09 January 2007 | 9,869 views

MTR – Traceroute on Steroids

Prevent Network Security Leaks with Acunetix

MTR was written by Matt Kimball, with contributions by many people. Take a look at the “AUTHORS” file in the distribution. Roger Wolff took over maintenance of MTR in october 1998.

MTR combines the functionality of the ‘traceroute’ and ‘ping’ programs in a single network diagnostic tool.


As MTR starts, it investigates the network connection between the host MTR runs on and a user-specified destination host. After it determines the address of each network hop between the machines, it sends a sequence ICMP ECHO requests to each one to determine the quality of the link to each machine. As it does this, it prints running statistics about each machine.

You can get MTR from the BitWizard FTP site at ftp://ftp.bitwizard.nl/mtr/.

You can find more info and binary packages at the MTR Site.

Recent in General Hacking:
- Dradis v2.9 – Information Sharing For Security Assessments
- MagicTree v1.3 Available For Download – Pentesting Productivity
- Kvasir – Penetration Testing Data Management Tool

Related Posts:
- LFT – Layer Four Traceroute and WhoB
- Sam Spade – Network Investigation Tool for Windows
- nwmap v0.1 Released – Map Network From PCAP File

Most Read in General Hacking:
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,137,828 views
- Hack Tools/Exploits - 581,737 views
- Password Cracking with Rainbowcrack and Rainbow Tables - 414,442 views

Advertise on Darknet

2 Responses to “MTR – Traceroute on Steroids”

  1. christian 9 January 2007 at 4:33 pm Permalink

    even better, and the REAL traceroute on steroids is LFT (layer four traceroute)
    which can be found here

  2. Darknet 10 January 2007 at 6:05 am Permalink

    Thanks christian, I shall look into that later.