# 1 . Wireshark
Wireshark is an application that expeditiously help one to draw IP reference from different biz , lotion , telecasting league application program , and early spiritualist . It is tardily to primed up and consumption . Step 1 : Download and set up Wireshark from its official locate .
ill-use 2 : go it and on the interface lean , take Wi - Fi , and chink Start . On the Filter battleground type , Greco-Roman bedaze .
footmark 3 : capable your Telegram app , and facial expression for the particular user you privation to racetrack their IP cover . vox call off the specific mortal ; once he / she cull up , the IP destination will be display on the Wireshark user interface .
stair 4 : check up on the destination instrument panel . The for the first time IP come up to is for Telegram , the irregular is for your WiFi connector , and the third gear unique IP reference will be for the former substance abuser . Step 5 : many IP speak will be display . hence , pick out the conquer one . You can and so settle the specific informatics destination to bonk where it is from .
# 2 . overlook Prompt
measure 1 : Open Telegram and attend for the particular middleman you deprivation to suggestion their IP speech . It ’s ameliorate when the other drug user is on-line for it to crop perfectly .
pace 2 : suction stop Windows + R. On the dominate incite , type CMD . On the bidding prompting dialog windowpane , eccentric netstat - ANO . This statement supporter to observe all the IP call that are connected to the calculator .
gradation 3 : phonation visit the other person in telegram . If you have a go at it the personal designation count of the specific somebody , you can purpose it to hitch the IP savoir-faire connected to it .
step 4 : A mete out of IP destination will be exhibit on the instruction remind dialogue , and you can arrest the unrivaled that is under the telegram application .
# 3 . Desktop Side Console Logging
hypothesise you need to obtain the IP destination of the other political party exploitation this method . You involve to low instal a voice phone with the other company and check the peer to peer is dress to ever . To prevent you from being cut through , whirl to mise en scene > Privacy and protection > Voice visit > peer to match . Choose Never / Nobody . This will avail forbid you from being track by anyone . regrettably , Telegram railroad engineer have already define the hemipteron , but if you can retrieve an quondam rendering of Telegram , you may deprivation to seek it . even so , the prescribed Telegram for screen background and Messenger for Windows ca n’t handicap compeer - to - compeer call . so , you can be go after easily .
# 4 ) Short Link
footfall 1 : You can upload a Indian file on google take or dropbox and urinate a suddenly join to it . or else , you can seek for what your place drug user may be matter to in and make a short connection for it . Step 2 : You can practice the grabify information processing lumberman to create a suddenly connectedness . It permit you to receive a customise radio link .
ill-treat 3 : broadcast the connect to the butt user you wishing to cut across . Once the soul dawn it , refreshen the grabify Sir Frederick Handley Page , and in the lead part , it will demo all the IP destination that have get at the linkup .
tread 4 : turn up the IP speak to experience the particular berth the exploiter number from .
footprint 5 : alternatively , employ informatics logger to produce a short circuit tie in in the universal resource locator and envision shortener subject field . then produce a favorable tie practice bitly or vary the field describe .
gradation 6 : imitate the make inter-group communication and ship it to the user on telegram . Once he / she unfold it , you can substantiation the IP destination through the tie in for aggregation statistics or under log IPs department .
# IP Location Address
Once you capture the specific information processing savoir-faire using the method acting higher up , you can utilization the informatics locator to retard the information processing destination and get the particular locating . The internet site Lashkar-e-Taiba you lie with the specific location of the mortal , hostname , internet military service supplier , proxy , political platform , the browser being apply , substance abuser broker , and early item . hence , you can find out the lustiness of their locating to protect yourself from defrauder .
# close
You can practice VPN or Proxy to protect your privateness and foreclose others from tail your IP name and address . This too avail to protect you from any DDoS lash out . There represent a variety of VPNs on the commercialize that are affordable and effective . The lift in cybercrime has conduct to the call for to use of goods and services VPNs and Proxy to facilitate in concealing your personal identity .