The ICSI Netalyzr
Start » Analysis » Results
Result Summary
63.239.94.10
Recorded at 02:18 EDT (06:18 UTC), Jun 18 2013. Permalink. Client/server transcript.

Summary of Noteworthy Events
Address-based Tests
NAT detection (?): NAT Detected

Your global IP address is 63.239.94.10 while your local one is 10.71.2.195. You are behind a NAT. Your local address is in unroutable address space.

Your machine numbers TCP source ports sequentially. The following graph shows connection attempts on the X-axis and their corresponding source ports used by your computer on the Y-axis.

port sequence plot

TCP ports are not renumbered by the network.

Local Network Interfaces (?): OK
Your computer reports the following network interfaces, with the following IP addresses for each one:
  • en0: (an ethernet interface)
    • fe80::60c:ceff:fedb:8222 [mnot-laptop.local] (a link-local IPv6 address)
    • 10.71.2.195 (a private IPv4 address)
  • lo0: (a local loopback interface)
    • ::1 [localhost] (an IPv6 loopback address)
    • fe80::1 (a link-local IPv6 address)
    • 127.0.0.1 [localhost] (an IPv4 loopback address)
  • utun0:
    • 172.19.124.56 (a private IPv4 address)
DNS-based host information (?): Warning
You are not a Tor exit node for HTTP traffic.
You are listed on the following Spamhaus blacklists: XBL
The SORBS DUHL believes you are using a statically assigned IP address.
Reachability Tests
TCP connectivity (?): Note
Direct TCP access to remote FTP servers (port 21) is allowed.
Direct TCP access to remote SSH servers (port 22) is allowed.
Direct TCP access to remote SMTP servers (port 25) is allowed.
Direct TCP connections to remote DNS servers (port 53) succeed, but do not receive the expected content.

A DNS proxy or firewall generated a new request rather than passing the client's request unmodified.

A DNS proxy or firewall caused the client's direct DNS request to arrive from another IP address. Instead of your IP address, the request came from 74.125.187.209.

Direct TCP access to remote HTTP servers (port 80) is allowed.
Direct TCP access to remote POP3 servers (port 110) is allowed.
Direct TCP access to remote RPC servers (port 135) is allowed.
Direct TCP access to remote NetBIOS servers (port 139) is allowed.
Direct TCP access to remote IMAP servers (port 143) is allowed.
Direct TCP access to remote SNMP servers (port 161) is allowed.
Direct TCP access to remote HTTPS servers (port 443) is allowed.
Direct TCP access to remote SMB servers (port 445) is allowed.
Direct TCP access to remote SMTP/SSL servers (port 465) is allowed.
Direct TCP access to remote secure IMAP servers (port 585) is allowed.
Direct TCP access to remote authenticated SMTP servers (port 587) is allowed.
Direct TCP access to remote IMAP/SSL servers (port 993) is allowed.
Direct TCP access to remote POP/SSL servers (port 995) is allowed.
Direct TCP access to remote OpenVPN servers (port 1194) is allowed.
Direct TCP access to remote PPTP Control servers (port 1723) is allowed.
Direct TCP access to remote SIP servers (port 5060) is allowed.
Direct TCP access to remote BitTorrent servers (port 6881) is allowed.
Direct TCP access to remote TOR servers (port 9001) is allowed.
UDP connectivity (?): Note

We are unable to deliver non-DNS UDP datagrams to our servers. Possible reasons include a restrictive Java security policy, a blocking rule imposed by your firewall or personal firewall configuration, or filtering performed by your ISP. Although it means we cannot conduct the latency and bandwidth tests, it does not necessarily indicate a problem with your network.

Traceroute (?): Not executed
The test was not executed. Required functionality was unavailable or not permitted, or this session dates from a time before Netalyzr supported this test.
Path MTU (?): Not executed
The test was not executed. Required functionality was unavailable or not permitted, or this session dates from a time before Netalyzr supported this test.
Hidden Proxy Detection (?): Warning

Netalyzr detected the following proxies:

    • Port: 80 (HTTP), Response Time: 29 ms
Network Access Link Properties
Network performance (?): Prohibited
The client was not permitted to run this test in its entirety. We encourage you to re-run Netalyzr, allowing it to conduct its tests if prompted. However, some system configurations will always block this test. See the corresponding FAQ for help.
TCP connection setup latency (?): 110ms
The time it takes your computer to set up a TCP connection with our server is 110 ms, which is good.
Background measurement of network health (?): Not executed
The test was not executed. Required functionality was unavailable or not permitted, or this session dates from a time before Netalyzr supported this test.
Network bandwidth (?): Not executed
The test was not executed. Required functionality was unavailable or not permitted, or this session dates from a time before Netalyzr supported this test.
Network buffer measurements (?): Not executed
The test was not executed. Required functionality was unavailable or not permitted, or this session dates from a time before Netalyzr supported this test.
HTTP Tests
Address-based HTTP proxy detection (?): OK
We detected no explicit sign of HTTP proxy via IP address changes.
Content-based HTTP proxy detection (?): Warning

Changes to headers or contents sent between the client and our HTTP server show the presence of an otherwise unadvertised HTTP proxy.

