log.txt

 avatar
unknown
text
11 days ago
96 kB
18
No Index
adding low-priority default empty desync profile
we have 3 user defined desync profile(s) and default low priority profile 0
profile 1 generated random SNI : gatech.edu -> ltwwyw.biz
profile 2 generated random SNI : gatech.edu -> e980mu.org
profile 3 generated random SNI : gatech.edu -> a3ruiq.net
Loading hostlist /opt/zapret/ipset/zapret-hosts-auto.txt
loading plain text list
Loaded 38 hosts from /opt/zapret/ipset/zapret-hosts-auto.txt
Loading hostlist /opt/zapret/ipset/zapret-hosts-user-exclude.txt
loading plain text list
Loaded 7 hosts from /opt/zapret/ipset/zapret-hosts-user-exclude.txt
Loading hostlist /opt/zapret/ipset/zapret-hosts.txt.gz
zlib compression detected. uncompressed size : 1797961
Loaded 118835 hosts from /opt/zapret/ipset/zapret-hosts.txt.gz
Loading hostlist /opt/zapret/ipset/zapret-hosts-user.txt
loading plain text list
Loaded 1 hosts from /opt/zapret/ipset/zapret-hosts-user.txt

lists summary:
hostlist file /opt/zapret/ipset/zapret-hosts-auto.txt
hostlist file /opt/zapret/ipset/zapret-hosts-user-exclude.txt
hostlist file /opt/zapret/ipset/zapret-hosts.txt.gz
hostlist file /opt/zapret/ipset/zapret-hosts-user.txt
profile 1 include hostlist /opt/zapret/ipset/zapret-hosts.txt.gz
profile 1 include hostlist /opt/zapret/ipset/zapret-hosts-user.txt
profile 1 exclude hostlist /opt/zapret/ipset/zapret-hosts-user-exclude.txt
profile 1 auto hostlist /opt/zapret/ipset/zapret-hosts-auto.txt
profile 2 include hostlist /opt/zapret/ipset/zapret-hosts.txt.gz
profile 2 include hostlist /opt/zapret/ipset/zapret-hosts-user.txt
profile 2 exclude hostlist /opt/zapret/ipset/zapret-hosts-user-exclude.txt
profile 2 auto hostlist /opt/zapret/ipset/zapret-hosts-auto.txt
profile 3 include hostlist /opt/zapret/ipset/zapret-hosts-auto.txt
profile 3 include hostlist /opt/zapret/ipset/zapret-hosts.txt.gz
profile 3 include hostlist /opt/zapret/ipset/zapret-hosts-user.txt
profile 3 exclude hostlist /opt/zapret/ipset/zapret-hosts-user-exclude.txt

splits summary:
profile 1 multisplit method 2
profile 2 multisplit abs 1
profile 2 multisplit midsld 0
profile 3 multisplit abs 2
profile 0 multisplit abs 2

initializing conntrack with timeouts tcp=60:300:60 udp=60
Running as UID=1 GID=1
opening library handle
unbinding existing nf_queue handler for AF_INET (if any)
binding nfnetlink_queue as nf_queue handler for AF_INET
binding this socket to queue '200'
setting copy_packet mode
initializing raw sockets bind-fix4=0 bind-fix6=0
set_socket_buffers fd=5 rcvbuf=2048 sndbuf=32768
fd=5 SO_RCVBUF=4096
fd=5 SO_SNDBUF=65536
set_socket_buffers fd=6 rcvbuf=2048 sndbuf=32768
fd=6 SO_RCVBUF=4096
fd=6 SO_SNDBUF=65536
packet: id=1 len=52 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51659 dport=443 flags=S seq=2889202594 ack_seq=0
desync profile search for tcp target=162.159.136.232:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=1 pass unmodified
packet: id=2 len=52 mark=00000000
IP4: 162.159.136.232 => 100.99.136.233 proto=tcp ttl=54 sport=443 dport=51659 flags=SA seq=1472298294 ack_seq=2889202595
using cached desync profile 2
incoming TTL 54
packet: id=2 pass unmodified
packet: id=3 len=40 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51659 dport=443 flags=A seq=2889202595 ack_seq=1472298295
using cached desync profile 2
packet: id=3 pass unmodified
packet: id=4 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51659 dport=443 flags=AP seq=2889202595 ack_seq=1472298295
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 ... : ...........g..qi..mk.....4.$.."% ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 2889202595-2889202785
hostname: updates.discord.com
discovered l7 protocol
discovered hostname
desync profile search for tcp target=162.159.136.232:443 l7proto=tls hostname='updates.discord.com'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51659 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 B0 3D 2E AE B4 1A B0 84 D7 44 F8 B0 D8 2D 9A C8 26 1D EB 88 3A ... : ...........=.......D...-..&...: ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 A3 ... : ..........g..qi..mk.....4.$.."%. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=4 drop
packet: id=5 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51659 dport=443 flags=AP seq=2889202595 ack_seq=1472298295
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 ... : ...........g..qi..mk.....4.$.."% ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51659 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 E9 87 3B 37 22 33 10 A5 26 C0 5C CB A3 EF 06 E1 92 94 41 80 2B ... : ............;7"3..&.\.......A.+ ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 A3 ... : ..........g..qi..mk.....4.$.."%. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=5 drop
packet: id=6 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51659 dport=443 flags=AP seq=2889202595 ack_seq=1472298295
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 ... : ...........g..qi..mk.....4.$.."% ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51659 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 4B 33 CC AE CE 0F DD C7 0D 2F F9 F7 F3 A1 5A 21 1A D0 7C 2A 83 ... : ..........K3......./....Z!..|*. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 A3 ... : ..........g..qi..mk.....4.$.."%. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=6 drop
packet: id=7 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51659 dport=443 flags=AP seq=2889202595 ack_seq=1472298295
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 ... : ...........g..qi..mk.....4.$.."% ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51659 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 97 94 97 93 AC BE B1 64 13 BE 2F 48 8D 8A 6D 3C 00 06 57 24 17 ... : .................d../H..m<..W$. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 A3 ... : ..........g..qi..mk.....4.$.."%. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=7 drop
packet: id=8 len=60 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52818 dport=443 flags=S seq=2002793575 ack_seq=0
desync profile search for tcp target=76.76.2.22:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=8 pass unmodified
packet: id=9 len=60 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=52818 flags=SA seq=1018364900 ack_seq=2002793576
using cached desync profile 2
incoming TTL 55
packet: id=9 pass unmodified
packet: id=10 len=52 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52818 dport=443 flags=A seq=2002793576 ack_seq=1018364901
using cached desync profile 2
packet: id=10 pass unmodified
packet: id=11 len=60 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52824 dport=443 flags=S seq=227907630 ack_seq=0
desync profile search for tcp target=76.76.2.22:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=11 pass unmodified
packet: id=12 len=488 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52818 dport=443 flags=AP seq=2002793576 ack_seq=1018364901
TCP: len=436 : 16 03 01 01 AF 01 00 01 AB 03 03 8F 83 7F 5D 4E 27 9D 84 F9 4E 0F 3D D4 D1 90 7D 26 AC AD C4 3A ... : .............]N'...N.=...}&...: ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 2002793576-2002794011
hostname: dns.controld.com
discovered l7 protocol
discovered hostname
desync profile search for tcp target=76.76.2.22:443 l7proto=tls hostname='dns.controld.com'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
not applying tampering to this request
packet: id=12 pass unmodified
packet: id=13 len=60 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=52824 flags=SA seq=4130156489 ack_seq=227907631
using cached desync profile 2
incoming TTL 55
packet: id=13 pass unmodified
packet: id=14 len=52 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52824 dport=443 flags=A seq=227907631 ack_seq=4130156490
using cached desync profile 2
packet: id=14 pass unmodified
packet: id=15 len=488 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52824 dport=443 flags=AP seq=227907631 ack_seq=4130156490
TCP: len=436 : 16 03 01 01 AF 01 00 01 AB 03 03 FC EC 3E A6 58 00 DB 9E C0 66 D2 C2 6F D6 44 6F 66 92 F4 76 80 ... : .............>.X....f..o.Dof..v. ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 227907631-227908066
hostname: dns.controld.com
discovered l7 protocol
discovered hostname
desync profile search for tcp target=76.76.2.22:443 l7proto=tls hostname='dns.controld.com'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
not applying tampering to this request
packet: id=15 pass unmodified
packet: id=16 len=52 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=52818 flags=A seq=1018364901 ack_seq=2002794012
using cached desync profile 2
packet: id=16 pass unmodified
packet: id=17 len=430 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=52818 flags=AP seq=1018364901 ack_seq=2002794012
TCP: len=378 : 16 03 03 00 80 02 00 00 7C 03 03 19 3D 2A E8 CB 3E B4 A7 52 B4 B3 F5 FC CE 9D 53 AA 88 24 75 D0 ... : ........|...=*..>..R......S..$u. ...
using cached desync profile 2
packet: id=17 pass unmodified
packet: id=18 len=52 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52818 dport=443 flags=A seq=2002794012 ack_seq=1018365279
using cached desync profile 2
packet: id=18 pass unmodified
packet: id=19 len=116 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52818 dport=443 flags=AP seq=2002794012 ack_seq=1018365279
TCP: len=64 : 14 03 03 00 01 01 17 03 03 00 35 50 F2 DD 39 86 86 CB 49 54 EB 64 A6 1A CC 0D 38 65 5E DF 54 F0 ... : ..........5P..9...IT.d....8e^.T. ...
using cached desync profile 2
req retrans : tcp seq 2002794012 not within the req range 2002793576-2002794011. stop tracking.
