![]() ![]() | tracepath from 206.12.154.60 (ps-bandwidth.hepnetcanada.ca) to 44.212.96.86 (ec2-44-212-96-86.compute-1.amazonaws.com) for 44.212.96.86CGI script maintainer: Les Cottrell, SLAC. Script version 7.7, 8/9/2018, Les Cottrell.Download perl source code. To perform a traceroute/ping/tracepath function from ps-bandwidth.hepnetcanada.ca to the target, enter the desired target host.domain (e.g. www.yahoo.com) or Internet address (e.g. 137.138.28.228) in the box below. Note the fucntion is performed for the target's resolved Internet address. Lookup: domain name | Locating a Host | visual traceroute | Find AS of a host | contacting someone | Related web sites Traceroute servers, Monitoring tutorial, Internet monitoring What is my IP address? |
Please note that traceroutes can appear similar
to port scans. If you see a suspected port scan alert,
for example from your firewall, with
a series of ports in the range 33434 - 33465, coming
from ps-bandwidth.hepnetcanada.ca it is probably a reverse traceroute from our
web based reverse traceroute server. Please do NOT report this to
us, it will almost certainly be a waste of both of our times.
For more on this see Traceroute security issues. |
Executing exec(/bin/tracepath 44.212.96.86) 1?: [LOCALHOST] pmtu 9000 1: elephant254.heprc.uvic.ca 0.329ms 1: elephant254.heprc.uvic.ca 0.312ms 2: 142.104.100.69 0.371ms 3: cle-core-edge.bb.uvic.ca 45.262ms 4: 207.23.244.233 1.187ms 5: 207.23.244.233 45.714ms pmtu 1500 5: no reply 6: 99.83.68.239 57.792ms asymm 10 7: 99.83.68.238 56.875ms asymm 11 8: 52.93.3.72 57.388ms asymm 16 9: