root@c66fa430586c:/# tcpdump -n tcp and port 80
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
16:47:14.393881 IP 172.17.0.3.50938 > 146.75.118.132.80: Flags [S], seq 1517565118, win 64240, options [mss 1460,sackOK,TS val 4282636928 ecr 0,nop,wscale 7], length 0
16:47:14.505298 IP 146.75.118.132.80 > 172.17.0.3.50938: Flags [S.], seq 4278727570, ack 1517565119, win 65535, options [mss 1460,sackOK,TS val 2280960337 ecr 4282636928,nop,wscale 9], length 0
16:47:14.505358 IP 172.17.0.3.50938 > 146.75.118.132.80: Flags [.], ack 1, win 502, options [nop,nop,TS val 4282637039 ecr 2280960337], length 0
16:47:14.505507 IP 172.17.0.3.50938 > 146.75.118.132.80: Flags [P.], seq 1:86, ack 1, win 502, options [nop,nop,TS val 4282637039 ecr 2280960337], length 85: HTTP: GET /debian/ HTTP/1.1
16:47:14.614046 IP 146.75.118.132.80 > 172.17.0.3.50938: Flags [.], ack 86, win 283, options [nop,nop,TS val 2280960447 ecr 4282637039], length 0
16:47:14.642363 IP 146.75.118.132.80 > 172.17.0.3.50938: Flags [P.], seq 1:573, ack 86, win 283, options [nop,nop,TS val 2280960475 ecr 4282637039], length 572: HTTP: HTTP/1.1 200 OK
16:47:14.642374 IP 172.17.0.3.50938 > 146.75.118.132.80: Flags [.], ack 573, win 501, options [nop,nop,TS val 4282637176 ecr 2280960475], length 0
16:47:14.642396 IP 146.75.118.132.80 > 172.17.0.3.50938: Flags [P.], seq 6349:6693, ack 86, win 283, options [nop,nop,TS val 2280960475 ecr 4282637039], length 344: HTTP
16:47:14.642402 IP 172.17.0.3.50938 > 146.75.118.132.80: Flags [.], ack 573, win 501, options [nop,nop,TS val 4282637176 ecr 2280960475,nop,nop,sack 1 {6349:6693}], length 0