Exam regardless of whether that address is reachable. Most effective energy is produced by the implementation to try to reach the host, but firewalls and server configuration might block requests leading to a unreachable position while some particular ports could be available. A standard implementation will use ICMP ECHO REQUESTs https://ukdirectorylist.com/listings12854487/the-2-minute-rule-for-trc20-token-generator