tracepath from 22.214.171.124 (ps-latency.hepnetcanada.ca) to 126.96.36.199 (ec2-3-237-66-86.compute-1.amazonaws.com) for 188.8.131.52CGI script maintainer: Les Cottrell, SLAC. Script version 7.7, 8/9/2018, Les Cottrell.
Download perl source code.
To perform a traceroute/ping/tracepath function from ps-latency.hepnetcanada.ca to the target, enter the desired target host.domain (e.g. www.yahoo.com) or Internet address (e.g. 184.108.40.206) in the box below. Note the fucntion is performed for the target's resolved Internet address. Lookup: domain name | Locating a Host | visual traceroute | Find AS of a host | contacting someone
|Related web sites|
What is my IP address?
Please note that traceroutes can appear similar
to port scans. If you see a suspected port scan alert,
for example from your firewall, with
a series of ports in the range 33434 - 33465, coming
from ps-latency.hepnetcanada.ca it is probably a reverse traceroute from our
web based reverse traceroute server. Please do NOT report this to
us, it will almost certainly be a waste of both of our times.
For more on this see|
Traceroute security issues.
Executing exec(/bin/tracepath 220.127.116.11) 1?: [LOCALHOST] pmtu 9000 1: elephant254.heprc.uvic.ca 0.366ms 1: elephant254.heprc.uvic.ca 0.344ms 2: 18.104.22.168 0.388ms 3: emc1clebi24-oran-ix.uvic.ca 24.766ms 4: 362-ix-cr1-uviccle.vctr3.bc.net 25.288ms 5: 362-ix-cr1-uviccle.vctr3.bc.net 24.975ms pmtu 1500 5: vctr3rtr2.canarie.ca 4.885ms 6: sask1rtr2.canarie.ca 54.792ms asymm 15 7: clgr2rtr2.canarie.ca 53.852ms asymm 14 8: wnpg2rtr2.canarie.ca 55.004ms asymm 13 9: 22.214.171.124 54.291ms asymm 12 10: no reply 11: 126.96.36.199 53.888ms 12: 188.8.131.52 53.890ms asymm 15 13: 184.108.40.206 54.015ms 14: no reply 15: no reply 16: no reply 17: no reply 18: no reply 19: no reply 20: 220.127.116.11 75.048ms asymm 32 21: no reply 22: no reply 23: no reply 24: no reply 25: no reply 26: no reply 27: no reply 28: no reply 29: no reply 30: no reply Too many hops: pmtu 1500 Resume: pmtu 1500