Check-Host.cc

Advanced Settings
Show world map
Advanced Options (Custom Payload)

If left empty, the system will automatically inject a standardized probe for known ports (DNS, NTP, SNMP, Source Engine, etc.).

A port is required for UDP checks.

Check UDP Port Availability: Global Connection Test from 50+ Locations

Enter a domain or IP address with a port (e.g., 8.8.8.8:53) to begin the global UDP check.

Commonly Used UDP Ports

A list of the most frequent destination ports encountered in modern UDP network monitoring.

Port Service Description
53DNSDomain Name System; resolves hostnames to IP addresses.
67DHCPDHCP Server; used for dynamic IP allocation.
123NTPNetwork Time Protocol; synchronizes system clocks.
161SNMPSimple Network Management Protocol; used for network monitoring.
500ISAKMPISAKMP; used for setting up IPsec VPN tunnels.
3478STUNSTUN; used for NAT traversal in VoIP and WebRTC.
5060SIPSession Initiation Protocol (SIP); used for VoIP signaling.
27015Source EngineSource Engine Query; used by game servers (CS:GO, TF2, Rust).

Global UDP Port Checker & Payload Injector

UDP sends packets to a target without establishing a connection first. There is no handshake, no acknowledgment — the packet goes out and either something comes back or it does not. This makes testing UDP ports fundamentally different from TCP: an empty packet to an open UDP port often produces no response at all, because the application is waiting for a meaningful payload before it replies.

Stateless Routing & Payload Injection

To get a real response from a UDP service, the probe has to look like legitimate traffic. For port 53, that means sending a valid DNS query. For port 123, an NTP version request. For game servers on 27015, a Source Engine query. The tool handles this automatically for well-known ports — it injects the correct application payload so the server has something to reply to, making the result meaningful rather than an inconclusive silence.

Firewall & DDoS Mitigation Testing

Because UDP amplification (NTP, DNS, Memcached) has been abused heavily in DDoS attacks, many networks apply aggressive UDP filtering by default. Cloud providers often block inbound UDP except on explicitly allowed ports. ISP scrubbing centers drop UDP that matches known amplification signatures. A test from multiple regions shows whether your UDP service is actually reachable from the internet or silently dropped somewhere upstream.

Gaming, VoIP, and Streaming Analysis

Game servers, SIP/RTP voice traffic, and live video streaming all depend on UDP because the latency overhead of TCP handshaking is too high. When UDP packets drop, it shows up as voice jitter, lag spikes in games, or freezing video. Live mode runs the check for 60 seconds and plots each response individually, which makes it possible to see whether packet loss is consistent or burst — the two patterns point to very different underlying causes.