EPSV (Extended Passive) command for IPv6 and IPv4, automatically falling back to the classic PASV command if the IPv4 server rejects it. In Active Mode, the client opens a port and waits for the server using the EPRT (for IPv6) or PORT (for IPv4) commands. Active mode is frequently blocked by modern client-side routers.AUTH TLS handshake. Both encrypted modes require an SSL/TLS certificate configured on the server. Self-signed certificates are fully supported by this test.NLST command to perform a directory listing, which works seamlessly for testing standard FTP servers (Linux, Windows, FreeBSD, Unix) and network devices, such as embedded devices, routers, switches, firewalls, Network Attached Storage (NAS), IP cameras, Digital Video Recorders (DVR), dedicated hardware appliances, and all FTP servers in general. The network test is considered successful as long as it receives a 150 status code, confirming the server is ready to open the data connection and the firewall is properly configured, even if a subsequent 226 code fails due to file system permissions.
---> Outbound Commands: These lines show the exact commands our diagnostic tool sent to your server (e.g., USER, PASS, PORT).<--- Inbound Responses: These lines display the raw replies and standard status codes returned by your server (e.g., 220 Welcome, 331 Password required, 150 Opening data connection).---- Internal Client Status: These lines indicate actions performed locally by our testing tool, such as resolving DNS, opening data sockets, or detecting the end of a file (EOF).Certificate, Issued by, Trusted) appear during encrypted connections and display the local validation of your server's certificate chain.173.249.29.54 and 2a02:c207:1:3253:1::1