The following headers had their capitalization modified by the proxy:

  • Content-Type: text/html
  • Content-Length: 698
  • Last-Modified: Tue
  • 18 Jun 2013 06:19:19 GMT
  • Set-Cookie: netAlizEd=BaR; path=/; domain=netalyzr.icsi.berkeley.edu
  • Connection: keep-alive

The following headers were added by the proxy to HTTP responses:

  • Via: [1.1 localhost:3128 (squid/2.7.STABLE3)]
  • X-Cache-Lookup: [MISS from localhost:3128]
  • X-Cache: [MISS from localhost]
  • Proxy-Connection: ke­ep-alive

The detected proxy reordered the headers sent from the server.

The detected HTTP proxy changed either the headers the client sent or the HTTP response from the server. We have captured the changes for further analysis.

The detected HTTP proxy may cause your traffic to be vulnerable to CERT Vulnerability Note 435052. An attacker might be able to use this vulnerability to attack your web browser.

HTTP proxy detection via malformed requests (?): OK
Deliberately malformed HTTP requests do not arrive at our server. This suggests that an otherwise undetected proxy exists along the network path. This proxy was either unable to parse or refused to forward the deliberately bad request.
Filetype-based filtering (?): OK
We did not detect file-content filtering.
HTTP caching behavior (?): Failed to complete
The test failed to execute completely, or the required results did not get uploaded to our server completely.
JavaScript-based tests (?): OK
JavaScript is not enabled for the Netalyzr site.
DNS Tests
Restricted domain DNS lookup (?): OK
We can successfully look up a name which resolves to the same IP address as our webserver. This means we are able to conduct many of the tests on your DNS server.
Unrestricted domain DNS lookup (?): OK
We can successfully look up arbitrary names from the client. This means we are able to conduct all test on your DNS server.
DNS resolver address (?): OK
The IP address of your ISP's DNS Resolver is 72.247.151.10, which resolves to a72-247-151-10.deploy.akamaitechnologies.com.
DNS resolver properties (?): Lookup latency 100 ms
Your ISP's DNS resolver requires 100 ms to conduct an external lookup. It takes 19 ms for your ISP's DNS resolver to lookup a name on our server.
Your resolver correctly uses TCP requests when necessary.
Your resolver is using QTYPE=A for default queries.
Your host or resolver also performs IPv6 queries in addition to IPv4 queries.
Your DNS resolver requests DNSSEC records.
Your DNS resolver advertises the ability to accept DNS packets of up to 4096 bytes.
Your DNS resolver can successfully receive a smaller (~1400 byte) DNS response.
Your DNS resolver can successfully receive a large (>1500 byte) DNS response.
Your DNS resolver can successfully accept large responses.
Your resolver does not use 0x20 randomization, but will pass names in a case-sensitive manner.
Your ISP's DNS server cannot use IPv6.
No transport problems were discovered which could affect the deployment of DNSSEC.
DNS glue policy (?): OK
Your ISP's DNS resolver does not accept generic additional (glue) records — good.
Your ISP's DNS resolver does not accept additional (glue) records which correspond to nameservers.
Your ISP's DNS resolver does not follow CNAMEs.
DNS resolver port randomization (?): Danger

Your ISP's DNS resolver does not randomize its local port number. This means your ISP's DNS resolver is probably vulnerable to DNS cache poisoning, which enables an attacker to intercept and modify effectively all communications of anyone using your ISP.

We suggest that, if possible, you immediately contact your network provider, as this represents a serious vulnerability.

The following graph shows DNS requests on the x-axis and the detected source ports on the y-axis.

