Tcp wireshark example. Apparently this is not possible with the .
Tcp wireshark example. X and select Set as Main Project.
Tcp wireshark example Analyze an ARP Request. First select a TCP packet in the packet list pane and then click the menu item Analyze/Follow TCP Stream. I don't think your examples are very good at all. Navigation Menu Toggle navigation Example. Real life examples of both TCP and UDP tcp -> a phone call, sms or anything specific to destination UDP -> a FM radio channel (AM), Wi-Fi. When you open a capture file, Download this fpm. Preference Settings Open MPLAB X IDE. port eq 80 || tcp. I have googled and googled but I am not a network guy and I am having trouble understanding what wireshark is trying to tell me. SCTP port(s)/range. How to use this script: Once the script is loaded, it creates a new protocol And I compiled it using clang -shared hello. POP uses MIME_multipart to transfer attachments. ” Additional FAQs How Do I For example, to exclude traffic on port 3490, you'd use not tcp port 3490. 4. This example captures telnet traffic to and from the host 10. We also generated attack packets, based on the assumption that an attacker had already gained Hi all, I'm trying to understand the complete flow of a TCP sequence and i think our application is sometimes not closing TCP sessions right but i'm not 100% sure. push==1 && tcp. What is the throughput (bytes transferred per unit time) for the TCP connection? Explain how you calculated this value. The best you can achive is what Jasper suggested. Malware Traffic. But in wireshark, I don't see any particular field for the RTT timing for a TCP packet like its there for the RTP packet. You can use an IP Home » Wireshark » 15 Top Wireshark IP Filters with Examples [Cheat Sheet] Wireshark is a powerful network analysis tool for network professionals. Utilize display filters to narrow down the packet list to only TCP packets. For example, to only display TCP packets, type tcp into Wireshark’s display filter toolbar. Help information available from Protocols/bacnet BACnet. The flags are noticeable aspects of the current packet. pcap A sample TCP/HTTP of a file transfer using ECN (Explicit Congestion Notification) feature per RFC3168. 4 TCP and WireShark ¶ In the WireShark example above, the client specified a Window Size field of 5888 (= 4 × 1472) in the third packet, but with a Window Scale value of 2 6 = 64 in the first packet, for an effective window size of 64 × 5888 = 256 segments of 1472 bytes. ; Select the first TCP packet, labeled http [SYN]. We see that in the example above the completeness is labeled as “Complete, WITH_DATA and then given a value of TCP Xmass scan. 80, 87, 88, etc) where the receiver is ACKing every other received segment. The dissector will use heuristics to determine from the fixed header whether the captured packet is SMPP or not. A HTTP proxy often uses a different port; typical values are 81, 3128, 8000 and 8080. 3 Back to Display Filter Reference Wireshark’s TCP dissector, by default, monitors the state of each TCP session and provides insights when it detects problems such as “TCP Window Full” or other potential issues. Let's consider a real-world example where a file is being transferred between two devices using a TCP connection. The POP dissector is fully functional. Id == 3 will show all the packets for the third tcp session MATE has found I'm trying to filter the packets by TCP options in wireshark. What is Wireshark? Wireshark is a free To only display packets containing a particular protocol, type the protocol name in the display filter toolbar of the Wireshark window and press enter to apply the filter. 3 Back to Display Filter Reference I want to calculate the Round Trip timing for the TCP packets. I can't attach the file because I don't have enough points. How to filter TCP Retransmissions with Wireshark. You can export received timestamp values by adding a custom column with the expression tcp. Time > 1 will give all the sessions that last more than one second ; filtering with mate. This is yet another technique of penetrating some of the firewalls to discover open ports. Protocol field name: tcp Versions: 1. If you need a display filter for a specific protocol, have a look for it at the 12. pcap [1]. Id == 3 will show all the packets for the third tcp session