Top.Mail.Ru
rgert

WinMTR: A Convenient Tool for Network Diagnostics

WinMTR: A Convenient Tool for Network Diagnostics

MTR is a cross-platform utility for network diagnostics that runs in the terminal. It combines the capabilities of traceroute and ping: like traceroute, it shows the route and all intermediate nodes, but it also calculates in real time the percentage of responses and latency for each hop between your computer and the remote host.

Below, we’ll explain how to use MTR on Windows.

Using MTR on Windows

For Windows, the easiest way to work with MTR is to use WinMTR. The process is straightforward:

  1. Download the archive and run the program as Administrator.
  2. If you prefer to see IP addresses instead of hostnames, disable the Resolve names option in the settings.
Image2
  1. In the Host field, enter the website domain or server IP address you want to test. 
  2. Click Start to begin the test.

Wait until the Sent counter reaches at least 100. You can stop the test at any time with the Stop button, but the more requests you send, the more accurate the results will be.

When finished, export the report using Export TEXT — this makes it easy to share the results with a specialist.

Key Metrics Explained

  • Hostname — the node’s name or its IP address. The message often indicates that ICMP requests are blocked on that node.
  • Nr — the hop number in the route.
  • Loss% — percentage of lost responses from the host.
  • Sent — number of packets sent to the node.
  • Recv — number of packets received in reply.
  • Best — minimum (fastest) latency.
  • Avrg — average latency in milliseconds.
  • Worst — maximum (slowest) latency.
  • Last — latency of the most recent packet received. 

How to Interpret the Results

Focus on consistent issues that appear across multiple destinations. You should pay attention if packet loss reaches around 5% or higher (Loss ≥ 5%), or if the average latency is about 350 ms or more (Avrg ≥ 350).

These metrics help identify where the bottleneck lies — whether it’s with your provider, on a backbone route, or closer to the target server.

Related

All articles
115395

How to Generate an SSH Key for Server Access

Working with remote servers requires a stable internet connection and a high level of security. Traditional passwords are gradually giving way to a more reliable authentication method: SSH keys. In this article, we’ll take a detailed look at how to…

19962558 6184587

Guide to Essential Docker Commands

Docker has long become a standard tool for containerizing applications, and this guide will help you understand the basic commands needed for everyday work. How Docker Commands Work Most Docker commands follow a simple pattern: docker + command + optional…