not applying tampering to unknown protocol
packet: id=19 pass unmodified
packet: id=20 len=144 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52818 dport=443 flags=AP seq=2002794076 ack_seq=1018365279
TCP: len=92 : 17 03 03 00 57 69 EC 6D 89 C0 E5 3C B6 6E 5E 74 AF FC 78 3A C9 78 9E 99 8B 77 AB 0E 07 81 73 7B ... : ....Wi.m...<.n^t..x:.x...w....s{ ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=20 pass unmodified
packet: id=21 len=395 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52818 dport=443 flags=AP seq=2002794168 ack_seq=1018365279
TCP: len=343 : 17 03 03 00 E4 8A 7B 36 5D C5 BD BA 27 C9 EA 19 FB 49 C5 19 E0 56 36 15 D0 C1 B2 C1 67 30 0E 2C ... : ......{6]...'....I...V6.....g0., ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=21 pass unmodified
packet: id=22 len=52 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=52824 flags=A seq=4130156490 ack_seq=227908067
using cached desync profile 2
packet: id=22 pass unmodified
packet: id=23 len=430 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=52824 flags=AP seq=4130156490 ack_seq=227908067
TCP: len=378 : 16 03 03 00 80 02 00 00 7C 03 03 3E 80 30 8A 51 15 1D 33 7E BD 5C C0 D9 62 C4 85 13 74 FC 2A FD ... : ........|..>.0.Q..3~.\..b...t.*. ...
using cached desync profile 2
packet: id=23 pass unmodified
packet: id=24 len=52 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52824 dport=443 flags=A seq=227908067 ack_seq=4130156868
using cached desync profile 2
packet: id=24 pass unmodified
packet: id=25 len=116 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52824 dport=443 flags=AP seq=227908067 ack_seq=4130156868
TCP: len=64 : 14 03 03 00 01 01 17 03 03 00 35 F9 96 18 F2 8D 28 BE 41 B2 AA E4 50 EE CF 5B CA 62 94 1D 6C E7 ... : ..........5.....(.A...P..[.b..l. ...
using cached desync profile 2
req retrans : tcp seq 227908067 not within the req range 227907631-227908066. stop tracking.
not applying tampering to unknown protocol
packet: id=25 pass unmodified
packet: id=26 len=76 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52824 dport=443 flags=AFP seq=227908131 ack_seq=4130156868
TCP: len=24 : 17 03 03 00 13 F4 D9 6B CB 27 4F 9B 3F A1 E4 1E 1C 9C C6 27 D8 51 BA 8F : .......k.'O.?......'.Q..
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=26 pass unmodified
packet: id=27 len=52 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52818 dport=443 flags=A seq=2002794511 ack_seq=1018365384
using cached desync profile 2
packet: id=27 pass unmodified
packet: id=28 len=83 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52818 dport=443 flags=AP seq=2002794511 ack_seq=1018365384
TCP: len=31 : 17 03 03 00 1A D2 F6 35 00 B1 4F 00 CE 1D B3 D0 3C 57 88 06 FC 8C D2 CB 04 E0 CC CA 0A 10 B9 : .......5..O.....<W.............
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=28 pass unmodified
packet: id=29 len=52 mark=20000000
IP4: 100.99.136.233 => 13.107.6.254 proto=tcp ttl=126 sport=51667 dport=443 flags=S seq=1833803547 ack_seq=0
desync profile search for tcp target=13.107.6.254:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=29 pass unmodified
packet: id=30 len=40 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52824 dport=443 flags=R seq=227908156 ack_seq=0
using cached desync profile 2
packet: id=30 pass unmodified
packet: id=31 len=40 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52824 dport=443 flags=R seq=227908156 ack_seq=0
using cached desync profile 2
packet: id=31 pass unmodified
packet: id=32 len=40 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=52824 dport=443 flags=R seq=227908156 ack_seq=0
using cached desync profile 2
packet: id=32 pass unmodified
packet: id=33 len=52 mark=00000000
IP4: 13.107.6.254 => 100.99.136.233 proto=tcp ttl=112 sport=443 dport=51667 flags=SA seq=3908840796 ack_seq=1833803548
using cached desync profile 2
incoming TTL 112
packet: id=33 pass unmodified
packet: id=34 len=40 mark=20000000
IP4: 100.99.136.233 => 13.107.6.254 proto=tcp ttl=126 sport=51667 dport=443 flags=A seq=1833803548 ack_seq=3908840797
using cached desync profile 2
packet: id=34 pass unmodified
packet: id=35 len=252 mark=20000000
IP4: 100.99.136.233 => 13.107.6.254 proto=tcp ttl=126 sport=51667 dport=443 flags=AP seq=1833803548 ack_seq=3908840797
TCP: len=212 : 16 03 03 00 CF 01 00 00 CB 03 03 67 E1 9C 73 B8 98 C4 30 2C 56 27 AB 7D 23 DF 49 FE 93 8B D4 29 ... : ...........g..s...0,V'.}#.I....) ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 1833803548-1833803759
hostname: b-ring.msedge.net
discovered l7 protocol
discovered hostname
desync profile search for tcp target=13.107.6.254:443 l7proto=tls hostname='b-ring.msedge.net'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for b-ring.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for b-ring.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for b-ring.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for b-ring.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
not applying tampering to this request
packet: id=35 pass unmodified
packet: id=36 len=40 mark=00000000
IP4: 13.107.6.254 => 100.99.136.233 proto=tcp ttl=113 sport=443 dport=51667 flags=A seq=3908840797 ack_seq=1833803760
using cached desync profile 2
packet: id=36 pass unmodified
packet: id=37 len=1500 mark=00000000
IP4: 13.107.6.254 => 100.99.136.233 proto=tcp ttl=113 sport=443 dport=51667 flags=A seq=3908840797 ack_seq=1833803760
TCP: len=1460 : 16 03 03 18 83 02 00 00 62 03 03 67 E1 9C 73 9C 3A CD 44 54 3A C6 DB 77 B0 CD 7F E7 89 3A E5 EA ... : ........b..g..s.:.DT:..w....:.. ...
using cached desync profile 2
packet: id=37 pass unmodified
packet: id=38 len=52 mark=20000000
IP4: 100.99.136.233 => 13.107.6.254 proto=tcp ttl=126 sport=51667 dport=443 flags=A seq=1833803760 ack_seq=3908840797
using cached desync profile 2
packet: id=38 pass unmodified
packet: id=39 len=52 mark=20000000
IP4: 100.99.136.233 => 13.107.6.254 proto=tcp ttl=126 sport=51667 dport=443 flags=A seq=1833803760 ack_seq=3908840797
using cached desync profile 2
packet: id=39 pass unmodified
packet: id=40 len=52 mark=20000000
IP4: 100.99.136.233 => 13.107.6.254 proto=tcp ttl=126 sport=51667 dport=443 flags=A seq=1833803760 ack_seq=3908840797
using cached desync profile 2
packet: id=40 pass unmodified
packet: id=41 len=40 mark=20000000
IP4: 100.99.136.233 => 13.107.6.254 proto=tcp ttl=126 sport=51667 dport=443 flags=A seq=1833803760 ack_seq=3908847077
using cached desync profile 2
packet: id=41 pass unmodified
packet: id=42 len=198 mark=20000000
IP4: 100.99.136.233 => 13.107.6.254 proto=tcp ttl=126 sport=51667 dport=443 flags=AP seq=1833803760 ack_seq=3908847077
TCP: len=158 : 16 03 03 00 66 10 00 00 62 61 04 36 24 4C B7 3A D0 8B BB F2 F2 3B 8A 31 2C C8 26 8E FF EF F9 73 ... : ....f...ba.6$L.:.....;.1,.&....s ...
using cached desync profile 2
req retrans : tcp seq 1833803760 not within the req range 1833803548-1833803759. stop tracking.
not applying tampering to unknown protocol
packet: id=42 pass unmodified
packet: id=43 len=127 mark=20000000
IP4: 100.99.136.233 => 13.107.6.254 proto=tcp ttl=126 sport=51667 dport=443 flags=AP seq=1833803918 ack_seq=3908847077
TCP: len=87 : 17 03 03 00 52 00 00 00 00 00 00 00 01 85 8B 04 97 92 C7 C4 3B 2A 7F 3A 89 1C 46 60 2D 0C 53 3B ... : ....R...............;*:..F`-.S; ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=43 pass unmodified
packet: id=44 len=52 mark=20000000
IP4: 100.99.136.233 => 131.253.33.254 proto=tcp ttl=126 sport=51668 dport=443 flags=S seq=3501731259 ack_seq=0
desync profile search for tcp target=131.253.33.254:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=44 pass unmodified
packet: id=45 len=52 mark=00000000
IP4: 131.253.33.254 => 100.99.136.233 proto=tcp ttl=112 sport=443 dport=51668 flags=SA seq=195340629 ack_seq=3501731260
using cached desync profile 2
incoming TTL 112
packet: id=45 pass unmodified
packet: id=46 len=40 mark=20000000
IP4: 100.99.136.233 => 131.253.33.254 proto=tcp ttl=126 sport=51668 dport=443 flags=A seq=3501731260 ack_seq=195340630
using cached desync profile 2
packet: id=46 pass unmodified
packet: id=47 len=261 mark=20000000
IP4: 100.99.136.233 => 131.253.33.254 proto=tcp ttl=126 sport=51668 dport=443 flags=AP seq=3501731260 ack_seq=195340630
TCP: len=221 : 16 03 03 00 D8 01 00 00 D4 03 03 67 E1 9C 73 35 CA 24 D8 2A 21 52 49 26 A9 5C 97 E7 B6 68 A6 66 ... : ...........g..s5.$.*!RI&.\...h.f ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 3501731260-3501731480
hostname: a-ring-fallback.msedge.net
discovered l7 protocol
discovered hostname
desync profile search for tcp target=131.253.33.254:443 l7proto=tls hostname='a-ring-fallback.msedge.net'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for a-ring-fallback.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for a-ring-fallback.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for a-ring-fallback.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for a-ring-fallback.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
not applying tampering to this request
packet: id=47 pass unmodified
packet: id=48 len=40 mark=00000000
IP4: 131.253.33.254 => 100.99.136.233 proto=tcp ttl=113 sport=443 dport=51668 flags=A seq=195340630 ack_seq=3501731481
using cached desync profile 2
packet: id=48 pass unmodified
packet: id=49 len=1500 mark=00000000
IP4: 131.253.33.254 => 100.99.136.233 proto=tcp ttl=113 sport=443 dport=51668 flags=A seq=195340630 ack_seq=3501731481
TCP: len=1460 : 16 03 03 18 83 02 00 00 62 03 03 67 E1 9C 74 55 E0 04 18 B2 27 69 C6 E3 1D 88 3A F0 71 42 C2 24 ... : ........b..g..tU....'i....:.qB.$ ...
