Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How do I find rogue IP addresses?

Posted on 2009-05-07
2
Medium Priority
?
441 Views
Last Modified: 2012-05-06
I set up a Windows 2003 DHCP server, but 3 of the addresses are flagged in the DHCP server as BAD ADDRESSES. They show a unique ID in the column where MAC addresses normally show up. The IDs are e50110ac, f70110ac, and e80110ac.

One will respond to pings, the other two dont. If I delete them from the DHCP list they come back as bad addresses again.

How can I find these on the network without a lot of manually searching?
0
Comment
Question by:Eric_Price
2 Comments
 
LVL 35

Expert Comment

by:Bembi
ID: 24328335
Is it possible, that these IPs are printers or other devices like NAS devices or something similar?

The device your can ping, can you resolve the name? (ping -a xxx)
0
 
LVL 40

Accepted Solution

by:
omarfarid earned 2000 total points
ID: 24332777
you check arp table after pinging ip and then get mac address, use command

arp -a
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ever wondered why you had to use DHCP options (dhcp opt 60, 66 or 67) in order to use PXE? Well, you don't!
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
How to fix incompatible JVM issue while installing Eclipse While installing Eclipse in windows, got one error like above and unable to proceed with the installation. This video describes how to successfully install Eclipse. How to solve incompa…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question