Current load


Current NTP server load

The chart below shows the server load for the last 300 seconds.

Current NTP server load

The list below shows the IP addresses of users who cause increased load on the server. The software against NTP server overloading automatically detects these users and adds them to the list of unserved users.

IPDate added to listNumber requests per second 4:09:210 22:51:390 8:41:4284 19:21:150 17:55:100 19:33:0164 3:44:18248 15:34:27100 19:29:55184 8:33:3075 13:03:0197 12:17:2891 11:13:2992 18:00:57157 11:12:0376 17:35:04167 12:35:02165 3:45:51522 19:36:3761 19:03:1776 11:45:0479 16:44:0994 13:08:4776 4:59:4695 15:16:0369 2:44:2874 15:28:2192 18:35:43146 18:43:5094 12:42:0981 16:07:03178 15:27:55222 16:40:31195 11:12:13107 15:20:47123 19:54:49129 16:07:2060 17:57:2092 16:38:0669 15:32:4074 16:59:35371

Some IP addresses send incorrect requests or even non-NTP requests. Upon detection of the repeated requests, IP addresses are added to the list of unserved. For such IPs, the ‘number of requests per second’ amounts to 0. If you have found your IP on the list with 0 requests per second, check your hardware and software requesting time from the NTP server. Maybe some of it generates requests that do not meet the NTP standards.

The IP address will be automatically removed from the list in a few days. If you have found your IP address in the list, please make sure that the equipment does not generate flood at the NTP server and correct the settings according to the recommendations. Later the server will be ready to process requests from your IP address. If the load recurs, your IP address will be immediately added to the list again.