using cached desync profile 2
packet: id=49 pass unmodified
packet: id=50 len=1500 mark=00000000
IP4: 131.253.33.254 => 100.99.136.233 proto=tcp ttl=113 sport=443 dport=51668 flags=A seq=195342090 ack_seq=3501731481
TCP: len=1460 : 82 0C 62 2D 6D 73 65 64 67 65 2E 6E 65 74 82 0E 2A 2E 62 2D 6D 73 65 64 67 65 2E 6E 65 74 82 0C ... : ..b-msedge.net..*.b-msedge.net.. ...
using cached desync profile 2
packet: id=50 pass unmodified
packet: id=51 len=1500 mark=00000000
IP4: 131.253.33.254 => 100.99.136.233 proto=tcp ttl=113 sport=443 dport=51668 flags=A seq=195343550 ack_seq=3501731481
TCP: len=1460 : DD DC 71 AD F2 1F 2C 95 C7 56 3A D3 E6 9F 63 A0 C0 A3 FD 8B B3 5B B3 01 F6 C3 7C CC C0 55 62 5A ... : ..q...,..V:...c......[....|..UbZ ...
using cached desync profile 2
packet: id=51 pass unmodified
packet: id=52 len=1500 mark=00000000
IP4: 131.253.33.254 => 100.99.136.233 proto=tcp ttl=113 sport=443 dport=51668 flags=A seq=195345010 ack_seq=3501731481
TCP: len=1460 : EF BA AC D0 A4 2B 85 58 AE 06 D7 E4 FE BA F0 BE 77 BB DF 92 8E 3C 02 18 6E 6B 89 43 0C F6 8F 56 ... : .....+.X........w....<..nk.C...V ...
using cached desync profile 2
packet: id=52 pass unmodified
packet: id=53 len=52 mark=20000000
IP4: 100.99.136.233 => 131.253.33.254 proto=tcp ttl=126 sport=51668 dport=443 flags=A seq=3501731481 ack_seq=195340630
using cached desync profile 2
packet: id=53 pass unmodified
packet: id=54 len=52 mark=20000000
IP4: 100.99.136.233 => 131.253.33.254 proto=tcp ttl=126 sport=51668 dport=443 flags=A seq=3501731481 ack_seq=195342090
using cached desync profile 2
packet: id=54 pass unmodified
packet: id=55 len=52 mark=20000000
IP4: 100.99.136.233 => 131.253.33.254 proto=tcp ttl=126 sport=51668 dport=443 flags=A seq=3501731481 ack_seq=195343550
using cached desync profile 2
packet: id=55 pass unmodified
packet: id=56 len=52 mark=20000000
IP4: 100.99.136.233 => 131.253.33.254 proto=tcp ttl=126 sport=51668 dport=443 flags=A seq=3501731481 ack_seq=195345010
using cached desync profile 2
packet: id=56 pass unmodified
packet: id=57 len=40 mark=20000000
IP4: 100.99.136.233 => 131.253.33.254 proto=tcp ttl=126 sport=51668 dport=443 flags=A seq=3501731481 ack_seq=195346910
using cached desync profile 2
packet: id=57 pass unmodified
packet: id=58 len=198 mark=20000000
IP4: 100.99.136.233 => 131.253.33.254 proto=tcp ttl=126 sport=51668 dport=443 flags=AP seq=3501731481 ack_seq=195346910
TCP: len=158 : 16 03 03 00 66 10 00 00 62 61 04 7C 62 38 75 5A 4C 9D 90 18 62 FE 32 11 92 3E 53 53 AC 32 EC 32 ... : ....f...ba.|b8uZL...b.2..>SS.2.2 ...
using cached desync profile 2
req retrans : tcp seq 3501731481 not within the req range 3501731260-3501731480. stop tracking.
not applying tampering to unknown protocol
packet: id=58 pass unmodified
packet: id=59 len=52 mark=20000000
IP4: 100.99.136.233 => 150.171.84.254 proto=tcp ttl=126 sport=51673 dport=443 flags=S seq=1980435108 ack_seq=0
desync profile search for tcp target=150.171.84.254:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=59 pass unmodified
packet: id=60 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51659 dport=443 flags=AP seq=2889202595 ack_seq=1472298295
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 ... : ...........g..qi..mk.....4.$.."% ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51659 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 9F C9 C0 59 A2 08 9F CF 17 7E B9 25 82 C0 3A 3B CB CC DE 40 65 ... : .............Y.....~.%..:;...@e ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 A3 ... : ..........g..qi..mk.....4.$.."%. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=60 drop
packet: id=61 len=52 mark=00000000
IP4: 150.171.84.254 => 100.99.136.233 proto=tcp ttl=52 sport=443 dport=51673 flags=SA seq=1010960613 ack_seq=1980435109
using cached desync profile 2
incoming TTL 52
packet: id=61 pass unmodified
packet: id=62 len=40 mark=20000000
IP4: 100.99.136.233 => 150.171.84.254 proto=tcp ttl=126 sport=51673 dport=443 flags=A seq=1980435109 ack_seq=1010960614
using cached desync profile 2
packet: id=62 pass unmodified
packet: id=63 len=460 mark=20000000
IP4: 100.99.136.233 => 150.171.84.254 proto=tcp ttl=126 sport=51673 dport=443 flags=AP seq=1980435109 ack_seq=1010960614
TCP: len=420 : 16 03 03 01 9F 01 00 01 9B 03 03 67 E1 9C 74 40 9F 66 89 93 C4 EB 61 DE FE CC C2 9A C2 BE 32 62 ... : ...........g..t@.f....a.......2b ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 1980435109-1980435528
hostname: p-ring.msedge.net
discovered l7 protocol
discovered hostname
desync profile search for tcp target=150.171.84.254:443 l7proto=tls hostname='p-ring.msedge.net'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for p-ring.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for p-ring.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for p-ring.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for p-ring.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
not applying tampering to this request
packet: id=63 pass unmodified
packet: id=64 len=40 mark=00000000
IP4: 150.171.84.254 => 100.99.136.233 proto=tcp ttl=52 sport=443 dport=51673 flags=A seq=1010960614 ack_seq=1980435529
using cached desync profile 2
packet: id=64 pass unmodified
packet: id=65 len=391 mark=00000000
IP4: 150.171.84.254 => 100.99.136.233 proto=tcp ttl=52 sport=443 dport=51673 flags=AP seq=1010960614 ack_seq=1980435529
TCP: len=351 : 16 03 03 00 48 02 00 00 44 03 03 2B 63 2D A2 A2 41 E7 BA 99 69 5D F2 4C 6F C4 F3 1F 68 13 DA 8F ... : ....H...D..+c-..A...i].Lo...h... ...
using cached desync profile 2
packet: id=65 pass unmodified
packet: id=66 len=40 mark=20000000
IP4: 100.99.136.233 => 150.171.84.254 proto=tcp ttl=126 sport=51673 dport=443 flags=A seq=1980435529 ack_seq=1010960965
using cached desync profile 2
packet: id=66 pass unmodified
packet: id=67 len=91 mark=20000000
IP4: 100.99.136.233 => 150.171.84.254 proto=tcp ttl=126 sport=51673 dport=443 flags=AP seq=1980435529 ack_seq=1010960965
TCP: len=51 : 14 03 03 00 01 01 16 03 03 00 28 00 00 00 00 00 00 00 00 85 69 D1 9A 00 4D 1D B2 0E FC 17 71 FD ... : ..........(.........i...M.....q. ...
using cached desync profile 2
req retrans : tcp seq 1980435529 not within the req range 1980435109-1980435528. stop tracking.
