Live Webinar
Troubleshooting Digital Experiences Across Owned and Unowned Networks

Abuse Report

ThousandEyes Abuse Report

What is ThousandEyes? What Does ThousandEyes Do?

ThousandEyes is a network intelligence platform that delivers visibility into every network an organization relies on, enabling organizations to optimize and improve application delivery, end-user experience, and ongoing infrastructure investments. This is made possible through the ThousandEyes SaaS platform that enables customers to test network performance against assets owned by the organization, and assets owned by organization's Service Provides (SaaS, Outsourcers, etc). These tests are executed using Endpoint Agents, Enterprise Agents, and Cloud Agents and comprise of Network Tests, DNS Tests, and Web Tests.

Tests Performed by ThousandEyes

ThousandEyes can execute tests using Cloud Agents deployed by us globally in critical internet locations, or using Enterprise Agents deployed by our customers where needed.

Network Tests can be either ICMP-based Network Tests, or TCP-based Network Tests. In ICMP-based Network Tests, ThousandEyes performs network measurements using the ICMP protocol to calculate metrics such as packet loss, latency, and jitter. In TCP-based Network Tests, ThousandEyes performs network measurements by sending a stream of TCP packets to the target port of the test (Web Tests default to port 80/443, and DNS Server Tests target port 53).

Web Tests target a web server, and measure availability, response time, throughput, redirects, and HTTP response codes (HTTP Server), or time to load page objects (Page Load), including component count, and providing a waterfall view of all page objects. Web Transaction Tests perform a sequence of scripted actions from within an actual browser process, returning waterfall views of all the pages and objects loaded. FTP Server Tests target an FTP server, and measure availability, response time, throughput, and reply codes.

The Enterprise agents' network communications for DNS Server Tests configured by the customers will be outbound traffic over port 53 (TCP).

ThousandEyes Tests Look Like Normal Traffic

If you see hosts with thousandeyes.com DNS names connecting to your servers or other network assets, or you see a ThousandEyes string as a user-agent in HTTP requests, then this is because one of our customers with whom you have a relationship is testing networked assets owned by your organization. While testing from ThousandEyes agents is non-disruptive to systems exposed on the internet, some infrastructure owners may consider these tests abusive.

Additionally, if you use Web Analytics for traffic reporting and analysis, you can exclude web requests generated by ThousandEyes agents. For more details on how to achieve this, using Google Analytics, please refer to https://success.thousandeyes.com/PublicArticlePage?articleIdParam=kA0E0000000CmnxKAC.

With regards to the issue of abuse, the ThousandEyes subscription agreement requires that the customer will not attempt to gain unauthorized access to any systems, networks, or data of ThousandEyes or any third party, interfere with or disrupt the integrity or performance of any ThousandEyes or third party systems, data, or networks, or use any Agents in violation of any third party terms of service, terms of use, or other online posted terms. If you consider those tests being abusive, please complete the Abuse form below and we will reach out to our customer and relay your concern.

You may wish to know how much network capacity will be utilized by the Agent when performing different types of tests. For more details, please refer to https://success.thousandeyes.com/PublicArticlePage?articleIdParam=kA0E0000000Cmp6KAC.

Concerns?

If you believe that tests set up against your assets by a ThousandEyes customer are interfering with the performance of your systems, please complete the form below. ThousandEyes will identify and notify the customer in question.

All fields are required.

Upgrade your browser to view our website properly.

Please download the latest version of Chrome, Firefox or Microsoft Edge.

More detail