How come that I ping an IP address (currently online in the same LAN network) and I get the reply "Request timed out" ?
Note: I use Win*8, that computer has WinXP installed.
Thanks for your answers
How come that I ping an IP address (currently online in the same LAN network) and I get the reply "Request timed out" ?
Note: I use Win*8, that computer has WinXP installed.
Thanks for your answers
This means that the target computer is firewalled:-) It's configured to discard incoming ping packets. The firewall is either the built-in WinXP firewall, or a *rd party product.
MrByte
Last edited by MrByte; 06-16-2004 at 11:20 AM.
When you "ping" a destination you send a "ICMP" Internet Control Message Protocol request to its port 0 and you wait till receiving the echo.
As MrByte said, If the destination's port 0 (zero) is closed/stealth by a firewall, you won't get any echo reply, your ping request will end up by a "Request timed out".
[url=http://fever.resourcez.com]fEǚ.法Er[/url]
hi,
You won't get a ping reply, if its a token ring either.
Data.
Hiya I'm new here and I have run into the same problem when I run a ping. I can get a WHOIS on the IP, but cannot get any furhter info on an IP using a trace route. It gets timed out during the last three checks and then tells me host is unreachable.
Data: what is a token ring? I am not familar with that.
Also, is there anyway to tell if a person is using a cloaking software or a cloaking site? For example, if a banned member were to use cloaking software or a cloaking site to access a forum could it retain the same IP each time that particular member logs in to post?
My friend said that it would, but it just doesn't seem like it would.
Any help would be greatly appreciated.
It is a [url=http://www.webopedia.com/TERM/N/network.html]network architecture[/url] developed by IBM.Originally posted by ladyhawk .............
Data: what is a token ring? I am not familar with that.
[url=http://fever.resourcez.com]fEǚ.法Er[/url]
Edited: No spam
Last edited by DATA; 07-12-2004 at 04:51 AM.
Edited by Data:
Last edited by DATA; 07-12-2004 at 04:51 AM.
hi,
Thanks for chipping in fever.
The idea is that in a token ring only the computer holding the token can communicate. if at this time, a ping is directed to some other computer on the network, it cannot generate a ping reply unless that computer is holding the token when the ping request arrived.
If you are using a cloaking website, the ip address of that site is logged on the forums. It is at times possible to query for certain parameters on a client. It can be prevented by disabling javascript,xml script etc...The site providing the service usually logs all your activities when you are using their services.
Data.
Thanks for the info Fever and Data.
I have a forum and I am having problems with banned members re-registering under different names. Now when they are banned, their IPs are banned also, but still they manage to using either a cloak or a website to alter their IP...but what I'm wondering is if there is a program out there that I can use to detect when one of these banned members is using such a program. A friend of mine s***ested NeoTrace, but I am not quite familiar with how that program works.
Thanks again for the help.
hi,
The problem is that they can come from a different isp and re-register. It is best to tell them privately that they are now welcome and ask them to leave.
You can otherwise modify your ban mask.
for example
ban ip.ip.ip.* should ban all ip's in the last octect
A wider ban would be
ban ip.ip.*.* here we are banning users from last to octects, use it judiciously as you wouldn't want innocent users in that ip range to be banned.
Neotrace performs a trace route if I remember corretly. All it does is to trace the path/route from source to destination.
look at this url
[url]http://all-nettools.com/toolbox[/url]
and do a trace route on an ip. That should give a clear picture of how it works.
Data.
add in your .htaccess
deny from *.*.*.
this ban from access C type of network. they be redirected to your 40* page if you use ErrorDocument 40* [url]http://domain.com/page.html[/url]
where * - numbers from ip address
for example -
deny from *27.0.0.
block all hits from all 256 ips in network.
not onlyOriginally posted by DATA
Neotrace performs a trace route if I remember corretly. All it does is to trace the path/route from source to destination.
it also show geo location of servers what packets passed trought at world map and have other useful options
hi tolik,
yes-nmap does come with the features you mentioned. thank you.
Data.
Thanks so much for the help!
Now I have another question. I have run into a small problem where it appears that a couple of members at my site have the same IP address, but do not live in the same home. But they both use AOL. I know I read somewhere, but I can't remember where, about AOL sometimes mimics their IPs and sometimes it appears to the same person, same home, but it's not. How can I find out for sure?
Any help is greatly appreciated. Thanks in advance.