Solved

Ghost IP - How do I kill it?

Posted on 2004-10-01
6
275 Views
Last Modified: 2008-03-06
I am configuring a pc with an Ip address on my lan which is running 2003 Server with Active Directory and every pc has the server set as the Primary DNS server.
When I configure the client machine with the ip in question, it says that the ip address is already in use on the network.
When I try to ping or port scan that address it doesn't respond and there are no ports open.
The only thing that I can think of is that its in an arp cache somewhere or something....

What can I do to clear it or find the offending machine?
0
Comment
Question by:Matrix1000
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12202615
PING the IP address in question, then do an ARP -a to see if the MAC address is listed.
A successful PING response is not mandatory for an ARP cache fill.
Do this on each of your subnets.
If you can find the MAC address, you can probably look through your switch ARP caches to work out precisely where this machine is.
0
 
LVL 4

Expert Comment

by:wileya
ID: 12202674
i mistakenly gave the same IP address to two PCs
a PC that i was setting up in my MIS room and
a PC that was at the other end of the fiber optic

(the boss) got instantly knocked off the network
with an error message that said the IP address
was already in use,

and i couldn't ping that IP because i was pinging
that IP address from the PC that had that same IP
(sort of like calling my phone number from my phone
duh, somebody on it, yea me)

that's one of the problems with static IP addresses
versus dynamic addressing
0
 
LVL 1

Author Comment

by:Matrix1000
ID: 12202918
Thanks for the reply,,,,I'm  pinging from another machine just to be safe...
I did an Arp -a on the server and it comes up with the IP and Mac address....Now that I have the offending mac address ( I think) how can I ping /get the hostname/ find the offending computer?
0
Ready to trade in that old firewall?

Whether you need to trade-up to a shiny new Firebox or just ready to upgrade from whatever appliance you're using now, WatchGuard has the right appliance for you! Find your perfect Firebox today with appliance sizing tool!

 
LVL 5

Expert Comment

by:netspec01
ID: 12203043
Try ping -A 1.2.3.4
0
 
LVL 4

Expert Comment

by:vnicolae
ID: 12203581
The problem comes with the WINS. Go into it and delete the entry for that IP address. You should be ok after that.


Vlad
0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 500 total points
ID: 12206575
ping -a 1.2.3.4, not -A  ;)

You can also look the MAC address up for it's vendor code on something like this:

http://www.erg.abdn.ac.uk/users/gorry/course/lan-pages/mac-vendor-codes.html

This will narrow your search down to NIC vendor, which may be useful ?
0

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses
Course of the Month4 days, 17 hours left to enroll

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question