Skip to main content

Trust · Operations · Connectivity

STUN / TURN connectivity test.

In-house, browser-native probe of the Conceptual Health® relay. No third-party libraries, no external services — your browser opens an RTCPeerConnection directly against our turn host, gathers ICE candidates, and reports what it sees. Use this to audit reachability from any network, including corporate firewalls.

DNSturn.conceptualhealth.com A record pending — using public IP 142.190.54.246 directly. TURNS (TLS) will be enabled once the A record is added at the registrar and a cert is issued for the hostname.
STUN endpointstun:142.190.54.246:3478
TURN endpoint (UDP)turn:142.190.54.246:3478?transport=udp
TURN endpoint (TCP)turn:142.190.54.246:3478?transport=tcp
TURNS endpoint (TLS)turns:turn.conceptualhealth.com:5349?transport=tcp
Realmconceptualhealth.com
AuthenticationHMAC-SHA1 short-lived credentials (RFC 7635 / oauth-style); ask the relay-credentials API for a one-time username + password.

Run a probe

The probe gathers candidates for a synthetic data channel and reports each one. A successful run shows at least one srflx (STUN-discovered server-reflexive) candidate and, if TURN credentials are provided, at least one relay candidate.

TURN credentials (optional)
Short-lived credentials are issued by POST /api/v1/relay/credentials on the GuardianOrb concierge service for any authenticated user. For an unauthenticated audit probe, paste a username + password the operator gave you.

Result

StatusIdle — click a button
Public reflexive (srflx)
Relayed (relay)
Local host
Total candidates0
Gather time

Log

[ready]

This page contains zero third-party JavaScript. It uses only the browser-built-in RTCPeerConnection API. Read the source: every line is in this single HTML file.