V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
V2EX  ›  RoyCho  ›  全部回复第 2 页 / 共 5 页
回复总数  93
1  2  3  4  5  
@thereone 网关是 10.24.230.1 的大内网 ip
@kome 没有哎,之前怀疑过的设备这几年陆续都升级换掉了,一直在用的设备也就剩下个 tp-link 摄像头,洗衣机,空调是一直联网的,最烦的就是干扰不是持续的,不好查,有时候 openvpn 连回家都会被干扰
@lcy630409 而且正常探查不到,要是能一直探查到通过拔网线也能揪出来了,就很偶尔几个月来这么一下,重新获取就没了
@thereone 移动的 IPTV 没有专门的线路,就跟普通第三方机顶盒一样用家庭内网 ip 就行了
@keyfunc 没有,移动的 UPTV 没有专门的线路,就跟普通第三方机顶盒一样用家庭内网 ip 就行了
@lcy630409 mac 地址找过,上面有贴出来抓包信息,应该是个虚拟 mac 地址
@n2l 你是 openwrt 吗?像我一向关了来自 wan 口的 dhcp 响应看看
@n2l 我的光猫 dhcp 已经关掉了,分配的也不是光猫的网段
@thereone IPTV 跟普通内网设备一样获取内网地址的,我这边 iptv 没有专门的网络
@ziseyinzi 是吧,正常家用设备都是 192.168.x.1 作为 dhcp 服务器,192.168.1.254 跟服务器名 3g 真的很像运营商设备,加上 ping 不通...
@thereone 看漏了,补充下有 IPTV ,但移动的 IPTV 好像不用专门 IPTV 口的
@thereone 光猫是 192.168.12.x 网段,光猫已经换第三个了,不可能是光猫了,前面两个是运营商的,但是同一个牌子,换第二个的时候我还有怀疑,最近我才换了第三方的万兆光猫
@xqzr traceroute to 192.168.1.113 (192.168.1.113), 30 hops max, 46 byte packets
1 221.178.219.99 1.554 ms
2 120.195.79.193 1.869 ms
3 192.168.1.113 3.570 ms
不同的 ipTranceroute 还稍有不同...
@niukuo 抓包吗?可是大部分时候都是正常的,是不是得有干扰的时候才能抓到有效的包?
@xqzr
traceroute to 192.168.1.33 (192.168.1.33), 30 hops max, 46 byte packets
1 221.178.219.99 1.212 ms
2 112.0.184.77 2.082 ms
3 192.168.1.33 3.265 ms
@kome DHCP 都是默认配置的,装过 smartdns 我想跟这个也没关系,我自己的内网是 192.168.30.x ,家里没有 192.168.1.x 的网段,却可以 ping 通 192.168.1.x 网段,之后发现 192.168.1.x ping 的网段延迟跟 Tranceroute 都表明是一个光猫外的设备,192.168.1.x 网段是跨了两个运营商公网 ip 到达的
@kome 没有开 DHCP relay 呢,问了 chatgpt 我这种情况确实可能是运营商的 dhcp 服务器干扰的,只能先关了 Allow-DHCP-Renew 再看看,家里的设备能排查的都排查了,唯一一个这么多年没换过的 tp-link 的无线摄像头,我觉得可能性不大,也确认过没有人私接设备到我的网络里,这种 192.168.1.254 的 dhcp 服务器地址,我觉得更像会是运营商的设置,加上服务器名是 3g ,更可疑了
@fuzzsh 家里的可以设备这些年都换了个遍,实在是不懂还有什么设备了,或者有什么排查的方法吗?我贴的抓包信息能看出什么关键信息吗
@fuzzsh 我应该没动过相关的默认规则,会不会是路由器本机 DHCP 服务( dnsmasq 或 odhcpd ),对 WAN 接口收到的 DHCP 包进行了处理,路由器可能错误地把它当作合法来源,再通过 DHCP 服务给 LAN 客户端回应。也就是说,不是 WAN → LAN 的防火墙转发,而是 路由器自己接收到 WAN DHCP 后,作为 DHCP 服务器响应 LAN 。
@infinet 我也搞不懂,只能暂时再观察下,内网实在没有这种机器了,抓包看了下也不是很懂。