MATE has found. The basics and the syntax of the display filters are described in the User's Guide. Commented Apr 13, 2021 at 16:45. com domain name as seen in the figure below. stream contains "string" I need to do this in order to filter out all streams containing a certain string to get exactly what I'm looking for. I know the Window Size in a TCP packet indicates the size of the receive buffer of the host. port == 80 || tcp. For example, the filter tcp displays all TCP packets, while tcp. WARNING: The password protected zip files contain real malware. For example, TCP 80 will be decoded as HTTP. The S7comm dissector is partially functional. Frame 48 experienced Congestion Encountered. I would like to use Wireshark to monitor traffic between the client and server running on localhost. to be specific: it's not possible to capture only the full 3-way handshake (SYN,SYN-ACK,ACK), as it's impossible to identify the single ACK in the handshake with tcpdump. No well known port is defined for this protocol. Skip to content. This article will teach you how to interpret TCP connections using the TCP time-sequence graphs. I'm wondering if there is a heuristic plug-in, software or other process for determining protocol when a non-standard TCP port is used. Packet #2262 is a [FIN,ACK] but shouldn't there be a [FIN] from the other side first? Packet #2265 shows the same but the I need to be able to search all tcp streams that contain a particular string, not just a particular packet. 0. org. The current sequence number is the same as the next expected sequence number. Similarly, to only display packets containing a particular field, type the field into Wireshark’s display filter toolbar. Write better code TPKT runs atop TCP; when used to transport RDP, the well known TCP port is 3389, rather than the normal TPKT port 102. Below is an extract from a pcapng file. # # This file is regenerated each time "Decode As" preferences If you do have both packets in the pcap file (e. This sequence below repeats over and over. TCP ACKed unseen segment. It also has the Acknowledgment number in the TCP header selected, But in practice, at times, TCP 3-way handshake not only just initiates the connection, but also negotiate some very important parameters. port == 80 (lower case) in the Filter box and press Enter. Navigation Menu Toggle navigation. Due to the fact, there are enough sample protocols to keep you busy for months and several worm / exploit filtering with mate. Possibilities include inserting headers such as Ethernet, Ethernet + IP, Ethernet + IP + UDP, or TCP, or SCTP before each packet. I need some clarification for window size. It is used for network troubleshooting, software analysis, protocol development, and conducting network security review. For example, to only display HTTP requests, the TCP layer plus the TCP payload, because it doesn’t get changed by the router; The TCP expert in Wireshark doesn’t care if the same packet is captured in different network segments, or if there are VLAN tags or tunneling involved. The analysis includes protocol statistics, IP address analysis, DNS queries, TCP/UDP port analysis, and identification of potential security risks. How to use this script: Once the script is loaded, it creates a new protocol filtering with mate. Example capture file. It works as expected. TCP packets on this port(s)/range will be dissected as Diameter. port == 80 focuses on TCP packets destined for port 80 (HTTP traffic). as the sender did not 'violate' any This Python script analyzes a Wireshark pcap file and generates a detailed PDF report. g. For Modbus RTU, it starts off with the slave ID; Modbus is a master and slave protocol, that means the designated Wireshark. for the example above, but sniffing on the source of the packet), wireshark will identify it. For example, if the data downloaded from the webserver is gzip compressed, following the TCP stream will TCP: Typically, HTTP uses TCP as its transport protocol. Is this the receive buffer for a single TCP stream or for all streams? As an example, a web server will have thousands if not more connections. urg==1. In the capture example above, frame 67795 sends an ACK for 10384. Wir empfehlen dir, Wireshark-Filter durch praktische Übungen zu erkunden. Thanks for the additional infos. lua. Use Wireshark's "Compile