not applying tampering to unknown protocol
packet: id=67 pass unmodified
packet: id=68 len=569 mark=20000000
IP4: 100.99.136.233 => 150.171.84.254 proto=tcp ttl=126 sport=51673 dport=443 flags=AP seq=1980435580 ack_seq=1010960965
TCP: len=529 : 17 03 03 02 0C 00 00 00 00 00 00 00 01 2E 1A 0D 43 51 79 72 49 92 D7 25 7C C8 57 1F C1 A4 0C C3 ... : ................CQyrI..%|.W..... ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=68 pass unmodified
packet: id=69 len=40 mark=20000000
IP4: 100.99.136.233 => 150.171.84.254 proto=tcp ttl=126 sport=51673 dport=443 flags=A seq=1980436109 ack_seq=1010961356
using cached desync profile 2
packet: id=69 pass unmodified
packet: id=70 len=569 mark=20000000
IP4: 100.99.136.233 => 150.171.84.254 proto=tcp ttl=126 sport=51673 dport=443 flags=AP seq=1980436109 ack_seq=1010961356
TCP: len=529 : 17 03 03 02 0C 00 00 00 00 00 00 00 02 0F 08 34 17 95 E8 EE A1 0E 1C 8D 8E 7E 19 D7 61 25 AE B1 ... : ...............4.........~..a%.. ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=70 pass unmodified
packet: id=71 len=40 mark=20000000
IP4: 100.99.136.233 => 150.171.84.254 proto=tcp ttl=126 sport=51673 dport=443 flags=A seq=1980436638 ack_seq=1010961747
using cached desync profile 2
packet: id=71 pass unmodified
packet: id=72 len=52 mark=20000000
IP4: 100.99.136.233 => 204.79.197.222 proto=tcp ttl=126 sport=51674 dport=443 flags=S seq=433001659 ack_seq=0
desync profile search for tcp target=204.79.197.222:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=72 pass unmodified
packet: id=73 len=52 mark=00000000
IP4: 204.79.197.222 => 100.99.136.233 proto=tcp ttl=116 sport=443 dport=51674 flags=SA seq=3871102256 ack_seq=433001660
using cached desync profile 2
incoming TTL 116
packet: id=73 pass unmodified
packet: id=74 len=40 mark=20000000
IP4: 100.99.136.233 => 204.79.197.222 proto=tcp ttl=126 sport=51674 dport=443 flags=A seq=433001660 ack_seq=3871102257
using cached desync profile 2
packet: id=74 pass unmodified
packet: id=75 len=556 mark=20000000
IP4: 100.99.136.233 => 204.79.197.222 proto=tcp ttl=126 sport=51674 dport=443 flags=AP seq=433001660 ack_seq=3871102257
TCP: len=516 : 16 03 03 01 FF 01 00 01 FB 03 03 67 E1 9C 74 EE F8 44 48 71 08 CE DC F6 76 27 0C 74 82 10 72 F7 ... : ...........g..t..DHq....v'.t..r. ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 433001660-433002175
hostname: fp.msedge.net
discovered l7 protocol
discovered hostname
desync profile search for tcp target=204.79.197.222:443 l7proto=tls hostname='fp.msedge.net'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for fp.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for fp.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for fp.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for fp.msedge.net : negative
hostlist check for msedge.net : negative
hostlist check for net : negative
not applying tampering to this request
packet: id=75 pass unmodified
packet: id=76 len=40 mark=00000000
IP4: 204.79.197.222 => 100.99.136.233 proto=tcp ttl=117 sport=443 dport=51674 flags=A seq=3871102257 ack_seq=433002176
using cached desync profile 2
packet: id=76 pass unmodified
packet: id=77 len=1500 mark=00000000
IP4: 204.79.197.222 => 100.99.136.233 proto=tcp ttl=117 sport=443 dport=51674 flags=A seq=3871102257 ack_seq=433002176
TCP: len=1460 : 16 03 03 18 83 02 00 00 62 03 03 67 E1 9C 74 7F FC D9 8B 3A A7 AB 14 7C 72 29 B8 3B A8 4B B2 00 ... : ........b..g..t...:...|r).;.K.. ...
using cached desync profile 2
packet: id=77 pass unmodified
packet: id=78 len=1500 mark=00000000
IP4: 204.79.197.222 => 100.99.136.233 proto=tcp ttl=117 sport=443 dport=51674 flags=A seq=3871103717 ack_seq=433002176
TCP: len=1460 : 82 0C 62 2D 6D 73 65 64 67 65 2E 6E 65 74 82 0E 2A 2E 62 2D 6D 73 65 64 67 65 2E 6E 65 74 82 0C ... : ..b-msedge.net..*.b-msedge.net.. ...
using cached desync profile 2
packet: id=78 pass unmodified
packet: id=79 len=1500 mark=00000000
IP4: 204.79.197.222 => 100.99.136.233 proto=tcp ttl=117 sport=443 dport=51674 flags=A seq=3871105177 ack_seq=433002176
TCP: len=1460 : DD DC 71 AD F2 1F 2C 95 C7 56 3A D3 E6 9F 63 A0 C0 A3 FD 8B B3 5B B3 01 F6 C3 7C CC C0 55 62 5A ... : ..q...,..V:...c......[....|..UbZ ...
using cached desync profile 2
packet: id=79 pass unmodified
packet: id=80 len=1500 mark=00000000
IP4: 204.79.197.222 => 100.99.136.233 proto=tcp ttl=117 sport=443 dport=51674 flags=A seq=3871106637 ack_seq=433002176
TCP: len=1460 : B0 0A B6 99 76 0D 93 01 8D 6F 25 52 2D 07 BB F2 5C FF 73 59 6B FB 5A 05 E0 56 80 55 F6 52 BC 4D ... : ....v....o%R-...\.sYk.Z..V.U.R.M ...
using cached desync profile 2
packet: id=80 pass unmodified
packet: id=81 len=480 mark=00000000
IP4: 204.79.197.222 => 100.99.136.233 proto=tcp ttl=117 sport=443 dport=51674 flags=AP seq=3871108097 ack_seq=433002176
TCP: len=440 : 5E E5 61 39 C6 48 A4 A4 57 24 2F FD F5 70 52 B7 DB 92 7A 14 81 A7 28 D2 63 76 A7 4F A6 2A 70 E6 ... : ^.a9.H..W$/..pR...z...(.cv.O.*p. ...
using cached desync profile 2
packet: id=81 pass unmodified
packet: id=82 len=40 mark=20000000
IP4: 100.99.136.233 => 204.79.197.222 proto=tcp ttl=126 sport=51674 dport=443 flags=A seq=433002176 ack_seq=3871103717
using cached desync profile 2
packet: id=82 pass unmodified
packet: id=83 len=40 mark=20000000
IP4: 100.99.136.233 => 204.79.197.222 proto=tcp ttl=126 sport=51674 dport=443 flags=A seq=433002176 ack_seq=3871105177
using cached desync profile 2
packet: id=83 pass unmodified
packet: id=84 len=40 mark=20000000
IP4: 100.99.136.233 => 204.79.197.222 proto=tcp ttl=126 sport=51674 dport=443 flags=A seq=433002176 ack_seq=3871106637
using cached desync profile 2
packet: id=84 pass unmodified
packet: id=85 len=40 mark=20000000
IP4: 100.99.136.233 => 204.79.197.222 proto=tcp ttl=126 sport=51674 dport=443 flags=A seq=433002176 ack_seq=3871108097
using cached desync profile 2
packet: id=85 pass unmodified
packet: id=86 len=40 mark=20000000
IP4: 100.99.136.233 => 204.79.197.222 proto=tcp ttl=126 sport=51674 dport=443 flags=A seq=433002176 ack_seq=3871108537
using cached desync profile 2
packet: id=86 pass unmodified
packet: id=87 len=198 mark=20000000
IP4: 100.99.136.233 => 204.79.197.222 proto=tcp ttl=126 sport=51674 dport=443 flags=AP seq=433002176 ack_seq=3871108537
TCP: len=158 : 16 03 03 00 66 10 00 00 62 61 04 2C 6D 2A 03 52 95 92 BC E9 BE D2 C6 32 9C 1E B5 C3 B1 D4 7E FF ... : ....f...ba.,m*.R.......2......~. ...
using cached desync profile 2
req retrans : tcp seq 433002176 not within the req range 433001660-433002175. stop tracking.
not applying tampering to unknown protocol
packet: id=87 pass unmodified
packet: id=88 len=52 mark=20000000
IP4: 100.99.136.233 => 2.18.29.120 proto=tcp ttl=126 sport=51675 dport=443 flags=S seq=728223132 ack_seq=0
desync profile search for tcp target=2.18.29.120:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=88 pass unmodified
packet: id=89 len=52 mark=00000000
IP4: 2.18.29.120 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=51675 flags=SA seq=572694 ack_seq=728223133
using cached desync profile 2
incoming TTL 55
packet: id=89 pass unmodified
packet: id=90 len=247 mark=20000000
IP4: 100.99.136.233 => 2.18.29.120 proto=tcp ttl=126 sport=51675 dport=443 flags=AP seq=728223133 ack_seq=572695
TCP: len=207 : 16 03 03 00 CA 01 00 00 C6 03 03 67 E1 9C 75 2C 89 6E D0 20 7B F5 A6 13 79 8D 22 52 61 FB 61 B8 ... : ...........g..u,.n. {...y."Ra.a. ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 728223133-728223339
hostname: www.bing.com
discovered l7 protocol
discovered hostname
desync profile search for tcp target=2.18.29.120:443 l7proto=tls hostname='www.bing.com'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for www.bing.com : negative
hostlist check for bing.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for www.bing.com : negative
hostlist check for bing.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for www.bing.com : negative
hostlist check for bing.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for www.bing.com : negative
hostlist check for bing.com : negative
hostlist check for com : negative
not applying tampering to this request
packet: id=90 pass unmodified
packet: id=91 len=40 mark=20000000
IP4: 100.99.136.233 => 2.18.29.120 proto=tcp ttl=126 sport=51675 dport=443 flags=A seq=728223133 ack_seq=572695
using cached desync profile 2
packet: id=91 pass unmodified
packet: id=92 len=1500 mark=00000000
IP4: 2.18.29.120 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=51675 flags=A seq=572695 ack_seq=728223340
TCP: len=1460 : 16 03 03 00 4E 02 00 00 4A 03 03 7B 68 8F 41 2E 91 2E 9C B5 2C FF A0 87 02 D5 C1 6D 73 D1 DA 9B ... : ....N...J..{h.A.....,......ms... ...
