![]() ![]() | tracepath from 127.0.0.1 (perf-nyc.sinet.ad.jp) to 3.233.221.90 (ec2-3-233-221-90.compute-1.amazonaws.com) for 3.233.221.90CGI script maintainer: Les Cottrell, SLAC. Script version 7.7, 8/9/2018, Les Cottrell.Download perl source code. To perform a traceroute/ping/tracepath function from perf-nyc.sinet.ad.jp to the target, enter the desired target host.domain (e.g. www.yahoo.com) or Internet address (e.g. 137.138.28.228) in the box below. Note the fucntion is performed for the target's resolved Internet address. Lookup: domain name | Locating a Host | visual traceroute | Find AS of a host | contacting someone | Related web sites Traceroute servers, Monitoring tutorial, Internet monitoring What is my IP address? |
Please note that traceroutes can appear similar
to port scans. If you see a suspected port scan alert,
for example from your firewall, with
a series of ports in the range 33434 - 33465, coming
from perf-nyc.sinet.ad.jp it is probably a reverse traceroute from our
web based reverse traceroute server. Please do NOT report this to
us, it will almost certainly be a waste of both of our times.
For more on this see Traceroute security issues. |
Executing exec(/bin/tracepath 3.233.221.90) 1?: [LOCALHOST] pmtu 9000 1: gateway 0.571ms 1: gateway 0.457ms 2: 150.99.21.60 63.275ms 3: 150.99.21.78 171.862ms 4: 150.99.21.21 168.974ms 5: 150.99.21.21 167.394ms pmtu 1500 5: 202.232.6.17 166.289ms 6: tky009bb01.IIJ.Net 160.398ms 7: sea001bb00.IIJ.Net 270.141ms 8: