It does not appear to be adding items. All I see are a series of dots "..............................." repeating forever. I have assumed that is showing that a certain number of packets have been processed.
Announcement
Collapse
No announcement yet.
Not working... no packets being processed
Collapse
X
-
After restarting, zoning so that it starts the capture process, this is what I see:
.DEVICE=0 is interface: \Device\NPF_Loopback : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
DEVICE=1 is interface: \Device\NPF_{4EA3A6F0-AC92-4912-B187-4FB53FD280C2} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
DEVICE=2 is interface: \Device\NPF_{CFC35797-83EA-4364-BAE7-088DF6CA160C} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
DEVICE=3 is interface: \Device\NPF_{2AE13859-7D80-4328-A1FE-63B969F223D5} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
DEVICE=4 is interface: \Device\NPF_{38050301-D15D-48B3-A2BF-51ECB553F8B9} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
DEVICE=5 is interface: \Device\NPF_{DBB1A90A-B736-40B9-BE3E-46B509D1E5E7} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
DEVICE=6 is interface: \Device\NPF_{D83F5346-1C6D-4645-93A1-9A861D582082} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
DEVICE=7 is interface: \Device\NPF_{7C8BD631-B553-49C8-9FE2-783C20A20E3B} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
DEVICE=8 is interface: \Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3
DEVICE=9 is interface: \Device\NPF_{4C95ABFA-CFF0-403B-AF35-9F34FD1FC8ED} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
Waiting for client...
Client Version: 2.4.8.6
Lore Op Code: 0x74c3
Book Op Code: 0x9f20
Link Op Code: 0x555a
Adv Op Code: 0x6586
Item Ignore Op Code: 0x0
Recipe Op Code: 0x0
RecipeList Op Code: 0x0
Mode is 0
Autodection is 1
Allow Item Discovery 1
Item Preview Op Code: 0x74c3
Item Reward Op Code: 0xfec
Server Operations Completed...
ItemStore: items.db
Listening on '\Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3'
Added PCL
Downloading Item Fields Definitions for debug purposes...
Downloading complete
Downloading Bad CharmFiles...
Downloading complete
BAD CHARMS V.0.1 @ 2020-04-20 13:12 UTC
Good ip count is 1
Not Filtering packets
User Name: SwiftyMUSE
Debugging Level: 0xffff (info, warnings, extra info, zone packet info, sequence debug messages, raw item data, entire instructions, not submitting to itemsdb)
ItemCollect based on EQitems on 13th-floor.org
-- Press 'y' to display a * when packet is being processed (switch on / off) --
-- Press 'z' to display a count of packets processed --
-- Press 'f' to flush the item store --
-- Press 'p' to reset pcap filter --
-- Press 'd' to download latest version --
-- Press 'c' to reupload all charm text info (it will wipe the file when done) --
-- Press 'i' to packet filter --
-- Press 'q' to exit --
.................................y
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
.PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.1 to 192.168.0.1
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 192.168.0.120 to 192.168.0.120
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.1 to 192.168.0.1
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
yPACKET FROM: 69.174.201.209 to 69.174.201.209
.PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 69.174.201.209 to 69.174.201.209
PACKET FROM: 192.168.0.21 to 192.168.0.21
PACKET FROM: 69.174.201.209 to 69.174.201.209
.
My items.db file is 0kb in size. Also, when displaying that packets are being seen (with "y"), why are the source and destination ip addresses the same? Since the device is listed as listening on local ip 192.168.0.21, shouldn't all the packets have that address in either source or destination ip address fields?
Comment
-
its not setting up the session packet, so its dropping out.
