• IP: 172.21.0.3
Ping IP Address
This tool performs real-time ping tests from an external server to a specified IP address or domain. By simulating reachability checks from outside your network, it helps verify public accessibility of your website or service. The tool returns latency metrics and packet loss details, making it ideal for diagnosing connectivity issues, validating firewall rules, and confirming uptime from an external vantage point.
Traceroute Tool
This tool traces the path that packets take from a source server to a specified destination (IP or domain) across an IP network. It identifies each intermediate hop—typically routers—and measures the round-trip time (RTT) for each. By visualizing the route and latency at every step, the tool helps diagnose routing issues, detect bottlenecks, and verify network reachability from end to end.
Whois Tool
This tool performs WHOIS lookups to retrieve publicly available registration details for domain names or IP addresses. By entering a domain (e.g., example.com) or IP, the tool queries global WHOIS databases to return information such as the registrant’s organization, registrar, registration and expiration dates, and name servers. It’s essential for verifying domain ownership, investigating suspicious websites, and supporting cybersecurity, legal, and administrative tasks.
Port-scanner Common Ports
This tool scans a target IP address or domain for a predefined set of commonly used TCP and/or UDP ports—such as 21 (FTP), 22 (SSH), 80 (HTTP), and 443 (HTTPS) etc (complete list is shown below). It identifies which ports are open, closed, or filtered, helping administrators quickly assess exposed services, validate firewall rules, and detect potential vulnerabilities. Ideal for rapid security checks, network audits, and service discovery
Port-scanner Custom Ports
This tool allows users to scan a specific IP address or domain against a custom list of TCP and/or UDP ports. By specifying the exact ports of interest—such as 22, 80, 443, or any non-standard ports—the tool checks their status (open, closed, or filtered) and returns detailed results. It’s ideal for targeted security assessments, firewall validation, and service discovery across known or suspected entry points.
Up to 20 ports.