Free online self-diagnosis service

"Jisin kun"

Powered by LAC Co.,Ltd.

What is "Jisin-kun"

Today personal/mobile computers directly connected to the Internet pose serious risks from a cybersecurity standpoint.
"Jisin-kun" is a service that diagnoses open port setting of the computers and provide some information to mitigate potential cyberattack risks over the Internet.

How to use "Jisin-kun"

  1. Please read the Terms & Conditions of Service before using "Jisin-kun".
  2. If you agree with the Terms & Conditions of Service, please tick "I agree to terms" and press the "Next" button.
  3. Please select the diagnostic items (You can select common ports used by major cyberattacks). After selecting items, please press the "Next" button.
  4. Please confirm your selected diagnostic items. To proceed, please press the "Start diagnosis" button.
  5. Diagnostic result will be displayed.

Terms & Conditions of Service

LAC Co., Ltd. (hereinafter referred to as the "Company" or “we”) offers this security diagnosis service called "Jisin-kun" (hereinafter referred to as "the Service") on this website (hereinafter referred to as "the Site"), we hereby provide this service in accordance with the terms and conditions (hereinafter referred to as "the Terms") of this security diagnosis service free of charge. This agreement establishes the method of providing this service, the scope of responsibility, other contract conditions, and if you do not agree to the conditions stipulated in these terms, you cannot use this service.
In addition, as stated in this agreement, the customer shall be responsible for using the results of the Service at the costomer’s own risk and we do not intend to provide any support (as described on this site’s FAQ offered as information). Therefore, please understand that we are assuming that based on the diagnostic results of this service, you or your organization’s specialist (such as personnel from your IT department) shall make judgments or shall provide support by yourself.

Article 1 (Agreement Establishing)
Upon pressing the button agreeing to the Terms displayed on this site, the Agreement based on the Terms between the company and the customer (hereinafter referred to as the “Agreement”) shall be concluded and it shall take effect immediately.

Article 2 (About this Service)
1. This service is a service to verify the customer’s environment being used in order to find out via external connection the Open/Close state of the ports during the assessment without charge. The Service performs diagnostic tests on the site’s access source IP address based on the acquired information listed below.
(1) Connected source IP address
(2) Browser type (User Agent)
(3) Check items based on the diagnostic objects selected by the customer

2. The source IP address of this diagnosis service is In addition, if any penetration testing other than the test described in the preceding paragraph is coming from this IP address, please check the safety of such communication and related matters.

3. The diagnostic results of this service do not indicate whether the environment being used by the customer is currently infected with a computer virus or not. In addition, the diagnostic results of this service do not guarantee whether the environment being used by the customer will be infected or contaminated in the future or not.

4. We do not provide support for the diagnostic results of this service.

Article 3 (Agreement Revisions)
The Company may change these Terms without notice at its discretion. Any changes in the Agreement shall take effect upon posting on our company’s website. In case the customer uses the Service after changing the Agreement, any changes in the Agreement by us shall be accepted by the customer accordingly.

Article 4 (Changes, Additions, Interruption, Cancellation of this service)
At our discretion, all or part of this service may be changed, added, suspended or cancelled without any notice.

Article 5 (Retention of Information)
By using our service, the Company mayretain the customer’s information described below. Regarding the retaind information, we will not provide such customer’s information held by us to the customer based on the customer’s request.

(1) IP address of the access source
(2) Access time
(3) Browser type (User/Agent)
(4) Items to be checked
(5) Time when diagnosis was performed
(6) Diagnosis results of this service

Article 6 (Use of Information)
By using the Service, the customer agrees that we may use the diagnostic results in the form of statistical information etc., without mentioning or including the specific information about the customer, for a research or investigation purpose or disclose the said diagnostic result as the results of research and surveys or a part of our educational activities.

Article 7 (Restrictions)
In the Service, in order to limit excess access from the same access source, a available access period has been set within a specific amount of time. This service cannot be used if the number of request exceeds the set maximum limit.

Article 8 (Prohibitions)
In using this service, the customer shall not perform the acts specified below.
(1) Any acts that infringe or may infringe the intellectual property rights of the Company or third parties, such as copyrights, trademark rights and other rights.
(2) Any acts that infringe or may infringe the privacy of third parties.
(3) Unauthorized access to our facilities, giving an excessive burden to disable the provision of this service, or acts that may interfere with the provision or management of this service.
(4) Any acts that interfere or may interfere with our business activities.
(5) Any act that gives disadvantage or damage to the Company or a third party, or an act that may likely occur
(6) Any acts leading to criminal acts or such acts that may likely occur
(7) Regardless of methods, by using this service to exploit any information obtained, to be used by third parties as a business
(8) In addition to the above, any acts in violation or acts that may violate laws and regulations, contractual terms etc. or public order and morals

Article 9 (Important Notice)
Various expenses such as communication charges for using the Service are to be borne by the customer.

Article 10 (Compliance with Laws and Regulations)
In using this service and its results, the customer understand and shall comply with the Terms, the Act on Regulation of Transmission of Specified Electronic Mail, and other related laws, government ordinances, ministerial ordinances, and other such ordinances.

Article 11 (Intellectual Property Rights/ Copyright)
All intellectual property rights concerning the Service are owned by the Company, and are protected by copyright law, and other applicable laws, etc. The customer may not copy, duplicate, modify, add or change any part or all of the application, content, system, and related documents of the Service without the Company’s permission.

