Been having some issues lately, regular internet use like browsing or streaming is fine but anything heavier like gaming ( I play LoL ) has been crapping out on me. It feels like packet loss and I've figured out through tracert that its definitely something going haywire on my end. I'm just not too educated on all this network stuff, so I can't really make heads or tails of this netalyzr test I did. Maybe someone else could tell me what my issue is, hopefully. Thanks in advance.
Summary of Noteworthy EventsMajor AbnormalitiesAddress-based Tests
Your global IP address is 184.108.40.206 while your local one is 192.168.1.6. You are behind a NAT. Your local address is in unroutable address space.
Your machine numbers TCP source ports sequentially. The following graph shows connection attempts on the X-axis and their corresponding source ports used by your computer on the Y-axis.
TCP ports are not renumbered by the network.Your computer reports the following network interfaces, with the following IP addresses for each one:
- eth0: (an ethernet interface)
- eth1: (an ethernet interface)
- eth2: (an ethernet interface)
- eth3: (an ethernet interface)
- eth4: (an ethernet interface)
- eth5: (an ethernet interface)
- eth6: (an ethernet interface)
- lo: (a local loopback interface)
- 127.0.0.1 (an IPv4 loopback address)
- ::1 (an IPv6 loopback address)
- fe80::e0:0:0:0 (a link-local IPv6 address)
- 192.168.1.6 [Zagubadu-PC] (a private IPv4 address)
- fe80::b582:a5ee:72dc:4e99 [Zagubadu-PC] (a link-local IPv6 address)
- ppp1:DNS-based host information (?): OKYou are not a Tor exit node for HTTP traffic.You are listed on the Spamhaus Policy Based Blacklist, meaning that your provider has designated your address block as one that should only be sending authenticated email, email through the ISP's mail server, or using webmail.The SORBS DUHL believes you are using a dynamically assigned IP address.NAT support for Universal Plug and Play (UPnP) (?): YesWe received UPnP responses from one device:
- 192.168.1.1: this device provided a valid device description via its UPnP URL. This description, viewable here, contains the following information about this gateway:
- Name: WNR2000v3 (Gateway)
- Manufacturer: NETGEAR, Inc.
- Manufacturer URL: http://www.netgear.com
- Model name: N300 Wireless Router
- Model number: WNR2000v3
- Model URL: http://www.netgear.com/ho[...]ork-and-play/WNR2000.aspx
- Model Description: NETGEAR WNR2000v3 N300 Wireless Router
- This device appears to run "WNR2000v3 UPnP/1.0 miniupnpd/1.0". This system may be vulnerable to CVE-2013-0230Reachability TestsTCP connectivity (?): OKDirect TCP access to remote FTP servers (port 21) is allowed.Direct TCP access to remote SSH servers (port 22) is allowed.Direct TCP access to remote SMTP servers (port 25) is allowed.Direct TCP access to remote DNS servers (port 53) is allowed.Direct TCP access to remote HTTP servers (port 80) is allowed.Direct TCP access to remote POP3 servers (port 110) is allowed.Direct TCP access to remote RPC servers (port 135) is allowed.Direct TCP access to remote NetBIOS servers (port 139) is allowed.Direct TCP access to remote IMAP servers (port 143) is allowed.Direct TCP access to remote SNMP servers (port 161) is allowed.Direct TCP access to remote HTTPS servers (port 443) is allowed.Direct TCP access to remote SMB servers (port 445) is allowed.Direct TCP access to remote SMTP/SSL servers (port 465) is allowed.Direct TCP access to remote secure IMAP servers (port 585) is allowed.Direct TCP access to remote authenticated SMTP servers (port 587) is allowed.Direct TCP access to remote IMAP/SSL servers (port 993) is allowed.Direct TCP access to remote POP/SSL servers (port 995) is allowed.Direct TCP access to remote OpenVPN servers (port 1194) is allowed.Direct TCP access to remote PPTP Control servers (port 1723) is allowed.Direct TCP access to remote SIP servers (port 5060) is allowed.Direct TCP access to remote BitTorrent servers (port 6881) is allowed.Direct TCP access to remote TOR servers (port 9001) is allowed.UDP connectivity (?): OKBasic UDP access is available.
