IP tracer is a great tool Created by Rajkumrdusad, that allows you to trace anyone's IP address and collect some extra information like country code, time zone city name Etc. You will also get longitude and latitude of the victim with the help of that coordinates you can find the location of the victim on the Google map. This location is not perfectly accurate but it will give you a rough idea about the location of the victim. { āĻāĻāĻĒāĻŋ āĻā§āϰā§āϏāĻžāϰ āĻš'āϞ āϰāĻžāĻāĻā§āĻŽāĻžāϰāĻĻā§āϏāĻžāĻĻ āĻĻā§āĻŦāĻžāϰāĻž āύāĻŋāϰā§āĻŽāĻŋāϤ āĻāĻāĻāĻŋ āĻĻā§āϰā§āĻĻāĻžāύā§āϤ āϏāϰāĻā§āĻāĻžāĻŽ āϝāĻž āĻāĻĒāύāĻžāĻā§ āĻāĻžāϰāĻ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āϏāύāĻžāĻā§āϤ āĻāϰāϤ⧠āĻāĻŦāĻ āĻĻā§āĻļā§āϰ āĻā§āĻĄ, āϏāĻŽāϝāĻŧ āĻ āĻā§āĻāϞ āĻļāĻšāϰā§āϰ āύāĻžāĻŽ āĻāϤā§āϝāĻžāĻĻāĻŋāϰ āĻŽāϤ⧠āĻāĻŋāĻā§ āĻ āϤāĻŋāϰāĻŋāĻā§āϤ āϤāĻĨā§āϝ āϏāĻāĻā§āϰāĻš āĻāϰāϤ⧠āĻĻā§āϝāĻŧ that āϏā§āĻ āϏā§āĻĨāĻžāύāĻžāĻā§āĻā§āϰ āϏāĻžāĻšāĻžāϝā§āϝ⧠āĻāĻĒāύāĻŋ āĻļāĻŋāĻāĻžāϰā§āϰ āĻĻā§āϰāĻžāĻāĻŋāĻŽāĻžāĻāĻļ āĻāĻŦāĻ āĻ āĻā§āώāĻžāĻāĻļāĻ āĻĒāĻžāĻŦā§āύ you āĻā§āĻāϞ āĻŽā§āϝāĻžāĻĒā§ āĻā§āĻā§āϤāĻā§āĻā§āϰ āĻ āĻŦāϏā§āĻĨāĻžāύ āĻā§āĻāĻā§ āĻĒā§āϤ⧠āĻĒāĻžāϰā§āύāĨ¤ āĻāĻ āĻ āĻŦāϏā§āĻĨāĻžāύāĻāĻŋ āĻĒā§āϰā§āĻĒā§āϰāĻŋ āϏāĻ āĻŋāĻ āύāϝāĻŧ āϤāĻŦā§ āĻāĻāĻŋ āĻāĻĒāύāĻžāĻā§ āĻā§āĻā§āϤāĻā§āĻā§āϰ āĻ āĻŦāϏā§āĻĨāĻžāύ āϏāĻŽā§āĻĒāϰā§āĻā§ āĻŽā§āĻāĻžāĻŽā§āĻāĻŋ āϧāĻžāϰāĻŖāĻž āĻĻā§āĻŦā§āĨ¤}
To use this tool we have to create a clone of the project from the GitHub repository the size of the project is very minimal. This tool is very helpful if you have victims IP address can you want to get some rough idea about the victim. { āĻāĻ āϏāϰāĻā§āĻāĻžāĻŽāĻāĻŋ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰāϤ⧠āĻāĻŽāĻžāĻĻā§āϰ āĻāĻŋāĻāĻšāĻžāĻŦ āϏāĻāĻā§āϰāĻšāϏā§āĻĨāϞ āĻĨā§āĻā§ āĻĒā§āϰāĻāϞā§āĻĒā§āϰ āĻāĻāĻāĻŋ āĻā§āϞā§āύ āϤā§āϰāĻŋ āĻāϰāϤ⧠āĻšāĻŦā§ āĻĒā§āϰāĻāϞā§āĻĒā§āϰ āĻāĻāĻžāϰ āĻā§āĻŦ āύā§āϝā§āύāϤāĻŽāĨ¤ āĻāĻ āϏāϰāĻā§āĻāĻžāĻŽāĻāĻŋ āĻā§āĻŦ āϏāĻšāĻžāϝāĻŧāĻ āϝāĻĻāĻŋ āĻāĻĒāύāĻŋ āĻā§āĻā§āϤāĻā§āĻā§ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āĻĒāĻžāύ āϤāĻŦā§ āĻāĻĒāύāĻŋ āĻā§āĻā§āϤāĻā§āĻā§ āϏāĻŽā§āĻĒāϰā§āĻā§ āĻāĻŋāĻā§āĻāĻž āϧāĻžāϰāĻŖāĻž āĻĒā§āϤ⧠āĻĒāĻžāϰā§āύāĨ¤}
Â
