|
2022-04-23 11:24:32 | 08:9b:4b:41:a4:5a" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth3): 10.1.2.9 08:9b:4b:41:a7:c6->08:9b:4b:41:a4:5a | 2022-04-23 11:23:44 | 08:9b:4b:41:a4:5a" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth3): 10.1.2.9 08:9b:4b:41:a7:c6->08:9b:4b:41:a4:5a | 2022-04-23 11:22:50 | 08:9b:4b:41:a4:5a" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221); background: rgb(245, 245, 245);">检测到一个ARP地址欺骗在接口(eth3): 10.1.2.9 08:9b:4b:41:a7:c6->08:9b:4b:41:a4:5a | 2022-04-23 11:22:14 | 08:9b:4b:41:a4:5a" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth3): 10.1.2.9 08:9b:4b:41:a7:c6->08:9b:4b:41:a4:5a | 2022-04-23 11:21:46 | 08:9b:4b:41:a4:5a" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth3): 10.1.2.9 08:9b:4b:41:a7:c6->08:9b:4b:41:a4:5a | 2022-04-23 11:21:02 | 08:9b:4b:41:a4:5a" class="" style="box-sizing: border-box; padding: 10px 6px; transition: all 0.4s ease 0s; border-bottom-color: rgb(221, 221, 221);">检测到一个ARP地址欺骗在接口(eth3): 10.1.2.9 08:9b:4b:41:a7:c6->08:9b:4b:41:a4:5a |
现已知 08:9b:4b:41:a7:c6->08:9b:4b:41:a4:5a 这两个MAC地址都是爱快AP,型号是:IK-H17 ,并且AC管理里两个AP的地址不相同。
08:9b:4b:41:a7:c6
10.1.2.3 | 正常
3天1时9分 | | | 2.4G: 11(自动)
5G:36(自动) | IK-H17 | |
08:9b:4b:41:a4:5a
10.1.2.9 | 正常
3天1时9分 | | | 2.4G: 11(自动)
5G:48(自动) | IK-H17 |
自动报ARP地址欺骗后,无线网络延迟较大。
|
|