Frame 2: 314 bytes on wire (2512 bits), 314 bytes captured (2512 bits) on interface \Device\NPF_{E5D10228-16CC-4B04-9F8B-5611DC6D238B}, id 0
Section number: 1
Interface id: 0 (\Device\NPF_{E5D10228-16CC-4B04-9F8B-5611DC6D238B})
Encapsulation type: Ethernet (1)
Arrival Time: Jun 18, 2024 22:57:34.085063000 中国标准时间
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1718722654.085063000 seconds
[Time delta from previous captured frame: 0.000749000 seconds]
[Time delta from previous displayed frame: 0.000000000 seconds]
[Time since reference or first frame: 0.000749000 seconds]
Frame Number: 2
Frame Length: 314 bytes (2512 bits)
Capture Length: 314 bytes (2512 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ethertype:ip:udp:dhcp]
[Coloring Rule Name: UDP]
[Coloring Rule String: udp]
Ethernet II, Src: 00:ff:e6:d1:02:28 (00:ff:e6:d1:02:28), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Destination: Broadcast (ff:ff:ff:ff:ff:ff)
Source: 00:ff:e6:d1:02:28 (00:ff:e6:d1:02:28)
Type: IPv4 (0x0800)
Internet Protocol Version 4, Src: 192.168.1.254, Dst: 255.255.255.255
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 300
Identification: 0x0000 (0)
000. .... = Flags: 0x0
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 16
Protocol: UDP (17)
Header Checksum: 0xe71b [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.254
Destination Address: 255.255.255.255
User Datagram Protocol, Src Port: 67, Dst Port: 68
Source Port: 67
Destination Port: 68
Length: 280
Checksum: 0xc2c7 [unverified]
[Checksum Status: Unverified]
[Stream index: 1]
[Timestamps]
UDP payload (272 bytes)
Dynamic Host Configuration Protocol (Offer)
Message type: Boot Reply (2)
Hardware type: Ethernet (0x01)
Hardware address length: 6
Hops: 0
Transaction ID: 0x24d6d8f2
Seconds elapsed: 0
Bootp flags: 0x0000 (Unicast)
Client IP address: 0.0.0.0
Your (client) IP address: 192.168.1.102
Next server IP address: 192.168.1.254
Relay agent IP address: 0.0.0.0
Client MAC address: 00:ff:e5:d1:02:28 (00:ff:e5:d1:02:28)
Client hardware address padding: 00000000000000000000
Server host name not given
Boot file name not given
Magic cookie: DHCP
Option: (53) DHCP Message Type (Offer)
Length: 1
DHCP: Offer (2)
Option: (54) DHCP Server Identifier (192.168.1.254)
Option: (51) IP Address Lease Time
Length: 4
IP Address Lease Time: (31536000s) 365 days
Option: (1) Subnet Mask (255.255.255.0)
Length: 4
Subnet Mask: 255.255.255.0
Option: (15) Domain Name
Length: 2
Domain Name: 3G
Option: (6) Domain Name Server
Length: 4
Domain Name Server: 192.168.1.10
Option: (255) End

下面这个是另一个我觉得跟这个问题相关的包
Frame 657: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on interface \Device\NPF_{10FB3DBC-1CF5-41F2-8653-8C8FF89365B8}, id 0
Section number: 1
Interface id: 0 (\Device\NPF_{10FB3DBC-1CF5-41F2-8653-8C8FF89365B8})
Interface name: \Device\NPF_{10FB3DBC-1CF5-41F2-8653-8C8FF89365B8}
Interface description: WLAN 2
Encapsulation type: Ethernet (1)
Arrival Time: Aug 24, 2025 12:54:20.430748000 中国标准时间
UTC Arrival Time: Aug 24, 2025 04:54:20.430748000 UTC
Epoch Arrival Time: 1756011260.430748000
[Time shift for this packet: 0.000000000 seconds]
[Time delta from previous captured frame: 0.011937000 seconds]
[Time delta from previous displayed frame: 0.011937000 seconds]
[Time since reference or first frame: 16.853005000 seconds]
Frame Number: 657
Frame Length: 60 bytes (480 bits)
Capture Length: 60 bytes (480 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ethertype:arp]
[Coloring Rule Name: ARP]
[Coloring Rule String: arp]
Ethernet II, Src: 00:ae:4f:44:87:0f (00:ae:4f:44:87:0f), Dst: CloudNetwork_e5:14:c3 (4c:82:a9:e5:14:c3)
Destination: CloudNetwork_e5:14:c3 (4c:82:a9:e5:14:c3)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
Source: 00:ae:4f:44:87:0f (00:ae:4f:44:87:0f)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
Type: ARP (0x0806)
[Stream index: 5]
Padding: 000000000000000000000000000000000000
Address Resolution Protocol (request)
Hardware type: Ethernet (1)
Protocol type: IPv4 (0x0800)
Hardware size: 6
Protocol size: 4
Opcode: request (1)
Sender MAC address: 00:ae:4f:44:87:0f (00:ae:4f:44:87:0f)
Sender IP address: 172.31.80.69
Target MAC address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Target IP address: 192.168.1.102


我的设备刚刚被分配到 192.168.1.102 这个非法地址,而且我也不清楚 172.31.80.69 这个 ip 是什么,看起来像运营商设备 ip
1  2  3  4  5  
关于   ·   帮助文档   ·   自助推广系统   ·   博客   ·   API   ·   FAQ   ·   Solana   ·   1203 人在线   最高记录 6679   ·     Select Language
创意工作者们的社区
World is powered by solitude
VERSION: 3.9.8.5 · 13ms · UTC 23:34 · PVG 07:34 · LAX 16:34 · JFK 19:34
♥ Do have faith in what you're doing.