tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 20:55:17.155627 IP 192.168.0.1 > 192.168.0.255: icmp 64: echo request seq 1 20:55:17.156659 arp who-has 192.168.0.1 tell 192.168.0.4 20:55:17.156695 arp reply 192.168.0.1 is-at 00:08:74:b5:c8:b7 20:55:17.157031 IP 192.168.0.4 > 192.168.0.1: icmp 64: echo reply seq 1 20:55:17.157032 arp who-has 192.168.0.1 tell 192.168.0.3 20:55:17.157096 arp reply 192.168.0.1 is-at 00:08:74:b5:c8:b7 20:55:17.157281 arp who-has 192.168.0.1 tell 192.168.0.2 20:55:17.157297 arp reply 192.168.0.1 is-at 00:08:74:b5:c8:b7 20:55:17.157405 IP 192.168.0.3 > 192.168.0.1: icmp 64: echo reply seq 1 20:55:17.157655 IP 192.168.0.2 > 192.168.0.1: icmp 64: echo reply seq 1 20:55:18.156802 IP 192.168.0.1 > 192.168.0.255: icmp 64: echo request seq 2 20:55:18.157175 IP 192.168.0.2 > 192.168.0.1: icmp 64: echo reply seq 2 20:55:18.157425 IP 192.168.0.3 > 192.168.0.1: icmp 64: echo reply seq 2 20:55:18.157549 IP 192.168.0.4 > 192.168.0.1: icmp 64: echo reply seq 2 20:55:19.157635 IP 192.168.0.1 > 192.168.0.255: icmp 64: echo request seq 3 20:55:19.157944 IP 192.168.0.2 > 192.168.0.1: icmp 64: echo reply seq 3 20:55:19.158068 IP 192.168.0.4 > 192.168.0.1: icmp 64: echo reply seq 3 20:55:19.158193 IP 192.168.0.3 > 192.168.0.1: icmp 64: echo reply seq 3 18 packets captured 18 packets received by filter 0 packets dropped by kernel