Code:if (packet.getDestinationPort() == EQPacket.PORT_CHATSERVER || packet.getSourcePort() == EQPacket.PORT_CHATSERVER) return; if ( (packet.getDestinationPort() >= EQPacket.PORT_LOGINSERVER_MIN && packet.getDestinationPort() <= EQPacket.PORT_LOGINSERVER_MAX) || (packet.getSourcePort() >= EQPacket.PORT_LOGINSERVER_MIN && packet.getSourcePort() <= EQPacket.PORT_LOGINSERVER_MAX) ) return; // discard world chat packets if ((packet.getDestinationPort() >= EQPacket.PORT_WORLDSERVER_CHAT_MIN && packet.getDestinationPort() <= EQPacket.PORT_WORLDSERVER_CHAT_MAX) || (packet.getSourcePort() >= EQPacket.PORT_WORLDSERVER_CHAT_MIN && packet.getSourcePort() <= EQPacket.PORT_WORLDSERVER_CHAT_MAX)) return; // client detection if (_detectingClient) { if (packet.getDestinationPort() == EQPacket.PORT_WORLDSERVER_GENERAL) { _testclientAddress = packet.getSourceAddress(); _testserverAddress = packet.getDestinationAddress(); _clientAddress = packet.getSourceAddress(); _serverAddress = packet.getDestinationAddress(); _detectingClient = false; pcap.setFilter("udp[0:2] > 1024 and udp[2:2] > 1024 and " + "ether proto 0x0800 and host " + _clientAddress, true); if ((_debugLevel & 1) > 0) System.out.println("Found Client>World: " + _clientAddress + " to " + _serverAddress); // System.out.println(packet.toString()); } } // we don't have a client yet if (_detectingClient) return;
Last edited by Deillusional; 30-07-2021, 14:17.
Comment
-
Downloaded new version, restarted collector, zoned to lobby and back into guild hall. Here is what I got:
Code:DEVICE=0 is interface: \Device\NPF_Loopback : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=1 is interface: \Device\NPF_{4EA3A6F0-AC92-4912-B187-4FB53FD280C2} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=2 is interface: \Device\NPF_{CFC35797-83EA-4364-BAE7-088DF6CA160C} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=3 is interface: \Device\NPF_{2AE13859-7D80-4328-A1FE-63B969F223D5} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=4 is interface: \Device\NPF_{38050301-D15D-48B3-A2BF-51ECB553F8B9} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=5 is interface: \Device\NPF_{DBB1A90A-B736-40B9-BE3E-46B509D1E5E7} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=6 is interface: \Device\NPF_{D83F5346-1C6D-4645-93A1-9A861D582082} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=7 is interface: \Device\NPF_{7C8BD631-B553-49C8-9FE2-783C20A20E3B} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=8 is interface: \Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3 DEVICE=9 is interface: \Device\NPF_{4C95ABFA-CFF0-403B-AF35-9F34FD1FC8ED} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 Waiting for client... Client Version: 2.4.8.7 Lore Op Code: 0x74c3 Book Op Code: 0x9f20 Link Op Code: 0x555a Adv Op Code: 0x6586 Item Ignore Op Code: 0x0 Recipe Op Code: 0x0 RecipeList Op Code: 0x0 Mode is 0 Autodection is 1 Allow Item Discovery 1 Item Preview Op Code: 0x74c3 Item Reward Op Code: 0xfec Server Operations Completed... ItemStore: items.db Listening on '\Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3' Added PCL Downloading Item Fields Definitions for debug purposes... Downloading complete Downloading Bad CharmFiles... Downloading complete BAD CHARMS V.0.1 @ 2020-04-20 13:12 UTC Good ip count is 1 Not Filtering packets User Name: SwiftyMUSE Debugging Level: 0xff (info, warnings, extra info, zone packet info, sequence debug messages, raw item data, entire instructions) ItemCollect based on EQitems on 13th-floor.org -- Press 'y' to display a * when packet is being processed (switch on / off) -- -- Press 'z' to display a count of packets processed -- -- Press 'f' to flush the item store -- -- Press 'p' to reset pcap filter -- -- Press 'd' to download latest version -- -- Press 'c' to reupload all charm text info (it will wipe the file when done) -- -- Press 'i' to packet filter -- -- Press 'q' to exit -- y PACKET FROM: 69.174.201.195[1801] to 69.174.201.195[65513] DETECTING CLIENT 65513[9000] NO CLIENT 65513[9000] PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801] DETECTING CLIENT 1801[9000] NO CLIENT 1801[9000] PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801] DETECTING CLIENT 1801[9000] NO CLIENT 1801[9000] PACKET