As it obvious there Should be Some layer two and layer one (physical layer tapping devices) network devices in between that we cannot trace or identify but they have an important impact on the result
These layer 2 & 1 network devices have many roles, including security issue. There are many Agency or Organization they capture data in physical layer or Data link layer.
As it shows some hop counts in the trace-route results, but there are certainly more L2 & L1 devices in the middle. I am looking for theory or practical way to find an answer for this question that can prove or identify data capturing.