using cached desync profile 2
packet: id=92 pass unmodified
packet: id=93 len=1500 mark=00000000
IP4: 2.18.29.120 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=51675 flags=AP seq=574155 ack_seq=728223340
TCP: len=1460 : 77 77 2E 6D 69 63 72 6F 73 6F 66 74 2E 63 6F 6D 2F 70 6B 69 6F 70 73 2F 63 72 6C 2F 4D 69 63 72 ... : ww.microsoft.com/pkiops/crl/Micr ...
using cached desync profile 2
packet: id=93 pass unmodified
packet: id=94 len=1039 mark=00000000
IP4: 2.18.29.120 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=51675 flags=AP seq=575615 ack_seq=728223340
TCP: len=999 : 82 37 15 04 04 0F 17 0D 32 35 30 33 32 31 31 34 32 33 30 38 5A 30 0A 06 08 2A 86 48 CE 3D 04 03 ... : .7......250321142308Z0...*.H.=.. ...
using cached desync profile 2
packet: id=94 pass unmodified
packet: id=95 len=40 mark=20000000
IP4: 100.99.136.233 => 2.18.29.120 proto=tcp ttl=126 sport=51675 dport=443 flags=A seq=728223340 ack_seq=574155
using cached desync profile 2
packet: id=95 pass unmodified
packet: id=96 len=52 mark=20000000
IP4: 100.99.136.233 => 2.18.29.120 proto=tcp ttl=126 sport=51675 dport=443 flags=A seq=728223340 ack_seq=574155
using cached desync profile 2
packet: id=96 pass unmodified
packet: id=97 len=40 mark=20000000
IP4: 100.99.136.233 => 2.18.29.120 proto=tcp ttl=126 sport=51675 dport=443 flags=A seq=728223340 ack_seq=576614
using cached desync profile 2
packet: id=97 pass unmodified
packet: id=98 len=166 mark=20000000
IP4: 100.99.136.233 => 2.18.29.120 proto=tcp ttl=126 sport=51675 dport=443 flags=AP seq=728223340 ack_seq=576614
TCP: len=126 : 16 03 03 00 46 10 00 00 42 41 04 E5 68 A0 4D EA 5E 92 B1 38 9F 70 11 90 8B C2 C9 9C AA 2E 23 7A ... : ....F...BA..h.M.^..8.p........#z ...
using cached desync profile 2
req retrans : tcp seq 728223340 not within the req range 728223133-728223339. stop tracking.
not applying tampering to unknown protocol
packet: id=98 pass unmodified
packet: id=99 len=40 mark=20000000
IP4: 100.99.136.233 => 2.18.29.120 proto=tcp ttl=126 sport=51675 dport=443 flags=A seq=728223466 ack_seq=576872
using cached desync profile 2
packet: id=99 pass unmodified
packet: id=100 len=127 mark=20000000
IP4: 100.99.136.233 => 2.18.29.120 proto=tcp ttl=126 sport=51675 dport=443 flags=AP seq=728223466 ack_seq=576872
TCP: len=87 : 17 03 03 00 52 00 00 00 00 00 00 00 01 EA CE 55 DE 84 9F AE 14 50 AB 23 DA 5A 87 3D 6D 9F 88 28 ... : ....R..........U.....P.#.Z.=m..( ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=100 pass unmodified
packet: id=101 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51659 dport=443 flags=AP seq=2889202595 ack_seq=1472298295
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 ... : ...........g..qi..mk.....4.$.."% ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51659 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 E3 EE 10 B6 CC 82 AF BB EF F6 31 CF 8B E7 E7 11 FA 12 DE 61 85 ... : ....................1........a. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 A3 ... : ..........g..qi..mk.....4.$.."%. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=101 drop
packet: id=102 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51659 dport=443 flags=AP seq=2889202595 ack_seq=1472298295
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 ... : ...........g..qi..mk.....4.$.."% ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51659 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 1F 92 3C DA D1 6A 1A A5 1A 3C 57 00 91 F3 C9 C4 9B 78 B3 34 95 ... : ............<..j...<W......x.4. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 71 69 B7 BF 6D 6B FF C8 E2 1C A3 34 CF 24 D9 8D 22 25 A3 ... : ..........g..qi..mk.....4.$.."%. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=102 drop
packet: id=103 len=52 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51741 dport=443 flags=S seq=2727183569 ack_seq=0
desync profile search for tcp target=162.159.136.232:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=103 pass unmodified
packet: id=104 len=52 mark=00000000
IP4: 162.159.136.232 => 100.99.136.233 proto=tcp ttl=54 sport=443 dport=51741 flags=SA seq=2019261377 ack_seq=2727183570
using cached desync profile 2
incoming TTL 54
packet: id=104 pass unmodified
packet: id=105 len=40 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51741 dport=443 flags=A seq=2727183570 ack_seq=2019261378
using cached desync profile 2
packet: id=105 pass unmodified
packet: id=106 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51741 dport=443 flags=AP seq=2727183570 ack_seq=2019261378
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 ... : ...........g....`......N..-....H ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 2727183570-2727183760
hostname: updates.discord.com
discovered l7 protocol
discovered hostname
desync profile search for tcp target=162.159.136.232:443 l7proto=tls hostname='updates.discord.com'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51741 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 D0 DA 44 E1 EF B0 6B 53 F7 15 84 5E EF AF E7 A3 ED 2A 8E D6 F5 ... : ............D...kS...^.....*... ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 92 ... : ..........g....`......N..-....H. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=106 drop
packet: id=107 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51741 dport=443 flags=AP seq=2727183570 ack_seq=2019261378
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 ... : ...........g....`......N..-....H ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51741 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 46 30 14 B5 64 A0 33 5B A2 8B 59 06 E4 11 3B 47 CA BE 6D 83 D3 ... : ..........F0..d.3[..Y...;G..m.. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 92 ... : ..........g....`......N..-....H. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=107 drop
packet: id=108 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51741 dport=443 flags=AP seq=2727183570 ack_seq=2019261378
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 ... : ...........g....`......N..-....H ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51741 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 64 36 9E 2A 11 95 2E F5 0C AE E4 FB 42 75 6C 56 6C 2E 61 6B 49 ... : ..........d6.*........BulVl.akI ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 92 ... : ..........g....`......N..-....H. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=108 drop
packet: id=109 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51741 dport=443 flags=AP seq=2727183570 ack_seq=2019261378
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 ... : ...........g....`......N..-....H ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51741 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 FE 79 D4 EE 88 5E 6A A8 35 5A D1 75 31 B8 7E 48 EF 1C F7 2D 20 ... : ...........y...^j.5Z.u1.~H...-  ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 92 ... : ..........g....`......N..-....H. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=109 drop
packet: id=110 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51741 dport=443 flags=AP seq=2727183570 ack_seq=2019261378
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 ... : ...........g....`......N..-....H ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51741 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 35 E0 D1 FB 58 F0 24 FD C8 29 78 A6 94 68 30 68 7B 20 28 CF 87 ... : ..........5...X.$..)x..h0h{ (.. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 92 ... : ..........g....`......N..-....H. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=110 drop
packet: id=111 len=60 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39720 dport=443 flags=S seq=230735500 ack_seq=0
desync profile search for tcp target=76.76.2.22:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=111 pass unmodified
packet: id=112 len=60 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=39720 flags=SA seq=1519334709 ack_seq=230735501
using cached desync profile 2
incoming TTL 55
packet: id=112 pass unmodified
packet: id=113 len=52 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39720 dport=443 flags=A seq=230735501 ack_seq=1519334710
using cached desync profile 2
packet: id=113 pass unmodified
packet: id=114 len=488 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39720 dport=443 flags=AP seq=230735501 ack_seq=1519334710
TCP: len=436 : 16 03 01 01 AF 01 00 01 AB 03 03 15 FE 76 3F 50 44 3C C2 0A F7 B3 BB 5C 21 5D C6 10 03 3E 3D 0D ... : .............v?PD<.....\!]...>=. ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 230735501-230735936
hostname: dns.controld.com
discovered l7 protocol
discovered hostname
desync profile search for tcp target=76.76.2.22:443 l7proto=tls hostname='dns.controld.com'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
not applying tampering to this request
packet: id=114 pass unmodified
packet: id=115 len=60 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39730 dport=443 flags=S seq=4213791336 ack_seq=0
desync profile search for tcp target=76.76.2.22:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=115 pass unmodified
packet: id=116 len=52 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=39720 flags=A seq=1519334710 ack_seq=230735937
using cached desync profile 2
packet: id=116 pass unmodified
packet: id=117 len=60 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=39730 flags=SA seq=2400986981 ack_seq=4213791337
using cached desync profile 2
incoming TTL 55
packet: id=117 pass unmodified
packet: id=118 len=52 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39730 dport=443 flags=A seq=4213791337 ack_seq=2400986982
using cached desync profile 2
packet: id=118 pass unmodified
packet: id=119 len=488 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39730 dport=443 flags=AP seq=4213791337 ack_seq=2400986982
TCP: len=436 : 16 03 01 01 AF 01 00 01 AB 03 03 1E AB F6 96 1F F1 03 9F 3B C4 15 F4 8A 86 80 FD 76 2F 55 63 29 ... : ...................;.......v/Uc) ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 4213791337-4213791772
hostname: dns.controld.com
discovered l7 protocol
discovered hostname
desync profile search for tcp target=76.76.2.22:443 l7proto=tls hostname='dns.controld.com'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for dns.controld.com : negative
hostlist check for controld.com : negative
hostlist check for com : negative
not applying tampering to this request
packet: id=119 pass unmodified
packet: id=120 len=430 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=39720 flags=AP seq=1519334710 ack_seq=230735937
TCP: len=378 : 16 03 03 00 80 02 00 00 7C 03 03 07 42 33 1B 65 7B B5 F6 4E 00 6E D6 B0 BA FF 84 84 4A D8 C7 02 ... : ........|...B3.e{..N.n......J... ...
