Solved

Why my network gears respond to my portscan for some non-existing IP addresses

Posted on 2011-09-15
6
214 Views
Last Modified: 2012-08-14
Hi,

When I use port scan software to scan some non-existing IP addresses, e.g. 10.22.22.22, 10.33.33.33 etc, in my company's network, I get following responses:
port 80 is open
port 25 is open

When I do the same scan at home I have different results: nothing is open.

My questions are:
1.) Why I have some ports opend on some non-existing IP address?
2.) Is it possible something is wrong with the code /software on Huawei network gears?
3.) Is there any other possiblity other than Huawei gear?

Any information and help would be much appreciated.

Thanks

Regards

John
0
Comment
Question by:mbsadmin1
  • 3
  • 2
6 Comments
 
LVL 3

Expert Comment

by:inetman
Comment Utility
Have you tried upgraded firmware on the routers?
0
 
LVL 21

Expert Comment

by:eeRoot
Comment Utility
There may be one or more devices on your network that have factory default IP's and factory default open ports.  Or maybe these settings are left over from an old config.  Ports 80 & 25 are web and SMTP,  If you type http://10.22.22.22 into a web browser, does a web page load?
0
 

Author Comment

by:mbsadmin1
Comment Utility
http://10.22.22.22 into a web browser, doesn't load a web page .

Thanks

John
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 
LVL 21

Expert Comment

by:eeRoot
Comment Utility
Are you able to associate MAC addresses with these IP's?
0
 

Accepted Solution

by:
mbsadmin1 earned 0 total points
Comment Utility
Thanks all, it turns out port 80 was open on the edge switch.

Thanks for your help.
0
 

Author Closing Comment

by:mbsadmin1
Comment Utility
Thanks everyone's help.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

I see many questions here on Experts Exchange regarding switch port configurations and trunks. This article is meant for beginners in the subject to help to get basic knowledge about Virtual Local Area Network (VLAN (http://en.wikipedia.org/wiki/Vir…
I eventually solved a perplexing problem setting up telnet for a new switch.  I installed a new Cisco WS-03560X-24P switch connected to an existing Cisco 4506 running a WS-X4013-10GE Sup II-Plus. After configuring vlans and trunking,  I could no…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now