Hello,
I’ve been experiencing frequent latency spikes and rubber banding for the last 15 days. I’ve been playing D4 since it came out and I’ve never experienced any such issues in the past. The in-game latency spikes are occasional but atrocious (anywhere from 400ms to 1800ms, one evening I got disconnected 5 times) and the rubber banding it derives from got my character killed in a few occasions.
My rig: 5700x Ryzen, 3090 RTX, 64 GB DD4 Ram, dedicated m.2 for games, FTTH connection of a symmetric 1Gbps, I’m connected to the router via CAT7 LAN cable; I live in the north of France and my ISP is SFR. I’ve got a fixed IPv4; port forwarding on my router is active for all the ports recommended on the Internet (except the UDP 12000-64000, because it seems a tad too wide).
A ticket to Blizzard support was not really conclusive; they recommended to do stuff that I already tried (flush dns cache, change game settings, etc) and ultimately they suggested to write in the Forum, which is what I’m doing.
My ISP sees of course no issues in my connection because their speed test shows that everything is ok.
I’ve tried playing another game (Warzone), using the same “platform” (Battle.net) and I had no latency issues whatsoever (no packet lost, latency constantly at 15ms).
I’ve read that people experienced this in the past, not really sure if still today, but no real solution was provided anywhere.
I can imagine that for any Tech Support this is a very obscure issue, and pinpointing the root-cause is considerably hard, so I tried to do some troubleshooting to help on this sense. I’m posting the same message in SFR forum as well, because I’m not really sure on which side the issue lies.
While connected to my router via cable, I monitored the connections that D4 process opened (Sysinternals’ ProcessExplorer shows the protocol, IPs and Ports) and then, using Wireshark and WinMRT, I tried to see if the traffic could have some issues by checking the “most relevant” TCP connections, setting aside those to ports 80 and 443, and focusing only on those to the ports that are recommended to be forwarded especially 1119, and range 6112 to 6119.
I launched D4 from Battle.net client: I stopped before clicking onto “Start Game”, so I was on the main menu.
The most relevant connections were:
To 34.147.8.240:1119 (Netherlands)
|------------------------------------------------------------------------------------------|
| WinMTR statistics |
| Host - % | Sent | Recv | Best | Avrg | Wrst | Last |
|------------------------------------------------|------|------|------|------|------|------|
| 192.168.50.1 - 0 | 50 | 50 | 0 | 0 | 1 | 0 |
| 1.127.128.77.rev.sfr. net - 5 | 43 | 41 | 1 | 1 | 3 | 2 |
| 202.4.128.77.rev.sfr. net - 5 | 43 | 41 | 2 | 3 | 46 | 2 |
| 240.8.147.34.bc.googleusercontent. com - 5 | 43 | 41 | 15 | 15 | 19 | 15 |
|____________|||||||
This looks like a “background” connection, which is always in “established” whenever D4 is launched, even if you simply stay at the menu screen.
Wireshark didn’t show any “colored label” in its captured traffic.
To 34.38.99.226:28891 (Belgium)
|------------------------------------------------------------------------------------------|
| WinMTR statistics |
| Host - % | Sent | Recv | Best | Avrg | Wrst | Last |
|------------------------------------------------|------|------|------|------|------|------|
| 192.168.50.1 - 0 | 51 | 51 | 0 | 0 | 1 | 0 |
| 1.127.128.77.rev.sfr. net - 8 | 39 | 36 | 0 | 1 | 2 | 1 |
| 202.4.128.77.rev.sfr. net - 3 | 47 | 46 | 2 | 2 | 4 | 2 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
| No response from host - 100 | 11 | 0 | 0 | 0 | 0 | 0 |
|____________|||||||
Wasn’t able to capture any traffic with Wireshark.
In the Main menu screen, I then clicked on “Start Game”.
This opened 2 UDP connections with . destination and, more notably, a TCP connection with variable IP, but whose port was within range 6112-6119, depending on the zone of the map where my D4 character was.