The client was able to send fragmented UDP traffic.
The client was able to receive fragmented UDP traffic.Direct UDP access to remote DNS servers (port 53) is allowed.Direct UDP access to remote NTP servers (port 123) is allowed.Direct UDP access to remote NetBIOS NS servers (port 137) is allowed.Direct UDP access to remote NetBIOS DGM servers (port 138) is allowed.Direct UDP access to remote IKE key exchange servers (port 500) is allowed.Direct UDP access to remote OpenVPN servers (port 1194) is allowed.Direct UDP access to remote Slammer servers (port 1434) is allowed.Direct UDP access to remote L2 tunneling servers (port 1701) is allowed.Direct UDP access to remote IPSec NAT servers (port 4500) is allowed.Direct UDP access to remote RTP servers (port 5004) is allowed.Direct UDP access to remote RTCP servers (port 5005) is allowed.Direct UDP access to remote SIP servers (port 5060) is allowed.Direct UDP access to remote VoIP servers (port 7078) is allowed.Direct UDP access to remote VoIP servers (port 7082) is allowed.Direct UDP access to remote SCTP servers (port 9899) is allowed.Direct UDP access to remote Steam gaming servers (port 27005) is allowed.Direct UDP access to remote Steam gaming servers (port 27015) is allowed.Traceroute (?): OK
It takes 22 network hops for traffic to pass from our server to your system, as shown below. For each hop, the time it takes to traverse it is shown in parentheses.
- 10.254.184.3 (0 ms)
- ip-10-1-12-1.ec2.internal (0 ms)
- ip-10-1-33-0.ec2.internal (0 ms)
- 100.64.16.197 (2 ms)
- 220.127.116.11 (1 ms)
- 18.104.22.168 (1 ms)
- 22.214.171.124 (1 ms)
- 126.96.36.199 (10 ms)
- 188.8.131.52 (9 ms)
- 184.108.40.206 (9 ms)
- 220.127.116.11 (9 ms)
- timewarner-ic-303549-nyk-b5.c.telia.net (18 ms)
- 18.104.22.168 (11 ms)
- ae-1-0.a0.buf00.tbone.rr.com (12 ms)
- be41.albynyyf00r.nyroc.rr.com (18 ms)
- ae13.ptldmehx-rtr001.ne.northeast.rr.com (76 ms)
- rdc-24-31-156-255.ne.east.twcable.com (29 ms)
- rdc-24-31-156-253.ne.east.twcable.com (30 ms)Path MTU (?): OKThe path between your network and our system supports an MTU of at least 1500 bytes, and the path between our system and your network has an MTU of 1500 bytes.Hidden Proxy Detection (?): OKWe detected no proxies using this test.Network Access Link Properties+Network performance (?): Latency: 42 ms, Loss: 0.0%The round-trip time (RTT) between your computer and our server is 42 ms, which is good.We recorded no packet loss between your system and our server.TCP connection setup latency (?): 43msThe time it takes your computer to set up a TCP connection with our server is 43 ms, which is good.Background measurement of network health (?): 5 transient outages, longest: 1.0 secondsDuring most of Netalyzr's execution, the client continuously measures the state of the network in the background, looking for short outages. During testing, the client observed 5 such outages. The longest outage lasted for 1.0 seconds. This suggests a general problem with the network where connectivity is intermittent. This loss might also cause some of Netalyzr's other tests to produce incorrect results.Network bandwidth (?): Upload 2.1 Mbit/s, Download 19 Mbit/sYour Uplink: We measured your uplink's sending bandwidth at 2.1 Mbit/s. This level of bandwidth works well for many users.Your Downlink: We measured your downlink's receiving bandwidth at 19 Mbit/s. This level of bandwidth works well for many users.
