sudo tcpdump -i eth0 -v icmp tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
14:03:57.077973 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.1.33 > 192.168.1.199: ICMP echo request, id 5078, seq 57, length 64 14:03:57.078792 IP (tos 0x0, ttl 64, id 48861, offset 0, flags [none], proto ICMP (1), length 84)
192.168.1.199 > 192.168.1.33: ICMP echo reply, id 5078, seq 57, length 64 14:03:58.076983 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.1.33 > 192.168.1.199: ICMP echo request, id 5078, seq 58, length 64 14:03:58.077894 IP (tos 0x0, ttl 64, id 48862, offset 0, flags [none], proto ICMP (1), length 84)
192.168.1.199 > 192.168.1.33: ICMP echo reply, id 5078, seq 58, length 64 14:03:59.078142 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
192.168.1.33 > 192.168.1.199: ICMP echo request, id 5078, seq 59, length 64 14:03:59.078935 IP (tos 0x0, ttl 64, id 48863, offset 0, flags [none], proto ICMP (1), length 84)
sudo tcpdump -i eth0 -v icmp unter knoppix.