To get a traceroute, open command prompt in Windows or Terminal on OSX and run the following. The first argument takes either a domain or IP address.
Now that you have your traceroute, you will see something that looks like this.
traceroute to tcpshield.net (126.96.36.199), 64 hops max, 52 byte packets1 10.13.95.1 (10.13.95.1) 302.809 ms 10.786 ms 182.727 ms2 * * *3 10.16.122.1 (10.16.122.1) 198.191 ms 33.049 ms 173.817 ms4 10.16.122.4 (10.16.122.4) 1.832 ms 1.833 ms 1.752 ms5 10.16.121.1 (10.16.121.1) 2.043 ms 1.957 ms 2.878 ms6 10.59.226.21 (10.59.226.21) 1.965 ms 1.988 ms 1.919 ms7 h84.gpvpn.redacted.com (x.x.x.x) 3.016 ms 2.810 ms 3.780 ms8 h66-244-233-17.bigpipeinc.com (188.8.131.52) 6.295 ms 3.205 ms 3.110 ms9 * * *10 rc3so-be31-1.cg.shawcable.net (184.108.40.206) 4.217 ms 3.546 ms 3.533 ms11 rc4ec-be13.il.shawcable.net (220.127.116.11) 33.704 ms 32.591 ms 37.759 ms12 chi-5-a9.il.us (18.104.22.168) 32.540 ms 36.926 ms 34.108 ms13 * * *14 be7.bhs-vac1-a75.qc.ca (22.214.171.124) 416.777 ms 509.795 ms 432.394 ms15 * * *16 * * *
You will notice that by hop 14 we have 400ms+. Could this be TCPShield related? We will analyze this traceroute closely to see what might be causing this.
Typical traceroutes are formatted like so:
<hop #> <hostname> (IP resolution) probe1, probe2, probe3
Let's outline what each of these mean.
Packets traverse the internet to their destination in a hop-by-hop basis. The hop number is simply a label identifying which sequence in that path your packets are currently traversing.
The human readable representation of the current hop in the trace. Sometimes you may not get a hostname for every hop, and this is completely normal. It's on network operators to configure this if they choose to do so.
The numerical IPv4 address pertaining to the current hop.
Each traceroute issues 3 ping (ICMP) requests to each of the hops being traversed. The number you see on each of the probes represents the round trip latency between your source machine and the target hop in milliseconds.
Traceroutes are read in-order starting from the first hop (at this point packets usually haven't exited the source network to the public internet yet), and the destination hop. Most hostnames you will see in a traceroute will contain information that may outline what location that router or switch is located, for example
ae7.cr7-chi1.ip4.gtt.net indicates a router in Chicago belonging to GTT,
six-sea.netarch.akamai.com is an endpoint in Seattle belonging to Akamai (located in SIX - Seattle Internet Exchange), and so on.
Lets look at the above trace a bit more closely.
1 10.13.95.1 (10.13.95.1) 302.809 ms 10.786 ms 182.727 ms2 * * *3 10.16.122.1 (10.16.122.1) 198.191 ms 33.049 ms 173.817 ms
The first 3 hops contain critical information here that will help us determine the cause for the high latency. You will see each of the 3 probes here have varying degrees of latency. Starting at the first hop, one of the probes has
302.809ms. This definitely isn't expected as the first hop is usually your home router or switch in a residential network - something that should be below 5ms ideally for all probes on that hop. Indeed, we have 10ms shown on one of the probes, however the other 2 have latencies in the triple digits which signify an unstable connection.
For context, I was running this traceroute over WiFi in an area with many connected clients. We can also see the same effects shown in the 3rd hop. During this point, our packets still have not left the internal network to the outside world yet - so as a result of our unstable connection to the WiFi router, this has introduced propagation delay to the remainder of the traceroute. As mentioned previously, packets are routed on the internet in a hop-by-hop basis. If one of the hops in that path experiences high latency or congestion, this will impact the quality of service for the remainder of the trace. In networking, a chain (or path in this case) is only as strong as its weakest link.
This now gives us more clues as to what is happening at hop 14 - the last hop we could observe before hitting TCPShield's edge nodes and thus not being able to proceed further (as we block ICMP across our edge).
14 be7.bhs-vac1-a75.qc.ca (126.96.36.199) 416.777 ms 509.795 ms 432.394 ms
BHS in this case indicates Beauharnois - our North American proxy location, and VAC indicates the mitigation infrastructure utilized at this facility. During normal circumstance (i.e. when connected over ethernet), the computer used to perform this traceroute typically experiences 60ms to this VAC hop. Do you remember the
302.809ms probe we saw on the first hop of our trace? Our unstable connection to our internal network has unfortunately propagated its way to the rest of our Traceroute, resulting in the high latency on hop 14 - therefore adding ~300ms to what would should normally be within the 60-70ms range. Networks are only as stable as the weakest link - and in our case, our weakest link is indeed our internal (home) network.
The BGP (border gateway protocol) is the system that glues the internet together, and is responsible for making routing decisions between switches and routers on the internet. In normal circumstances, BGP will route around these problems automatically when high latency or packet loss becomes and issue between major PoPs (point of presences) on the internet. However in our case, there really isn't anything to route around because we haven't routed anywhere yet - the high latency is present within our LAN itself, and our only solution at this point would be to diagnose why this could be happening.
Since our high latency occurred within our internal network itself - it would be a good idea to determine why this is happening. After all, WiFi isn't totally stable from a jitter standpoint, especially considering this trace was performed with many other clients connected - and presumably other appliances or electronic equipment interfering as well. For residential connections, you should first try and see if the high latency is still present when performing a traceroute over Ethernet, which is not prone to the inherent pitfalls introduced with Wifi.
If the high latency still occurs over Ethernet, the most probable scenario is a congestion issue within the ISP your player(s) are using itself. During high traffic periods of the day, sometimes an ISP's downstream link to its distribution routers may be overwhelmed, and thus forwarding and propagation delays will be an inherent issue that cannot be solved without contacting the ISP's network engineers to further diagnose the issue.