Skip to main content

Nmap: how to traceroute (part-18)

Traceroute
The --traceroute parameter can be use to trace the network path to the specified
host.
Usage syntax: nmap --traceroute [target]
# nmap --traceroute scanme.insecure.org
Starting Nmap 5.00 ( http://nmap.org ) at 2009-08-16 13:01 CDT
Interesting ports on scanme.nmap.org (64.13.134.52):
Not shown: 996 filtered ports
PORT STATE SERVICE
53/tcp open domain
70/tcp closed gopher
80/tcp open
http
113/tcp closed auth
TRACEROUTE (using port 113/tcp)
HOP RTT
ADDRESS
1 0.91
home (192.168.1.254)
2 24.40 99-60-32-2.lightspeed.wchtks.sbcglobal.net (99.60.32.2)
3 23.12 76.196.172.4
4 22.69 151.164.94.52
5 32.79 ex3-p12-0.eqdltx.sbcglobal.net (69.220.8.53)
6 32.74 asn2828-XO.eqdltx.sbcglobal.net (151.164.249.134)
...
13 74.90 ip65-46-255-94.z255-46-65.customer.algx.net (65.46.255.94)
14 75.01 scanme.nmap.org (64.13.134.52)
Nmap done: 1 IP address (1 host up) scanned in 33.72 seconds
Output of a traceroute scan
The information displayed is similar to the traceroute or tracepath commands
found on Unix and Linux systems - with the added bonus of Nmap’s tracing being
functionally superior to these commands.