An IP address is a unique address of a device on the internet. Since everyone has a unique IP address, therefore we can find some interesting information about the victim using the IP address off the device using. { āĻāĻāĻāĻŋ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āĻāύā§āĻāĻžāϰāύā§āĻā§āϰ āĻā§āύāĻ āĻĄāĻŋāĻāĻžāĻāϏā§āϰ āĻāĻāĻāĻŋ āĻ āύāύā§āϝ āĻ āĻŋāĻāĻžāύāĻžāĨ¤ āϝā§āĻšā§āϤ⧠āĻĒā§āϰāϤā§āϝā§āĻā§āϰ āĻāĻāĻāĻŋ āĻ āύāύā§āϝ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āϰāϝāĻŧā§āĻā§, āϤāĻžāĻ āĻāĻŽāϰāĻž āĻĄāĻŋāĻāĻžāĻāϏāĻāĻŋ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰ⧠āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰ⧠āĻā§āĻā§āϤāĻā§āĻā§ āϏāĻŽā§āĻĒāϰā§āĻā§ āĻāĻŋāĻā§ āĻāĻāϰā§āώāĻŖā§āϝāĻŧ āϤāĻĨā§āϝ āĻā§āĻāĻā§ āĻĒā§āϤ⧠āĻĒāĻžāϰāĻŋāĨ¤}
In this post, I am going to guide you on how you can Grab someone's IP address by just sending a link. If the victim clicks the Link it's guaranteed that you will get the IP address of the victim. After getting the IP address of the victim we can trace information about that IP like the location of the IP address, which city belongs to and zip code etc. { āĻāĻ āĻĒā§āϏā§āĻā§, āĻāĻŽāĻŋ āĻāĻĒāύāĻžāĻā§ āĻā§āĻāĻžāĻŦā§ āĻā§āĻŦāϞ āĻāĻāĻāĻŋ āϞāĻŋāĻā§āĻ āĻĒā§āϰā§āϰāĻŖ āĻāϰ⧠āĻāĻžāϰāĻ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āĻā§āϰā§āϝāĻžāĻŦ āĻāϰāϤ⧠āĻĒāĻžāϰā§āύ āϏ⧠āϏāĻŽā§āĻĒāϰā§āĻā§ āĻāĻĒāύāĻžāĻā§ āĻāĻžāĻāĻĄ āĻāϰāϤ⧠āϝāĻžāĻā§āĻāĻŋāĨ¤ āϝāĻĻāĻŋ āĻļāĻŋāĻāĻžāϰāĻāĻŋ āϞāĻŋāĻā§āĻāĻāĻŋ āĻā§āϞāĻŋāĻ āĻāϰ⧠āĻĨāĻžāĻā§ āϤāĻŦā§ āĻāĻāĻŋāϰ āĻā§āϝāĻžāϰāĻžāύā§āĻāĻŋāϝā§āĻā§āϤ āĻāĻĒāύāĻŋ āĻļāĻŋāĻāĻžāϰā§āϰ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āĻĒāĻžāĻŦā§āύāĨ¤ āĻā§āĻā§āϤāĻā§āĻā§āϰ āĻāĻāĻĒāĻŋ āĻ ā§āϝāĻžāĻĄā§āϰā§āϏ āĻĒāĻžāĻāϝāĻŧāĻžāϰ āĻĒāϰ⧠āĻāĻŽāϰāĻž āϏā§āĻ āĻāĻāĻĒāĻŋ āϏāĻŽā§āĻĒāϰā§āĻāĻŋāϤ āϤāĻĨā§āϝ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻžāϰ āĻ āĻŦāϏā§āĻĨāĻžāύ, āĻā§āύ āĻļāĻšāϰāĻāĻŋāϰ āϏāĻžāĻĨā§ āϏāĻŽā§āĻĒāϰā§āĻāĻŋāϤ āĻāĻŦāĻ āĻāĻŋāĻĒ āĻā§āĻĄ āĻāϤā§āϝāĻžāĻĻāĻŋ āϏāύāĻžāĻā§āϤ āĻāϰāϤ⧠āĻĒāĻžāϰāĻŋ }
