traceroute

JSON
executablemacOS168.0 KBx86_64, arm64

Network packet sniffer — captures and analyzes raw network traffic

Captures raw network packets using libpcap or equivalent packet capture facilities. Establishes outgoing network connections and listens for incoming traffic on specified ports or interfaces. Processes captured packets for analysis, logging, or forwarding to network monitoring systems. Communicates with multiple network endpoints and integrates with other system bundles through XPC or similar inter-process mechanisms.AI

Fingerprint

Platform
macOS
Type
executable
Arch
x86_64, arm64
Min OS
26.1.0
SDK
26.1.0
File Size
168.0 KB
UUID
3BA2D0F9-86FA-3EBF-AC8E-DC55D5EE13F7
Analyzed
2026-04-07T05:21:14Z
CDHash
b475cd472e0bb990b4e40812e3f8ff037d4606b53f954b376c0f59d82681b386

Capabilities

NetworkListen for incoming network connections
com.apple.security.network.server[object Object]
NetworkRaw packet capture library
/usr/lib/libpcap.A.dylib

Interesting Strings

Network Surfaceentitled

DNA Capability Vector

Location
0
Keychain
0
Network
3
Storage
0
Hardware
0
IPC
0
Analytics
0
Security
0
System
0

Behavioral Profile

URL Endpoints
4
Telemetry Strings
0
File Paths
0
Bundle IDs
9
IOKit Constants
0
Library Functions
0

Structural HashesSHA-256

Static Libraries0 / 41 functions identified

Functions(41)

0x100000700sub_100000700
0x1000008fcsub_1000008fc
0x100000a80sub_100000a80
0x100000ad4sub_100000ad4
0x100000d80sub_100000d80
0x10000106csub_10000106c
0x10000112csub_10000112c
0x100001188sub_100001188
0x1000012a0sub_1000012a0
0x100001374sub_100001374
0x1000013bcsub_1000013bc
0x1000013fcsub_1000013fc
0x100001470sub_100001470
0x1000014a4sub_1000014a4
0x1000014e0sub_1000014e0
0x100001520sub_100001520
0x100002a98sub_100002a98
0x100002b80sub_100002b80
0x100002bccsub_100002bcc
0x100002d04sub_100002d04

Imports90 symbols from 2 dylibs

Exports1

_mh_execute_header0x0