Networking 互联网供应商;私人湾;给客户?

Networking 互联网供应商;私人湾;给客户?,networking,lan,nmap,traceroute,wan,Networking,Lan,Nmap,Traceroute,Wan,这很奇怪。这实际上是如何工作的。到目前为止,我知道“不可能”有这样一个网络。 我将详细解释我的网络是如何工作的 我有一个局域网。192.168.1.0/24,路由器位于192.168.1.1,此路由器具有公共地址。 我可以共享IP地址,因为我在那里运行一个服务器来进行测试。到目前为止还可以。 现在奇迹发生了。 当我追踪到IP的路由时,我得到了以下信息(到google DNS): 第二、第三和第四跳是什么?当192.168.1.1正在运行NAT服务时,我的局域网和外部3个公共地址(是的,我有3个,

这很奇怪。这实际上是如何工作的。到目前为止,我知道“不可能”有这样一个网络。 我将详细解释我的网络是如何工作的

我有一个局域网。192.168.1.0/24,路由器位于192.168.1.1,此路由器具有公共地址。 我可以共享IP地址,因为我在那里运行一个服务器来进行测试。到目前为止还可以。 现在奇迹发生了。 当我追踪到IP的路由时,我得到了以下信息(到google DNS):

第二、第三和第四跳是什么?当192.168.1.1正在运行NAT服务时,我的局域网和外部3个公共地址(是的,我有3个,并且是88,89,93网络上的3个“A类”IP),它怎么可能位于A类专用地址上

另一件事是在第四跳我们怎么有第二个八位组255

任何人都可以随意追踪我的无ip域:synackfiles.no-ip.org 请不要弄乱我的路由器(如果您端口扫描或未能登录ssh或http auth,它会阻止您,因此您会因此被禁止。如果您只是跟踪路由,它很好):P

现在,第二个神奇和奇怪的事情发生了。 我要运行nmap。所以我得到了这个:

sudo nmap -sV -A -O 10.137.211.113 -vv -p 1-500 -Pn

Starting Nmap 6.00 ( http://nmap.org ) at 2013-11-14 15:24 WET
NSE: Loaded 93 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 2) scan.
NSE: Starting runlevel 2 (of 2) scan.
Initiating Parallel DNS resolution of 1 host. at 15:24
Completed Parallel DNS resolution of 1 host. at 15:24, 0.04s elapsed
Initiating SYN Stealth Scan at 15:24
Scanning 10.137.211.113 [500 ports]
SYN Stealth Scan Timing: About 30.40% done; ETC: 15:26 (0:01:11 remaining)
SYN Stealth Scan Timing: About 60.30% done; ETC: 15:26 (0:00:40 remaining)
Completed SYN Stealth Scan at 15:26, 101.14s elapsed (500 total ports)
Initiating Service scan at 15:26
Initiating OS detection (try #1) against 10.137.211.113
Initiating Traceroute at 15:26
Completed Traceroute at 15:26, 9.05s elapsed
Initiating Parallel DNS resolution of 1 host. at 15:26
Completed Parallel DNS resolution of 1 host. at 15:26, 0.01s elapsed
NSE: Script scanning 10.137.211.113.
NSE: Starting runlevel 1 (of 2) scan.
Initiating NSE at 15:26
Completed NSE at 15:26, 0.00s elapsed
NSE: Starting runlevel 2 (of 2) scan.
Nmap scan report for 10.137.211.113
Host is up (0.0010s latency).
All 500 scanned ports on 10.137.211.113 are filtered
Device type: general purpose|specialized|media device
Running: Barrelfish, Microsoft Windows 2003|PocketPC/CE|XP, Novell NetWare 3.X, Siemens embedded, Telekom embedded
OS CPE: cpe:/o:barrelfish:barrelfish cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2 cpe:/o:microsoft:windows_ce cpe:/o:microsoft:windows_xp:::professional cpe:/o:novell:netware:3.12
Too many fingerprints match this host to give specific OS details
TCP/IP fingerprint:
SCAN(V=6.00%E=4%D=11/14%OT=%CT=%CU=%PV=Y%G=N%TM=5284EBAB%P=armv7l-unknown-linux-gnueabi)
T7(R=Y%DF=N%TG=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=R)
U1(R=N)
IE(R=N)


