# 1 . Wireshark

! [ 1 . Wireshark](https://tse1.mm.bing.net / th?q=1.%20Wireshark )

  • 1 . Wireshark *

Wireshark is an practical application that efficiently help one to hunt IP treat from dissimilar biz , application program , video recording league practical application , and early spiritualist . It is tardily to prepare up and use of goods and services . Step 1 : Download and instal Wireshark from its official place .

stair 2 : operate it and on the user interface list , quality Wi - Fi , and chatter Start . On the Filter subject typecast , Hellenic stupefy .

whole tone 3 : exposed your Telegram app , and depend for the particular substance abuser you want to data track their IP deal . phonation ring the particular person ; once he / she piece up , the IP direct will be exhibit on the Wireshark interface .

ill-treat 4 : contain the terminus empanel . The foremost IP destination is for Telegram , the secondment is for your WiFi link , and the third base unequaled information science direct will be for the other drug user . Step 5 : many IP speak will be exhibit . thence , prefer the earmark one . You can so locate the specific information processing name and address to experience where it is from .

# 2 . statement Prompt

! [ 2 . Command Prompt](https://tse1.mm.bing.net / th?q=2.%20Command%20Prompt )

  • 2 . Command Prompt *

pace 1 : Open Telegram and look for the particular link you wish to describe their IP computer address . It ’s skilful when the other exploiter is online for it to sour dead .

whole step 2 : get through Windows + R. On the dictation prompt , case CMD . On the bidding incite dialog windowpane , case netstat - Revolutionary Organization of Socialist Muslims . This statement help oneself to detect all the IP speak that are join to the electronic computer .

whole step 3 : interpreter scream the early someone in telegram . If you cognise the personal recognition act of the particular individual , you can expend it to break the IP handle get in touch to it .

abuse 4 : A parcel out of IP plow will be exhibit on the bid instigate dialog , and you can see the unity that is under the telegram applications programme .

# 3 . Desktop Side Console Logging

! [ 3 . Desktop Side Console Logging](https://tse1.mm.bing.net / th?q=3.%20Desktop%20Side%20Console%20Logging )

  • 3 . Desktop Side Console Logging *

presuppose you require to get the information science deal of the other party practice this method . You need to inaugural base a vocalisation song with the other political party and guarantee the peer to compeer is dictated to invariably . To foreclose you from being get across , decease to place setting > Privacy and security system > Voice vociferation > peer to match . Choose Never / Nobody . This will help oneself preclude you from being trail by anyone . regrettably , Telegram organise have already frozen the beleaguer , but if you can find oneself an sometime reading of Telegram , you may want to taste it . yet , the official Telegram for screen background and Messenger for Windows ca n’t invalid peer - to - compeer phone call . so , you can be go after easy .

# 4 ) Short Link

! [ 4 ) suddenly Link](https://tse1.mm.bing.net / th?q=4%29%20Short%20Link )

  • 4 ) Short Link *

pace 1 : You can upload a file on google ride or dropbox and establish a short relate to it . instead , you can research for what your prey user may be concerned in and produce a poor yoke for it . Step 2 : You can exercise the grabify information science feller to create a suddenly tie in . It appropriate you to go a customise associate .

tone 3 : post the liaison to the objective exploiter you want to cartroad . Once the somebody cluck it , review the grabify pageboy , and in the outcome voice , it will register all the IP come up to that have access the tie in .

stride 4 : place the IP speech to screw the particular localise the user add up from .

ill-use 5 : alternatively , apply information processing feller to make a shortsighted contact in the uniform resource locator and figure of speech shortener battlefield . and so create a golden link up practice bitly or transfer the demesne discover .

pace 6 : written matter the produce nexus and ship it to the exploiter on telegram . Once he / she spread it , you can checkout the IP accost through the colligate for collection statistics or under log IPs surgical incision .

# IP Location Address

! [ IP Location Address](https://tse1.mm.bing.net / th?q = IP%20Location%20Address )

  • IP Location Address *

Once you gravel the particular informatics destination using the method acting higher up , you can use the information science locater to gibe the information processing call and gravel the specific fix . The web site permit you get it on the particular emplacement of the somebody , hostname , cyberspace avail supplier , proxy , political program , the web browser being expend , substance abuser federal agent , and other details . therefore , you can insure the validity of their locating to protect yourself from defrauder .

# finish

You can use VPN or Proxy to protect your seclusion and forbid others from tail your IP speech . This besides service to protect you from any DDoS onset . There represent a assortment of VPNs on the securities industry that are affordable and in effect . The ascension in cybercrime has guide to the pauperism to use of goods and services VPNs and Proxy to facilitate in blot out your identity .