Logo

Session Traces

Test run at: 2022-09-04 21:22:26 GMT
Client Prefix: 109.201.133.x/24
Client AS: 43350 (NFORCE)
Attempted Spoofs: 60

Your test session probed the following paths:

IPAutonomous System
Path 1 (to: 78.41.116.2)
* * *0
109.201.133.x/2443350
* * *0
80.249.211.1230
* * *0
* * *0
* * *0
* * *0
78.41.116.235492
Path 2 (to: 128.223.157.13)
* * *0
* * *0
* * *0
* * *0
* * *0
Path 3 (to: 128.232.97.9)
* * *0
109.201.133.x/2443350
* * *0
* * *0
212.187.216.2383356
* * *0
* * *0
* * *0
* * *0
146.97.41.38786
* * *0
* * *0
131.111.6.114786
193.60.89.14786
* * *0
* * *0
128.232.97.9786
Path 4 (to: 130.206.158.142)
* * *0
* * *0
* * *0
130.117.49.145174
* * *0
* * *0
* * *0
* * *0
* * *0
Path 5 (to: 139.18.11.241)
* * *0
* * *0
185.107.116.2243350
* * *0
* * *0
* * *0
141.57.252.229680
139.18.122.81680
* * *0
139.18.11.241680
Path 6 (to: 192.42.115.98)
* * *0
* * *0
* * *0
* * *0
145.145.178.2321103
145.145.176.411103
* * *0
* * *0
192.42.115.981103
Path 7 (to: 192.107.171.130)
* * *0
* * *0
* * *0
* * *0
* * *0
Path 8 (to: 192.172.226.242)
* * *0
109.201.133.x/2443350
213.244.134.2253356
* * *0
4.35.156.663356
* * *0
137.164.11.832152
* * *0
* * *0
192.12.207.46195
* * *0
* * *0
192.172.226.2421909
Path 9 (to: 192.172.226.247)
* * *0
109.201.133.x/2443350
* * *0
* * *0
4.35.156.663356
137.164.11.712152
* * *0
* * *0
137.164.23.432152
192.12.207.46195
192.172.226.2471909
Path 10 (to: 193.1.33.5)
* * *0
109.201.133.x/2443350
* * *0
* * *0
* * *0
154.54.62.42174
* * *0
* * *0
* * *0
* * *0
87.44.56.1781213
193.1.33.51213
Path 11 (to: 203.181.248.51)
* * *0
109.201.133.x/2443350
* * *0
* * *0
154.54.56.93174
* * *0
* * *0
* * *0
154.54.42.165174
154.54.5.89174
* * *0
154.54.44.137174
* * *0
38.88.224.178174
111.87.3.1132516
106.187.13.52516
* * *0
203.181.102.1302516
203.181.249.1007660
203.181.248.517660
Path 12 (to: 204.235.64.14)
* * *0
* * *0
* * *0
* * *0
129.250.5.12914
* * *0
* * *0
* * *0
206.126.237.420
* * *0
* * *0
* * *0
* * *0
* * *0
Last Modified