FROM: 69.174.201.195[1801] to 69.174.201.195[65513] DETECTING CLIENT 65513[9000] NO CLIENT 65513[9000] PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801] DETECTING CLIENT 1801[9000] NO CLIENT 1801[9000] PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801] DETECTING CLIENT 1801[9000] NO CLIENT 1801[9000] PACKET FROM: 69.174.201.195[1801] to 69.174.201.195[65513] DETECTING CLIENT 65513[9000] NO CLIENT 65513[9000] PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801] DETECTING CLIENT 1801[9000] NO CLIENT 1801[9000] PACKET FROM: 192.168.0.1[32772] to 192.168.0.1[7423] DETECTING CLIENT 7423[9000] NO CLIENT 7423[9000] PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801] DETECTING CLIENT 1801[9000] NO CLIENT 1801[9000] PACKET FROM: 69.174.201.195[1801] to 69.174.201.195[65513] DETECTING CLIENT 65513[9000] NO CLIENT 65513[9000] PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801] DETECTING CLIENT 1801[9000] NO CLIENT 1801[9000] PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500] DETECTING CLIENT 17500[9000] NO CLIENT 17500[9000] PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500] DETECTING CLIENT 17500[9000] NO CLIENT 17500[9000] PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500] DETECTING CLIENT 17500[9000] NO CLIENT 17500[9000] PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500] DETECTING CLIENT 17500[9000] NO CLIENT 17500[9000] PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500] DETECTING CLIENT 17500[9000] NO CLIENT 17500[9000] PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500] DETECTING CLIENT 17500[9000] NO CLIENT 17500[9000] PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500] DETECTING CLIENT 17500[9000] NO CLIENT 17500[9000] PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801] DETECTING CLIENT 1801[9000] NO CLIENT 1801[9000] PACKET FROM: 69.174.201.195[1801] to 69.174.201.195[65513] DETECTING CLIENT 65513[9000] NO CLIENT 65513[9000] PACKET FROM: 192.168.0.120[10101] to 192.168.0.120[10101] DETECTING CLIENT 10101[9000] NO CLIENT 10101[9000] PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801] DETECTING CLIENT 1801[9000] NO CLIENT 1801[9000] yPACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801] DETECTING CLIENT 1801[9000] NO CLIENT 1801[9000]
Comment
-
According to my item collector, I get the following:
Code:Setting up session: Client port 65513, Server port 1801. SKey is 0x29594877. Processing player profile. server(Xegony): 01.everquest.com, sip: 1086959173, port: 9002 Processing player inventory. New zone detected, xxxxxxxxxxxx has entered Palatial Guild Hall.
Comment
-
Here is how I detect a new client session. (I have yet to change for the Selos/Povar server merger).
Code:int get_servernum_by_worldid(int worldnum, unsigned long portnum) { switch (worldnum) { case 1: // 69.174.201.64 switch (portnum) { case 9000: return 1; //Erollisi Marr case 9001: return 7; //Tunare case 9002: return 8; //Xegony case 9003: return 23; //Mangler case 9004: return 12; //Firiona Vie case 9005: return 6; //Coirnav case 9006: return 4; //The Rathe default: return 0; } case 2: // 69.174.201.65 switch (portnum) { case 9000: return 2; //Cazic-Thule case 9001: return 10; //Luclin case 9002: return 15; //Bristlebane case 9003: return 30; //Rizlona case 9004: return 16; //Vox case 9005: return 14; //Drinal case 9006: return 11; //Povar default: return 0; } case 3: // 69.174.201.66 switch (portnum) { case 9000: return 3; //Aradune case 9001: return 27; //Miragul case 9002: return 24; //Selo case 9003: return 17; //Ragefire case 9004: return 19; //Phinigel case 9005: return 22; //Agnarr case 9006: return 5; //Zek case 9007: return 9; //Bertoxxulous default: return 0; } case 20: // 69.174.193.133 switch (portnum) { case 9000: return 20; //Antonius Bayle default: return 0; } case 25: // 69.174.201.88 switch (portnum) { case 9000: return 166; //Test default: return 0; } case 26: // 69.174.201.89 switch (portnum) { case 9000: return 26; //Beta default: return 0; } default: return 0; } }
Comment
-
Unfortunately we don't actually detect an end-of-session, per se. We just restart a session everytime we detect a new zone entered. It's somewhat working now, except it seems as you said to detect an end-of-session an awful lot which requires me to zone again to restart the capture. I'm also seeing the following:
