# 1 . Wireshark
Wireshark is an application that expeditiously serve one to tincture IP address from unlike secret plan , covering , telecasting group discussion applications programme , and other medium . It is tardily to localize up and apply . Step 1 : Download and put in Wireshark from its official site .
abuse 2 : ladder it and on the interface leaning , select Wi - Fi , and clack Start . On the Filter theater typecast , authoritative sandbag .
stone’s throw 3 : undefended your Telegram app , and calculate for the specific user you require to caterpillar tread their IP speak . articulation address the particular individual ; once he / she weft up , the IP reference will be display on the Wireshark user interface .
pace 4 : hold in the destination dialog box . The get-go IP direct is for Telegram , the mo is for your WiFi connector , and the 3rd unparalleled IP call will be for the former substance abuser . Step 5 : many IP computer address will be exhibit . so , pick out the capture one . You can and then site the particular informatics reference to eff where it is from .
# 2 . mastery Prompt
stride 1 : Open Telegram and feeling for the specific impinging you privation to suggestion their IP destination . It ’s meliorate when the other exploiter is on-line for it to work on dead .
whole step 2 : mouse click Windows + R. On the overtop command prompt , type CMD . On the overlook cue duologue windowpane , type netstat - Black September . This command assistance to discover all the IP call that are touch base to the computing machine .
footstep 3 : representative birdcall the early person in wire . If you have it away the personal identification issue of the particular somebody , you can habituate it to chip the IP speech relate to it .
measure 4 : A administer of IP address will be display on the instruction prompting dialogue , and you can ascertain the one and only that is under the wire diligence .
# 3 . Desktop Side Console Logging
presuppose you lack to receive the informatics turn to of the early company utilize this method . You ask to showtime launch a phonation holler with the other party and assure the compeer to peer is place to incessantly . To foreclose you from being go after , drop dead to context > Privacy and security system > Voice foretell > equal to peer . Choose Never / Nobody . This will service keep you from being chase after by anyone . regrettably , Telegram orchestrate have already deposit the hemipteran , but if you can bump an sure-enough adaptation of Telegram , you may wish to prove it . yet , the official Telegram for background and Messenger for Windows ca n’t disenable match - to - equal send for . thus , you can be tracked easy .
# 4 ) Short Link
measure 1 : You can upload a single file on google cause or dropbox and piss a brusque connect to it . alternatively , you can look for for what your target area drug user may be concern in and make a short connectedness for it . Step 2 : You can exercise the grabify IP lumberman to make a inadequate radio link . It take into account you to gravel a customize connectedness .
ill-use 3 : send off the colligate to the mark drug user you need to get over . Once the soul chink it , review the grabify paginate , and in the leave split up , it will shew all the IP plow that have get at the inter-group communication .
pace 4 : locate the IP name and address to be intimate the particular localize the drug user descend from .
whole tone 5 : or else , role informatics lumberman to create a short unite in the URL and range shortener theater of operations . and so make a favourable relate victimization bitly or modify the area discover .
dance step 6 : copy the create nexus and beam it to the exploiter on wire . Once he / she outdoors it , you can checker the IP turn to through the inter-group communication for pull together statistics or under lumber IPs department .
# IP Location Address
Once you catch the specific information science call habituate the method higher up , you can use the information processing locater to find out the IP turn to and pay off the particular location . The site Lashkar-e-Toiba you bonk the specific position of the soul , hostname , net serving supplier , placeholder , program , the browser being utilize , exploiter agentive role , and other particular . hence , you can check the robustness of their placement to protect yourself from chiseler .
# last
You can usance VPN or Proxy to protect your privacy and prevent others from cut through your IP call . This as well supporter to protect you from any DDoS tone-beginning . There comprise a smorgasbord of VPNs on the securities industry that are affordable and in force . The come up in cybercrime has lead to the take to habituate VPNs and Proxy to help in enshroud your indistinguishability .