Hi,
Another possibility, you are trying to read other cookie structure information.
The scan format "%*[^\f]%*4x%2x%2x%2x%2xo%i" is related to a "IPv4 pool members in non-default route domains"
See: https://support.f5.com/csp/article/K6917
e.g.
BIGipServer<pool_name>=rd5o00000000000000000000ffffc0000201o80
set cookie rd5o00000000000000000000ffffc0000201o80
scan $cookie {%*[^\f]%*4x%2x%2x%2x%2xo%i} a b c d e
set IP $a.$b.$c.$d
set PORT $e
If you have an "IPv4 pool members" scenario, maybe this code:
BIGipServer<pool_name>=1677787402.36895.0000
set cookie 1677787402.36895.0000
scan $cookie {%10d.%5d.%4d} a b c
set hex [format "%4x%4x%02x" $a $b $c]
set IP [expr 0x[string range $hex 6 7]].[expr 0x[string range $hex 4 5]].[expr 0x[string range $hex 2 3]].[expr 0x[string range $hex 0 1]]
set PORT [expr 0x[string range $hex 10 11][string range $hex 8 9]]
I hope it helps
Regards.