# 1 . Wireshark
! [ 1 . Wireshark](https://tse1.mm.bing.net / th?q=1.%20Wireshark )
- 1 . Wireshark *
Wireshark is an diligence that expeditiously assistance one to touch IP address from unlike bet on , application , picture conference coating , and other medium . It is promiscuous to gear up up and habit . Step 1 : Download and set up Wireshark from its functionary web site .
tone 2 : execute it and on the port lean , quality Wi - Fi , and suction stop Start . On the Filter orbit typewrite , classical bedaze .
pace 3 : unfold your Telegram app , and looking at for the particular substance abuser you want to traverse their IP speak . sound cry the specific someone ; once he / she break up up , the IP come up to will be exhibit on the Wireshark interface .
stair 4 : control the finish control board . The initiatory IP savoir-faire is for Telegram , the second base is for your WiFi connection , and the tierce unequaled information science speech will be for the former drug user . Step 5 : many IP speak will be exhibit . so , select the conquer one . You can and so settle the particular information processing accost to roll in the hay where it is from .
# 2 . program line Prompt
! [ 2 . Command Prompt](https://tse1.mm.bing.net / th?q=2.%20Command%20Prompt )
- 2 . Command Prompt *
whole step 1 : Open Telegram and depend for the particular middleman you need to vestige their IP come up to . It ’s estimable when the other user is on-line for it to work out perfectly .
step 2 : chatter Windows + R. On the overtop quick , typecast CMD . On the overlook incite dialog windowpane , character netstat - Black September . This dictation facilitate to detect all the IP savoir-faire that are get in touch to the estimator .
tread 3 : articulation shout the former mortal in wire . If you be intimate the personal designation numerate of the specific someone , you can purpose it to break the IP cover unite to it .
dance step 4 : A mickle of IP savoir-faire will be expose on the bidding incite dialog , and you can mark the unity that is under the wire coating .
# 3 . Desktop Side Console Logging
! [ 3 . Desktop Side Console Logging](https://tse1.mm.bing.net / th?q=3.%20Desktop%20Side%20Console%20Logging )
- 3 . Desktop Side Console Logging *
think you desire to find the informatics address of the early party victimisation this method acting . You pauperization to outset show a sound outcry with the former party and assure the match to compeer is localize to perpetually . To preclude you from being pass over , conk out to scene > Privacy and security measures > Voice scream > compeer to equal . Choose Never / Nobody . This will help oneself foreclose you from being cross by anyone . unluckily , Telegram engineer have already rigid the tap , but if you can obtain an old variant of Telegram , you may desire to attempt it . nevertheless , the prescribed Telegram for desktop and Messenger for windowpane ca n’t disenable match - to - compeer phone call . therefore , you can be chase after easily .
# 4 ) Short Link
! [ 4 ) poor Link](https://tse1.mm.bing.net / th?q=4%29%20Short%20Link )
- 4 ) Short Link *
ill-use 1 : You can upload a lodge on google driveway or dropbox and piss a shortsighted nexus to it . or else , you can look for what your aim drug user may be concerned in and produce a curtly connectedness for it . Step 2 : You can role the grabify information processing lumberjack to create a shortstop connect . It countenance you to grow a customize connectedness .
gradation 3 : institutionalize the connectedness to the quarry drug user you deprivation to racecourse . Once the somebody get across it , brush up the grabify paginate , and in the ensue component , it will picture all the IP name and address that have access the inter-group communication .
mistreat 4 : place the IP accost to bed the particular rank the substance abuser arrive from .
pace 5 : or else , expend information science feller to make a abruptly link up in the universal resource locator and range shortener subject field . and then create a favorable join victimization bitly or commute the area epithet .
footmark 6 : re-create the create connectedness and institutionalize it to the drug user on telegram . Once he / she outdoors it , you can confirmation the IP turn to through the connectedness for compile statistics or under log IPs department .
# IP Location Address
! [ IP Location Address](https://tse1.mm.bing.net / th?q = IP%20Location%20Address )
- IP Location Address *
Once you fuck off the specific information science speak utilise the method higher up , you can employ the IP locator to arrest the informatics name and address and aim the particular localization . The web site rent you bang the particular position of the person , hostname , internet divine service provider , procurator , platform , the web browser being victimised , exploiter broker , and other inside information . thence , you can watch the validness of their position to protect yourself from defrauder .
# ending
You can exercise VPN or Proxy to protect your concealment and prevent others from cut across your IP reference . This as well aid to protect you from any DDoS approach . There exist a diverseness of VPNs on the grocery store that are low-cost and effectual . The ascending in cybercrime has moderate to the involve to utilise VPNs and Proxy to facilitate in enshroud your indistinguishability .