216.48.109.64 isnât us.
The remaining traffic to 70.42.6.232 is unexpectedly high if thatâs for 72 hours, and is wildly different to what I see on the server side. How much do you trust that âtotal bytesâ figure? (Notably, some systems derive a âbyte countâ from whatâs actually a packet count + some assumptions about average packet size which often donât hold true)
FWIW on the server side I see around 34MB (not GB!) of expanded non-mlat data from your feeder for the complete day of the 28th (UTC), or about 0.4kB/s. The actual transferred data will be less than this due to compression. From the fa-mlat-client logs, mlat upload is also low (< 0.5kB/s)
Looking at the raw network traffic arriving right now, it all seems normal and low volume (TCP is the main upload, UDP is mlat traffic). (The duplication of packets is an artifact of how I did the capture, it picked up both the bonded interface and the physical interface)
03:19:26.003441 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 2557559958:2557560108, ack 196733663, win 6090, length 150
03:19:26.003441 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 0:150, ack 1, win 6090, length 150
03:19:26.003464 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 150, win 8195, length 0
03:19:26.003466 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 150, win 8195, length 0
03:19:26.105582 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [P.], seq 1:78, ack 150, win 8195, length 77
03:19:26.105597 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [P.], seq 1:78, ack 150, win 8195, length 77
03:19:26.225852 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [.], ack 78, win 6090, length 0
03:19:26.225852 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [.], ack 78, win 6090, length 0
03:19:26.225873 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [P.], seq 78:236, ack 150, win 8195, length 158
03:19:26.225876 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [P.], seq 78:236, ack 150, win 8195, length 158
03:19:26.342597 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [.], ack 236, win 6090, length 0
03:19:26.342597 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [.], ack 236, win 6090, length 0
03:19:35.677007 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 150:287, ack 236, win 6090, length 137
03:19:35.677007 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 150:287, ack 236, win 6090, length 137
03:19:35.677027 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 287, win 8195, length 0
03:19:35.677028 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 287, win 8195, length 0
03:19:40.683412 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 287:333, ack 236, win 6090, length 46
03:19:40.683412 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 287:333, ack 236, win 6090, length 46
03:19:40.683445 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 333, win 8195, length 0
03:19:40.683448 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 333, win 8195, length 0
03:19:42.685631 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 333:423, ack 236, win 6090, length 90
03:19:42.685631 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 333:423, ack 236, win 6090, length 90
03:19:42.685643 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 423, win 8195, length 0
03:19:42.685644 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 423, win 8195, length 0
03:19:43.687759 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 423:479, ack 236, win 6090, length 56
03:19:43.687759 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 423:479, ack 236, win 6090, length 56
03:19:43.687776 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 479, win 8195, length 0
03:19:43.687778 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 479, win 8195, length 0
03:19:48.449276 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 479:1286, ack 236, win 6090, length 807
03:19:48.449276 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 479:1286, ack 236, win 6090, length 807
03:19:48.449306 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 1286, win 8195, length 0
03:19:48.449310 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 1286, win 8195, length 0
03:19:50.433787 IP 82.14.xxx.xxx.40364 > 70.42.6.232.8988: UDP, length 44
03:19:50.433787 IP 82.14.xxx.xxx.40364 > 70.42.6.232.8988: UDP, length 44
03:19:51.104682 IP 82.14.xxx.xxx.40364 > 70.42.6.232.8988: UDP, length 111
03:19:51.104682 IP 82.14.xxx.xxx.40364 > 70.42.6.232.8988: UDP, length 111
03:19:51.862313 IP 82.14.xxx.xxx.40364 > 70.42.6.232.8988: UDP, length 54
03:19:51.862313 IP 82.14.xxx.xxx.40364 > 70.42.6.232.8988: UDP, length 54
03:19:52.696312 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 1286:1436, ack 236, win 6090, length 150
03:19:52.696312 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 1286:1436, ack 236, win 6090, length 150
03:19:52.696335 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 1436, win 8195, length 0
03:19:52.696337 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 1436, win 8195, length 0
03:19:53.289927 IP 82.14.xxx.xxx.40364 > 70.42.6.232.8988: UDP, length 54
03:19:53.289927 IP 82.14.xxx.xxx.40364 > 70.42.6.232.8988: UDP, length 54
03:19:53.698434 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 1436:1574, ack 236, win 6090, length 138
03:19:53.698434 IP 82.14.xxx.xxx.43179 > 70.42.6.232.1200: Flags [P.], seq 1436:1574, ack 236, win 6090, length 138
03:19:53.698450 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 1574, win 8195, length 0
03:19:53.698453 IP 70.42.6.232.1200 > 82.14.xxx.xxx.43179: Flags [.], ack 1574, win 8195, length 0
Do you have finer grained data?