A chaque fois que mon gamin est à la maison, sinon ça le fait pas.
Que son téléphone soit potentiellement crabé, je m'en tape, il s'en tape car ne comprend pas

Voila la situation:
Je débranche/rebranche le routeur donc changement d'ip public aléatoire et à chaque fois un "gazier" amsterdam [port_scan] suivi d'un "gazier" chez Orange [DOS]
UDP Packet - Source:80.12.25.216,8080 Destination:2.14.44.125,45327 - [DOS]
UDP Packet - Source:80.12.25.216,50264 Destination:2.14.44.125,43196 - [DOS]
UDP Packet - Source:80.12.25.216,8080 Destination:2.14.44.125,45327 - [DOS]
UDP Packet - Source:80.12.25.216,8080 Destination:2.14.44.125,45378 - [DOS]
UDP Packet - Source:80.12.25.216,54196 Destination:2.14.44.125,41827 - [DOS]
UDP Packet - Source:80.12.25.216,8080 Destination:2.14.44.125,45378 - [DOS]
TCP Packet - Source:89.248.163.203 Destination:2.14.44.125 - [PORT SCAN]
TCP Packet - Source:89.248.163.203 Destination:2.14.44.125 - [PORT SCAN]
https://browserleaks.com/ip/89.248.163.203
https://browserleaks.com/ip/80.12.25.216
Ce qui m'intéresse surtout c'est quoi le lien entre les 2 IPs
kitty@kitty:~/Documents/gnu/nikto-master/program$ sudo perl nikto.pl -h 80.12.25.216
[sudo] Mot de passe de kitty :
- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP: 80.12.25.216
+ Target Hostname: 80.12.25.216
+ Target Port: 80
+ Start Time: 2022-12-17 19:37:03 (GMT1)
---------------------------------------------------------------------------
+ Server: nPerf/2.2.7 2022-10-14
+ IP address found in the 'nperfserver-remote-endpoint' header. The IP is "2.14.13.251".
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ Uncommon header 'nperfserver-remote-endpoint' found, with contents: 2.14.13.251
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /crossdomain.xml contains 1 line which include the following domains: *.nperf.com" secure="false
+ Server banner changed from 'nPerf/2.2.7 2022-10-14' to 'ADSL Router'
+ Uncommon header 'conten-type' found, with contents: text/html
+ OSVDB-3093: /admin/upload.php: This might be interesting: has been seen in web logs from an unknown scanner.
+ OSVDB-3093: /tinymsg.php: This might be interesting: has been seen in web logs from an unknown scanner.
+ /#wp-config.php#: #wp-config.php# file found. This file contains the credentials.
+ 8080 requests: 9 error(s) and 11 item(s) reported on remote host
+ End Time: 2022-12-17 19:52:08 (GMT1) (905 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
89.248.163.203 Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times may be slower.
Starting Nmap 7.92 ( https://nmap.org ) at 2022-12-17 20:06 CET
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 20:06
Completed NSE at 20:06, 0.00s elapsed
Initiating NSE at 20:06
Completed NSE at 20:06, 0.00s elapsed
Initiating NSE at 20:06
Completed NSE at 20:06, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 20:06
Completed Parallel DNS resolution of 1 host. at 20:06, 0.00s elapsed
Initiating Connect Scan at 20:06
Scanning recyber.net (89.248.163.203) [1000 ports]
Discovered open port 22/tcp on 89.248.163.203
Completed Connect Scan at 20:06, 2.96s elapsed (1000 total ports)
Initiating Service scan at 20:06
Scanning 1 service on recyber.net (89.248.163.203)
Completed Service scan at 20:06, 0.08s elapsed (1 service on 1 host)
NSE: Script scanning 89.248.163.203.
Initiating NSE at 20:06
Completed NSE at 20:06, 1.18s elapsed
Initiating NSE at 20:06
Completed NSE at 20:06, 0.00s elapsed
Initiating NSE at 20:06
Completed NSE at 20:06, 0.00s elapsed
Nmap scan report for recyber.net (89.248.163.203)
Host is up (0.040s latency).
Not shown: 995 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey:
| 2048 9d:10:7e:52:ed:4c:f5:5a:82:ba:2e:ba:f4:10:f4:4a (RSA)
| 256 b0:fc:90:ca:17:a0:d7:28:f0:18:21:5f:6a:20:36:3b (ECDSA)
|_ 256 82:93:45:86:8e:ec:9e:2d:3d:5c:64:26:5d:4d:1e:ea (ED25519)
25/tcp filtered smtp
1863/tcp filtered msnp
5050/tcp filtered mmcc
5190/tcp filtered aol
NSE: Script Post-scanning.
Initiating NSE at 20:06
Completed NSE at 20:06, 0.00s elapsed
Initiating NSE at 20:06
Completed NSE at 20:06, 0.00s elapsed