Ping (ICMP)
Ping (ICMP) Ping is request message for protocol ICMP.

Ping is request message for ICMP (stands for Internet Control Message Protocol). This protocol is used by different network devices to check if a service or a device is available. Usually it is used for network diagnostics.

Ping monitoring allows you to keep an eye on your network infrastructure. Ping failure means broken connection to a network entity. It is handy to use Ping together with HTTP monitoring. In this case, you get additional information - for example, you know if the error is site-related, or the whole server has gone down. However, sometimes ICMP could be blocked for incoming requests, in order to prevent ddos attacks.

  • CM.Glossary.WebsiteMonitoring
  • CM.Glossary.Downtime
  • CM.Glossary.DistributedMonitoring
  • CM.Glossary.HTTP
more glossary
"

I rely on HostTracker to monitor my servers so I can sleep at night

"
- S.
Shellshock vulnerability online check

Considering the recently discovered Shellshock vulnerability, HostTracker has created a tool for testing it.

Check your server for vulnerability

How does it work?

It is developed for a Linux server with a web server installed on it. The algorithm is very simple. We consequently generate 4 http requests:

  • 1. Ordinary request
  • 2. The request tries, using vulneratility, post a "harmful" cookie which causes 2-seconds delay in respond to our special http request.
  • 3. The request tries, using vulneratility, post a "harmful" cookie which causes 4-seconds delay in respond to our special http request.
  • 4. Same as #3

How to understand the result?

We compare response time for all 4 requests. Three situation are possible:

  • 1. Vulnerability found. We may affirm that if the difference in responses is about 2 seconds for requests without cookie and with 2-second-delay cookie, as well as for requests with 2 and 4-second delay cookie. It means that our request was able to use the vulnerability and set these cookies.
  • 2. Vulnerability not found. All the requests have about the same response time. The cookies, likely, were not installed because there is no vulnerability.
  • 3. Uncertain situation. If the response time differs widely, without coincidence with preset by cookies delay, we can not say for sure. It could be if the server is under high load. To check this, we use two requests with same cookies (#3 and #4). If the response time for two same checks varies, we make a conclusion that the response time is not affected by cookies. At least, not only by them. So in this case our method can not detect vulnerability

Safety of checks

Our test can not damage your server. The risk consists of appearance of one extra-cookie, which is used only for our requests and can not affect normal work-flow of your site.

more blog
Thank you for feedback!
 
Privacy policy
Sign In
Sign Up
Prices & packages
Our monitoring network
Home > Privacy policy

What information do we collect?

  • We collect information from you when you register on our site or place an order.
  • When ordering or registering on our site, as appropriate, you may be asked to enter your: name, e-mail address, mailing address, phone number or credit card information. You may, however, visit our site anonymously.

What do we use your information for?

  • Any of the information we collect from you may be used in one of the following ways:
  • To personalize your experience (your information helps us to better respond to your individual needs.
  • To improve our website (we continually strive to improve our website offerings based on the information and feedback we receive from you).
  • To improve customer service (your information helps us to more effectively respond to your customer service requests and support needs).
  • To process transactions. Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested.
  • To send periodic emails. The email address you provide for order processing, may be used to send you information and updates pertaining to your order, in addition to receiving occasional company news, updates, related product or service information, etc.

How do we protect your information?

  • We implement a variety of security measures to maintain the safety of your personal information when you place an order.
  • We offer the use of a secure server. All supplied sensitive/credit information is transmitted via Secure Socket Layer (SSL) technology and then encrypted into our Database to be only accessed by those authorized with special access rights to our systems, and are required to keep the information confidential.

Do we use cookies?

  • Yes (Cookies are small files that a site or its service provider transfers to your computers hard drive through your Web browser (if you allow) that enables the sites or service providers systems to recognize your browser and capture and remember certain information.
  • We use cookies to understand and save your preferences for future visits.

Do we disclose any information to outside parties?

  • We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential.
  • We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.

California Online Privacy Protection Act Compliance

  • Because we value your privacy we have taken the necessary precautions to be in compliance with the California Online Privacy Protection Act. We therefore will not distribute your personal information to outside parties without your consent.
  • As part of the California Online Privacy Protection Act, all users of our site may make any changes to their information at anytime by logging into their account and going to the 'Profile' page.

Host-Tracker Microsoft Bot Framework

  • Our Host-Tracker bot is enabled by Microsoft Bot Framework. The Microsoft Bot Framework is a set of web-services that enable intelligent services and connections using conversation channels you authorize. As a service provider, Microsoft will transmit content you provide to our bot/service in order to enable the service.
  • For more information about Microsoft privacy policies please see their privacy statement here: http://go.microsoft.com/fwlink/?LinkId=521839.
  • In addition, your interactions with this bot/service are also subject to the conversational channel's applicable terms of use, privacy and data collection policies.
  • To report abuse when using a bot that uses the Microsoft Bot Framework to Microsoft, please visit the Microsoft Bot Framework website at https://www.botframework.com and use the “Report Abuse” link in the menu to contact Microsoft.

Your Consent

  • By using our site, you consent to our web site privacy policy.

Changes to our Privacy Policy

  • If we decide to change our privacy policy, we will post those changes on this page, and/or update the Privacy Policy modification date below.
  • This policy was last modified on 11.11.2016

Contacting Us

Share:
Send to Twitter Send to Facebook Send to LinkedIn Share on Google+
Blogs:
HostTracker blog HostTracker page on Facebook