<div dir="ltr"><div dir="ltr"><div>Hello Beowulf,<br></div><div>An update to my question, not a resolution. Something serious happened here a couple weeks ago. See below.<br></div><div><br></div><div>Dragonfly BSD runs a much prettier nmap. 0.5 is gone, or so it seems. Dragonfly is my VM, which has IP 192.168.0.6, thus something is or was at 192.168.0.5.</div><div>Here is Dragonfly BSD's nmap -v -sn 192.168.0.0.24</div><div><br></div><div>Starting Nmap 7.70 ( <a href="https://nmap.org">https://nmap.org</a> ) at 2019-06-09 14:14 PDT<br>Initiating ARP Ping Scan at 14:14<br>Scanning 255 hosts [1 port/host]<br>Completed ARP Ping Scan at 14:14, 2.03s elapsed (255 total hosts)<br>Initiating Parallel DNS resolution of 255 hosts. at 14:14<br>Completed Parallel DNS resolution of 255 hosts. at 14:14, 0.04s elapsed<br>Nmap scan report for 192.168.0.0 [host down]<br>Nmap scan report for 192.168.0.1<br>Host is up (0.0051s latency).<br>MAC Address: ******************** (Unknown)<br>Nmap scan report for 192.168.0.2<br>Host is up (0.00051s latency).<br>MAC Address: ********************* (Netgear)<br>Nmap scan report for 192.168.0.3<br>Host is up (0.021s latency).<br>MAC Address: ********************** (Shenzhen Four Seas Global Link Network Technology)<br>Nmap scan report for 192.168.0.4<br>Host is up (0.00011s latency).<br>MAC Address: *********************** (Dell)<br>Nmap scan report for 192.168.0.5 [host down]<br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sun, Jun 9, 2019 at 1:41 PM Jonathan Engwall <<a href="mailto:engwalljonathanthereal@gmail.com">engwalljonathanthereal@gmail.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div>Hello Beowulf,</div><div>Recently we had serious trouble with the internet. A technician had to climb the pole. Another technician, an IT specialist in Mexico City, could not resolve the issue, sent the man here.</div><div>Now trouble is back. What does this mean? Where are the missing IPs? From the pole to the modem, to my repeater, to my machine, and then my VM gives this using nmap:</div><div><br></div><div>Starting Nmap 6.40 ( <a href="http://nmap.org" target="_blank">http://nmap.org</a> ) at 2019-06-09 13:30 PDT<br>Initiating Ping Scan at 13:30<br>Scanning 256 hosts [2 ports/host]<br>Completed Ping Scan at 13:31, 6.64s elapsed (256 total hosts)<br>Initiating Parallel DNS resolution of 256 hosts. at 13:31<br>Completed Parallel DNS resolution of 256 hosts. at 13:31, 0.04s elapsed<br>Nmap scan report for 192.168.0.0 [host down]<br>Nmap scan report for 192.168.0.1<br>Host is up (0.0080s latency).<br>Nmap scan report for 192.168.0.2<br>Host is up (0.00068s latency).<br>Nmap scan report for 192.168.0.3 [host down]<br>Nmap scan report for 192.168.0.4 [host down]<br>Nmap scan report for 192.168.0.5<br>Host is up (0.063s latency).<br>Nmap scan report for 192.168.0.6<br>Host is up (0.00068s latency).<br>Nmap scan report for 192.168.0.7 [host down]<br>Nmap scan report for 192.168.0.8 [host down]<br>Nmap scan report for 192.168.0.9 [host down]<br>Nmap scan report for 192.168.0.10 [host down]<br>Nmap scan report for 192.168.0.11 [host down]</div><div><br></div><div>Is this a new exploit?</div><div>Thank you,</div><div>Jonathan Engwall<br></div></div>
</blockquote></div></div>