using cached desync profile 2
packet: id=120 pass unmodified
packet: id=121 len=52 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39720 dport=443 flags=A seq=230735937 ack_seq=1519335088
using cached desync profile 2
packet: id=121 pass unmodified
packet: id=122 len=116 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39720 dport=443 flags=AP seq=230735937 ack_seq=1519335088
TCP: len=64 : 14 03 03 00 01 01 17 03 03 00 35 1A 0A B3 A3 8F 5E B7 16 E7 17 6B 5A F4 EB AE EB 9B C2 AC 97 46 ... : ..........5.....^....kZ........F ...
using cached desync profile 2
req retrans : tcp seq 230735937 not within the req range 230735501-230735936. stop tracking.
not applying tampering to unknown protocol
packet: id=122 pass unmodified
packet: id=123 len=144 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39720 dport=443 flags=AP seq=230736001 ack_seq=1519335088
TCP: len=92 : 17 03 03 00 57 4B CA 38 16 22 C1 49 C9 7D C4 81 1E 79 A4 84 C1 39 77 21 5A 37 DA B5 A2 12 71 8F ... : ....WK.8.".I.}...y...9w!Z7....q. ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=123 pass unmodified
packet: id=124 len=434 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39720 dport=443 flags=AP seq=230736093 ack_seq=1519335088
TCP: len=382 : 17 03 03 00 F7 AD 58 39 1F 21 B4 F8 BB 38 51 9C 1C C6 6F EC 06 FB FF CD E1 69 5F 98 5C D3 C1 CF ... : ......X9.!...8Q...o......i_.\... ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=124 pass unmodified
packet: id=125 len=52 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=39730 flags=A seq=2400986982 ack_seq=4213791773
using cached desync profile 2
packet: id=125 pass unmodified
packet: id=126 len=430 mark=00000000
IP4: 76.76.2.22 => 100.99.136.233 proto=tcp ttl=55 sport=443 dport=39730 flags=AP seq=2400986982 ack_seq=4213791773
TCP: len=378 : 16 03 03 00 80 02 00 00 7C 03 03 F5 46 3B B8 FF A0 62 A9 F2 7C DC FD 31 FA B1 1C 20 4C E0 1F 60 ... : ........|...F;...b..|..1... L..` ...
using cached desync profile 2
packet: id=126 pass unmodified
packet: id=127 len=83 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39720 dport=443 flags=AP seq=230736475 ack_seq=1519335149
TCP: len=31 : 17 03 03 00 1A B0 A3 99 7D D2 95 7C BC 44 D3 79 D5 0C 55 01 2D 76 F7 8E 19 DF 25 B4 CF 50 67 : ........}..|.D.y..U.-v....%..Pg
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=127 pass unmodified
packet: id=128 len=52 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39730 dport=443 flags=A seq=4213791773 ack_seq=2400987360
using cached desync profile 2
packet: id=128 pass unmodified
packet: id=129 len=116 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39730 dport=443 flags=AP seq=4213791773 ack_seq=2400987360
TCP: len=64 : 14 03 03 00 01 01 17 03 03 00 35 82 37 66 45 FF 41 22 BE 19 EF C9 2B 0E D3 74 E7 53 66 67 6A B9 ... : ..........5.7fE.A"....+..t.Sfgj. ...
using cached desync profile 2
req retrans : tcp seq 4213791773 not within the req range 4213791337-4213791772. stop tracking.
not applying tampering to unknown protocol
packet: id=129 pass unmodified
packet: id=130 len=76 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39730 dport=443 flags=AFP seq=4213791837 ack_seq=2400987360
TCP: len=24 : 17 03 03 00 13 28 39 C9 59 65 99 4A 53 A1 98 4C 77 08 16 4E CA 09 5B 20 : .....(9.Ye.JS..Lw..N..[ 
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=130 pass unmodified
packet: id=131 len=52 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39720 dport=443 flags=A seq=230736506 ack_seq=1519335215
using cached desync profile 2
packet: id=131 pass unmodified
packet: id=132 len=40 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39730 dport=443 flags=R seq=4213791862 ack_seq=0
using cached desync profile 2
packet: id=132 pass unmodified
packet: id=133 len=40 mark=20000000
IP4: 100.99.136.233 => 76.76.2.22 proto=tcp ttl=64 sport=39730 dport=443 flags=R seq=4213791862 ack_seq=0
using cached desync profile 2
packet: id=133 pass unmodified
packet: id=134 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51741 dport=443 flags=AP seq=2727183570 ack_seq=2019261378
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 ... : ...........g....`......N..-....H ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51741 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 18 08 EB B9 47 70 93 28 14 89 CE E2 F1 8E 20 4D DD B8 31 14 05 ... : ..............Gp.(...... M..1.. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 92 ... : ..........g....`......N..-....H. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=134 drop
packet: id=135 len=1278 mark=20000000
IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=126 sport=57900 dport=443
UDP: len=1250 : C8 00 00 00 01 08 CE 33 10 63 3F C1 93 5F 00 40 46 00 05 57 FD 2B DF 0D C3 6A BA FF E8 16 2F 0E ... : .......3.c?.._.@F..W.+...j..../. ...
desync profile search for udp target=35.186.224.26:443 l7proto=unknown hostname=''
desync profile 0 matches
packet contains QUIC initial
packet contains partial TLS ClientHello
starting reassemble. now we have 1144/16384
DELAY desync until reasm is complete (#1)
applying linux postnat conntrack workaround
packet: id=135 pass modified. len=28
packet: id=136 len=1278 mark=20000000
IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=126 sport=57900 dport=443
UDP: len=1250 : CC 00 00 00 01 08 CE 33 10 63 3F C1 93 5F 00 40 46 00 05 57 FD 2B DF 0D C3 6A BA FF E8 16 2F 0E ... : .......3.c?.._.@F..W.+...j..../. ...
using cached desync profile 0
packet contains QUIC initial
reassemble : feeding data payload size=1144. now we have 2288/16384
packet contains full TLS ClientHello
DELAY desync until reasm is complete (#2)
REPLAYING delayed packet #1 offset 0
REPLAY IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=126 sport=57900 dport=443
UDP: len=1250 : C8 00 00 00 01 08 CE 33 10 63 3F C1 93 5F 00 40 46 00 05 57 FD 2B DF 0D C3 6A BA FF E8 16 2F 0E ... : .......3.c?.._.@F..W.+...j..../. ...
using cached desync profile 0
packet contains QUIC initial
packet contains full TLS ClientHello
hostname: gew1-spclient.spotify.com
discovered l7 protocol
discovered hostname
desync profile search for udp target=35.186.224.26:443 l7proto=quic hostname='gew1-spclient.spotify.com'
* hostlist check for profile 3
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for gew1-spclient.spotify.com : negative
hostlist check for spotify.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for gew1-spclient.spotify.com : negative
hostlist check for spotify.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for gew1-spclient.spotify.com : negative
hostlist check for spotify.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for gew1-spclient.spotify.com : negative
hostlist check for spotify.com : negative
hostlist check for com : negative
desync profile 0 matches
dpi desync src=100.99.136.233:57900 dst=35.186.224.26:443
SENDING delayed packet #1 unmodified
REPLAYING delayed packet #2 offset 1250
REPLAY IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=126 sport=57900 dport=443
UDP: len=1250 : CC 00 00 00 01 08 CE 33 10 63 3F C1 93 5F 00 40 46 00 05 57 FD 2B DF 0D C3 6A BA FF E8 16 2F 0E ... : .......3.c?.._.@F..W.+...j..../. ...