port sequence plot

DNS lookups of popular domains (?): OK
90 of 90 popular names were resolved successfully. In the following table reverse lookups that failed but for which a Start Of Authority (SOA) entry indicated correct name associations are shown using an "X", followed by the SOA entry. Absence of both IP address and reverse name indicates failed forward lookups.
Name IP Address Reverse Name/SOA
6park.com 74.55.98.186 ba.62.374a.st[...]theplanet.com
www.6park.com 74.55.98.186 ba.62.374a.st[...]theplanet.com
www.abbey.co.uk 165.160.13.20 X (pdns1.cscdns.net)
ad.doubleclick.net 74.125.239.123 nuq05s01-in-f27.1e100.net
www.amazon.com 205.251.242.54 X (dns-external-master.amazon.com)
www.ameritrade.com 216.105.251.222 kcg.tdameritrade.com
appspot.com 74.125.141.141 da-in-f141.1e100.net
www.bankofamerica.com 171.161.202.100 X (hostmaster.bankofamerica.com)
www.bankofscotland.co.uk 195.171.195.92 www.bankofscotland.com
www.blogimg.jp 125.6.190.4 125-6-190-4.data-hotel.net
blogpark.jp 125.6.146.13 125-6-146-13.data-hotel.net
www.capitalone.com 208.80.48.112 X (z.arin.net)
www.careerbuilder.com 208.82.7.22 www.careerbuilder.com
www.chase.com 159.53.62.93 X (ns1.jpmorganchase.com)
chaseonline.chase.com 159.53.74.30 X (ns1.jpmorganchase.com)
www.citi.com 192.193.218.177 citi.com
www.citibank.com 192.193.103.222 citibank.com
www.citimortgage.com 192.193.218.222 citimortgage.com
www.desjardins.com 142.195.132.100 NAT-VS-www.desjardins.com
www.ebay.com 66.135.200.181 www.ebay.com
encrypted.google.com 74.125.239.97 nuq05s01-in-f1.1e100.net
www.etrade.com 12.153.224.22 etrade.com
www.f-secure.com 184.25.118.32 a184-25-118-32.[...]echnologies.com
www.facebook.com 66.220.152.19 edge-star-shv-[...]1.facebook.com
www.fdic.gov 167.176.17.84 www.fdic.gov
www.friendfinder.com 208.88.180.129 X (ii53-30.friendfinderinc.com)
www.google.com 74.125.141.99 da-in-f99.1e100.net
www.google-analytics.com 74.125.239.97 nuq05s01-in-f1.1e100.net
www.halifax.co.uk 195.171.220.140 www.halifax.co.uk
hootsuite.com 75.101.142.236 ec2-75-101-142-[...]1.amazonaws.com
www.hsbc.co.uk 91.214.6.98 X (ns3.hsbc.com)
www.irs.gov 72.247.151.60 a72-247-151-60.[...]echnologies.com
www.jpmorganchase.com 159.53.60.105 X (ns1.jpmorganchase.com)
mail.google.com 74.125.239.118 nuq05s01-in-f22.1e100.net
mail.live.com 64.4.56.87 origin.by150w.[...].mail.live.com
mail.yahoo.com 209.191.122.42 l1.login.vip.mud.yahoo.com
messenger.yahoo.com 68.180.190.124 myc1.msg.vip.sk1.yahoo.com
www.microsoft.com 65.55.57.27 X (msnhst.microsoft.com)
www.nationwide.co.uk 155.131.31.10 m.nationwide.co.uk
www.networksolutions.com 205.178.187.13 www.networksolutions.com
www.newegg.com 216.52.208.185 X (pdns1.ultradns.net)
online.wellsfargo.com 159.45.2.72 online.wellsfargo.com
www.orange.fr 193.252.122.103 www.orange.fr.b2.fti.net
partner.googleadservices.com 74.125.239.121 nuq05s01-in-f25.1e100.net
www.rbs.co.uk 155.136.80.222 X (ns0-08.dns.pipex.net)
www.schwab.com 209.200.152.2 unknown.prolexic.com
search.yahoo.com 74.6.116.77 rtr1.l7.searc[...]sk1.yahoo.com
www.sears.com 184.27.233.99 a184-27-233-99.[...]echnologies.com
smartzone.comcast.net 76.96.40.168 hprxy.emeryvill[...]ail.comcast.net
www.smithbarney.com 192.193.224.59 X (ns.citicorp.com)
thepiratebay.org 194.71.107.50 X (ns0.thepiratebay.org)
www.thepiratebay.org 194.71.107.50 X (ns0.thepiratebay.org)
www.ticketmaster.com 184.27.228.199 a184-27-228-199[...]echnologies.com
www.torproject.org 86.59.30.40 nova.torproject.org
www.twitpic.com 50.23.200.230 50.23.200.230-s[...]e.softlayer.com
www.twitter.com 199.59.148.82 r-199-59-148-82.twttr.com
us.etrade.com 198.93.34.50 us.etrade.com
www.usbank.com 170.135.184.252 X (ns3.usbank.com)
www.verisign.com 69.58.181.89 www-ilg.verisign.net
www.visa.com 184.27.233.100 a184-27-233-100[...]echnologies.com
www.wamu.com 159.53.62.63 X (ns1.jpmorganchase.com)
www.wellsfargo.com 159.45.66.101 www.wellsfargo.com
windowsupdate.microsoft.com 65.55.184.26 X (msnhst.microsoft.com)
wireless.att.com 135.209.168.22 origin-b2b-al[...]eless.att.com
www.yahoo.com 206.190.36.45 ir1.fp.vip.gq1.yahoo.com
www.youtube.com 74.125.239.103 nuq05s01-in-f7.1e100.net
22 popular names have a mild anomaly. The ownership suggested by the reverse name lookup does not match our understanding of the original name. The most likely cause is the site's use of a Content Delivery Network.