Article 12 (Disclaimer and Scope of Warranty)
(1) Depending on the customer's network environment (NAT etc.), there is a possibility of diagnosing the equipment other than the equipment accessing this site in the Service.
(2) Please do not use the Service for the customers who are using environments (AWS etc.) prohibiting acts that fall under the diagnostic method (detailed in Article 2) implemented by this service.
(3) We shall not be responsible in the event that a problem occurs in the customer's network configuration, facilities or other customers or the environment of a third party, etc., due to the customer taking some measures in response to the diagnosis and diagnosis results by this service.
(4) Based on the results of the Services and depending on the request from the customer, after using the Service, we do not promise to provide services other than the Service to the customers.
(5) If the customer is not the owner of the assets to be diagnosed by the Service, such as a NAT environment, or a cloud environment, etc. it is the customer’s responsibility to correspond regarding any complaints that may arise from the owner.
(6) In the event that the customer connect to the Service from overseas, such connect shall be executed only after the customer’s verification that the use of the Service is not illegal in the related country(s) on such connection, the customer will connect on its own free will and when using this service in such country, the Compnay shall not be responsible for any conflicts with any laws, regulations and other rules in such country.
(7) The Company shall not responsible for any suspension of network operations due to any natural disasters and other unexpected accidents or incidents, etc.
(8) When using the Service, the Company shall not responsible for any legal disputes and/or in the case of social-related disputes between the customer and any third parties.
(9) As defined above, the Company shall not be liable for any damages arising from the use of other services.

Article 13 (Compensation for Damages)
(1) In the event that the customer has caused the Company to incur any loss related to the Service, or if the Company suffers damages or incurs any expenses, the customer shall be liable for any loss, damage or expenses and the Company shall be compensated in full by the customer.
(2) In the event that the customer incurs damage to a third party by using this service, the customer shall bear the responsibility to settle such damages and our company shall not be involved at all.

Article 14 (Governing Law and Agreement Jurisdiction)
This agreement is in accordance with the Japanese laws and shall be interpreted accordingly. In the event of a need for litigation, the Tokyo District Court shall be the exclusive jurisdiction for the first instance. Supplementary provisions of this service shall take effect from the start of the service and may be revised at any given time without prior notice to the customer.
Frequentlry Asked Questions(FAQ)
Please let us know how to make inquiries about this service.

Please take note that since this is a free service, we are not able to correspond to inquiries.

Does it cost money to use the service?

This service is available free of charge. However, customers are responsible for various expenses such as communication fees for using this service.

Is there a limitation on using the service?

We limit the number of requests received from the same access source within a certain period of time in order to avoid heavy traffic load on the inspection target. If the number of requests exceeds the upper limit, you will see a message saying "Please try again later" during which time this service cannot be used.

Who is the target user?

We are assuming it would be either yourself or any specialist in your affiliated organization (such as those in the Information System Dept.) who can determine and correspond with the diagnostic results of this service.

Which particular terminals need to be inspected?

It is recommended to diagnose mobile data communication equipment such as laptops or tablets that are used to connect to the internet and because the risk is too high, we recommend connecting PCs etc. to be connected directly to the internet instead of connecting through the company network.

Can I use it on a smartphone or tablet?

Yes, you can use it.

Is there any environment where this service cannot be used?

In some cloud services etc., the performance of this type of diagnostic service might fall under prohibited acts. Please check the terms and conditions of your environment.

Exactly what takes place during the diagnostic test?

We attempt Socket Open on the customer’s chosen port number.

Is there a fixed IP address of the diagnostic source?

The IP address is

What should I do if according to the diagnosis result it says “Network connection succeeded?”

When the computer performed the test, it indicates that your environment accepts direct connection from the internet. It is necessary to set up a Security Software in order to block communication when connecting to a global IP from the internet. According to the results of the diagnosis, you need to consult the security personnel or the information system administrator of your organization.

What’s the risk of an open port?

There is a risk of being infected with a virus. As for “WannaCry” please refer to the following contents.
Ransomware “WannaCry” countermeasure guide rev. 1(in Japanese only)

How does diagnosis take place on a NAT environment?

Diagnosis is performed on the global IP address after NAT.

The diagnostic result indicated "Do not connect." Do you think that there is no possibility of a virus infection?

In the environment where the diagnosis was conducted, the possibility of a virus infection directly from the Internet is quite low, however, another use environment may possibly be infected so please continue to take appropriate security measures.

The diagnostic result indicated "Cannot connect." Is ok to think that it’s no longer necessary to perform any diagnosis in the future?

The customer’s environment changes whenever the customer’s laptops and tablets are used so the diagnosis results may change as well. Therefore, we recommend conducting inspections on a regular basis.

Are the diagnostic results saved?

The following are the saved information
-Connection source IP address
-OS type
-Browser type (User Agent)
-Time when diagnosis was performed
-Checked items on the diagnostic target selected by the customer
-Checked items on the open status of the port selected by the customer

For what purpose do you use the saved diagnosis results?

Without specifying the customer’s information, the diagnostic results are used as statistical information for research purposes, surveys and security-awareness raising activities.

Do you disclose diagnostic results to others?

We do not disclose personal information to others in an identifiable form.

Do you plan to support this diagnostic service in case new forms of attacks come up in the future?

If there are risks or threats from new attacks specifically those that target PCs and tablets that are taken out of the company and if we can determine valid ways to verify, we are thinking of adding a menu on how to deal with it.

Please tell me about Ransomware "WannaCry".

"Please refer to the following contents:
Ransomware “WannaCry” countermeasure guide rev. 1(in Japanese only)

What is the origin of your service name "Jisin kun"?

We came up with the name “Jisin kun” having two meanings.
“Jisin” means “self-test” and it also means to have “self-confidence” to connect to the network and “kun” is the informal way of referring to a person after the name is mentioned, for example “John kun” or “Robert kun” etc. as opposed to the formal way “san” for example “John san” or “Robert san”

© 2017 LAC Co., Ltd.