TCP Pulse

The heartbeat of
your network.
Every connection.

Every service your application depends on communicates over TCP. When a handshake fails, the service is unreachable. TCP Pulse monitors every connection, measures every handshake, and alerts you the instant a link in the chain breaks. Combine with port monitoring for complete service-layer visibility.

Handshake timing7 global probes30-sec intervals
tcp-handshake

Client

192.168.1.50

Server

db-prod:3306

SYN

Client initiates connection

SYN-ACK

Server acknowledges

ACK

Connection established

Waiting

Dependency awareness

See your entire service topology

Modern applications are a web of interconnected services. Your load balancer forwards to application servers. Those connect to databases, caches, and search engines. Each connection is a TCP socket. Each socket is a potential point of failure.

TCP monitoring maps these dependencies. When Redis on port 6379 goes dark, you know before the database gets overloaded. When Elasticsearch on 9200 becomes unreachable, you know before search breaks. The topology view shows which connections are healthy and which are failing, in real time.

This is infrastructure monitoring at the network layer. Above it, HTTP monitoring checks your applications. Below it, ping monitoring checks your servers. TCP monitoring fills the critical gap between.

Service Dependency Map
Healthy Down
443Load Balancer8080App Server 18080App Server 23306MySQL Primary6379Redis Cache9200Elasticsearch

TCP monitoring detects service failures at the network layer before they cascade through your application stack.

Free tool

TCP Port Checker

Test whether any TCP port is open, closed, or filtered. No account required.

TCP Port Checker

Test connectivity to any host and port

For continuous monitoring with automated alerts, create a free account with 50 monitors included.

Your Redis just stopped responding

Would you know in 30 seconds? Or would your users tell you 30 minutes later?

Start monitoring

TCP vs UDP vs ICMP: choose the right monitor

Different protocols serve different purposes. TCP monitoring covers the widest range of production services.

Best for services

TCP

Transmission Control Protocol

Connection

Connection-oriented

Handshake

3-way (SYN/SYN-ACK/ACK)

Used for

Web, databases, email, SSH

Monitoring

Port check confirms service is running

Reliable delivery

UDP

User Datagram Protocol

Connection

Connectionless

Handshake

None

Used for

DNS queries, video streaming, VoIP

Monitoring

No handshake, harder to verify

Best-effort delivery

ICMP

Internet Control Message Protocol

Connection

Network layer only

Handshake

Echo request/reply

Used for

Ping, traceroute, network diagnostics

Monitoring

Tests reachability, not services

Best-effort delivery

TCP deep dive

The anatomy of a TCP connection

A TCP connection has four phases: establishment (the three-way handshake), data transfer, idle keepalive, and termination. Each phase can fail in different ways that affect your application differently.

During establishment, failures manifest as connection timeouts or refusals. During data transfer, failures cause broken pipes and reset connections. During idle periods, connections can silently die when intermediate firewalls or load balancers close inactive sockets without notification.

TCP monitoring focuses on the establishment phase because it is the fastest and most reliable indicator of service health. If a service cannot complete a handshake, it cannot serve any traffic. The connection time directly measures how quickly the service processes the SYN backlog.

For complete application health, combine TCP checks with API monitoring that validates data transfer works correctly, and HTTP monitoring that checks application responses end-to-end.

Performance tuning

Connection timeouts and thresholds

The default TCP connection timeout on most operating systems is 75 seconds. For monitoring, this is far too long. PulseStack uses a configurable timeout (default 10 seconds) to detect failures quickly without triggering false positives on congested networks.

ScenarioTypical latencyThreshold
Same data centre< 1ms10ms
Same region1-5ms50ms
Same continent10-50ms200ms
Cross-continent80-200ms500ms
Degraded service500ms-3s5s

Set response time thresholds based on your geography and service requirements. PulseStack alerts you when connection times exceed your threshold, giving you early warning of performance degradation before connections start failing entirely.

Built for infrastructure teams

Everything you need to monitor TCP connections at scale, from a single server to a global fleet.

Three-way handshake checks

Every check performs a full SYN/SYN-ACK/ACK handshake, confirming the service is genuinely accepting connections, not just the server responding to pings.

Connection time tracking

Handshake duration is measured to the millisecond. Track trends over time and get alerted when latency exceeds your configured thresholds.

Open / closed / filtered

Distinguish between a stopped service (RST), a firewalled port (timeout), and a DNS resolution failure. Each requires a different remediation.

7 global locations

Check from New York, San Francisco, Toronto, London, Frankfurt, Singapore, and Bangalore. Consensus logic eliminates false alarms from regional issues.

30-second intervals

Detect service failures within 30 seconds. For critical infrastructure like production databases, this means recovery starts in under a minute.

16+ alert channels

Email, SMS, phone, Slack, Discord, Teams, Telegram, PagerDuty, OpsGenie, webhooks, Zapier, and more. Escalation policies for critical services.

Five failures TCP monitoring catches first

Real scenarios where TCP monitoring detects the problem minutes before any other monitoring type.

01

Database connection pool exhaustion

Your MySQL server hits max_connections. New handshakes queue in the SYN backlog, and connection time spikes from 3ms to 800ms.

Detection: TCP monitoring alerts on response time threshold before any HTTP 500 errors appear.

Detected 2 min earlier before HTTP monitoring
02

Firewall rule change blocks a port

A security team update accidentally blocks port 6379 in a security group. Redis becomes unreachable from application servers.

Detection: TCP check to port 6379 immediately returns filtered state instead of open.

Detected 30 sec before HTTP monitoring
03

Service crash after deployment

A new deploy causes PostgreSQL to crash during startup. The process exits silently. Port 5432 transitions from open to closed.

Detection: TCP monitoring detects connection refused within one check interval.

Detected 30 sec before HTTP monitoring
04

TLS terminator memory leak

Your Nginx TLS terminator slowly leaks memory. At 95% utilisation, new TCP handshakes on port 443 take 5+ seconds.

Detection: Connection time threshold alert fires as handshake times degrade.

Detected 5 min earlier before HTTP monitoring
05

DNS failure breaks internal routing

Internal DNS stops resolving db-primary.internal. Applications cannot establish TCP connections to the database.

Detection: TCP checks using hostname detect resolution failure immediately.

Detected 30 sec before HTTP monitoring

Simple pricing. Start free.

50 monitors free forever. Upgrade when you need faster checks or more capacity.

Free

£0forever

  • 50 monitors
  • 3-min checks
  • Email alerts
  • 5 status pages
Start free

Most popular

Pro

£29/month

  • 200 monitors
  • 30-sec checks
  • All 16+ alert channels
  • 90-day data retention
Get started

Enterprise

£89/month

  • 500+ monitors
  • 30-sec checks
  • SSO & audit logs
  • Dedicated support
Contact us

All plans include multi-location checks, incident management, and public status pages. Full plan comparison →

Frequently asked questions

Everything you need to know about TCP monitoring.

Can every service in your stack accept connections right now?

Monitor every TCP connection across your infrastructure. Free for 50 monitors, no credit card required.

Start TCP monitoring free