MTR – Traceroute on Steroids

Outsmart Malicious Hackers

MTR was written by Matt Kimball, with contributions by many people. Take a look at the “AUTHORS” file in the distribution. Roger Wolff took over maintenance of MTR in october 1998.

MTR combines the functionality of the ‘traceroute’ and ‘ping’ programs in a single network diagnostic tool.


As MTR starts, it investigates the network connection between the host MTR runs on and a user-specified destination host. After it determines the address of each network hop between the machines, it sends a sequence ICMP ECHO requests to each one to determine the quality of the link to each machine. As it does this, it prints running statistics about each machine.

You can get MTR from the BitWizard FTP site at

You can find more info and binary packages at the MTR Site.

Posted in: General Hacking, Network Hacking

, , , , , , ,

Recent in General Hacking:
- Why Are Hackers Winning The Security Game?
- The Dyn DNS DDoS That Killed Half The Internet
- Fully Integrated Defense Operation (FIDO) – Automated Incident Response

Related Posts:

Most Read in General Hacking:
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,177,900 views
- Hack Tools/Exploits - 642,985 views
- Password Cracking with Rainbowcrack and Rainbow Tables - 443,705 views

2 Responses to MTR – Traceroute on Steroids

  1. christian January 9, 2007 at 4:33 pm #

    even better, and the REAL traceroute on steroids is LFT (layer four traceroute)
    which can be found here

  2. Darknet January 10, 2007 at 6:05 am #

    Thanks christian, I shall look into that later.