![]() ![]() | tracepath from 147.231.25.192 (ps01-l.farm.particle.cz) to 3.239.6.58 (ec2-3-239-6-58.compute-1.amazonaws.com) for 3.239.6.58CGI script maintainer: Les Cottrell, SLAC. Script version 7.7, 8/9/2018, Les Cottrell.Download perl source code. To perform a traceroute/ping/tracepath function from ps01-l.farm.particle.cz to the target, enter the desired target host.domain (e.g. www.yahoo.com) or Internet address (e.g. 137.138.28.228) in the box below. Note the fucntion is performed for the target's resolved Internet address. Lookup: domain name | Locating a Host | visual traceroute | Find AS of a host | contacting someone | Related web sites Traceroute servers, Monitoring tutorial, Internet monitoring What is my IP address? |
Please note that traceroutes can appear similar
to port scans. If you see a suspected port scan alert,
for example from your firewall, with
a series of ports in the range 33434 - 33465, coming
from ps01-l.farm.particle.cz it is probably a reverse traceroute from our
web based reverse traceroute server. Please do NOT report this to
us, it will almost certainly be a waste of both of our times.
For more on this see Traceroute security issues. |
Executing exec(/bin/tracepath 3.239.6.58) 1?: [LOCALHOST] pmtu 1500 1: router.farm.particle.cz 7.920ms 1: router.farm.particle.cz 4.031ms 2: 147.231.18.213 3.951ms 3: cesnetzikova-bgpovc.pasnet.cz 3.618ms 4: 195.113.235.99 3.151ms 5: 213.144.184.24 7.612ms asymm 6 6: ffm-b5-link.ip.twelve99.net 7.439ms 7: ffm-bb1-link.ip.twelve99.net 7.614ms asymm 9 8: prs-bb1-link.ip.twelve99.net 35.439ms asymm 10 9: rest-bb1-link.ip.twelve99.net 92.364ms asymm 10 10: ash-b2-link.ip.twelve99.net 96.561ms asymm 9 11: