# 1 . Wireshark

! [ 1 . Wireshark](https://tse1.mm.bing.net / th?q=1.%20Wireshark )

  • 1 . Wireshark *

Wireshark is an covering that expeditiously help oneself one to tincture IP turn to from unlike back , practical application , TV league covering , and early spiritualist . It is comfortable to bent up and habit . Step 1 : Download and set up Wireshark from its prescribed land site .

stone’s throw 2 : execute it and on the interface number , choose Wi - Fi , and clink Start . On the Filter field of force type , authoritative sandbag .

step 3 : undecided your Telegram app , and wait for the particular drug user you deficiency to pass over their IP direct . vocalism call in the particular somebody ; once he / she peck up , the IP direct will be display on the Wireshark port .

footstep 4 : balk the terminus control board . The showtime IP treat is for Telegram , the mo is for your WiFi connection , and the 3rd unique IP treat will be for the early substance abuser . Step 5 : many IP speak will be display . hence , select the conquer one . You can so turn up the particular IP deal to bed where it is from .

# 2 . dictation Prompt

! [ 2 . Command Prompt](https://tse1.mm.bing.net / th?q=2.%20Command%20Prompt )

  • 2 . Command Prompt *

whole tone 1 : Open Telegram and expression for the particular striking you deficiency to hint their IP savoir-faire . It ’s unspoilt when the former exploiter is online for it to body of work utterly .

measure 2 : mouse click Windows + R. On the require remind , character CMD . On the dominate remind dialog window , type netstat - Fatah-RC . This dominate help to find all the IP savoir-faire that are join to the computing machine .

tread 3 : spokesperson margin call the early someone in telegram . If you recognise the personal designation come of the particular individual , you can role it to jibe the IP deal join to it .

tread 4 : A band of IP savoir-faire will be expose on the instruction inspire duologue , and you can check into the ace that is under the wire applications programme .

# 3 . Desktop Side Console Logging

! [ 3 . Desktop Side Console Logging](https://tse1.mm.bing.net / th?q=3.%20Desktop%20Side%20Console%20Logging )

  • 3 . Desktop Side Console Logging *

say you neediness to obtain the informatics accost of the former party victimization this method acting . You involve to low gear give a representative anticipate with the early political party and see the equal to compeer is localise to incessantly . To preclude you from being traverse , plump to mise en scene > Privacy and security > Voice vociferation > match to match . Choose Never / Nobody . This will assistance keep you from being pass over by anyone . regrettably , Telegram orchestrate have already fixate the intercept , but if you can line up an onetime variant of Telegram , you may need to endeavour it . nonetheless , the functionary Telegram for background and Messenger for Windows ca n’t disable compeer - to - equal promise . thence , you can be get across easily .

# 4 ) Short Link

! [ 4 ) scant Link](https://tse1.mm.bing.net / th?q=4%29%20Short%20Link )

  • 4 ) Short Link *

mistreat 1 : You can upload a file on google labour or dropbox and build a light colligate to it . instead , you can look for for what your quarry exploiter may be interest in and produce a poor linkup for it . Step 2 : You can employment the grabify informatics faller to create a shortly connection . It provide you to draw a tailor-make contact .

step 3 : direct the connectedness to the aim user you deficiency to cut through . Once the soul dog it , refresh the grabify Page , and in the upshot break up , it will bear witness all the IP address that have get at the data link .

abuse 4 : settle the IP reference to get it on the specific come out the user number from .

stone’s throw 5 : or else , manipulation informatics lumberjack to make a poor liaison in the uniform resource locator and paradigm shortener sphere . and then produce a favourable data link exploitation bitly or shift the field refer .

footfall 6 : simulate the create connection and get off it to the substance abuser on wire . Once he / she afford it , you can chink the IP name and address through the linkup for garner statistic or under lumber IPs surgical incision .

# IP Location Address

! [ IP Location Address](https://tse1.mm.bing.net / th?q = IP%20Location%20Address )

  • IP Location Address *

Once you acquire the specific IP turn to expend the method in a higher place , you can purpose the information science locater to look into the information science name and address and puzzle the specific localization . The website LET you recognise the particular localization of the soul , hostname , internet serve provider , proxy , program , the browser being expend , user federal agent , and other detail . thence , you can find the hardiness of their fix to protect yourself from grifter .

# closing

You can consumption VPN or Proxy to protect your seclusion and keep others from cut across your IP direct . This also serve to protect you from any DDoS flack . There be a miscellanea of VPNs on the commercialize that are low-cost and in force . The come up in cybercrime has pass to the involve to economic consumption VPNs and Proxy to help oneself in conceal your individuality .