Some users of my web server experience a TCP/443-only traffic block. The block is inconsistent across the users' home ISPs, even within a single ISP/city. Seems to be activated by traffic volume. Block lifted on the old IP when I direct traffic to a different IP, new IP is blocked.
All these traceroute methods work: ICMP, UDP, TCP/non-443-port.
Only TCP/443 traceroute fails, right on the 2nd hop (the next router after the home router does not respond).
The question:
- does this indicate some blacklist being pushed up to the home ISP? If so, what protocol/technology might be used to block traffic so specifically (TCP/443 only) and so early (home ISP in a different country)?
- or is this related to how TCP traceroute works?
mtr <host> // Full trace
mtr --tcp --port 80 <host> // Full trace
mtr --tcp --port 666 <host> // Full trace (except the host), even to a closed port
mtr --tcp --port 443 <host> // Only home route responds (1 hop), no further hops
(I have contacted all the ASes along the route, nobody acknowledges any traffic blocking so far. So the question is specifically about traceroute and possible mechanisms of such traffic blocking.)