SENDING delayed packet #2 unmodified
reassemble session finished
packet: id=136 drop
packet: id=137 len=190 mark=20000000
IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=126 sport=57900 dport=443
UDP: len=162 : E2 00 00 00 01 08 EE 33 10 63 3F C1 93 5F 00 40 47 A9 FF 45 D2 E8 20 81 CB AF 3A 19 30 A4 9E 43 ... : .......3.c?.._.@G..E.. ...:.0..C ...
using cached desync profile 0
not applying tampering to unknown protocol
packet: id=137 pass unmodified
packet: id=138 len=1274 mark=20000000
IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=126 sport=57900 dport=443
UDP: len=1246 : 59 EE 33 10 63 3F C1 93 5F 2A 18 67 F1 A5 77 99 13 34 C2 89 E5 04 C1 87 AD 42 4A 70 C8 56 FD 03 ... : Y.3.c?.._*.g..w..4.......BJp.V.. ...
using cached desync profile 0
not applying tampering to unknown protocol
packet: id=138 pass unmodified
packet: id=139 len=1278 mark=20000000
IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=126 sport=57900 dport=443
UDP: len=1250 : 46 EE 33 10 63 3F C1 93 5F 79 D0 29 F6 50 A7 14 C6 E7 98 7E 83 3D 4E D9 02 98 5D D1 AF 73 12 65 ... : F.3.c?.._y.).P.....~.=N...]..s.e ...
using cached desync profile 0
not applying tampering to unknown protocol
packet: id=139 pass unmodified
packet: id=140 len=157 mark=20000000
IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=127 sport=57900 dport=443
UDP: len=129 : 4B EE 33 10 63 3F C1 93 5F 04 8D B5 F8 7A 7F 1F 10 3F 39 AA F2 8C 45 C8 57 99 01 6E C3 D1 8D 6B ... : K.3.c?.._....z..?9...E.W..n...k ...
using cached desync profile 0
not applying tampering to unknown protocol
packet: id=140 pass unmodified
packet: id=141 len=59 mark=20000000
IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=126 sport=57900 dport=443
UDP: len=31 : 5B EE 33 10 63 3F C1 93 5F A4 F0 B3 15 2E 79 FA EF 42 6C FD AA 9B 5B 3C 78 3E 4D 46 A7 E9 CD : [.3.c?.._.....y..Bl...[<x>MF...
using cached desync profile 0
not applying tampering to unknown protocol
packet: id=141 pass unmodified
packet: id=142 len=60 mark=20000000
IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=126 sport=57900 dport=443
UDP: len=32 : 4C EE 33 10 63 3F C1 93 5F 9E 0F 12 28 14 C4 3F E2 95 9E 7E C4 5B 6A FE 40 FE 00 7E 99 EF E5 6D : L.3.c?.._...(..?...~.[j.@..~...m
using cached desync profile 0
not applying tampering to unknown protocol
packet: id=142 pass unmodified
packet: id=143 len=64 mark=20000000
IP4: 100.99.136.233 => 35.186.224.26 proto=udp ttl=126 sport=57900 dport=443
UDP: len=36 : 54 EE 33 10 63 3F C1 93 5F 9E 78 3E 3A F3 7F 6A BC 42 67 FF 11 8E A5 DE FC C9 98 9B B0 FE 15 C5 ... : T.3.c?.._.x>:.j.Bg............. ...
using cached desync profile 0
not applying tampering to unknown protocol
packet: id=143 pass unmodified
packet: id=144 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51741 dport=443 flags=AP seq=2727183570 ack_seq=2019261378
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 ... : ...........g....`......N..-....H ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51741 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 77 F4 7C 50 27 B4 55 AD AD 64 2C D8 80 B6 32 B8 EF 33 A8 B9 28 ... : ..........w.|P'.U..d,...2..3..( ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 86 06 60 F1 8F 19 DB DF A1 4E 80 D7 2D A1 A6 02 BB 48 92 ... : ..........g....`......N..-....H. ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=144 drop
packet: id=145 len=52 mark=20000000
IP4: 100.99.136.233 => 185.136.68.153 proto=tcp ttl=126 sport=51799 dport=443 flags=S seq=645711011 ack_seq=0
desync profile search for tcp target=185.136.68.153:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=145 pass unmodified
packet: id=146 len=48 mark=00000000
IP4: 185.136.68.153 => 100.99.136.233 proto=tcp ttl=115 sport=443 dport=51799 flags=SA seq=389185862 ack_seq=645711012
using cached desync profile 2
incoming TTL 115
packet: id=146 pass unmodified
packet: id=147 len=40 mark=20000000
IP4: 100.99.136.233 => 185.136.68.153 proto=tcp ttl=126 sport=51799 dport=443 flags=A seq=645711012 ack_seq=389185863
using cached desync profile 2
packet: id=147 pass unmodified
packet: id=148 len=256 mark=20000000
IP4: 100.99.136.233 => 185.136.68.153 proto=tcp ttl=126 sport=51799 dport=443 flags=AP seq=645711012 ack_seq=389185863
TCP: len=216 : 16 03 03 00 D3 01 00 00 CF 03 03 67 E1 9C 97 33 30 CA E1 66 9F 34 5D 35 9F E8 D4 F4 74 00 43 AA ... : ...........g...30..f.4]5....t.C. ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 645711012-645711227
hostname: events.gfe.nvidia.com
discovered l7 protocol
discovered hostname
desync profile search for tcp target=185.136.68.153:443 l7proto=tls hostname='events.gfe.nvidia.com'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for events.gfe.nvidia.com : negative
hostlist check for gfe.nvidia.com : negative
hostlist check for nvidia.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for events.gfe.nvidia.com : positive
dpi desync src=100.99.136.233:51799 dst=185.136.68.153:443
multisplit pos: 1 121 
normalized multisplit pos: 1 121 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 8F 0B E4 5F 27 E7 7E 3F 8D 19 4F D5 2B EC 1B D4 17 FD 61 8D 29 ... : ............._'.~?..O.+.....a.) ...
sending multisplit part 3 121-215 len=95 seqovl=0 : 64 69 61 2E 63 6F 6D 00 05 00 05 01 00 00 00 00 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 ... : dia.com......................... ...
sending multisplit part 2 1-120 len=120 seqovl=0 : 03 03 00 D3 01 00 00 CF 03 03 67 E1 9C 97 33 30 CA E1 66 9F 34 5D 35 9F E8 D4 F4 74 00 43 AA 2D ... : ..........g...30..f.4]5....t.C.- ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=148 drop
packet: id=149 len=40 mark=00000000
IP4: 185.136.68.153 => 100.99.136.233 proto=tcp ttl=241 sport=443 dport=51799 flags=A seq=389185863 ack_seq=645711012
using cached desync profile 2
packet: id=149 pass unmodified
packet: id=150 len=52 mark=00000000
IP4: 185.136.68.153 => 100.99.136.233 proto=tcp ttl=241 sport=443 dport=51799 flags=A seq=389185863 ack_seq=645711012
using cached desync profile 2
packet: id=150 pass unmodified
packet: id=151 len=40 mark=20000000
IP4: 100.99.136.233 => 185.136.68.153 proto=tcp ttl=126 sport=51799 dport=443 flags=A seq=645711228 ack_seq=389189528
using cached desync profile 2
packet: id=151 pass unmodified
packet: id=152 len=166 mark=20000000
IP4: 100.99.136.233 => 185.136.68.153 proto=tcp ttl=126 sport=51799 dport=443 flags=AP seq=645711228 ack_seq=389189528
TCP: len=126 : 16 03 03 00 46 10 00 00 42 41 04 F2 CA E8 82 FA 86 C7 08 84 66 73 C4 95 14 99 20 11 BB 95 87 18 ... : ....F...BA..........fs.... ..... ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=152 pass unmodified
packet: id=153 len=361 mark=20000000
IP4: 100.99.136.233 => 185.136.68.153 proto=tcp ttl=126 sport=51799 dport=443 flags=AP seq=645711354 ack_seq=389189579
TCP: len=321 : 17 03 03 01 3C 00 00 00 00 00 00 00 01 03 DC AA C9 98 05 1E 57 7E C7 7C 3B 23 EA 6A 39 53 BC 35 ... : ....<...............W~.|;#.j9S.5 ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=153 pass unmodified
packet: id=154 len=1397 mark=20000000
IP4: 100.99.136.233 => 185.136.68.153 proto=tcp ttl=126 sport=51799 dport=443 flags=AP seq=645711675 ack_seq=389189579
TCP: len=1357 : 17 03 03 05 48 00 00 00 00 00 00 00 02 5E 98 F2 99 18 33 64 1A F7 DC 50 5B E2 25 F9 09 54 6E F3 ... : ....H........^....3d...P[.%..Tn. ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=154 pass unmodified
packet: id=155 len=52 mark=20000000
IP4: 100.99.136.233 => 18.215.99.196 proto=tcp ttl=126 sport=51811 dport=443 flags=S seq=1887339616 ack_seq=0
desync profile search for tcp target=18.215.99.196:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=155 pass unmodified
packet: id=156 len=52 mark=00000000
IP4: 18.215.99.196 => 100.99.136.233 proto=tcp ttl=238 sport=443 dport=51811 flags=SA seq=2523289568 ack_seq=1887339617
using cached desync profile 2
incoming TTL 238
packet: id=156 pass unmodified
packet: id=157 len=40 mark=20000000
IP4: 100.99.136.233 => 18.215.99.196 proto=tcp ttl=126 sport=51811 dport=443 flags=A seq=1887339617 ack_seq=2523289569
using cached desync profile 2
packet: id=157 pass unmodified
packet: id=158 len=262 mark=20000000
IP4: 100.99.136.233 => 18.215.99.196 proto=tcp ttl=126 sport=51811 dport=443 flags=AP seq=1887339617 ack_seq=2523289569
TCP: len=222 : 16 03 03 00 D9 01 00 00 D5 03 03 67 E1 9C 9B 8A F4 04 87 EE 2A 5A 2D 6B E5 FD 5A 1C 9D 86 76 C1 ... : ...........g........*Z-k..Z...v. ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 1887339617-1887339838
hostname: lightstep.kaizen.nvidia.com
discovered l7 protocol
discovered hostname
desync profile search for tcp target=18.215.99.196:443 l7proto=tls hostname='lightstep.kaizen.nvidia.com'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for lightstep.kaizen.nvidia.com : negative
hostlist check for kaizen.nvidia.com : negative
hostlist check for nvidia.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for lightstep.kaizen.nvidia.com : negative
hostlist check for kaizen.nvidia.com : negative
hostlist check for nvidia.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts.txt.gz] include hostlist check for lightstep.kaizen.nvidia.com : negative
hostlist check for kaizen.nvidia.com : negative
hostlist check for nvidia.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-user.txt] include hostlist check for lightstep.kaizen.nvidia.com : negative
hostlist check for kaizen.nvidia.com : negative
hostlist check for nvidia.com : negative
hostlist check for com : negative
not applying tampering to this request
packet: id=158 pass unmodified
packet: id=159 len=40 mark=00000000
IP4: 18.215.99.196 => 100.99.136.233 proto=tcp ttl=238 sport=443 dport=51811 flags=A seq=2523289569 ack_seq=1887339839
using cached desync profile 2
packet: id=159 pass unmodified
packet: id=160 len=1500 mark=00000000
IP4: 18.215.99.196 => 100.99.136.233 proto=tcp ttl=238 sport=443 dport=51811 flags=A seq=2523289569 ack_seq=1887339839
TCP: len=1460 : 16 03 03 00 6C 02 00 00 68 03 03 E4 DA 03 1B D4 7A 18 D0 C5 60 EC E0 5D B2 ED 5C 44 D8 5D FA 90 ... : ....l...h.......z...`..]..\D.].. ...