Name IP Address Reverse Name/SOA
www.alliance-leicester.co.uk 194.130.105.121 X (ns1.ioko.com)
www.barclays.co.uk 195.69.153.161 X (ns0.lbi.co.uk)
www.bing.com 72.247.151.60 a72-247-151-60.[...]echnologies.com
bit.ly 69.58.188.39 X (ns1.verisign-grs.net)
www.cnn.com 157.166.241.10 X (ns1.timewarner.net)
www.deutsche-bank.de 160.83.8.79 deutschebank.tec.db.com
www.e-gold.com 24.173.168.101 rrcs-24-173-16[...].se.biz.rr.com
www.lloydstsb.com 141.92.130.226 X (ns0.bt.net)
www.mbna.com 206.17.87.35 X (xbru.br.ns.els-gms.att.net)
www.mbna.net 63.236.19.66 X (ns0.teb.qwest.net)
www.meebo.com 208.81.191.110 domain.not.configured
www.nordea.fi 193.88.186.178 X (ns01.tdchosting.dk)
online.citibank.com 184.25.118.106 a184-25-118-106[...]echnologies.com
www.paypal.com 184.31.146.234 a184-31-146-234[...]echnologies.com
www.postbank.de 160.83.4.4 X (ns1.db.com)
www.secureworks.com 216.52.89.170 X (ns1.nym.pnap.net)
www.sparkasse.de 212.34.69.3 rev-212.34.69.3.rev.izb.net
www.tdameritrade.com 184.27.239.5 a184-27-239-5.d[...]echnologies.com
tinyurl.com 64.62.243.92
www.trendmicro.com 184.25.221.214 a184-25-221-214[...]echnologies.com
www.wachovia.com 159.45.2.100 mn2-wachovia-p[...]wellsfargo.com
westernunion.com 206.201.226.252 X (nsmast2.wan.wcom.net)
2 popular names have a mild anomaly: we are unable to find a reverse name associated with the IP address provided by your ISP's DNS server. This is most likely due to a slow responding DNS server or misconfiguration on the part of the domain owner.
Name IP Address Reverse Name/SOA
www.bankofthewest.com 204.44.12.103 X
www.sterlingsavingsbank.com 12.69.145.232 X
DNS external proxy (?): Not executed
The test was not executed. Required functionality was unavailable or not permitted, or this session dates from a time before Netalyzr supported this test.
DNS results wildcarding (?): OK
Your ISP correctly leaves non-resolving names untouched.
DNS-level redirection of specific sites (?): OK
Your ISP does not appear to be using DNS to redirect traffic for specific websites.
Direct probing of DNS roots (?): Failed to complete
The test failed to execute completely, or the required results did not get uploaded to our server completely.
IPv6 Tests
DNS support for IPv6 (?): OK
Your system can successfully look up IPv6 addresses. Your DNS resolver is on Google's IPv6 "whitelist", which means that Google enables IPv6 access to their services for you.
IPv4, IPv6, and your web browser (?): Not executed
JavaScript is not enabled for the Netalyzr site.
IPv6 connectivity (?): No IPv6 support
Your host was not able to contact a separate server using IPv6, but was able to contact the same server using IPv4.
Network Security Protocols
DNSSEC Support from the DNS Roots (?): Not executed
The test was not executed. Required functionality was unavailable or not permitted, or this session dates from a time before Netalyzr supported this test.
Host Properties
System clock accuracy (?): Not executed
The test was not executed. Required functionality was unavailable or not permitted, or this session dates from a time before Netalyzr supported this test.
Browser properties (?): OK
Your web browser sends the following parameters to all web sites you visit:
  • User Agent: Java/1.6.0_45
  • Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
  • Accept Language: en-us,en;q=0.5
  • Accept Encoding: gzip,deflate
  • Accept Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Java identifies your operating system as Mac OS X.
Uploaded data (?): OK
Feedback
User-provided feedback

Kindly take a moment to answer a few questions. All fields are optional. You can submit your feedback once the tests complete. If you would like to contact us with questions about your results, please send email with your session ID, or get in touch on the mailing list.

If you'd like to give us a way to contact you at a later time, please provide an email address. We will never share your address with anyone.

How is your machine/device connected to the local network?
Wireless
Wired

Where are you right now?
At home
At work
In a public setting (wifi hotspot, internet cafe, etc)
Other (please describe)

Feel free to leave additional comments here.