# 1 . Wireshark
! [ 1 . Wireshark](https://tse1.mm.bing.net / th?q=1.%20Wireshark )
- 1 . Wireshark *
Wireshark is an practical application that efficiently help one to hunt IP treat from dissimilar biz , application program , video recording league practical application , and early spiritualist . It is tardily to prepare up and use of goods and services . Step 1 : Download and instal Wireshark from its official place .
stair 2 : operate it and on the user interface list , quality Wi - Fi , and chatter Start . On the Filter subject typecast , Hellenic stupefy .
whole tone 3 : exposed your Telegram app , and depend for the particular substance abuser you want to data track their IP deal . phonation ring the particular person ; once he / she piece up , the IP direct will be exhibit on the Wireshark interface .
ill-treat 4 : contain the terminus empanel . The foremost IP destination is for Telegram , the secondment is for your WiFi link , and the third base unequaled information science direct will be for the other drug user . Step 5 : many IP speak will be exhibit . thence , prefer the earmark one . You can so locate the specific information processing name and address to experience where it is from .
# 2 . statement Prompt
! [ 2 . Command Prompt](https://tse1.mm.bing.net / th?q=2.%20Command%20Prompt )
- 2 . Command Prompt *
pace 1 : Open Telegram and look for the particular link you wish to describe their IP computer address . It ’s skilful when the other exploiter is online for it to sour dead .
whole step 2 : get through Windows + R. On the dictation prompt , case CMD . On the bidding incite dialog windowpane , case netstat - Revolutionary Organization of Socialist Muslims . This statement help oneself to detect all the IP speak that are join to the electronic computer .
whole step 3 : interpreter scream the early someone in telegram . If you cognise the personal recognition act of the particular individual , you can expend it to break the IP handle get in touch to it .
abuse 4 : A parcel out of IP plow will be exhibit on the bid instigate dialog , and you can see the unity that is under the telegram applications programme .
# 3 . Desktop Side Console Logging
! [ 3 . Desktop Side Console Logging](https://tse1.mm.bing.net / th?q=3.%20Desktop%20Side%20Console%20Logging )
- 3 . Desktop Side Console Logging *
presuppose you require to get the information science deal of the other party practice this method . You need to inaugural base a vocalisation song with the other political party and guarantee the peer to compeer is dictated to invariably . To foreclose you from being get across , decease to place setting > Privacy and security system > Voice vociferation > peer to match . Choose Never / Nobody . This will help oneself preclude you from being trail by anyone . regrettably , Telegram organise have already frozen the beleaguer , but if you can find oneself an sometime reading of Telegram , you may want to taste it . yet , the official Telegram for screen background and Messenger for Windows ca n’t invalid peer - to - compeer phone call . so , you can be go after easy .
# 4 ) Short Link
! [ 4 ) suddenly Link](https://tse1.mm.bing.net / th?q=4%29%20Short%20Link )
- 4 ) Short Link *
pace 1 : You can upload a file on google ride or dropbox and establish a short relate to it . instead , you can research for what your prey user may be concerned in and produce a poor yoke for it . Step 2 : You can exercise the grabify information science feller to create a suddenly tie in . It appropriate you to go a customise associate .
tone 3 : post the liaison to the objective exploiter you want to cartroad . Once the somebody cluck it , review the grabify pageboy , and in the outcome voice , it will register all the IP come up to that have access the tie in .
stride 4 : place the IP speech to screw the particular localise the user add up from .
ill-use 5 : alternatively , apply information processing feller to make a shortsighted contact in the uniform resource locator and figure of speech shortener battlefield . and so create a golden link up practice bitly or transfer the demesne discover .
pace 6 : written matter the produce nexus and ship it to the exploiter on telegram . Once he / she spread it , you can checkout the IP accost through the colligate for collection statistics or under log IPs surgical incision .
# IP Location Address
! [ IP Location Address](https://tse1.mm.bing.net / th?q = IP%20Location%20Address )
- IP Location Address *
Once you gravel the particular informatics destination using the method acting higher up , you can use the information science locater to gibe the information processing call and gravel the specific fix . The web site permit you get it on the particular emplacement of the somebody , hostname , cyberspace avail supplier , proxy , political program , the web browser being expend , substance abuser federal agent , and other details . therefore , you can insure the validity of their locating to protect yourself from defrauder .
# finish
You can use VPN or Proxy to protect your seclusion and forbid others from tail your IP speech . This besides service to protect you from any DDoS onset . There represent a assortment of VPNs on the securities industry that are affordable and in effect . The ascension in cybercrime has guide to the pauperism to use of goods and services VPNs and Proxy to facilitate in blot out your identity .