using cached desync profile 2
packet: id=160 pass unmodified
packet: id=161 len=1500 mark=00000000
IP4: 18.215.99.196 => 100.99.136.233 proto=tcp ttl=238 sport=443 dport=51811 flags=A seq=2523291029 ack_seq=1887339839
TCP: len=1460 : E3 E2 62 90 E9 28 11 BC 25 AF E9 BF F3 2B 58 F3 B2 45 D1 21 A5 2D 6A 4E A0 7C FE A0 D2 F8 BE B6 ... : ..b..(..%....+X..E.!.-jN.|...... ...
using cached desync profile 2
packet: id=161 pass unmodified
packet: id=162 len=52 mark=20000000
IP4: 100.99.136.233 => 18.215.99.196 proto=tcp ttl=126 sport=51811 dport=443 flags=A seq=1887339839 ack_seq=2523289569
using cached desync profile 2
packet: id=162 pass unmodified
packet: id=163 len=40 mark=20000000
IP4: 100.99.136.233 => 18.215.99.196 proto=tcp ttl=126 sport=51811 dport=443 flags=A seq=1887339839 ack_seq=2523292489
using cached desync profile 2
packet: id=163 pass unmodified
packet: id=164 len=133 mark=20000000
IP4: 100.99.136.233 => 18.215.99.196 proto=tcp ttl=126 sport=51811 dport=443 flags=AP seq=1887339839 ack_seq=2523293808
TCP: len=93 : 16 03 03 00 25 10 00 00 21 20 43 3A 01 87 4E EB DA 07 B7 98 EA E3 27 FC 42 DD 63 DB 9E 9D FD 0E ... : ....%...! C:..N.......'.B.c..... ...
using cached desync profile 2
req retrans : tcp seq 1887339839 not within the req range 1887339617-1887339838. stop tracking.
not applying tampering to unknown protocol
packet: id=164 pass unmodified
packet: id=165 len=40 mark=20000000
IP4: 100.99.136.233 => 18.215.99.196 proto=tcp ttl=126 sport=51811 dport=443 flags=A seq=1887339932 ack_seq=2523294081
using cached desync profile 2
packet: id=165 pass unmodified
packet: id=166 len=127 mark=20000000
IP4: 100.99.136.233 => 18.215.99.196 proto=tcp ttl=126 sport=51811 dport=443 flags=AP seq=1887339932 ack_seq=2523294081
TCP: len=87 : 17 03 03 00 52 00 00 00 00 00 00 00 01 EF 5E DF 6A 77 7A CC 01 A1 B3 30 A0 49 AB E1 7A D8 B5 50 ... : ....R.........^.jwz....0.I..z..P ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=166 pass unmodified
packet: id=167 len=78 mark=20000000
IP4: 100.99.136.233 => 18.215.99.196 proto=tcp ttl=126 sport=51811 dport=443 flags=AP seq=1887340019 ack_seq=2523294081
TCP: len=38 : 17 03 03 00 21 00 00 00 00 00 00 00 02 80 14 E7 DD D5 89 6D BF 97 9E 15 9C EB D9 20 06 86 58 5A ... : ....!..............m....... ..XZ ...
using cached desync profile 2
not applying tampering to unknown protocol
packet: id=167 pass unmodified
packet: id=168 len=52 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51818 dport=443 flags=S seq=2069973464 ack_seq=0
desync profile search for tcp target=162.159.136.232:443 l7proto=unknown hostname=''
desync profile 2 matches
packet: id=168 pass unmodified
packet: id=169 len=52 mark=00000000
IP4: 162.159.136.232 => 100.99.136.233 proto=tcp ttl=54 sport=443 dport=51818 flags=SA seq=4155314558 ack_seq=2069973465
using cached desync profile 2
incoming TTL 54
packet: id=169 pass unmodified
packet: id=170 len=40 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51818 dport=443 flags=A seq=2069973465 ack_seq=4155314559
using cached desync profile 2
packet: id=170 pass unmodified
packet: id=171 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51818 dport=443 flags=AP seq=2069973465 ack_seq=4155314559
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 ... : ...........g.....~.?1.:.(..*.... ...
using cached desync profile 2
packet contains full TLS ClientHello
req retrans : seq interval 2069973465-2069973655
hostname: updates.discord.com
discovered l7 protocol
discovered hostname
desync profile search for tcp target=162.159.136.232:443 l7proto=tls hostname='updates.discord.com'
desync profile 2 matches
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51818 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 04 82 41 2F B4 FD 1C 7F A2 BC DE 96 79 7C 2F A9 92 73 19 35 28 ... : ............A/.......y|/..s.5( ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 6D ... : ..........g.....~.?1.:.(..*....m ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=171 drop
packet: id=172 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51818 dport=443 flags=AP seq=2069973465 ack_seq=4155314559
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 ... : ...........g.....~.?1.:.(..*.... ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51818 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 36 D5 B8 63 86 71 C9 48 D1 98 AE 95 4B AF 16 DB 1A 54 FF 42 77 ... : ..........6..c.q.H....K....T.Bw ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 6D ... : ..........g.....~.?1.:.(..*....m ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=172 drop
packet: id=173 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51818 dport=443 flags=AP seq=2069973465 ack_seq=4155314559
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 ... : ...........g.....~.?1.:.(..*.... ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51818 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 B2 A0 B4 31 B0 FC CC F4 B3 74 27 1D D8 59 CE 90 B3 8D 25 9C A8 ... : .............1.....t'..Y....%.. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 6D ... : ..........g.....~.?1.:.(..*....m ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=173 drop
packet: id=174 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51818 dport=443 flags=AP seq=2069973465 ack_seq=4155314559
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 ... : ...........g.....~.?1.:.(..*.... ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51818 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 AB 3E B9 AD A2 86 5E CC DE 49 4A D1 75 21 2C 9C 93 6B EF 44 0C ... : ...........>....^..IJ.u!,..k.D. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 6D ... : ..........g.....~.?1.:.(..*....m ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=174 drop
packet: id=175 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51818 dport=443 flags=AP seq=2069973465 ack_seq=4155314559
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 ... : ...........g.....~.?1.:.(..*.... ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51818 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 83 FB 7D 3B F2 09 16 67 6C 80 FE E7 F2 55 42 CE 99 DD 88 8D 11 ... : ............};...gl....UB...... ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 6D ... : ..........g.....~.?1.:.(..*....m ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=175 drop
packet: id=176 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51818 dport=443 flags=AP seq=2069973465 ack_seq=4155314559
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 ... : ...........g.....~.?1.:.(..*.... ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51818 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 29 C3 32 99 02 A5 C3 A0 BA 26 13 F0 58 C9 B9 05 55 4B 5B B7 8F ... : ..........).2......&..X...UK[.. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 6D ... : ..........g.....~.?1.:.(..*....m ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=176 drop
packet: id=177 len=231 mark=20000000
IP4: 100.99.136.233 => 162.159.136.232 proto=tcp ttl=126 sport=51818 dport=443 flags=AP seq=2069973465 ack_seq=4155314559
TCP: len=191 : 16 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 ... : ...........g.....~.?1.:.(..*.... ...
using cached desync profile 2
packet contains full TLS ClientHello
hostname: updates.discord.com
* hostlist check for profile 2
[/opt/zapret/ipset/zapret-hosts-user-exclude.txt] exclude hostlist check for updates.discord.com : negative
hostlist check for discord.com : negative
hostlist check for com : negative
[/opt/zapret/ipset/zapret-hosts-auto.txt] include hostlist check for updates.discord.com : positive
dpi desync src=100.99.136.233:51818 dst=162.159.136.232:443
multisplit pos: 1 122 
normalized multisplit pos: 1 122 
sending fake : 16 03 01 02 83 01 00 02 7F 03 03 1A A3 A1 D6 DD 77 6F EE FC 8D 6C 61 3A 72 02 FC 0B F2 1B 5B 2E ... : ...............wo...la:r.....[. ...
sending multisplit part 3 122-190 len=69 seqovl=0 : 63 6F 72 64 2E 63 6F 6D 00 0A 00 08 00 06 00 1D 00 17 00 18 00 0B 00 02 01 00 00 0D 00 1A 00 18 ... : cord.com........................ ...
sending multisplit part 2 1-121 len=121 seqovl=0 : 03 03 00 BA 01 00 00 B6 03 03 67 E1 9C 9D 81 F1 7E 11 3F 31 C7 3A F7 28 C1 8F 2A A9 FF 19 D7 6D ... : ..........g.....~.?1.:.(..*....m ...
sending multisplit part 1 0-0 len=1 seqovl=0 : 16 : .
packet: id=177 drop
Editor is loading...