TRACEROUTE (using proto 1/icmp)
HOP RTT     ADDRESS
1   2.32 ms zonhub.home (192.168.1.1)
2   ... 30

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 2) scan.
NSE: Starting runlevel 2 (of 2) scan.
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 122.65 seconds
           Raw packets sent: 1109 (49.620KB) | Rcvd: 4 (200B)
嗯,这很奇怪。我不知道我国的广域网是如何设计和建造的。 我来自葡萄牙,我的ISP是“ZON TVCABO”。您现在可以搜索:P 这很有趣

真诚地

int3

  • 我不能告诉你你的广域网是如何建立的,但是为了 保存公共IP-可以使用专用IP设计ISPs内部网络 IPs。不需要从公众处获得的路由器将 仅具有专用IP-分配给您的IP可以路由到您的 仅在ISP内部的路由器上上行

  • 第二个跃点不允许跟踪,但允许转发它们

  • 第4个-10.255.x.x是10.0.0.0/8A范围内的私有IP。(你 可以使用0-255之间的数字)

sudo nmap -sV -A -O 10.137.211.113 -vv -p 1-500 -Pn

Starting Nmap 6.00 ( http://nmap.org ) at 2013-11-14 15:24 WET
NSE: Loaded 93 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 2) scan.
NSE: Starting runlevel 2 (of 2) scan.
Initiating Parallel DNS resolution of 1 host. at 15:24
Completed Parallel DNS resolution of 1 host. at 15:24, 0.04s elapsed
Initiating SYN Stealth Scan at 15:24
Scanning 10.137.211.113 [500 ports]
SYN Stealth Scan Timing: About 30.40% done; ETC: 15:26 (0:01:11 remaining)
SYN Stealth Scan Timing: About 60.30% done; ETC: 15:26 (0:00:40 remaining)
Completed SYN Stealth Scan at 15:26, 101.14s elapsed (500 total ports)
Initiating Service scan at 15:26
Initiating OS detection (try #1) against 10.137.211.113
Initiating Traceroute at 15:26
Completed Traceroute at 15:26, 9.05s elapsed
Initiating Parallel DNS resolution of 1 host. at 15:26
Completed Parallel DNS resolution of 1 host. at 15:26, 0.01s elapsed
NSE: Script scanning 10.137.211.113.
NSE: Starting runlevel 1 (of 2) scan.
Initiating NSE at 15:26
Completed NSE at 15:26, 0.00s elapsed
NSE: Starting runlevel 2 (of 2) scan.
Nmap scan report for 10.137.211.113
Host is up (0.0010s latency).
All 500 scanned ports on 10.137.211.113 are filtered
Device type: general purpose|specialized|media device
Running: Barrelfish, Microsoft Windows 2003|PocketPC/CE|XP, Novell NetWare 3.X, Siemens embedded, Telekom embedded
OS CPE: cpe:/o:barrelfish:barrelfish cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2 cpe:/o:microsoft:windows_ce cpe:/o:microsoft:windows_xp:::professional cpe:/o:novell:netware:3.12
Too many fingerprints match this host to give specific OS details
TCP/IP fingerprint:
SCAN(V=6.00%E=4%D=11/14%OT=%CT=%CU=%PV=Y%G=N%TM=5284EBAB%P=armv7l-unknown-linux-gnueabi)
T7(R=Y%DF=N%TG=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=R)
U1(R=N)
IE(R=N)


TRACEROUTE (using proto 1/icmp)
HOP RTT     ADDRESS
1   2.32 ms zonhub.home (192.168.1.1)
2   ... 30

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 2) scan.
NSE: Starting runlevel 2 (of 2) scan.
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 122.65 seconds
           Raw packets sent: 1109 (49.620KB) | Rcvd: 4 (200B)