09 January 2007 | 9,923 views

MTR – Traceroute on Steroids

Check Your Web Security with Acunetix

MTR was written by Matt Kimball, with contributions by many people. Take a look at the “AUTHORS” file in the distribution. Roger Wolff took over maintenance of MTR in october 1998.

MTR combines the functionality of the ‘traceroute’ and ‘ping’ programs in a single network diagnostic tool.


As MTR starts, it investigates the network connection between the host MTR runs on and a user-specified destination host. After it determines the address of each network hop between the machines, it sends a sequence ICMP ECHO requests to each one to determine the quality of the link to each machine. As it does this, it prints running statistics about each machine.

You can get MTR from the BitWizard FTP site at ftp://ftp.bitwizard.nl/mtr/.

You can find more info and binary packages at the MTR Site.


Recent in General Hacking:
- Drones, Tor & Remailers – The Story Of A High-Tech Kidnapping
- U.S. State Department Hacked
- Kali Linux – The Most Advanced Penetration Testing Linux Distribution

Related Posts:
- LFT – Layer Four Traceroute and WhoB
- Sam Spade – Network Investigation Tool for Windows
- nwmap v0.1 Released – Map Network From PCAP File

Most Read in General Hacking:
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,154,963 views
- Hack Tools/Exploits - 605,664 views
- Password Cracking with Rainbowcrack and Rainbow Tables - 425,592 views

Advertise on Darknet

2 Responses to “MTR – Traceroute on Steroids”

  1. christian 9 January 2007 at 4:33 pm Permalink

    even better, and the REAL traceroute on steroids is LFT (layer four traceroute)
    which can be found here

  2. Darknet 10 January 2007 at 6:05 am Permalink

    Thanks christian, I shall look into that later.