Tesseract’s The Tracer is an award winning software application for monitoring network activities. It works like other network monitoring tools but with some advanced specialties. This can serve multiple purposes. You can use it to get port details and scan the IP address. At the same time one can use it to get WhoIs information and trace route.
Three core functional capabilities combine into The Tracer to make it an exceptional quality software. With this tool you can find out where a website is really managed and hosted. The tool will also inform you where a person behind a web is really based in. and plus to them, you will get the website’s WhoIs details. All these three information combine into a good piece of data for you to better manage your network operations. The Tracer’s traceroute will send packet data to display route and to measure the delays. Thus it will collect single hop and geographic information. The WhoIs works through a query system to identify users on domain or IP address. Lastly the port scanner does what it does the best – verifies security.
Download freeware The Tracer, it works fast and is simple to operate.
|The Tracer 2017.7 Nov 14, 2014||- New setup engine (InnoSetup) - geographical info engine improvements - Other various little improvements|
|The Tracer 2014.11 Nov 14, 2014||- The Tracer shows the geographical path through the different hops - Better recognition of the target hosts - Better messaging text for the user - Other various little improvements|
Last month's downloads
Last week's downloads
... hundreds computers per second. It simply pings each IP address to check if it's alive, then optionally it is resolving its hostname, determines the MAC address, NetBIOS information, scans ports, etc. The ...
... information on your local machine or network computer. The tool used WMI ( Windows Management Instrumentation ) ... accounts, proxy settings, shared resource information and more. The tool is designed with a user-friendly interface and ...
... testing some services, firewall and intrusion detection systems. The program can also be used for debugging programs and configuring other network tools.
|8||TCP Port Forwarding|
|13||HTTrack Website Copier|