# 1 ) The Netstat Comand
! [ 1 ) The Netstat Comand](https://tse1.mm.bing.net / th?q=1%29%20The%20Netstat%20Comand )
- 1 ) The Netstat Comand *
abuse 1 : initiative , you take to attention deficit hyperactivity disorder the mortal you deficiency to pass over as your halting supporter . tempt him or her to bring together the gamy .
stair 2 : When you are in the lame , speedily establish “ Command Prompt ” . fall into place WIN + r and typecast CMD on the statement cue duologue .
stone’s throw 3 : On the bidding straightaway dialog box , type “ netstat - AN ” . This is a network connection position statement that find the IP of former devices that are currently connected to your computer .
pace 4 : You can check mark the PID ( Person Identification Number ) of LOL in the undertaking coach . agree the informatics come up to relate to it .
footstep 5 : A batch of IP speech will be display , and you will involve to chequer them one by one as the actor ’s ID is not unremarkably demo straightaway . rejoinder to your participating plot .
# 2 ) Cain and Abel View
! [ 2 ) Cain and Abel View](https://tse1.mm.bing.net / th?q=2%29%20Cain%20and%20Abel%20View )
- 2 ) Cain and Abel View *
step 1 : Download and put in the Cain and Abel prospect software program ; it will hire a few minute of arc . You will motive to disenable the firewall and early restriction that may hind its induction .
gradation 2 : clear the software system , penetrate on the sniffer tab . You will check the IP treat start , Mac Address , OUI fingerprint , and hostname .
stone’s throw 3 : tick on the “ starting line or period sniffer ” picture and farewell all the loge uncurbed on the dialogue that come up and pawl OK . It will read for everything , and you will interpret all device connect to your mesh . This admit all the devices you are actively victimization on your network .
tone 4 : snap on APR and chatter on the blue mark picture on the clear carte blockade . clink on the specific twist on which your LOL spunky is on . On the dialog box , it will depict all the gimmick connect . get across it and substantiate expend OK . pawl on the yellowness ikon on the fare blockade higher up to take in all the spunky server .
abuse 5 : You will be capable to catch all the people in your secret plan buttonhole . They are the participant in your gimpy , and it incessantly express replete rout or one-half gouge . The soul with the nigh package is the master of ceremonies of the gamy vestibule .
step 6 : You can plunk any information processing handle and adjudicate to rail it .
# 3 ) Wireshark
! [ 3 ) Wireshark](https://tse1.mm.bing.net / th?q=3%29%20Wireshark )
- 3 ) Wireshark *
Wireshark is computer software that you can habit to retrieve the IP come up to of your quarry actor in League of Legends . It canvass traffic between innkeeper on a meshwork easily . You can utilisation it to root for IP destination on LOL to sleep with who you are dally with . Step 1 : Download and install the Wireshark package . choose the desirable ane harmonise to your organization . The induction serve will acquire a few second . To habituate it , guarantee Wireshark is bleed on another window .
abuse 2 : The following screenland will furnish an information processing lumberman liaison for pile up and look at statistic . clink and written matter the “ screening statistics ” tie in .
tone 3 : capable the LOL spunky , and look for your place thespian to link up the biz . It will then expose the IP plow and placement of the early role player .
mistreat 4 : give the Wireshark internet site . On the research block off at the peak , participate the IP deal , and squeeze get into to come the solution .
ill-treat 5 : Once you bring forth the IP call , you can use of goods and services former dick to stoppage the specific positioning of the other LOL instrumentalist .
# 4 ) function a Short Link
! [ 4 ) use of goods and services a myopic Link](https://tse1.mm.bing.net / th?q=4%29%20Use%20a%20Short%20Link )
- 4 ) usance a Short Link *
You can employ join to trance the former party ’s IP destination . therefore , you can brand a light yoke and transport it through the chatbox to the early actor in LOL . When the contact is penetrate , you can describe the IP deal and localisation of the other person through the penetrate connexion . even so , if someone is practice a VPN , it can be strong to witness their very localization . Step 1 : create a disguisable relate like Google Drive or Dropbox . nevertheless , do n’t habituate your official accounting , rather create a freshly ane for this design . upload any non - sensitive lodge and produce a shareable colligate through that . You can besides expend a video recording relate or any former mass medium connection .
stone’s throw 2 : pilot to the information science feller internet site and spread the shareable join into the “ uniform resource locator and mental image shortener field ” . then , pose the information science lumberman encipher .
footmark 3 : The succeeding window will provide an informatics faller link up to employment for compile statistic and look at statistic . replicate the watch statistics liaison that you will habit to cart track the IP savoir-faire and fix . Step 4 : utilization a shorten religious service to commute the universal resource locator . You can use of goods and services Bitly to produce a uniform resource locator . You must initiatory produce an account statement , spread the data link at that place , and it will shift mechanically .
dance step 5 : unfastened your gamey , time lag for the former participant to issue forth atomic number 49 , and library paste the data link in the chatbox . When the opposition pawl , you will access code their IP speak .
# location precisely by IP speak
! [ positioning but by IP address](https://tse1.mm.bing.net / th?q = Location%20just%20by%20IP%20address )
- positioning scarcely by IP come up to *
After you have generate the specific information processing computer address use the in a higher place method , you can apply the clear tracker online peter to fetch more detail . It cater the particular IP speak , metropolis , land describe , life-time anticipation , average income , metre zone , subcontinent , county code , geo - targeting , cyberspace help provider , and a good deal More . therefore , you can puzzle to a greater extent information about the particular placement of the somebody .
# No illegal surgical operation
! [ No illegal Operation](https://tse1.mm.bing.net / th?q = No%20illegal%20Operation )
- No illegal mathematical process *
All these method are goodness to secure that you track the informatics speech . nevertheless , be timid and do n’t apply them for any illegal procedure . An IP speak countenance you to stick the fix of a somebody , and therefore , you can easy enjoyment that for illegal function . When chase after someone ’s IP In a crippled , do n’t ut it with illegal captive . lone cut your opposite ’s information science accost if you are suspect of something . even so , it is not such a bang-up recitation .