options [nop,nop,TS val 622119021 ecr 145991952], length 0
14:54:09.947635 IP 192.168.0.4.46360 > 192.168.0.1.49155: Flags [F.], seq 601, ack 572, win 501, options [nop,nop,TS val 622119021 ecr 145991952], length 0
14:54:09.947644 IP 192.168.0.4.46366 > 192.168.0.1.49155: Flags [S], seq 1371474331, win 64240, options [mss 1460,sackOK,TS val 622119021 ecr 0,nop,wscale 7], length 0
14:54:09.949030 IP 192.168.0.4.46366 > 192.168.0.1.49155: Flags [.], ack 2584397854, win 502, options [nop,nop,TS val 622119022 ecr 145991953], length 0
14:54:09.949046 IP 192.168.0.4.46366 > 192.168.0.1.49155: Flags [P.], seq 0:905, ack 1, win 502, options [nop,nop,TS val 622119022 ecr 145991953], length 905
14:54:10.065977 IP 192.168.0.4.46366 > 192.168.0.1.49155: Flags [.], ack 230, win 501, options [nop,nop,TS val 622119139 ecr 145992070], length 0
14:54:10.066094 IP 192.168.0.4.46366 > 192.168.0.1.49155: Flags [F.], seq 905, ack 499, win 501, options [nop,nop,TS val 622119139 ecr 145992070], length 0
14:54:10.066187 IP 192.168.0.4.46376 > 192.168.0.1.49155: Flags [S], seq 1038112737, win 64240, options [mss 1460,sackOK,TS val 622119139 ecr 0,nop,wscale 7], length 0
14:54:10.067396 IP 192.168.0.4.46376 > 192.168.0.1.49155: Flags [.], ack 1781443229, win 502, options [nop,nop,TS val 622119141 ecr 145992071], length 0
14:54:10.067492 IP 192.168.0.4.46376 > 192.168.0.1.49155: Flags [P.], seq 0:723, ack 1, win 502, options [nop,nop,TS val 622119141 ecr 145992071], length 723
14:54:10.070661 IP 192.168.0.4.46376 > 192.168.0.1.49155: Flags [.], ack 230, win 501, options [nop,nop,TS val 622119144 ecr 145992074], length 0
14:54:10.070754 IP 192.168.0.4.46376 > 192.168.0.1.49155: Flags [F.], seq 723, ack 758, win 501, options [nop,nop,TS val 622119144 ecr 145992075], length 0