tcpdump -n -i lo0 host 127.0.0.1 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on lo0, link-type NULL (BSD loopback), capture size 262144 bytes 12:45:38.286264 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [S], seq 217921756, win 65535, options [mss 16344,nop,wscale 6,sackOK,TS val 1989698682 ecr 0], length 0 12:45:38.286284 IP 127.0.0.1.80 > 127.0.0.1.36654: Flags [S.], seq 1557012138, ack 217921757, win 65535, options [mss 16344,nop,wscale 6,sackOK,TS val 4239743513 ecr 1989698682], length 0 12:45:38.286297 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [.], ack 1, win 1276, options [nop,nop,TS val 1989698682 ecr 4239743513], length 0 12:45:38.286327 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [P.], seq 1:457, ack 1, win 1276, options [nop,nop,TS val 1989698682 ecr 4239743513], length 456: HTTP: GET /ihead.txt HTTP/1.0 12:45:38.286536 IP 127.0.0.1.80 > 127.0.0.1.36654: Flags [.], seq 1:16333, ack 457, win 1276, options [nop,nop,TS val 4239743513 ecr 1989698682], length 16332: HTTP: HTTP/1.1 200 OK 12:45:38.392445 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [.], ack 16333, win 1276, options [nop,nop,TS val 1989698788 ecr 4239743513], length 0 12:45:38.392471 IP 127.0.0.1.80 > 127.0.0.1.36654: Flags [.], seq 16333:32665, ack 457, win 1276, options [nop,nop,TS val 4239743619 ecr 1989698788], length 16332: HTTP 12:45:38.392481 IP 127.0.0.1.80 > 127.0.0.1.36654: Flags [FP.], seq 32665:35458, ack 457, win 1276, options [nop,nop,TS val 4239743619 ecr 1989698788], length 2793: HTTP 12:45:38.392498 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [.], ack 35459, win 978, options [nop,nop,TS val 1989698788 ecr 4239743619], length 0 12:45:38.393014 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [F.], seq 457, ack 35459, win 1276, options [nop,nop,TS val 1989698788 ecr 4239743619], length 0 12:45:38.393032 IP 127.0.0.1.80 > 127.0.0.1.36654: Flags [.], ack 458, win 1276, options [nop,nop,TS val 4239743619 ecr 1989698788], length 0 ^C 11 packets captured 11 packets received by filter 0 packets dropped by kernel