BPFs" button to view the generated instructions or use dumpcap with the -d option. A subdissector can register itself in "protobuf_field" dissector table for parsing the value of the field. Refer to pcap-filter for more information on capture filters. lua file available under the A dissector tutorial with TCP-reassembly section of the Lua examples wiki page. You Efficient packet analysis in Wireshark relies heavily on the use of precise display filters (of which there are a LOT). RFC 1001 Protocol Standard For a NetBIOS Service on a TCP/UDP Transport: Concepts and Methods. Preference Settings (XXX add links to preference settings affecting how PROTO is TCP: Typically, POP uses TCP as its transport protocol. Open the Command Prompt/Terminal window, type ipconfig and press 'Enter' to get the I don't know of a way to calculate TCP jitter in Wireshark (or any other tool) but I assume that you could do this by comparing the deltas between the TCP timestamp fields and comparing to the actual arrival times. Download this fpm. Sign in Product GitHub Copilot. 80 acknowledged data with 2920 bytes = 1460*2 bytes. There is some level of flexibility, such as the ability to define TCP 8080 traffic as HTTP and to For example, if you want to filter ports 80 and 443, type this into the filter bar: “tcp. You can select a TCP stream very fast by using the Follow TCP stream feature. It provides great filters with, which you can easily zoom in to where you think the problem may lie. port == 53) Try You may be getting started with Wireshark and looking for interesting packet captures to explore, the Wireshark Samples page is a great place to start. TCP analysis series. TCP may either transmit a Wireshark is the go-to tool for anyone diving into the world of network analysis, cybersecurity, or even Capture The Flag (CTF) challenges. XXX - Add example traffic here (as plain text or Wireshark screenshot). - dincbrk/pcap-analyzer I would even add that TCP was never actually completely reliable from persistent connections point of view. The master list of display filter protocol fields can be found in the display filter reference. analysis. Whether you’re troubleshooting, learning the ropes, or preparing for a red team engagement, this Wireshark cheat sheet is your one-stop guide to getting things done efficiently. 2. How TCP connection is established and terminated (This article) Data transmission over TCP In this course, TCP Analysis with Wireshark, you’ll learn to analyze and troubleshoot TCP/IP networks using Wireshark. Example traffic. proto. See the various NetBIOS protocols for Wireshark specifics and examples. The well known TCP port for TPKT traffic is 102. 0 to 4. I would note that IP fragmentation is IP fragmentation regardless of the payloads carried over IP; What are you looking for that you wish to see "IP fragmentation of FTP data, images, files, etc" ? Is it actually TCP re-assembly that you wish to look HTTP, HTTPS, and FTP are only a few examples from the list. port eq 443. flags. 9. Follow answered Oct 9, 2012 at 9:15. org If you're looking for an example of Lua dissector for a TCP-based protocol, then you might want to refer to the fpm. Wireshark’s filtering capabilities are invaluable for isolating TCP traffic. The way wireshark marks TCP retransmissions varies between WS versions but in the later ones it will usually default to black color (and anyway you can always see in the "expert info" field under TCP). 2. SMS would be more like UDP, and you don't seem to understand UDP at all - it So, for the TCP handshake example, if the client sends a seq=0, the server responds with ack=1. Figure 8: Cumulative ACKs (No. Auf diese Weise kannst du dieses Tool besser verstehen. - LpCodes/Identifying-and-Troubleshooting-Common-TCP-Issues-with-Wireshark. Default on. The well known TCP port for BGP traffic is 179. 12. We can put following Lua script 'protobuf_portrait_field. Reload to refresh your session. However, packets may have multiple options, which means I couldn't Neben UDP ist TCP das meistverwendete Protokoll der TCP/IP-Familie auf der OSI-Schicht 4. Wireshark Wireshark. External links. In many other cases, instead, the connections starts fast and then drops until it ends with a low throughput, around 4-5 MB/s. Figure 6. How to use this script: Once the script is loaded, it creates a new protocol Protobuf field subdissectors. NetBIOS on wikipedia. For example, there is a bytes type field for carrying a portrait image in Person message type of addressbook. Time > 1 will give all the sessions that last less than one second. 