- netAlizEd = BaR (set by our server)
- netalyzrStatus = running (set by our server)Your web browser was unable to fetch an image using IPv6.DNS TestsRestricted domain DNS lookup (?): OKWe can successfully look up a name which resolves to the same IP address as our webserver. This means we are able to conduct many of the tests on your DNS server.Unrestricted domain DNS lookup (?): OKWe can successfully look up arbitrary names from the client. This means we are able to conduct all test on your DNS server.DNS resolver address (?): OKThe IP address of your ISP's DNS Resolver is 22.214.171.124, which does not resolve. Additional nameservers observed for your host: 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168.DNS resolver properties (?): Lookup latency 140 msYour ISP's DNS resolver requires 140 ms to conduct an external lookup. It takes 86 ms for your ISP's DNS resolver to lookup a name on our server.Your resolver correctly uses TCP requests when necessary.Your resolver is using QTYPE=A for default queries.Your resolver is not automatically performing IPv6 queries.Your DNS resolver requests DNSSEC records.Your DNS resolver advertises the ability to accept DNS packets of up to 4096 bytes.Your DNS resolver can successfully receive a smaller (~1400 byte) DNS response.Your DNS resolver can successfully receive a large (>1500 byte) DNS response.Your DNS resolver can successfully accept large responses.Your resolver uses 0x20 randomization.Your ISP's DNS server is capable of fetching records using IPv6.No transport problems were discovered which could affect the deployment of DNSSEC.Direct probing of DNS resolvers (?)Your system is configured to use 1 DNS resolver(s).The resolver at 192.168.1.1 can process all tested types. Requests from this resolver come from 22.214.171.124. This resolver requries 227 ms to fetch a result from our server and 70 ms to return a result from its cache. It validates DNSSEC. It does not provide requested DNSSEC records. It does not wildcard NXDOMAIN errors. The resolver reports a number of additional properties. Show them.DNS glue policy (?): WarningYour ISP's DNS resolver does not accept generic additional (glue) records — good.Your ISP's DNS resolver does not accept additional (glue) records which correspond to nameservers.Your ISP's DNS resolver follows CNAMEs regardless of their location. This is very unusual.Your ISP's DNS resolver properly randomizes its local port number.
The following graph shows DNS requests on the x-axis and the detected source ports on the y-axis.
DNS lookups of popular domains (?): OK100 of 100 popular names were resolved successfully. Show all names.40 popular names have a mild anomaly. The ownership suggested by the reverse name lookup does not match our understanding of the original name. The most likely cause is the site's use of a Content Delivery Network. Show all names.3 popular names have a mild anomaly: we are unable to find a reverse name associated with the IP address provided by your ISP's DNS server. This is most likely due to a slow responding DNS server or misconfiguration on the part of the domain owner. Show all names.DNS external proxy (?): OKYour host ignores external DNS requests.DNS results wildcarding (?): OKYour ISP correctly leaves non-resolving names untouched.DNS-level redirection of specific sites (?): OKYour ISP does not appear to be using DNS to redirect traffic for specific websites.IPv6 TestsDNS support for IPv6 (?): OKYour system does not look up IPv6 addresses by default. Your DNS resolver is not onGoogle's IPv6 "whitelist", which means that Google does not enable IPv6 access to their services for you.IPv4, IPv6, and your web browser (?): No IPv6 supportYour browser was unable to fetch a test image from an IPv6-only server. IPv4 performance to our IPv4-only server did not differ substantially from our IPv4/IPv6 dual-stacked one.IPv6 connectivity (?): No IPv6 supportYour system appears to have no IPv6 connectivity as it was unable to look up the IPv6 address associated with our IPv6 test server.Network Security ProtocolsDNSSEC Support from the DNS Roots (?): WarningOnly some DNS root server instances returned proper DNSSEC information. The working roots are: A, B, C, E, F, G, H, I, J, K, L, MHost PropertiesSystem clock accuracy (?): WarningYour computer's clock is 14 seconds slow.Browser properties (?): OKYour web browser sends the following parameters to all web sites you visit:
Java identifies your operating system as Windows 7.
- User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36
- Accept: text/html,application/xhtml+xml,application/xml; q=0.9,image/webp,*/*; q=0.8
- Accept Language: en-US,en;q=0.8
- Accept Encoding: gzip,deflate,sdch
- Accept Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7