Networking/Computing Tips/Tricks

archive Traceroute Comparison Capture pcapng for Wireshark (15 KB)

Equal-Cost Multi-Path (ECMP) is a forwarding mechanism for routing packets along multiple paths of equal cost with the goal to achieve almost equally distributed link load sharing. This, of course, significantly impacts a router's next-hop (path) decision.

For further details, look at RFC 2991, "Multipath Issues in Unicast and Multicast Next-Hop Selection," and RFC 2992, "Analysis of an Equal-Cost Multi-Path Algorithm."

How can we see this?  Normal Traceroute expects the network to do traditional routing, where all your traffic follows the same path unless there is a failure in the network to trigger a routing table update.  Chances of this are extremely small in the real world.

So how can we detect if ECMP is in play in the network your traffic is traversing?  The answer is we need a special version of Traceroute that can figure out if ECMP is in play.

There are two solutions: Paris Traceroute and Dublin Traceroute.  

The initial version of traceroute was implemented by Van Jacobson from a suggestion by Steve Deering.

Paris traceroute was implemented by Xavier Cuvellier. Debugged and enhanced by Brice Augustin.  The current version is available at:

Dublin Traceroute was built on top of Paris Traceroute and is written by Andrea Barberio from, you guessed it, Dublin.  You can find Dublin Traceroute at

What is the difference?  Dublin Traceroute uses the techniques invented by the authors of Paris-traceroute to enumerate the paths of ECMP flow-based load balancing, but introduces a new technique for NAT detection.

Lets look at Paris Traceroute first.

To check and see if you have this: simply type:


Screenshot from 2018 10 24 11 27 42

I did not have it, so I followed the instructions to install it on my Ubuntu Linux box.

sudo apt install paris-traceroute

Once done, I now get the proper response:

Screenshot from 2018 10 24 11 32 00

All is good.  You can use the following command to see what all the command line options are:

paris-traceroute -h

Now let's see if we have Dublin Traceroute installed:


Screenshot from 2018 10 24 14 17 12

Install it with:

sudo apt-get install dublin-traceroute

To get the help type:

dublin-traceroute --help


Let's run them both to see what happens when we traceroute to Google's public DNS at  First, here is a normal, regular traceroute:

Screenshot from 2018 10 24 14 32 52

Now, let's use Paris Traceroute:

Screenshot from 2018 10 24 14 36 31

Now Dublin Traceroute (you will note I add the '-n 3' parameter as this limits Dublin Traceroute to 3 probes which is the same as the Paris Traceroute default):

Screenshot from 2018 10 24 14 43 31 

Very different. 

To be fair, I am doing this from behing my home router which is a NAT.  So Dublin is successful as advertised in seeing there is some ECMP going on.  Look at the 8th hop.  We see there are two dirrent IP addresses, and we see them toggling.  Same thing in the 12th hop.

If you want to dig a bit deeper, I have also enclosed a Wireshark packet capture of the three traceroutes for your parusal and deeper dissection.

So cool!  I hope, like me, this is the last time you ever use regular traceroute!

Happy Tracerouting!!

Comments powered by CComment

The nicest thing you can do is use these inks to support us!  Thank you!

Support our research!  Buy me a coffee :)

Support our research. Become a Patron!

Find by Tag

4G Networks 5G Networks 6in4 6LoWLAN 6LoWPAN 802.11 802.11ah 802.11ax 802.11ay 802.11az Addressing Analysis Ansible Architecture ARP AToM BGP Bloom's Taxonomy Broadband Cable cat CBRS CellStream Cellular Central Office Cheat Sheet Chrome Cisco Cloud Coloring Rules Computer Consulting CPI Customer Support Data Center Data Networking DHCPv6 DNS Docker Documentation Dublin-Traceroute dumpcap ECMP Ethernet Ethics Fragmentation G-MPLS Git GNS3 Google GQUIC Hands-On History Home Network ICMP ICMPv6 IEEE 802.11p IEEE 802.15.4 Interface Control Internet IoT IPsec IPv4 IPv6 IS-IS L2VPN L3VPN LDP Linux LLN LoL M-BGP MAC MAC OSx Macro Microsoft mininet Monitoring MPLS MTU Multicast My Room Name Resolution Netcat Netmiko NetMon netsh Networking Network Science nmap Npcap Online School OpenFlow OSPF OSPFv2 OSPFv3 OSX OTT Paris-Traceroute Parrot PIM pktmon PMTU Policy POTS POTS to Pipes PPP Profile Programming Project Management Protocol 41 PW3E Python QoS QUIC Remote Desktop Requirements RIP Routing RPL RSVP Rural SAS SDN Security Service Provider Small Business SONET Speed SS7 SSH SSL Subnetting SYSCTL T-Shark TCP TCP/IP Telco Telecom 101 Telecommunications Telephone termshark TLS Tools Traceroute Traffic Engineering Training Travel Tunnel Ubuntu Utility Video Virtualbox Virtualization VoIP VRF VXLAN Webex WEP Wi-Fi Wi-Fi 4 Wi-Fi 5 Wi-Fi 6 Wi-Fi 6/6E Windows Winpcap Wireless Wireless 5G Wireshark Wireshark Tip WLAN WPA2 Zenmap ZigBee Zoom

Support us by clicking:

Twitter Feed