3. port == 502 In the network capture you can first observe the TCP 3-way handshake followed by the first Modbus packet. Contagio Malware Dump: Collection of PCAP files categorized as APT, Crime or Metasplot (archived web page). I have tried to use a linux docker image to replicate the same TCP: Typically, SMPP uses TCP as its transport protocol (though it is no stranger to X. The PCAP files are hosted on DropBox and MediaFire. To view only TCP traffic related to the web server connection, type tcp. You signed out in another tab or window. The 'Follow TCP Stream" feature in Wireshark shows the data bytes being transferred across the connection, with the bytes in each direction shown in different colors. If it sees the same 5-tuple and the same TCP information (especially the sequence number and payload length The screenshot of Figure 5 shows an example of TCP and DNP3 packets in a connection by Wireshark. 5”, and shows how to capture all TCP Port(s)/range. Wenn du mehr über Wireshark erfahren möchtest, besuche die offizielle Website von Wireshark unter https://www. Reassemble Diameter messages spanning multiple TCP segments. tcp_ses. 5, and shows how to use two primitives and the and conjunction. Captured malware traffic from honeypots, sandboxes or real world intrusions. Open Wireshark. To assist with this, I’ve updated and compiled a downloadable and searchable pdf cheat sheet of the essential Wireshark display filters for quick reference. NumOfPdus < 5 will show all tcp sessions that have less than 5 packets. tcp-ecn-sample. It captures raw network traffic and presents it in a structured Start Wireshark data capturing, and ping the default gateway address -> Now, let's analyze what happens after removing the ARP entry and pinging a new IP address in the meantime. Even though wireshark reports Bogus IP length (0), frame 67795 is reported to have length 13194. BACnet, the ASHRAE building automation and control networking protocol, has been designed specifically to meet the communication needs of building automation and control systems for applications such as heating, ventilating, and air-conditioning control, lighting control, access control, and fire detection systems. wireshark. The packet is identified as a SYN-ACK packet by looking at the packet listing field and also by looking at the packet details field, highlighted in red below. a Gog for a complete FTP session The respective frame formats of Modbus TCP and Modbus RTU can be seen below. 5 TCP Offloading¶ In the Wireshark example above, the hardware involved used TCP checksum offloading, or TCO, to have the network-interface card do the actual checksum calculations; this permits a modest amount of parallelism. There are two versions of the time sequence graph, the more straightforward Stevens graph** and the more advanced TCP trace graph. Please see the following: My concerns are with the closing stage of the TCP connection. TLS wrapper mode encrypts everything right from the get-go, so your ability to peek into what’s happening is very limited. This filter highlights packets that have been retransmitted despite having already been acknowledged. timestamp. ip and not tcp dst port 3490. option_kind == 2, I'll only get the packets with the first option as kind 2. There are options for you to choose how those bytes are represented by Wireshark, with the default being ASCII but you can pick other representations from a long list via the "Show data as" option at the bottom of that An example: The Receiver advertises a TCP Window of 5000 byte. It includes metrics like RTT, bytes in flight, bytes since last PSH. Example capture files are detailed below. Display Filter Reference: Transmission Control Protocol. For example, segment of No. . A basic RDP dissector exists that can decode most of the PDUs that are exchanged during the connection sequence. Die folgende Anleitung zeigt, wie man diesen Handshake für eine FTP-Kommunikation in Wireshark visualisiert. Dies passiert mit Hilfe eines 3-Wege-Handshakes. Protocol field name: mbtcp Versions: 1. Wireshark uses display filters for general packet filtering while viewing and for its ColoringRules. I'm not sure if this would be doable with a capture filter. edit flag offensive delete link more add a comment. Apparently this is not possible with the I'm looking to capture the conversation between 2 hosts that contains the 3 way handshake. 