root@OpenWrt:~# tcpdump -i br-lan -n "port 5038"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on br-lan, link-type EN10MB (Ethernet), capture size 65535 bytes
23:00:50.841238 IP 192.168.0.201.5038 > 206.53.152.166.29710: Flags [S.], seq 1045335257, ack 2984618469, win 5792, options [mss 1460,sackOK,TS val 33630636 ecr 343148770,nop,wscale 2], length 0
23:00:52.554529 IP 206.53.152.166.8895 > 192.168.0.201.5038: Flags [s], seq 3428477309, win 5840, options [mss 1380,sackOK,TS val 343172542 ecr 0,nop,wscale 7], length 0
23:00:52.554644 IP 192.168.0.201.5038 > 206.53.152.166.8895: Flags [S.], seq 2531118748, ack 3428477310, win 5792, options [mss 1460,sackOK,TS val 33630807 ecr 343172542,nop,wscale 2], length 0
23:00:55.554290 IP 206.53.152.166.8895 > 192.168.0.201.5038: Flags [s], seq 3428477309, win 5840, options [mss 1380,sackOK,TS val 343173293 ecr 0,nop,wscale 7], length 0
23:00:55.554404 IP 192.168.0.201.5038 > 206.53.152.166.8895: Flags [S.], seq 2531118748, ack 3428477310, win 5792, options [mss 1460,sackOK,TS val 33631107 ecr 343172542,nop,wscale 2], length 0
23:00:56.641089 IP 192.168.0.201.5038 > 206.53.152.166.8895: Flags [S.], seq 2531118748, ack 3428477310, win 5792, options [mss 1460,sackOK,TS val 33631216 ecr 343172542,nop,wscale 2], length 0
23:01:01.554149 IP 206.53.152.166.8895 > 192.168.0.201.5038: Flags [s], seq 3428477309, win 5840, options [mss 1380,sackOK,TS val 343174793 ecr 0,nop,wscale 7], length 0
23:01:01.554256 IP 192.168.0.201.5038 > 206.53.152.166.8895: Flags [S.], seq 2531118748, ack 3428477310, win 5792, options [mss 1460,sackOK,TS val 33631707 ecr 343172542,nop,wscale 2], length 0
23:01:01.840971 IP 192.168.0.201.5038 > 206.53.152.167.53068: Flags [S.], seq 1204645195, ack 1869301636, win 5792, options [mss 1460,sackOK,TS val 33631736 ecr 343151224,nop,wscale 2], length 0
Please advise. Thank you.