Unknown Device on Network

Noticed a couple of devices (named Radar 40 and Radar 55) on my network I could apparently cast to and eventually traced it to an IP on my network. I've accounted for every single physical device besides that one. I tried to port scan it but despite it appearing as active on my router nmap kept telling me the host was down. I tried actually casting something to it and then it suddenly started responding to nmap:

Starting Nmap 7.70 ( nmap.org ) at 2019-04-22 10:18 PDT
Initiating ARP Ping Scan at 10:18
Scanning 192.168.1.123 [1 port]
Completed ARP Ping Scan at 10:18, 0.03s elapsed (1 total hosts)
Initiating System DNS resolution of 1 host. at 10:18
Completed System DNS resolution of 1 host. at 10:18, 5.10s elapsed
Initiating SYN Stealth Scan at 10:18
Scanning 192.168.1.123 [65536 ports]
Completed SYN Stealth Scan at 10:18, 12.20s elapsed (65536 total ports)
Initiating OS detection (try #1) against 192.168.1.123
Retrying OS detection (try #2) against 192.168.1.123
Nmap scan report for 192.168.1.123
Host is up, received arp-response (0.0072s latency).
All 65536 scanned ports on 192.168.1.123 are closed because of 65536 resets
MAC Address: 40:4E:36:21:57:B3 (HTC)
Too many fingerprints match this host to give specific OS details
TCP/IP fingerprint:
SCAN(V=7.70%E=4%D=4/22%OT=%CT=1%CU=34622%PV=Y%DS=1%DC=D%G=N%M=404E36%TM=5CBDF779%P=x86_64-solus-linux-gnu)
SEQ(CI=I%II=I)
T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
IE(R=Y%DFI=N%T=40%CD=S)

Network Distance: 1 hop

Read data files from: /usr/bin/../share/nmap
OS detection performed. Please report any incorrect results at nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 19.13 seconds
Raw packets sent: 65551 (2.885MB) | Rcvd: 65550 (2.623MB)


As far as I can tell there's nothing useful there. What else can I do?

Attached: Screenshot_20190418-082749.png (1920x1080, 140K)

cast hardcore porn to both of them

Yeah op cast hardcore trap porn to them

post hardcore BLACKED porn to them

that happened to me the other week - turned out to be a lightbulb my brother had bought.

was outside the DHCP range as well, very odd.

It doesn't actually complete the transaction, it just makes the connection count skyrocket and enabled nmap to work. It was disappointing to say the least. Nothing fun is coming out of this at all so far.

>Google shit in your home network
Yikes

>Hostname is Radar
>MAC address is in the range for HTC devices
Have you considered that they might be HTC Radars?

IoT needs to die already

It's an HTC chip, my router told me that already. Not super useful.
So its two phone access points that are somehow magically tapped into my network?

Its one of these fuckers isn't it? They better watch out because I'm coming for them.

Attached: www.gsmarena.com_htc_radar-4131.php.png (711x470, 50K)

It's probably just WiFi Direct, not an access point and not related to your network

>not related to your network
>has an ip address in his wlan

Once found out the neighbor has one of those fridges with a computer in it.

Its connected to my network

do you live near an airbase, spystation or someting?

kick it then change pass

Never mind I'm an idiot. Still doesn't explain the Radar 40 and Radar 55 cast devices, but it explains the device on my network that responds to my casting activity.

Attached: Screenshot (Apr 22, 2019 11_39_34 AM).png (1080x1920, 112K)

thanks user

No it isn't

Okay so this is probably what it is after realizing I'm dumb as rocks in Is there any easy way to identify the device? Now that I know its not on my network I'm not as motivated to investigate any further. Oh well. I thought I had something interesting going on.

Well yeah that's obvious now, but lets pretend didn't happen. What could I possibly be seeing in my router's list of ACTIVE CLIENTS that isn't a device connected to the network? I'd love to know your thought process.

You have not shown your router's list of active clients, so I don't know why you'd expect any answers about it

I literally posted the nmap output of me trying to port scan it dumdum.

Attached: 192.168.1.1_Status_Lan.asp.png (703x20, 4K)

Yeah, you posted the output of an nmap scan of an unrelated device, which is not a list of active clients, and is a device connected to your network normally

What the fuck question are you even trying to ask?

Okay bye. Thread over