[Beowulf] A careful exploit?
Jonathan Engwall
engwalljonathanthereal at gmail.com
Tue Jun 11 19:05:43 PDT 2019
Update:
Centos assures me that all host are down.
On Sun, Jun 9, 2019, 1:41 PM Jonathan Engwall <
engwalljonathanthereal at gmail.com> wrote:
> Hello Beowulf,
> Recently we had serious trouble with the internet. A technician had to
> climb the pole. Another technician, an IT specialist in Mexico City, could
> not resolve the issue, sent the man here.
> Now trouble is back. What does this mean? Where are the missing IPs? From
> the pole to the modem, to my repeater, to my machine, and then my VM gives
> this using nmap:
>
> Starting Nmap 6.40 ( http://nmap.org ) at 2019-06-09 13:30 PDT
> Initiating Ping Scan at 13:30
> Scanning 256 hosts [2 ports/host]
> Completed Ping Scan at 13:31, 6.64s elapsed (256 total hosts)
> Initiating Parallel DNS resolution of 256 hosts. at 13:31
> Completed Parallel DNS resolution of 256 hosts. at 13:31, 0.04s elapsed
> Nmap scan report for 192.168.0.0 [host down]
> Nmap scan report for 192.168.0.1
> Host is up (0.0080s latency).
> Nmap scan report for 192.168.0.2
> Host is up (0.00068s latency).
> Nmap scan report for 192.168.0.3 [host down]
> Nmap scan report for 192.168.0.4 [host down]
> Nmap scan report for 192.168.0.5
> Host is up (0.063s latency).
> Nmap scan report for 192.168.0.6
> Host is up (0.00068s latency).
> Nmap scan report for 192.168.0.7 [host down]
> Nmap scan report for 192.168.0.8 [host down]
> Nmap scan report for 192.168.0.9 [host down]
> Nmap scan report for 192.168.0.10 [host down]
> Nmap scan report for 192.168.0.11 [host down]
>
> Is this a new exploit?
> Thank you,
> Jonathan Engwall
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://beowulf.org/pipermail/beowulf/attachments/20190611/b2f4e9df/attachment.html>
More information about the Beowulf
mailing list