Hi, I'm trying to perform some experiments with chutney, it actually works fine, but I have some questions about I can use it for my scope. In particular, I want (first of all) discover the path that my package do through the tor network (node by node). I tried to send data with curl and in particular
HTML Code:
curl --socks5 127.0.0.1:9000 www.torproject.org
and I capture the output via Wireshark, I notice that the traffic pass through wlan0 (my wlan) and nothing pass on loopback, another thing that I notice is that on Wireshark the get request come from an IP that isn't mine, and I don't understand why. Continuing, since I want to see the package through the tor network, I decided to create an http server on 127.0.0.1:12058 with python
HTML Code:
python3 -m http.server 12058
and I sent a request via curl again curl
HTML Code:
--socks5 127.0.0.1:9000 127.0.0.1:12058
, now the traffic pass through loopback, but I can't follow the package because the Ips of client, realys and exit are the same 127.0.0.1 and what change is the port. From what I know, there exists 4 types of port:

ControlPort that can be used with nyx or other tool to control the traffic

OrPort that is used by the nodes to send packets

DirPort that is used by AD to send informations such as consensus

SockPort used by the client to connect to the network

Standing on these informations, when I send a request to my http server I might see a lot of 127.0.0.1 that communicates each other with 9000 (sockport) for the client, orports for the relays and the exit node and the dirport for the DA, but what I see is different, infact the ports seems to be random and different from the ones wrote on the torrc (something like: 41126 or 34450) so I cannot follow the package.

Do you know why? Do you know how can I follow the package through the network? (maybe another tool or something like that) Am I doing something wrong?