sudo tcpdump -nni bridge0 host yy.yyy.10.207 and port 80 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on bridge0, link-type EN10MB (Ethernet), capture size 65535 bytes 21:56:36.490989 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [S], seq 1291572589, win 14600, options [mss 1460,sackOK,TS val 66856106 ecr 0,nop,wscale 6], length 0 21:56:36.598377 IP 213.95.206.41.80 > yy.yyy.10.207.59068: Flags [S.], seq 389153084, ack 1291572590, win 7300, options [mss 1460], length 0 21:56:36.599414 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [.], ack 1, win 14600, length 0 21:56:36.600134 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 21:56:36.925982 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 21:56:37.592991 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 21:56:38.912839 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 21:56:41.559227 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 21:56:46.847599 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 21:56:51.707421 IP 213.95.206.41.80 > yy.yyy.10.207.59068: Flags [F.], seq 1, ack 1, win 7300, length 0 21:56:51.916556 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [.], ack 2, win 14600, length 0 21:56:51.920041 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [F.], seq 717, ack 2, win 14600, length 0 21:56:52.037353 IP 213.95.206.41.80 > yy.yyy.10.207.59068: Flags [R], seq 389153086, win 0, length 0 ^C 13 packets captured 63 packets received by filter 0 packets dropped by kernel sudo tcpdump -nni em0 port 80 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on em0, link-type EN10MB (Ethernet), capture size 65535 bytes 21:57:41.407146 IP6 2607:f8b0:4004:808::1003.80 > 2601:152:4380:1fac:30bf:f0a0:8472:c685.37679: Flags [R], seq 95977522, win 0, length 0 21:57:41.500216 IP xx.xxx.143.153.56836 > 213.95.206.42.80: Flags [S], seq 1243298629, win 14600, options [mss 1460,sackOK,TS val 66862610 ecr 0,nop,wscale 6], length 0 21:57:41.608149 IP 213.95.206.42.80 > xx.xxx.143.153.56836: Flags [S.], seq 966800353, ack 1243298630, win 7300, options [mss 1460], length 0 21:57:41.609674 IP xx.xxx.143.153.56836 > 213.95.206.42.80: Flags [.], ack 1, win 14600, length 0 21:57:56.715628 IP 213.95.206.42.80 > xx.xxx.143.153.56836: Flags [F.], seq 1, ack 1, win 7300, length 0 21:57:56.721375 IP xx.xxx.143.153.56836 > 213.95.206.42.80: Flags [F.], seq 717, ack 2, win 14600, length 0 21:57:56.874673 IP 213.95.206.42.80 > xx.xxx.143.153.56836: Flags [R], seq 966800355, win 0, length 0 ^C 8 packets captured 110 packets received by filter 0 packets dropped by kernel