Code:DEVICE=0 is interface: \Device\NPF_Loopback : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=1 is interface: \Device\NPF_{4EA3A6F0-AC92-4912-B187-4FB53FD280C2} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=2 is interface: \Device\NPF_{CFC35797-83EA-4364-BAE7-088DF6CA160C} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=3 is interface: \Device\NPF_{2AE13859-7D80-4328-A1FE-63B969F223D5} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=4 is interface: \Device\NPF_{38050301-D15D-48B3-A2BF-51ECB553F8B9} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=5 is interface: \Device\NPF_{DBB1A90A-B736-40B9-BE3E-46B509D1E5E7} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=6 is interface: \Device\NPF_{D83F5346-1C6D-4645-93A1-9A861D582082} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=7 is interface: \Device\NPF_{7C8BD631-B553-49C8-9FE2-783C20A20E3B} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 DEVICE=8 is interface: \Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3 DEVICE=9 is interface: \Device\NPF_{4C95ABFA-CFF0-403B-AF35-9F34FD1FC8ED} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1 Waiting for client... Client Version: 2.4.8.8 Lore Op Code: 0x74c3 Book Op Code: 0x9f20 Link Op Code: 0x555a Adv Op Code: 0x6586 Item Ignore Op Code: 0x0 Recipe Op Code: 0x0 RecipeList Op Code: 0x0 Mode is 1 Autodection is 1 Allow Item Discovery 1 Item Preview Op Code: 0x74c3 Item Reward Op Code: 0xfec Server Operations Completed... ItemStore: items.db Listening on '\Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3' Added PCL Downloading Item Fields Definitions for debug purposes... Downloading complete Downloading Bad CharmFiles... Download failed. BAD CHARMS V.0.1 @ 2020-04-20 13:12 UTC Good ip count is 2 Filtering packets for local addresses and ... 69.174 192.168.0.21 User Name: SwiftyMUSE Debugging Level: 0xf (info, warnings, extra info, zone packet info) ItemCollect based on EQitems on 13th-floor.org -- Press 'y' to display a * when packet is being processed (switch on / off) -- -- Press 'z' to display a count of packets processed -- -- Press 'f' to flush the item store -- -- Press 'p' to reset pcap filter -- -- Press 'd' to download latest version -- -- Press 'c' to reupload all charm text info (it will wipe the file when done) -- -- Press 'i' to packet filter -- -- Press 'q' to exit -- *** Session End Detected *** *** New Session Detected *** Charm Read Mode is 1 Found Client>World: null to null Session Key: 0x4fb1c87a, Server Port: 9002, Client Port: 65513 *** Session End Detected *** *** New Session Detected *** Charm Read Mode is 1 Found Client>World: null to 69.174.201.64 Session Key: 0x348151d3, Server Port: 1362, Client Port: 65513 Stream Sequence Lost Error: Zone or Relog to fix. Expecting : 269 Received : 1311 Cache Size: 1024 *** Session End Detected *** *** New Session Detected *** Charm Read Mode is 1 Found Client>World: null to 69.174.201.209 Session Key: 0x5ea228bd, Server Port: 9002, Client Port: 65513 *** Session End Detected *** *** New Session Detected *** Charm Read Mode is 1 Found Client>World: null to 69.174.201.64 Session Key: 0x7b273152, Server Port: 1801, Client Port: 65513 Stream Sequence Lost Error: Zone or Relog to fix. Expecting : 118 Received : 1154 Cache Size: 1024
Comment
-
Let me know how it goes, and thanks for the help/suggestions:
Version 2.5.0.0
General
Removed the timed * echo.
IP Filtering
Controlled via ipaddresses.ini this file is created on load if it doesn't exist. Otherwise is customisable. To reload it use i
[IP_FILTER]
COUNT = 1
USE = 1
LOCAL_IP =
IP_1 = 69.174
LOCAL_IP is if you want to search for a starting packet of an ip address range or a single IP e.g. 192.168 will take every ip address in 192.168. as valid, 192.168.0.2 will only take 192.168.0.2 as valid
the IP_x is enable filters from the external addresses starting with the address.
Sessions
Client Detection is on ports 9000-9007 now.
Session Response takes the size of the packet into account as well as the opcode.
Session Disconnect takes the size of the packet into account as well as the opcode.
Comment
Comment