UPDATE 10/4 6:47 EDT
I have been going through all the comments. THANKS!!! I did not know about the techniques listed, so they are extremely helpful. Sorry for the slow update. As I mentioned below, I got behind with this yesterday so work cut into my evening.
I ran a port scan. The first syntax, -p, brought no joy. The nmap software itself suggested changing to -Pn. That brought an interesting response:
nmap -Pn 1-9999 <Local IP Addr>
Starting Nmap 7.93 ( https://nmap.org ) at 2024-10-04 11:44 BST Failed to resolve “1-9999”. Nmap scan report for <Local IP Address> Host is up (0.070s latency). All 1000 scanned ports on 192.168.0.46 are in ignored states. Not shown: 990 filtered tcp ports (no-response), 10 filtered tcp ports (host-unreach)
Nmap done: 1 IP address (1 host up) scanned in 6.03 seconds
Just to be absolutely sure, I turned off my work computer (the only windows box on my network) and reran the same syntax with the same results.
As I read this, there is definitely something on my network running windows that is not showing up on the DHCP.
nmap’s seeing the 1-9999 as the next argument (expecting an IP address). In -Pn, the n is a placeholder for the port numbers you want to scan, so you want -P1-9999
Besides the MAC lookup suggestion, have you tried to simply find hostname in local DNS by reverse IP lookup, maybe that would shed some light.
Not sure if there is anything useful, but in browser just check site source, maybe there is something useful there that could help with identification. Does site have certificate? It might include info that would help with identification. Do the standard browser network trace via dev tools F12, maybe something useful appears there.
In nmap you can attempt to guess OS, try that. Additionally it might be possible to get hostname as well.
And have you checked your router to see if this connection is connected to your Wi-Fi AP or Ethernet to narrow things down? If it is not possible to determine this from router, simply connect your main PC to Ethernet, disable AP in router settings and check if IIS site is still up. If it is not, enable AP again, does it come back early or it takes some time?
Lastly, if it still is a mystery, start powering off devices one by one to find the source. Based on comments it seems you have multiple devices, but I assume it would not take that long?
You don’t have Ethernet over power do you?
Fun story, I live in a townhome, I had so bizarre network issues going on. Not able to stream to TV etc. finally started unplugging shit. Unplugged the router and saw the computer still happily downloading something WTF! Turns out a neighbor also had Ethernet over power and devices were randomly connecting to their network. Crazy ass shit.
I’m confused. Are you talking about power over ethernet or power-line ethernet?
There are Ethernet extenders that can utilize the power lines. They basically plug into an outlet and you stick an Ethernet into them and do the same somewhere else in the house.
Exactly, except mine was talking to the neighbors :p
It’s me. I’m your nextdoor neighbour. Sorry!
Maybe set up Kismet https://www.kismetwireless.net/
That’ll show devices attempting to break in wirelessly
… So when you port scanned it, IIS was gone?
Bro, you gotta keep us updated, I’m surprisingly invested in this now.
I lost my entire morning to this yesterday. I had to work late to catch up. There are some good ideas in here I’m starting on now.
Windows IIS probably from around the time of windows 8 so maybe 2012. Probably running on either windows server 2012 (like exchange, an active directory domain controller, or if you are unlucky sharepoint) or some weirdly configured appliance running windows 8 ish enterprise.
Thanks. This helps. My work computer is way newer than that. It makes me think it could be networking hardware. I have some kit that’s about that old.
Maybe try traceroutre or lft (layer 4 traceroutre) to see if something wacky is happening with routing in your lan?
Following, I want to know what god awful iot device this is. Refrigerator? Toaster oven? Vibrating dildo? The suspense is killing me
Nobody wants windows on a vibrating dildo
I mean, Windows already fucks us metaphorically
Maybe I want my vibrating dildo to take an hour to load and come with spyware
I have a Bluetooth controlled vibrator. Reverse engineered the app (which has a chat function) and it has a blacklist of words (mainly Chinese) you’re not allowed to text using the app.
I did not check if your horny chat gets copied to Chinese spy agencies, but I suspect that will be done on the server.
load and come
Hey, I’m not normally one to judge but it seems like a bad idea to call yourself spyware. Either you’re going to blow your cover or it’s just negative self talk.
blow
It’s the default page for a Windows Server running IIS web server.
You’re looking at my worst nightmare 😅
I would download metasploit and dig up some interesting exploits to try against it.
Others haven’t suggested this yet, but a single device, like your laptop, even with one connection, can have two IPs.
Thanks. It is neither the Ethernet nor the Wi-Fi on my windows laptop.,
Don’t just turn your devices off when testing - - unplug them. An off computer can still respond to network requests.
I did not think of this. I will have to go into the bios to turn off the battery of my work laptop.
There’s Power Over Ethernet too.
So, as others have saId this is just an unconfigured IIS server, which implies it’s either a windows machine, or a windows based VM, well or someone put the default IIS files on another server, but that’s unlikely.
When you say “weird” IP I’d wonder what you mean by that.
I think since it’s probably a windows machine, from another windows machine typing nbtstat -A <ip> should give you the computer name and workgroup or domain they belong to. See if it matches anything you expect on your network.
If not, maybe it’s time to change your WPA wifi key.
It could be a configured one with the default greet page still up.
Thanks. I ran nbtstat and it came up empty.
Edit: Also, I am big on wired networks. I mostly save WI-FI for smart and mobile devices. There is a lot of stuff on Ethernet that does not need a password.
Hmm. That would mean it’s likely one of the following (well perhaps more options, but these spring to mind)
- A windows machine that has the network set as a public network, or netbios specifically blocked on LAN.
- A windows machine that has all the netbios services disabled.
- Not a windows machine, or a container as others suggested that’s running some kind of IIS install
- Not a windows machine at all but for some weird reason IIS files and a web server setup.
I think you suggested in another comment, that it’s not in your DHCP client list but has an IP in your normal range. Which suggests it is setup with a static IP. That is odd.
Some other people suggested it could be a container that is using a real IP rather than the NAT that docker etc usually use. I do know that you can use real IPs in containers, I’ve done it on my NAS to get a “proper” linux install on top of the NAS lite linux that is provided. But I would have expected that you’d know about that, since it would require someone to actually choose the IP address to use.
If you have managed switches you could find which port on which switch the MAC address (as found by lookuping up the arp record for the IP using arp -a) is on (provided the switch allows access to the forwarding tables). Of course, if they’re on Wi-Fi it’s only going to lead to the access point they’re connecting to.
At least get WPA2
I don’t even think my current wifi kit has WPA (1) as an option. It’s WPA2 or 3 only I’m pretty sure.
Get the MAC address from the ARP table, and look up the OIN, should help you determine if it’s virtual or physical, and if physical the type of NIC it’s using.
That gave nothing useful
The first few octets of the Mac address are unique to a manufacturer. This may at least help narrow which device it is. You can look it up at https://macaddress.io/
Sorry, I meant the OUI ( was going by memory ) . It’s the part that you can look up that tells your what kind of device the MAC address belongs to.
Thanks!
Did this actually help?