Debug your Internet.
I ran across this today, an interesting tool to debug your internet connection (Thanks Dr Stewart)
this is a project of Berkeley.edu, and according to the about us page.
The Netalyzr analyzes various properties of your Internet connection that you should care about — including blocking of important services, HTTP caching behavior and proxy correctness, your DNS server’s resilience to abuse, NAT detection, as well as latency & bandwidth measurements — and reports its findings in a detailed report. You can check out an example report from a real network to get a better idea of our tests.
To perform these tests, the Netalyzr runs a Java applet on your computer. You may be asked to confirm network-related activities that your system’s applet security policy or firewall considers sensitive. We hope that you will permit any such activity, as it will ensure more comprehensive test results. For details on the tests that will be performed please visit the FAQ section.
to try it today, click the link below and let me know what you think by commenting on this post:
http://netalyzr.icsi.berkeley.edu/index.html
here are my results:
Summary of Noteworthy Events+ –Major Abnormalities–
Minor Aberrations–
Address-based Tests+ –Basic UDP access is available.The applet was able to send fragmented UDP traffic.The applet was able to receive fragmented UDP traffic.
UDP access to remote DNS servers (port 53) appears to pass through a firewall or proxy. The applet was unable to transmit an arbitrary request on this UDP port, but was able to transmit a legitimate DNS request, suggesting that a proxy, NAT, or firewall intercepted and blocked the deliberately invalid request.
Direct UDP access to remote NTP servers (port 123) is allowed.Direct UDP access to remote NetBIOS NS servers (port 137) is allowed.Direct UDP access to remote NetBIOS DGM servers (port 138) is allowed.Direct UDP access to remote IKE key exchange servers (port 500) is allowed.Direct UDP access to remote OpenVPN servers (port 1194) is allowed.Direct UDP access to remote Slammer servers (port 1434) is allowed.Direct UDP access to remote L2 tunneling servers (port 1701) is allowed.Direct UDP access to remote IPSec NAT servers (port 4500) is allowed.Direct UDP access to remote RTP servers (port 5004) is allowed.Direct UDP access to remote RTCP servers (port 5005) is allowed.Direct UDP access to remote SIP servers (port 5060) is allowed.Direct UDP access to remote VoIP servers (port 7078) is allowed.Direct UDP access to remote VoIP servers (port 7082) is allowed.Direct UDP access to remote SCTP servers (port 9899) is allowed.Direct UDP access to remote Steam gaming servers (port 27005) is allowed.Direct UDP access to remote Steam gaming servers (port 27015) is allowed.During most of Netalyzr’s execution, the applet continuously measures the state of the network in the background, looking for short outages. During testing, the applet observed 1 such outages. The longest outage lasted for 0.6 seconds. This suggests a general problem with the network where connectivity is intermittent. This loss might also cause some of Netalyzr’s other tests to produce incorrect results.We estimate your uplink as having 51 msec of buffering. This level may serve well for maximizing speed while minimizing the impact of large transfers on other traffic.We estimate your downlink as having 2100 msec of buffering. This is quite high, and you may experience substantial disruption to your network performance when performing interactive tasks such as web-surfing while simultaneously conducting large downloads. With such a buffer, real-time applications such as games or audio chat can work quite poorly when conducting large downloads at the same time.HTTP Tests+ –Your system is configured to use 2 DNS resolver(s).The resolver at 192.168.1.1 could not process the following tested types:
- Medium (~1300B) TXT records
- Large (~3000B) TXT records
- Large (~3000B) TXT records fetched with EDNS0
It does not validate DNSSEC. It wildcards NXDOMAIN errors. Instead of an error it returns the following IP address(es): 63.251.179.13, 8.15.7.117. The resolver reports a number of additional properties. Show them.
The resolver at 68.238.96.12 can process all tested types. It does not validate DNSSEC. It wildcards NXDOMAIN errors. Instead of an error it returns the following IP address(es): 63.251.179.13, 8.15.7.117. The resolver reports a number of additional properties. Show them.Your ISP’s DNS server returns IP addresses even for domain names which should not resolve. Instead of an error, the DNS server returns an address of 63.251.179.13, which does not resolve. You can inspect the resulting HTML content here.
There are several possible explanations for this behavior. The most likely cause is that the ISP is attempting to profit from customer’s typos by presenting advertisements in response to bad requests, but it could also be due to an error or misconfiguration in the DNS server.
The big problem with this behavior is that it can potentially break any network application which relies on DNS properly returning an error when a name does not exist.
The following lists your DNS server’s behavior in more detail.
- www.{random}.com is mapped to 63.251.179.13.
- www.{random}.org is mapped to 8.15.7.117.
- fubar.{random}.com is correctly reported as an error.
- www.yahoo.cmo [sic] is mapped to 63.251.179.13.
- nxdomain.{random}.netalyzr.icsi.berkeley.edu is correctly reported as an error.