Online services based on Miloserdov.org


IP Ranges Composing

Find out information about yourself

Information Gathering

SSH scanning

Information exfiltration from cache and web archives

IP calculators

Bypassing the prohibition of displaying source HTML code, bypassing social content lockers

Advanced search engines usage

Encoding

Anti CloudFlare techniques

Images and Metadata

Information about phone numbers

Web Application Vulnerability Scanners

Web Server Vulnerability Scanners

Subdomains and hidden files

Getting Information on MAC Addresses

Web server analysis

Hashes, checksums

E-mail Analysis

Analysis of files

Convert values

QR codes

Special pages

Traceroute to my computer

Traceroute is used to discover the topology of a network and identify problems. Typically, users and system administrators traceroute from their computer to another host on the WAN or LAN. This service traceroutes from the remote host to your computer. This allows you to see the network route that network traffic can take to you.

If your ISP uses NAT, then computers behind NAT will not be shown in the traceroute – this is not a service error, this is a feature of computer networks.

By the way, this is one of the ways to determine that you are behind NAT – if the last hops (nodes) are not shown, then you are almost certainly behind NAT.

Description of traceroute methods:

  • default: Default method – used if not specified otherwise. This is a traditional, ancient route tracing method. Sending packets are udp datagrams with the so-called ‘unlikely’ destination port.
  • icmp: Now this is the most typical method, it uses icmp echo packets as probes. If you can ping the destination host, then icmp tracing is also applicable.
  • tcp: Well-known modern method designed to bypass firewalls.
  • tcpconn: The initial implementation of the tcp method simply uses the connect () call, which opens a full tcp session. It is not recommended for normal use, since the listening port on the destination host always affects the application.
  • udp: Uses udp datagrams with a fixed destination port (default is 53, dns). Also designed to bypass firewalls.
  • udplite: Use for udplite datagram probes (with a fixed destination port, default is 53).
  • dccp: Uses DCCP Request packets (rfc4340) for probes.
  • raw: This method sends the raw packets of the specified protocol.

You may also be interested in the following articles:

Your IP:
 
         

You may also like:

If you want to contribute, you can make donation for adding new services:

  • Bitcoin: Click for Address