Please let us know how to make inquiries about this service.
Please take note that since this is a free service, we are not able to correspond to inquiries.
Does it cost money to use the service?
This service is available free of charge. However, customers are responsible for various expenses such as communication fees for using this service.
Is there a limitation on using the service?
We limit the number of requests received from the same access source within a certain period of time in order to avoid heavy traffic load on the inspection target. If the number of requests exceeds the upper limit, you will see a message saying "Please try again later" during which time this service cannot be used.
Who is the target user?
We are assuming it would be either yourself or any specialist in your affiliated organization (such as those in the Information System Dept.) who can determine and correspond with the diagnostic results of this service.
Which particular terminals need to be inspected?
It is recommended to diagnose mobile data communication equipment such as laptops or tablets that are used to connect to the internet and because the risk is too high, we recommend connecting PCs etc. to be connected directly to the internet instead of connecting through the company network.
Can I use it on a smartphone or tablet?
Yes, you can use it.
Is there any environment where this service cannot be used?
In some cloud services etc., the performance of this type of diagnostic service might fall under prohibited acts. Please check the terms and conditions of your environment.
Exactly what takes place during the diagnostic test?
We attempt Socket Open on the customer’s chosen port number.
Is there a fixed IP address of the diagnostic source?
The IP address is 188.8.131.52.
What should I do if according to the diagnosis result it says “Network connection succeeded?”
When the computer performed the test, it indicates that your environment accepts direct connection from the internet. It is necessary to set up a Security Software in order to block communication when connecting to a global IP from the internet. According to the results of the diagnosis, you need to consult the security personnel or the information system administrator of your organization.
What’s the risk of an open port?
How does diagnosis take place on a NAT environment?
Diagnosis is performed on the global IP address after NAT.
The diagnostic result indicated "Do not connect." Do you think that there is no possibility of a virus infection?
In the environment where the diagnosis was conducted, the possibility of a virus infection directly from the Internet is quite low, however, another use environment may possibly be infected so please continue to take appropriate security measures.
The diagnostic result indicated "Cannot connect." Is ok to think that it’s no longer necessary to perform any diagnosis in the future?
The customer’s environment changes whenever the customer’s laptops and tablets are used so the diagnosis results may change as well. Therefore, we recommend conducting inspections on a regular basis.
Are the diagnostic results saved?
The following are the saved information
-Connection source IP address
-Browser type (User Agent)
-Time when diagnosis was performed
-Checked items on the diagnostic target selected by the customer
-Checked items on the open status of the port selected by the customer
For what purpose do you use the saved diagnosis results?
Without specifying the customer’s information, the diagnostic results are used as statistical information for research purposes, surveys and security-awareness raising activities.
Do you disclose diagnostic results to others?
We do not disclose personal information to others in an identifiable form.
Do you plan to support this diagnostic service in case new forms of attacks come up in the future?
If there are risks or threats from new attacks specifically those that target PCs and tablets that are taken out of the company and if we can determine valid ways to verify, we are thinking of adding a menu on how to deal with it.
Please tell me about Ransomware "WannaCry".
What is the origin of your service name "Jisin kun"?
We came up with the name “Jisin kun” having two meanings.
“Jisin” means “self-test” and it also means to have “self-confidence” to connect to the network and “kun” is the informal way of referring to a person after the name is mentioned, for example “John kun” or “Robert kun” etc. as opposed to the formal way “san” for example “John san” or “Robert san”