Me gusta esta pregunta nmap muestra IP desconocidas desde 192.168.2. * en mi red doméstica que tiene un rango de IP de 192.168.1. *.
A diferencia de la pregunta anterior, cada IP parece estar completamente bloqueada, incluido el bloqueo de los intentos de ping. Para todas las IP (alrededor de 70 entre 192.168.2.0 y 192.168.2.143), la ejecución de nmap -A -Pn
da como resultado:
PS C:\Users\Matthew> nmap -A -Pn 192.168.2.137
Starting Nmap 7.01 ( https://nmap.org ) at 2016-01-18 12:14 Central Standard Time
Nmap scan report for 192.168.2.137
Host is up (0.0021s latency).
All 1000 scanned ports on 192.168.2.137 are closed
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop
TRACEROUTE (using port 6788/tcp)
HOP RTT ADDRESS
1 16.00 ms 192.168.2.137
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Según el comentario de AddisonWIlson a continuación, ejecuté lo siguiente.
nmap -T4 -A -v -Pn
PS C:\Users\Matthew> nmap -T4 -A -v -Pn 192.168.2.137
Starting Nmap 7.01 ( https://nmap.org ) at 2016-01-18 13:18 Central Standard Time
NSE: Loaded 132 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 13:18
Completed NSE at 13:18, 0.00s elapsed
Initiating NSE at 13:18
Completed NSE at 13:18, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 13:18
Completed Parallel DNS resolution of 1 host. at 13:18, 0.01s elapsed
Initiating SYN Stealth Scan at 13:18
Scanning 192.168.2.137 [1000 ports]
SYN Stealth Scan Timing: About 29.55% done; ETC: 13:20 (0:01:14 remaining)
Increasing send delay for 192.168.2.137 from 0 to 5 due to 65 out of 162 dropped probes since last increase.
Completed SYN Stealth Scan at 13:19, 43.95s elapsed (1000 total ports)
Initiating Service scan at 13:19
Initiating OS detection (try #1) against 192.168.2.137
Initiating Traceroute at 13:19
Completed Traceroute at 13:19, 0.02s elapsed
Initiating Parallel DNS resolution of 1 host. at 13:19
Completed Parallel DNS resolution of 1 host. at 13:19, 5.52s elapsed
NSE: Script scanning 192.168.2.137.
Initiating NSE at 13:19
Completed NSE at 13:19, 0.00s elapsed
Initiating NSE at 13:19
Completed NSE at 13:19, 0.00s elapsed
Nmap scan report for 192.168.2.137
Host is up (0.000077s latency).
All 1000 scanned ports on 192.168.2.137 are closed
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop
TRACEROUTE (using port 4998/tcp)
HOP RTT ADDRESS
1 0.00 ms 192.168.2.137
NSE: Script Post-scanning.
Initiating NSE at 13:19
Completed NSE at 13:19, 0.00s elapsed
Initiating NSE at 13:19
Completed NSE at 13:19, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 54.65 seconds
Raw packets sent: 1828 (82.664KB) | Rcvd: 1010 (40.400KB)
Llamé a mi ISP en base a la pregunta vinculada anteriormente, y dijeron que no era su equipo.
Soy nuevo en administración de redes, pero he desarrollado software durante 20 años, por lo que estoy técnicamente interesado. No estoy seguro si alguno de los siguientes podría ser la causa.
- VMWare se instaló hace años, pero nunca se usó realmente.
- MS HyperV con un interruptor virtual, sin embargo, todo en ese interruptor es 192.168.1. *
¿Alguien tiene alguna idea?