Morgan, a skilled hacker, has been enlisted by an organization to discreetly acquire confidential information regarding its competitors. To achieve this, Morgan employs Whois footprinting to collect the server IP address of the target organization. Subsequently, they utilize this server IP address as an input for an online tool, enabling them to extract crucial details like the network range, network topology, and the operating system employed within the target organization's network. What is the specific tool utilized by Morgan in the described scenario?