Improve company productivity with a Business Account.Sign Up

x
?
Solved

Why my network gears respond to my portscan for some non-existing IP addresses

Posted on 2011-09-15
6
Medium Priority
?
309 Views
Last Modified: 2012-08-14
Hi,

When I use port scan software to scan some non-existing IP addresses, e.g. 10.22.22.22, 10.33.33.33 etc, in my company's network, I get following responses:
port 80 is open
port 25 is open

When I do the same scan at home I have different results: nothing is open.

My questions are:
1.) Why I have some ports opend on some non-existing IP address?
2.) Is it possible something is wrong with the code /software on Huawei network gears?
3.) Is there any other possiblity other than Huawei gear?

Any information and help would be much appreciated.

Thanks

Regards

John
0
Comment
Question by:mbsadmin1
  • 3
  • 2
6 Comments
 
LVL 3

Expert Comment

by:inetman
ID: 36546964
Have you tried upgraded firmware on the routers?
0
 
LVL 22

Expert Comment

by:eeRoot
ID: 36547246
There may be one or more devices on your network that have factory default IP's and factory default open ports.  Or maybe these settings are left over from an old config.  Ports 80 & 25 are web and SMTP,  If you type http://10.22.22.22 into a web browser, does a web page load?
0
 

Author Comment

by:mbsadmin1
ID: 36557923
http://10.22.22.22 into a web browser, doesn't load a web page .

Thanks

John
0
Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

 
LVL 22

Expert Comment

by:eeRoot
ID: 36558148
Are you able to associate MAC addresses with these IP's?
0
 

Accepted Solution

by:
mbsadmin1 earned 0 total points
ID: 37093202
Thanks all, it turns out port 80 was open on the edge switch.

Thanks for your help.
0
 

Author Closing Comment

by:mbsadmin1
ID: 37166548
Thanks everyone's help.
0

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
This article will show how Aten was able to supply easy management and control for Artear's video walls and wide range display configurations of their newsroom.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

607 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question