For example, starting at the Tree of Whispers, a TCP connection was created to 35.242.230.151:6112 (Germany)
|------------------------------------------------------------------------------------------|
| WinMTR statistics |
Host - % Sent Recv Best Avrg Wrst Last
192.168.50.1 - 0 63 63 0 0 3 0
1.127.128.77.rev.sfr. net - 6 52 49 1 1 2 1
202.4.128.77.rev.sfr. net - 4 56 54 2 2 2 2
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
No response from host - 100 13 0 0 0 0 0
Rubber banding was already noticeable; spikes of up to 400ms, however most of the time the latency was around 35ms.
In Wireshark, a significative amount of “TCP Dup ACK” (from server to my IP) and “TCP Fast Retransmission” (from my IP to server) were captured.
I then teleported to Kyovashad, which closed the previous connection and opened a new one, to 34.76.51.173:6113 (Belgium)
|------------------------------------------------------------------------------------------|
| WinMTR statistics |
Host - % Sent Recv Best Avrg Wrst Last
192.168.50.1 - 0 35 35 0 0 2 0
1.127.128.77.rev.sfr. net - 0 35 35 1 1 2 1
202.4.128.77.rev.sfr. net - 0 35 35 1 2 6 2
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
No response from host - 100 8 0 0 0 0 0
Here I noticed absolutely zero lag, the latency was stable on 25ms all the time. I almost cried.
Incidentally, zero “TCP Dup ACK” (from server to my IP) and “TCP Fast Retransmission” were caught by Wireshark when I was there.
I then teleported from Kyovashad to a Helltide zone, at the Onyx Watchtower.
This closed the previous connection and opened a new one to 104.199.36.170:6113 (Belgium)
|------------------------------------------------------------------------------------------|
| WinMTR statistics |
Host - % Sent Recv Best Avrg Wrst Last
192.168.50.1 - 0 42 42 0 0 2 0
1.127.128.77.rev.sfr. net - 0 42 42 1 1 2 1
202.4.128.77.rev.sfr. net - 0 42 42 1 2 3 2
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
Rubber banding again, “TCP Dup ACK” (from server to my IP) and “TCP Fast Retransmission” were caught again.
I decided to walk around a little bit and explore some areas close to that.
I reached the Bastard’s Pass and the and Bluff of Olzei: new connection to 35.205.51.253:6112 (Belgium)
|------------------------------------------------------------------------------------------|
| WinMTR statistics |
Host - % Sent Recv Best Avrg Wrst Last
192.168.50.1 - 0 15 15 0 0 0 0
1.127.128.77.rev.sfr. net - 0 15 15 1 1 1 1
202.4.128.77.rev.sfr. net - 0 15 15 2 2 4 2
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
No response from host - 100 3 0 0 0 0 0
Latency spikes again, rubber banding, “TCP Dup ACK” (from server to my IP) and “TCP Fast Retransmission” were caught again
I reached the Field of Broken spears and Gaaltma bushlands: new connection to 35.246.178.38:6112 (Germany)
|------------------------------------------------------------------------------------------|
| WinMTR statistics |
Host - % Sent Recv Best Avrg Wrst Last
192.168.50.1 - 0 20 20 0 0 1 0
1.127.128.77.rev.sfr. net - 0 20 20 1 1 2 1
202.4.128.77.rev.sfr. net - 0 20 20 2 2 3 2
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
No response from host - 100 4 0 0 0 0 0
Latency spikes again, rubber banding, “TCP Dup ACK” (from server to my IP) and “TCP Fast Retransmission” were caught again.
I did a couple of events and teleported back to the Tree of Whispers.
New connection to 34.159.239.63:6112 (Germany)
|------------------------------------------------------------------------------------------|
| WinMTR statistics |
Host - % Sent Recv Best Avrg Wrst Last
192.168.50.1 - 0 45 45 0 0 5 0
1.127.128.77.rev.sfr. net - 0 45 45 1 1 2 1
202.4.128.77.rev.sfr. net - 0 45 45 1 1 3 2
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
No response from host - 100 9 0 0 0 0 0
Latency spikes again, rubber banding, “TCP Dup ACK” (from server to my IP) and “TCP Fast Retransmission” were caught again
At this point, I exited the game to the main menu, which closed the UDP connections and all the other TCP connections to the ports 6112-6119. This is where I stopped the capture of Wireshark.
I don’t know if this is helpful at all, I’m not an expert at any of this. I’m only tired of being … “rubber banded” from one side (Blizzard) to another (my ISP), without the issue being really addressed by anyone.