{"id":2832,"date":"2022-07-16T10:00:00","date_gmt":"2022-07-16T07:00:00","guid":{"rendered":"https:\/\/www.virtono.com\/community\/?p=2832"},"modified":"2022-07-16T14:41:54","modified_gmt":"2022-07-16T11:41:54","slug":"how-to-use-tracert-traceroute","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-use-tracert-traceroute\/","title":{"rendered":"How to use Tracert\/Traceroute"},"content":{"rendered":"\n<p>What is Traceroute?<\/p>\n\n\n\n<p>An internet traceroute shows the route taken by data as it moves from its source to its destination. In contrast to other diagnostic tools that examine data, such as packet capture, a traceroute serves a different purpose. In contrast, Traceroute looks at how the data travels over the internet.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-use-tracert-traceroute\/#How_do_I_use_Tracert_in_Microsoft_Windows\" title=\"How do I use Tracert in Microsoft Windows?\">How do I use Tracert in Microsoft Windows?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-use-tracert-traceroute\/#Run_a_traceroute_in_macOS\" title=\"Run a traceroute in macOS\">Run a traceroute in macOS<\/a><\/li><\/ul><\/nav><\/div>\n<h3 class=\"has-accent-color has-text-color wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_do_I_use_Tracert_in_Microsoft_Windows\"><\/span>How do I use Tracert in Microsoft Windows?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li>Open a Command Prompt<\/li><li>Click on the Start Menu and in the search bar, type &#8216;cmd&#8217;, and press Enter.<\/li><li>Enter &#8220;tracert&#8221; followed by the destination\u2014either an IP address or a domain name\u2014in the Command Prompt window.<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li><em>For example tracert google.com OR tracert 142.251.36.14<\/em><\/li><li><em>The command&#8217;s output will include the number of hops found and the time (in milliseconds) for each hop.<\/em><\/li><\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"390\" data-attachment-id=\"2833\" data-permalink=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-use-tracert-traceroute\/attachment\/screenshot-2022-07-12-at-11-09-27\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.09.27.png?fit=975%2C507&amp;ssl=1\" data-orig-size=\"975,507\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screenshot-2022-07-12-at-11.09.27\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.09.27.png?fit=750%2C390&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.09.27.png?resize=750%2C390&#038;ssl=1\" alt=\"Tracert Windows\" class=\"wp-image-2833\" srcset=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.09.27.png?w=975&amp;ssl=1 975w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.09.27.png?resize=300%2C156&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.09.27.png?resize=768%2C399&amp;ssl=1 768w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"has-accent-color has-text-color wp-block-heading\"><span class=\"ez-toc-section\" id=\"Run_a_traceroute_in_macOS\"><\/span>Run a traceroute in macOS<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li>Launch Terminal (found in the Applications &gt; Utilities folder).<\/li><li>In the Terminal window, enter traceroute www.google.com<\/li><\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"430\" data-attachment-id=\"2834\" data-permalink=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-use-tracert-traceroute\/attachment\/screenshot-2022-07-12-at-11-13-19\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.13.19.png?fit=756%2C433&amp;ssl=1\" data-orig-size=\"756,433\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screenshot-2022-07-12-at-11.13.19\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.13.19.png?fit=750%2C430&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.13.19.png?resize=750%2C430&#038;ssl=1\" alt=\"traceroute in macOS\" class=\"wp-image-2834\" srcset=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.13.19.png?w=756&amp;ssl=1 756w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.13.19.png?resize=300%2C172&amp;ssl=1 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>What is Traceroute? An internet traceroute shows the route taken by data as it moves from its source to its destination. In contrast to other diagnostic tools that examine data, such as packet capture, a traceroute serves a different purpose. In contrast, Traceroute looks at how the data travels over<\/p>\n","protected":false},"author":8,"featured_media":2834,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Tutorial on how to use Tracert\/Traceroute\n\n\n#tracert #traceroute #tutorial #admin #web #developer","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[3,5],"tags":[165,166,167,164,168],"class_list":["post-2832","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorial-how-to","category-knowledgebase","tag-traceroute","tag-traceroute-macos","tag-traceroute-windows","tag-tracert","tag-tracert-windows"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/Screenshot-2022-07-12-at-11.13.19.png?fit=756%2C433&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-JG","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":817,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/footprinting\/","url_meta":{"origin":2832,"position":0},"title":"FOOTPRINTING","author":"Shreyash Sharma","date":"December 14, 2016","format":false,"excerpt":"WHAT IS FOOTPRINTING? Footprinting refers to the process of gathering information about a specific