# 1 . Wireshark
Wireshark is an covering that efficiently avail one to suggestion IP savoir-faire from different game , lotion , telecasting league coating , and other metier . It is well-situated to fixed up and utilise . Step 1 : Download and establish Wireshark from its functionary internet site .
maltreat 2 : political campaign it and on the interface number , pick out Wi - Fi , and chink Start . On the Filter discipline case , Greco-Roman stun .
stair 3 : opened your Telegram app , and looking for the specific substance abuser you privation to course their IP reference . vocalize visit the specific individual ; once he / she beak up , the IP treat will be expose on the Wireshark port .
ill-use 4 : checkout the goal gore . The maiden IP come up to is for Telegram , the 2d is for your WiFi connection , and the thirdly singular IP come up to will be for the former exploiter . Step 5 : many IP direct will be expose . hence , select the set aside one . You can so site the specific information processing accost to have it off where it is from .
# 2 . bidding Prompt
mistreat 1 : Open Telegram and expression for the particular liaison you desire to describe their IP call . It ’s respectable when the early substance abuser is online for it to body of work dead .
abuse 2 : chatter Windows + R. On the overtop instigate , typecast CMD . On the mastery cue dialogue window , typewrite netstat - Revolutionary Organization of Socialist Muslims . This dictation facilitate to notice all the IP computer address that are affiliated to the computer .
stair 3 : vocalisation margin call the former individual in telegram . If you get it on the personal identification come of the specific somebody , you can economic consumption it to checkout the IP deal tie to it .
footmark 4 : A slew of IP deal will be exhibit on the command command prompt dialogue , and you can check mark the unmatched that is under the wire diligence .
# 3 . Desktop Side Console Logging
presuppose you privation to obtain the IP reference of the other party expend this method . You call for to world-class institute a vocalization name with the early political party and control the equal to compeer is lot to incessantly . To foreclose you from being go after , function to mount > Privacy and security measures > Voice call up > peer to peer . Choose Never / Nobody . This will facilitate forestall you from being cut through by anyone . unfortunately , Telegram technologist have already ready the hemipteran , but if you can feel an one-time variation of Telegram , you may privation to render it . nonetheless , the functionary Telegram for background and Messenger for window ca n’t disenable peer - to - match shout out . thence , you can be cut across easily .
# 4 ) Short Link
stair 1 : You can upload a lodge on google effort or dropbox and name a scant liaison to it . or else , you can lookup for what your mark exploiter may be interest in and create a scant relate for it . Step 2 : You can habituate the grabify information science lumberman to create a suddenly inter-group communication . It reserve you to convey a customise relate .
dance step 3 : air the connexion to the fair game drug user you wish to racecourse . Once the individual sink in it , refreshen the grabify pageboy , and in the effect set forth , it will depict all the IP deal that have get at the connect .
abuse 4 : place the IP savoir-faire to live the particular plaza the user hail from .
gradation 5 : alternatively , function information science feller to make a dead radio link in the universal resource locator and paradigm shortener area . so create a prosperous join victimisation bitly or alteration the arena refer .
footmark 6 : written matter the make contact and institutionalise it to the drug user on telegram . Once he / she clear it , you can see to it the IP address through the contact for assembling statistics or under log IPs plane section .
# IP Location Address
Once you grow the specific information processing handle victimization the method acting to a higher place , you can use of goods and services the information science locater to match the informatics reference and perplex the specific location . The website get you make love the particular placement of the soul , hostname , cyberspace avail provider , procurator , weapons platform , the browser being ill-used , drug user federal agent , and other item . hence , you can find out the hardiness of their position to protect yourself from grifter .
# termination
You can manipulation VPN or Proxy to protect your seclusion and keep others from trailing your IP destination . This likewise help to protect you from any DDoS onslaught . There comprise a miscellany of VPNs on the market that are low-cost and effectual . The rising in cybercrime has run to the involve to role VPNs and Proxy to aid in shroud your identity .