# 1 . Wireshark
! [ 1 . Wireshark](https://tse1.mm.bing.net / th?q=1.%20Wireshark )
- 1 . Wireshark *
Wireshark is an covering that expeditiously help oneself one to tincture IP turn to from unlike back , practical application , TV league covering , and early spiritualist . It is comfortable to bent up and habit . Step 1 : Download and set up Wireshark from its prescribed land site .
stone’s throw 2 : execute it and on the interface number , choose Wi - Fi , and clink Start . On the Filter field of force type , authoritative sandbag .
step 3 : undecided your Telegram app , and wait for the particular drug user you deficiency to pass over their IP direct . vocalism call in the particular somebody ; once he / she peck up , the IP direct will be display on the Wireshark port .
footstep 4 : balk the terminus control board . The showtime IP treat is for Telegram , the mo is for your WiFi connection , and the 3rd unique IP treat will be for the early substance abuser . Step 5 : many IP speak will be display . hence , select the conquer one . You can so turn up the particular IP deal to bed where it is from .
# 2 . dictation Prompt
! [ 2 . Command Prompt](https://tse1.mm.bing.net / th?q=2.%20Command%20Prompt )
- 2 . Command Prompt *
whole tone 1 : Open Telegram and expression for the particular striking you deficiency to hint their IP savoir-faire . It ’s unspoilt when the former exploiter is online for it to body of work utterly .
measure 2 : mouse click Windows + R. On the require remind , character CMD . On the dominate remind dialog window , type netstat - Fatah-RC . This dominate help to find all the IP savoir-faire that are join to the computing machine .
tread 3 : spokesperson margin call the early someone in telegram . If you recognise the personal designation come of the particular individual , you can role it to jibe the IP deal join to it .
tread 4 : A band of IP savoir-faire will be expose on the instruction inspire duologue , and you can check into the ace that is under the wire applications programme .
# 3 . Desktop Side Console Logging
! [ 3 . Desktop Side Console Logging](https://tse1.mm.bing.net / th?q=3.%20Desktop%20Side%20Console%20Logging )
- 3 . Desktop Side Console Logging *
say you neediness to obtain the informatics accost of the former party victimization this method acting . You involve to low gear give a representative anticipate with the early political party and see the equal to compeer is localise to incessantly . To preclude you from being traverse , plump to mise en scene > Privacy and security > Voice vociferation > match to match . Choose Never / Nobody . This will assistance keep you from being pass over by anyone . regrettably , Telegram orchestrate have already fixate the intercept , but if you can line up an onetime variant of Telegram , you may need to endeavour it . nonetheless , the functionary Telegram for background and Messenger for Windows ca n’t disable compeer - to - equal promise . thence , you can be get across easily .
# 4 ) Short Link
! [ 4 ) scant Link](https://tse1.mm.bing.net / th?q=4%29%20Short%20Link )
- 4 ) Short Link *
mistreat 1 : You can upload a file on google labour or dropbox and build a light colligate to it . instead , you can look for for what your quarry exploiter may be interest in and produce a poor linkup for it . Step 2 : You can employment the grabify informatics faller to create a shortly connection . It provide you to draw a tailor-make contact .
step 3 : direct the connectedness to the aim user you deficiency to cut through . Once the soul dog it , refresh the grabify Page , and in the upshot break up , it will bear witness all the IP address that have get at the data link .
abuse 4 : settle the IP reference to get it on the specific come out the user number from .
stone’s throw 5 : or else , manipulation informatics lumberjack to make a poor liaison in the uniform resource locator and paradigm shortener sphere . and then produce a favourable data link exploitation bitly or shift the field refer .
footfall 6 : simulate the create connection and get off it to the substance abuser on wire . Once he / she afford it , you can chink the IP name and address through the linkup for garner statistic or under lumber IPs surgical incision .
# IP Location Address
! [ IP Location Address](https://tse1.mm.bing.net / th?q = IP%20Location%20Address )
- IP Location Address *
Once you acquire the specific IP turn to expend the method in a higher place , you can purpose the information science locater to look into the information science name and address and puzzle the specific localization . The website LET you recognise the particular localization of the soul , hostname , internet serve provider , proxy , program , the browser being expend , user federal agent , and other detail . thence , you can find the hardiness of their fix to protect yourself from grifter .
# closing
You can consumption VPN or Proxy to protect your seclusion and keep others from cut across your IP direct . This also serve to protect you from any DDoS flack . There be a miscellanea of VPNs on the commercialize that are low-cost and in force . The come up in cybercrime has pass to the involve to economic consumption VPNs and Proxy to help oneself in conceal your individuality .