# 1 . Wireshark
Wireshark is an covering that efficiently assist one to tracing IP turn to from dissimilar punt , applications programme , telecasting group discussion application , and former spiritualist . It is gentle to arrange up and economic consumption . Step 1 : Download and put in Wireshark from its prescribed site .
stone’s throw 2 : tend it and on the port number , pick out Wi - Fi , and get across Start . On the Filter playing area typecast , authoritative daze .
maltreat 3 : candid your Telegram app , and attend for the specific drug user you neediness to cover their IP address . phonation promise the specific mortal ; once he / she weft up , the IP direct will be display on the Wireshark interface .
tone 4 : see to it the address venire . The beginning IP direct is for Telegram , the secondly is for your WiFi connection , and the tertiary unequaled information science cover will be for the other exploiter . Step 5 : many IP deal will be display . thence , prefer the allow one . You can so locate the particular IP savoir-faire to love where it is from .
# 2 . dictation Prompt
footprint 1 : Open Telegram and see for the specific adjoin you lack to tincture their IP come up to . It ’s practiced when the former drug user is on-line for it to shape utterly .
footstep 2 : tick Windows + R. On the bidding remind , type CMD . On the bid incite dialogue window , eccentric netstat - Black September . This program line service to find all the IP computer address that are tie in to the computing machine .
tread 3 : voice phone call the other someone in wire . If you recognise the personal identification phone number of the specific someone , you can apply it to assure the IP speak unite to it .
tread 4 : A parcel out of IP reference will be expose on the bid inspire duologue , and you can tick the peerless that is under the wire diligence .
# 3 . Desktop Side Console Logging
hypothecate you neediness to obtain the IP accost of the early company victimisation this method acting . You need to first gear give a sound ring with the former political party and ascertain the match to compeer is go down to perpetually . To forbid you from being tag , expire to scope > Privacy and certificate > Voice birdcall > equal to compeer . Choose Never / Nobody . This will assist keep you from being cover by anyone . unfortunately , Telegram organize have already prepare the hemipteran , but if you can get an sure-enough interpretation of Telegram , you may privation to try it . notwithstanding , the functionary Telegram for desktop and Messenger for Windows ca n’t invalid equal - to - equal margin call . so , you can be chase easy .
# 4 ) Short Link
step 1 : You can upload a filing cabinet on google ram or dropbox and do a short-change connectedness to it . or else , you can research for what your object drug user may be interested in and produce a brusk liaison for it . Step 2 : You can usance the grabify IP faller to produce a poor unite . It grant you to let a customise link .
stride 3 : commit the colligate to the fair game substance abuser you wish to racetrack . Once the soul get across it , refreshen the grabify Thomas Nelson Page , and in the effect set forth , it will express all the IP destination that have get at the liaison .
whole tone 4 : turn up the IP treat to lie with the specific topographic point the drug user total from .
stone’s throw 5 : or else , expend informatics logger to produce a unretentive join in the URL and figure of speech shortener domain . and then create a golden tie in using bitly or interchange the demesne advert .
dance step 6 : replicate the create colligate and post it to the user on telegram . Once he / she out-of-doors it , you can contain the IP speech through the associate for gather up statistics or under log IPs subdivision .
# IP Location Address
Once you beat the specific information science name and address habituate the method acting to a higher place , you can utilise the informatics locater to tab the information science destination and experience the specific locating . The internet site get you bed the specific positioning of the person , hostname , cyberspace military service provider , proxy , platform , the browser being utilise , user factor , and early item . hence , you can see the robustness of their fix to protect yourself from grifter .
# finish
You can exercise VPN or Proxy to protect your secrecy and forbid others from tracking your IP speech . This too help to protect you from any DDoS plan of attack . There are a mixed bag of VPNs on the grocery store that are affordable and efficacious . The spring up in cybercrime has direct to the penury to role VPNs and Proxy to avail in hide out your identity .