computer system or a network environment and the company it belongs to. This is the preparatory phase for the hacker where he gathers as much information as he can so as to find ways to intrude\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/df_logo_1200x533.jpg?fit=720%2C320&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/df_logo_1200x533.jpg?fit=720%2C320&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/df_logo_1200x533.jpg?fit=720%2C320&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/df_logo_1200x533.jpg?fit=720%2C320&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":3885,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/network-troubleshooting-via-command-line\/","url_meta":{"origin":2832,"position":1},"title":"Network Troubleshooting via Command Line","author":"George B.","date":"September 16, 2023","format":false,"excerpt":"In this tutorial, we will explore how to use Linux command line options for network troubleshooting. The CLI, also known as the terminal or shell, allows users to execute commands directly, making complex tasks simpler. The Fundamentals It's important to understand what network troubleshooting entails before getting into the details.\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/09\/Linux-Network-Troubleshooting-via-Command-Line.png?fit=360%2C240&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":828,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/russian-cyber-attack-on-us-what-does-cyber-attack-means\/","url_meta":{"origin":2832,"position":2},"title":"Russian Cyber Attack on US : What Does Cyber Attack Means?","author":"Daniel Draga","date":"January 2, 2017","format":false,"excerpt":"The US elections of 2016, were full of surprise and twist, the main being the outcome. But no one saw this coming,\u00a0when CIA said that Kremlin-directed a cyber campaign to influence the US election, the world was more than shocked, so today we look at what exactly a Cyber Attack\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/hacking-myspace-735x400.jpg?fit=735%2C400&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/hacking-myspace-735x400.jpg?fit=735%2C400&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/hacking-myspace-735x400.jpg?fit=735%2C400&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/hacking-myspace-735x400.jpg?fit=735%2C400&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":358,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-clear-your-dns-cache\/","url_meta":{"origin":2832,"position":3},"title":"How to clear your DNS cache","author":"Daniel Draga","date":"August 7, 2016","format":false,"excerpt":"DOMAIN NAME SYSTEM What is DNS? Internet Directory Service A client-server application that maps host names into their corresponding IP addresses Mapping host names into their corresponding IP addresses is called name resolution or name translation or name mapping or Address Resolution \u00a0 How to clear your DNS cache The\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/08\/dns-icon.png?fit=400%2C264&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2136,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/linux-encryption-how-to-secure-your-data\/","url_meta":{"origin":2832,"position":4},"title":"Linux encryption: How to secure your data","author":"Shreyash Sharma","date":"December 12, 2020","format":false,"excerpt":"Sales figures, strategy papers, payrolls and private records, pictures, account data, and passwords do not belong in the wrong hands. This article shows where encryption is necessary and how it is best implemented. Encryption is technically not a problem at all. There are several reliable methods under Linux for protecting\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/linux-encrypting-tools.png?fit=560%2C315&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/linux-encrypting-tools.png?fit=560%2C315&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/linux-encrypting-tools.png?fit=560%2C315&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":267,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/types-of-servers\/","url_meta":{"origin":2832,"position":5},"title":"Types Of Servers","author":"Daniel Draga","date":"July 30, 2016","format":false,"excerpt":"File Servers A file server may be dedicated or non-dedicated. \u00a0A dedicated server is designed specifically for use as a file server\u00a0 not for other database purposes. File servers may also be categorized by the method of access: Internet file servers are frequently accessed by File Transfer Protocol (FTP) or\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-3.jpg?fit=940%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-3.jpg?fit=940%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-3.jpg?fit=940%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-3.jpg?fit=940%2C500&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/2832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=2832"}],"version-history":[{"count":2,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/2832\/revisions"}],"predecessor-version":[{"id":2854,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/2832\/revisions\/2854"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/2834"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=2832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=2832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=2832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}