Personal dashboard: Utilities


In the default configuration, this section of the personal dashboard is available only to users in the Administrative and Technical groups.

The Check IP, Trace and Vulnerabilities utilities in the Qrator Labs dashboard can be useful for diagnosing user problems and checking if the firewall configuration is correct.

Check IP address detail

Using the IP Check utility, you can find out how Qrator Labs reverse proxies treat inbound traffic from a given IP address. The utility is available for domains and services. If you have multiple domains or services configured in your account, the status of the same IP address may be different for them.

To use the utility:

  1. Select the domain under Domains or service under Services.

  2. Select Check IP. (When working with a domain, this menu item is found in submenu Utilities)

  3. In the text box, enter the IP address.

  4. Click Search.

One of the following statuses will be shown next to the form.

  • Statuses in which traffic from the IP address is allowed without restriction:

    • IP address not blocked
    • IP address is on the "Whitelist"
    • IP address is upstream
  • Statuses in which traffic from an IP address is restricted:

    • IP address blocked via Qrator API
    • IP address blocked by WAF
    • IP address blocked by Qrator filtering system
    • Blocked based on HTTP error code (456) server response

View traceroute to IP address

With the Traceroute utility, you can see the route via which packets are sent from each of the [Qrator Labs traffic scrubbing centers] to a given IP. This utility is only available for domains.

To use the utility:

  1. Select your domain under Domains.

  2. Select UtilitiesTraceroute.

  3. Select the IP address of your upstream from the drop-down list.

  4. Specify the Port.

  5. Click Run.

Check for vulnerable ports

The Vulnerabilities section displays the results of regular checks of the upstreams for open ports 80 и 443.

The checks are performed each 4 hours from an IP address outside the Qrator Labs subnet. With a correct configuration, firewall should drop the connection from such an IP address. If any kind of server response was received during the check, this indicates a vulnerability of your network to attacks that are directed to the upstream directly, i.e., not via the Qrator Labs network.

To see the results of a check:

  1. Select your domain under Domains.

  2. Select UtilitiesVulnerabilities.

  3. In the Date field, select the date and time you want. By default, the date and time of the latest check are selected.

    The results are displayed in a table with the following columns:

    • the IP address of the upstream,
    • the port checked,
    • the results of the check: Protected or Vulnerable.

If at least one of your ports is vilnerable, change the configuration of your firewall to eliminate the vulnerability. To do so, follow the Firewall configuration guide and, if necessary, contact the Qrator Labs technical support.