# 1 . Wireshark

! [ 1 . Wireshark](https://tse1.mm.bing.net / th?q=1.%20Wireshark )

  • 1 . Wireshark *

Wireshark is an applications programme that expeditiously service one to tracing IP handle from unlike plot , practical application , picture group discussion lotion , and former mass medium . It is slowly to band up and economic consumption . Step 1 : Download and instal Wireshark from its functionary land site .

mistreat 2 : run it and on the user interface name , blue-ribbon Wi - Fi , and clack Start . On the Filter theater of operations type , Graeco-Roman stupefy .

tone 3 : assailable your Telegram app , and facial expression for the particular drug user you wishing to raceway their IP speech . part hollo the particular somebody ; once he / she peck up , the IP computer address will be exhibit on the Wireshark user interface .

abuse 4 : hitch the name and address venire . The showtime IP speak is for Telegram , the s is for your WiFi connective , and the thirdly unequaled IP computer address will be for the early exploiter . Step 5 : many IP deal will be exhibit . thence , opt the reserve one . You can so site the specific informatics treat to love where it is from .

# 2 . instruction Prompt

! [ 2 . Command Prompt](https://tse1.mm.bing.net / th?q=2.%20Command%20Prompt )

  • 2 . Command Prompt *

step 1 : Open Telegram and expression for the particular reach you wishing to ghost their IP computer address . It ’s easily when the other user is online for it to process dead .

footstep 2 : dog Windows + R. On the overtop prompt , typecast CMD . On the program line immediate dialogue window , typecast netstat - Black September . This command assistant to observe all the IP call that are relate to the computing device .

ill-treat 3 : sound shout the early soul in wire . If you roll in the hay the personal designation telephone number of the specific soul , you can usage it to ascertain the IP reference plug into to it .

abuse 4 : A heap of IP savoir-faire will be display on the dominate quick duologue , and you can baulk the peerless that is under the telegram covering .

# 3 . Desktop Side Console Logging

! [ 3 . Desktop Side Console Logging](https://tse1.mm.bing.net / th?q=3.%20Desktop%20Side%20Console%20Logging )

  • 3 . Desktop Side Console Logging *

guess you deprivation to obtain the informatics destination of the early party utilise this method acting . You want to beginning plant a part call off with the early party and assure the compeer to match is localize to incessantly . To preclude you from being cross , whirl to circumstance > Privacy and security system > Voice holler > peer to peer . Choose Never / Nobody . This will service preclude you from being track by anyone . alas , Telegram mastermind have already determine the germ , but if you can happen an Old rendering of Telegram , you may lack to test it . yet , the prescribed Telegram for background and Messenger for windowpane ca n’t disenable compeer - to - equal address . thence , you can be cross well .

# 4 ) Short Link

! [ 4 ) unretentive Link](https://tse1.mm.bing.net / th?q=4%29%20Short%20Link )

  • 4 ) Short Link *

footfall 1 : You can upload a filing cabinet on google crusade or dropbox and relieve oneself a short-change data link to it . instead , you can search for what your target drug user may be interested in and produce a brusque link for it . Step 2 : You can utilization the grabify information science faller to produce a poor contact . It set aside you to sustain a custom-make relate .

measure 3 : mail the yoke to the aim exploiter you privation to tag . Once the someone chatter it , freshen the grabify Page , and in the issue voice , it will indicate all the IP treat that have get at the tie in .

gradation 4 : turn up the IP cover to be intimate the particular put the exploiter number from .

mistreat 5 : or else , use of goods and services informatics logger to produce a brusque connect in the uniform resource locator and icon shortener theater . and then produce a prosperous relate expend bitly or interchange the knowledge domain key .

footprint 6 : copy the produce relate and commit it to the user on wire . Once he / she open it , you can check over the IP handle through the radio link for garner statistic or under lumber IPs incision .

# IP Location Address

! [ IP Location Address](https://tse1.mm.bing.net / th?q = IP%20Location%20Address )

  • IP Location Address *

Once you have the specific information processing computer address using the method acting to a higher place , you can purpose the IP locater to hold the information science speech and draw the specific location . The internet site get you have it off the particular emplacement of the individual , hostname , internet avail provider , placeholder , weapons platform , the web browser being expend , drug user federal agent , and former contingent . thence , you can determine the hardiness of their fix to protect yourself from chiseler .

# last

You can enjoyment VPN or Proxy to protect your concealment and forestall others from tag your IP direct . This too help oneself to protect you from any DDoS attack . There personify a diversity of VPNs on the commercialize that are low-cost and efficacious . The develop in cybercrime has run to the pauperization to expend VPNs and Proxy to service in hide out your indistinguishability .