Q. How do I find out the network path and/or router that is being used to reach a particular host on the internet?
A. You need to use traceroute command, which display the route packets take to network host on the Internet. It traces a packet from your computer to an Internet host, showing how many hops the packet requires to reach the host and how long each hop takes. Very useful to troubleshot network problem.
As you may be aware that the Internet is a large and complex aggregation of network hardware, connected together by gateways. Tracking the route one's packets follow (or finding the miscreant gateway that's discarding your packets) can be difficult.
Tracing routes under Linux/UNIX
Use traceroute command as follows:
$ traceroute cyberciti.biz
1 gateway-29.0.vsnl.net.in (188.8.131.52) 0.706 ms 0.887 ms 5.442 ms 2 184.108.40.206.static.vsnl.net.in (220.127.116.11) 1.123 ms 0.597 ms 0.566 ms 3 18.104.22.168 (22.214.171.124) 0.633 ms 1.109 ms 0.627 ms 4 nny-mum-6th-stm1.Bbone.vsnl.net.in (126.96.36.199) 211.014 ms 217.451 ms 210.244 ms 5 188.8.131.52.mpls-vpn-ny.static.vsnl.net.in (184.108.40.206) 213.922 ms 213.965 ms 213.777 ms 6 ge-0-0-9.p812.pat1.dce.yahoo.com (220.127.116.11) 229.726 ms 220.475 ms 219.694 ms 7 vlan240-msr1.re1.yahoo.com (18.104.22.168) 220.287 ms ge-3-1-0.p440-msr1.re1.yahoo.com (22.214.171.124) 230.317 ms * 9 p5w4.geo.re2.yahoo.com (126.96.36.199) 346.741 ms 346.824 ms 346.111 ms
Tracing routes under MS-Windows NT/XP/2000/2003/Vista
Use tracert command. Click on Start > Run and type following command:
Please note that traceroute utilizes the IP protocol time to live field and attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along the path to some host. For security reason some ISP / network admin (stupid move IMPO) may block access to traceroute. You can bypass this restriction with tcptraceroute command for most common firewall filters.
You can also try out online traceroute from leading Indian ISP (Internet/broadband service provider's web site):
- 30 Handy Bash Shell Aliases For Linux / Unix / Mac OS X
- Top 30 Nmap Command Examples For Sys/Network Admins
- 25 PHP Security Best Practices For Sys Admins
- 20 Linux System Monitoring Tools Every SysAdmin Should Know
- 20 Linux Server Hardening Security Tips
- Linux: 20 Iptables Examples For New SysAdmins
- Top 20 OpenSSH Server Best Security Practices
- Top 20 Nginx WebServer Best Security Practices
- 20 Examples: Make Sure Unix / Linux Configuration Files Are Free From Syntax Errors
- 15 Greatest Open Source Terminal Applications Of 2012
- My 10 UNIX Command Line Mistakes
- Top 10 Open Source Web-Based Project Management Software
- Top 5 Email Client For Linux, Mac OS X, and Windows Users
- The Novice Guide To Buying A Linux Laptop