8, “Filtering on the TCP protocol” shows an example of what happens when you type tcp in the display filter toolbar. For example, I want to get all packets with the option Maximum Segment Size (with kind number 2). The server side specified a window size of 5792 and a scaling factor of 2 5 = 32. When Wireshark see some anomalies, it adds some description to packet header, especially for TCP. 2, “Capturing all telnet traffic not from 10. BGP sample update message. Capture Example. Something like: tcp. Upon first opening a capture file, each TCP packet is analyzed in the order they appear in the packet list. ; filtering with mate. There is a way to get Wireshark to tell you which 17. 3-way handshake. Frame 67800 sends an ACK for 23524; 10384+13194 = 23578; 23578 – 23524 = 54; 54 is in fact length of the Ethernet / IP / TCP headers (14 for Ethernt, 20 for IP, 20 for TCP) Wireshark offers a couple of graphs for TCP analysis: RTT, throughput, window scaling, and the time sequence graphs. port == 80 http not arp and not (udp. TCP: Typically, TPKT uses TCP as its transport protocol. I am going to use www. analysis is the Wireshark analysis of the TCP sequence numbers and acknowledgements so far. port == 80 || udp. To analyze TCP SYN traffic: Observe the traffic captured in the top Wireshark packet list pane. filtering with mate. And then sometimes they don't TCP: Typically, BGP uses TCP as its transport protocol. X and select Set as Main Project. An example with a TCP packet selected is shown in Figure 6. ABIR ABIR. We do not want to capture all packets coming ang going through our interface so we create a capture filter like below. There is a difference between following a TCP stream and an HTTP stream. My end goal filter would look something like this: I'm doing some scp transfers between an AIX and a Linux in two separated LAN (I have a VPN between them). Wireshark supports reassembly of PDUs spanning multiple TCP segments for a large number of protocols implemented on top of TCP. lua file for an example Lua script for a TCP-based protocol dissector. golinuxcloud. There are two statistical menu items for TCP available: Statistics/Endpoints which contains a tab showing all TCP endpoints (combination of IP If you look into the TCP header, you will see the TCP Completeness information that is in brackets, meaning this information is not actually in the packet headers, but rather has been added by the Wireshark Expert Analysis processes. The script is too long to embed in this page, and it's much better to view it in a text editor that supports Lua syntax highlighting, because there are a lot of comments in the script explaining things. options. For more information on text2pcap consult your local manual page (man text2pcap) or the online version. I'm new to all this. DisplayFilters DisplayFilters. So the Window size in the TCP window, is this the receive window for all How to identify the problem using Wireshark TCP logs and suggest potential resolutions. Share. Remember that BitTorrent’s peer protocol operates over TCP or uTP. Another example is shown in Example 4. All in all probably something like 20 different protocols. Set when all of the following are true: The segment size is zero. 1, “Wireshark with a TCP packet selected for viewing”. There are two TCP streams in the provided pcap file: Add a Decode As entry for a Stream ID 1 TCP port (34727): # "Decode As" entries file for Wireshark 4. K. Basic knowledge of how to use Wireshark is needed. However, I find if I use the filter as tcp. Yes, add a column (type custom) with field tcp. Sometimes the connection ends well, so I get 50MB/s. TCB---Transmission Control Block, something like PCB, it stores some significant info like, TCP connection table, the pointer for the sending and receiving buffer, Hi All, I hope I am doing the right thing asking this here. The report also features a time-based traffic analysis graph. In diesem Leitfaden haben wir gelernt, wie man Filter in der Wireshark-Software verwendet. This is the first article in a series that illustrates the basics of the TCP protocol and its analysis using Wireshark. In order to troubleshoot computer network related problems effectively and efficiently, an in-depth understanding of TCP/IP is absolutely necessary, but you also need to Here I present some examples of BitTorrent protocol interactions. A TCP Dump and Wireshark Example: TLS Wrapper. 