You find that a host (192.168.1.4) being used on one of your client's networks has been compromised with a backdoor program listening on port 31337. Your client requests a list of originating IP addresses connecting to that port. Using a Linux workstation as traffic analyzer, which of the following commands would gather the data requested by the client?
tcpdump host 192.168.1.4 and port 31337 -w out
nmap host 192.168.1.4:31337
pcap -d 192.168.1.4:31337