>ну тогда что, нужно узнать какой порт ин использует и вперед
>
>tcpdump -ni eth0 port XXXX Сделал выводит все равно белеберду какую то:
[root@p1 ~]# tcpdump -ni eth0 port 3334
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
14:20:05.252915 IP 192.168.0.1.45971 > 192.168.0.2.3334: Flags [S], seq 2335268239, win 5840, options [mss 1460,sackOK,TS val 2573707562 ecr 0,nop,wscale 7], length 0
14:20:05.256226 IP 192.168.0.2.3334 > 192.168.0.1.45971: Flags [S.], seq 4205023791, ack 2335268240, win 16384, options [mss 1460,nop,wscale 0,nop,nop,TS val 0 ecr 0,nop,nop,sackOK], length 0
14:20:05.256238 IP 192.168.0.1.45971 > 192.168.0.2.3334: Flags [.], ack 1, win 46, options [nop,nop,TS val 2573707566 ecr 0], length 0
14:20:05.256433 IP 192.168.0.1.45971 > 192.168.0.2.3334: Flags [P.], ack 1, win 46, options [nop,nop,TS val 2573707566 ecr 0], length 37
14:20:05.282960 IP 192.168.0.2.3334 > 192.168.0.1.45971: Flags [P.], ack 38, win 65498, options [nop,nop,TS val 68030811 ecr 2573707566], length 22
14:20:05.283035 IP 192.168.0.1.45971 > 192.168.0.2.3334: Flags [.], ack 23, win 46, options [nop,nop,TS val 2573707593 ecr 68030811], length 0
14:20:05.283348 IP 192.168.0.1.45971 > 192.168.0.2.3334: Flags [P.], ack 23, win 46, options [nop,nop,TS val 2573707593 ecr 68030811], length 52
14:20:05.489496 IP 192.168.0.1.45971 > 192.168.0.2.3334: Flags [P.], ack 23, win 46, options [nop,nop,TS val 2573707799 ecr 68030811], length 52
14:20:05.492842 IP 192.168.0.2.3334 > 192.168.0.1.45971: Flags [.], ack 90, win 65446, options [nop,nop,TS val 68030813 ecr 2573707593], length 0
14:20:35.272843 IP 192.168.0.2.3334 > 192.168.0.1.45971: Flags [P.], ack 90, win 65446, options [nop,nop,TS val 68031111 ecr 2573707593], length 16
14:20:35.313413 IP 192.168.0.1.45971 > 192.168.0.2.3334: Flags [.], ack 39, win 46, options [nop,nop,TS val 2573737623 ecr 68031111], length 0
Помогите привести это все в нормальный вид :(