3. It analyses TCP flags and inserts a relevant description to the header for informing experts (administrators). X. – Christopher Maynard. If Standard RDP Security is being negotiated, all the PDUs Starting point for a custom TCP Wireshark dissector in Lua - chat. Contribute to flyck1/nvmetcp-wireshark development by creating an account on GitHub. SCTP packets on this port will be dissected as Diameter. From this point, we will work with wireshark, steps as below. so $(pkg-config --cflags wireshark) $(pkg-config --libs wireshark) -Wall -fPIC I am trying to understand this because I'm currently working on building some custom plugins for various platforms but I can't seem to get this example working. The well known TCP port for HTTP traffic is 80. This allows Wireshark or any other full-packet decoder to handle these dumps. Here's what Wireshark says about a keep-alive ACK:. 25 as well). The Sender sends 5 packets with a TCP Len of 1000 each; There is no ACK between those 5 packets; Wireshark will mark the 5th packet with [TCP Window Full] as it has seen those advertized 5000 bytes, without an ACK; Up to now, everything is O. Es arbeitet verbindungsorientiert, wozu es eine Sitzung aufbaut. The BGP dissector is (fully functional, partially functional, not existing, whatever the current state is). Starting point for a custom TCP Wireshark dissector in Lua - chat. These are the test I made (file dimension: 1GB) Scp transfer As you can Following streams (like TCP connections) in Wireshark provides a different view on network traffic: in stead of individual packets, one can see data flowing between client & server. TCP dissector is fully functional. Set when the expected next acknowledgment number is set Wireshark, with its powerful packet capture and analysis features, empowers you to dissect TCP conversations. This is how TCP Xmass scan looks like in Wireshark: TCP Xmass scan work by sending packets with FIN, PUSH and URG flags set. fin==1 && tcp. Select File>Open Project>enc28j60-pic-tcpclient. Step-2: Setting Wireshark to Decrypt SSL/TLS. Tip Following a protocol stream applies a display filter which selects all the packets in the current stream. Let’s have a look at the Modbus packet. NVMe over TCP fabrics dissector for wireshark. I've created a simple TCP client and TCP server in Visual Studio using WCF. Wireshark has a decoder for Modbus (at least for captures done via TCP, for serial captures you have to set mbrtu in the user DLT) which makes it NVMe over TCP fabrics dissector for wireshark. Improve this answer. The window size is non-zero and hasn’t changed. Solution: The computation of TCP throughput largely Filtering and Displaying TCP Packets. Wireshark can be used to analyze BitTorrent protocol interactions in TCP/IP. We will create a dissector and import it to wireshark to decode the packet trace. MSS (maximum segment size) negotiation occurs in this steps. c -o hello. Wireshark. lua' into Wireshark will set an appropriate display filter and display a dialog box with the data from the stream laid out, as shown in Figure 7. The well known TCP port for POP traffic is 110. All gists Back to GitHub Sign in Sign up Sign in Sign up You signed in with another tab or window. However, HTTP can use other transport protocols as well. You notice that the transfer is tcp. tcp-ethereal-file1. This feature can be enabled or disabled See the files attached to the following Wireshark bug reports for examples of IP fragmentation. At the time of writing, Wireshark could identify correctly a uTP connection, but unfortunately would not decode its contents as a BitTorrent protocol session. Examining TCP Headers In this tutorial we explore wireshark dissector and understand how it works with some practical examples. Next, you'll discover the critical role of sequence and acknowledgment numbers in ensuring Protobuf content is normally dissected by Wireshark from some higher layer dissectors including gRPC or other UDP/TCP based dissectors. RFC 1002 Protocol Standard For a NetBIOS Service on a TCP/UDP Transport: Detailed Specifications. Request by an end-user's browser tcp. I have one simple operation on the server that receives an integer, increments it and sends it back. It also has the Acknowledgment number in the TCP header selected, which shows up in the byte view as the selected bytes. Display Filter Reference: Modbus/TCP. stream as field, and use that to sort. Wireshark will decode packets based on the well-known port number. XXX - Add a simple example capture file to the SampleCaptures page and link from here By default, Wireshark’s TCP parser tracks the state of each TCP session and provides additional information when issues or potential problems, such as TCP Port numbers reused, are detected. Right click enc28j60-pic-tcpclient. First, you'll explore the intricacies of the TCP handshake process, understanding how connections are initiated, maintained, and terminated. ; Observe the packet details in the middle Wireshark packet details pane. 1, “The “Follow TCP Stream” dialog box”. Here’s a Wireshark filter to detect TCP Xmass scans: tcp. Wireshark do calculates the RTT graph but i am not finding as how it has been calculated. TCP_Reassembly TCP Reassembly. spurious_retransmission. The key of record in "protobuf_field" table is the full name of the field. port == 443”, or “tcp. trace (libpcap) A large POST request, taking many TCP segments. Using An example with a TCP packet selected is shown in Figure 6. It just becomes more noticeable from time to time. Another interesting example: some people may implement logic that marks a TCP client as offline as soon as connection closure or reset is being detected. Wireshark provides a useful feature called “Expert Info”. Also add info of additional Wireshark features where appropriate, like Protocol Filter Examples tcp udp tcp. These protocols include, but are not limited to, iSCSI, HTTP, DNS, Kerberos, CIFS, ONC-RPC etc. Wireshark is an essential network analysis tool for network professionals. tsval then exporting as CSV or To identify them, you can use the Wireshark display filter tcp. Can someone help me out in finding the formula used for the same? Clicking on an item in the tree will highlight the corresponding bytes in the byte view.
qwnd xpwax dgosg gktyxcz tesqsg jrrtv fcf zfgde uwgwqn nzpuz
{"Title":"What is the best girl
name?","Description":"Wheel of girl
names","FontSize":7,"LabelsList":["Emma","Olivia","Isabel","Sophie","Charlotte","Mia","Amelia","Harper","Evelyn","Abigail","Emily","Elizabeth","Mila","Ella","Avery","Camilla","Aria","Scarlett","Victoria","Madison","Luna","Grace","Chloe","Penelope","Riley","Zoey","Nora","Lily","Eleanor","Hannah","Lillian","Addison","Aubrey","Ellie","Stella","Natalia","Zoe","Leah","Hazel","Aurora","Savannah","Brooklyn","Bella","Claire","Skylar","Lucy","Paisley","Everly","Anna","Caroline","Nova","Genesis","Emelia","Kennedy","Maya","Willow","Kinsley","Naomi","Sarah","Allison","Gabriella","Madelyn","Cora","Eva","Serenity","Autumn","Hailey","Gianna","Valentina","Eliana","Quinn","Nevaeh","Sadie","Linda","Alexa","Josephine","Emery","Julia","Delilah","Arianna","Vivian","Kaylee","Sophie","Brielle","Madeline","Hadley","Ibby","Sam","Madie","Maria","Amanda","Ayaana","Rachel","Ashley","Alyssa","Keara","Rihanna","Brianna","Kassandra","Laura","Summer","Chelsea","Megan","Jordan"],"Style":{"_id":null,"Type":0,"Colors":["#f44336","#710d06","#9c27b0","#3e1046","#03a9f4","#014462","#009688","#003c36","#8bc34a","#38511b","#ffeb3b","#7e7100","#ff9800","#663d00","#607d8b","#263238","#e91e63","#600927","#673ab7","#291749","#2196f3","#063d69","#00bcd4","#004b55","#4caf50","#1e4620","#cddc39","#575e11","#ffc107","#694f00","#9e9e9e","#3f3f3f","#3f51b5","#192048","#ff5722","#741c00","#795548","#30221d"],"Data":[[0,1],[2,3],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[6,7],[8,9],[10,11],[12,13],[16,17],[20,21],[22,23],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[36,37],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[2,3],[32,33],[4,5],[6,7]],"Space":null},"ColorLock":null,"LabelRepeat":1,"ThumbnailUrl":"","Confirmed":true,"TextDisplayType":null,"Flagged":false,"DateModified":"2020-02-05T05:14:","CategoryId":3,"Weights":[],"WheelKey":"what-is-the-best-girl-name"}