You can even use IP stressors that will stop the incoming and outgoing traffic for that particular IP address this can be beneficial if you want to prevent something bad from a specific IP address. {āĻāĻŽāύāĻāĻŋ āĻāĻĒāύāĻŋ āĻāĻāĻĒāĻŋ āϏā§āĻā§āϰā§āϏāĻžāϰ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰāϤ⧠āĻĒāĻžāϰā§āύ āϝāĻž āύāĻŋāϰā§āĻĻāĻŋāώā§āĻ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻžāϰ āĻāύā§āϝ āĻāĻāϤ āĻāĻŦāĻ āĻŦāĻšāĻŋāϰā§āĻāĻžāĻŽā§ āĻā§āϰā§āϝāĻžāĻĢāĻŋāĻ āĻŦāύā§āϧ āĻāϰ⧠āĻĻā§āĻŦā§ āϝāĻĻāĻŋ āĻāĻĒāύāĻŋ āĻā§āύāĻ āύāĻŋāϰā§āĻĻāĻŋāώā§āĻ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āĻĨā§āĻā§ āĻāĻžāϰāĻžāĻĒ āĻāĻŋāĻā§ āϰā§āϧ āĻāϰāϤ⧠āĻāĻžāύ āϤāĻŦā§ āĻāĻāĻŋ āĻāĻĒāĻāĻžāϰ⧠āĻšāϤ⧠āĻĒāĻžāϰā§āĨ¤}
To find the IP address by sending a link we are going to use a tool called shellfish we can use this tool to do phishing attacks I have a complete post on How to do phishing attack using shellfish To hack anyones Social media account, but in this post, we are going to use this tool as IP Logger. This tool will create a link which we will have to send to the victim, after victim Clicks on the link we will get the IP address on the terminal. This tool uses port forwarding to achieve this task. I am not going to waste your time and give you step by step guide I have combined all commands in one big command. { āϞāĻŋāĻā§āĻ āĻĒā§āϰā§āϰāĻŖā§āϰ āĻŽāĻžāϧā§āϝāĻŽā§ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻžāĻāĻŋ āϏāύā§āϧāĻžāύā§āϰ āĻāύā§āϝ āĻāĻŽāϰāĻž āĻļā§āϞāĻĢāĻŋāĻļ āύāĻžāĻŽā§ āĻāĻāĻāĻŋ āϏāϰāĻā§āĻāĻžāĻŽ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰāϤ⧠āϝāĻžāĻā§āĻāĻŋ āĻāĻŽāϰāĻž āĻĢāĻŋāĻļāĻŋāĻ āĻāĻā§āϰāĻŽāĻŖ āĻāϰāϤ⧠āĻāĻ āϏāϰāĻā§āĻāĻžāĻŽāĻāĻŋ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰāϤ⧠āĻĒāĻžāϰāĻŋ āĻļā§āϞāĻĢāĻŋāĻļ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰ⧠āĻĢāĻŋāĻļāĻŋāĻ āĻāĻā§āϰāĻŽāĻŖ āĻā§āĻāĻžāĻŦā§ āĻāϰāĻž āϝāĻžāϝāĻŧ āϤāĻžāϰ āĻāĻāĻāĻŋ āϏāĻŽā§āĻĒā§āϰā§āĻŖ āĻĒā§āϏā§āĻ āĻāĻŽāĻžāϰ āϏāĻžāĻŽāĻžāĻāĻŋāĻ āĻŽāĻŋāĻĄāĻŋāϝāĻŧāĻž āĻ ā§āϝāĻžāĻāĻžāĻāύā§āĻ āĻšā§āϝāĻžāĻ āĻāϰāĻžāϰ āĻāύā§āϝ, āϤāĻŦā§ āĻāĻāĻŋāϤ⧠āĻĒā§āϏā§āĻ, āĻāĻŽāϰāĻž āĻāĻāĻĒāĻŋ āϞāĻāĻžāϰ āĻšāĻŋāϏāĻžāĻŦā§ āĻāĻ āϏāϰāĻā§āĻāĻžāĻŽāĻāĻŋ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰāϤ⧠āϝāĻžāĻā§āĻāĻŋāĨ¤ āĻāĻ āϏāϰāĻā§āĻāĻžāĻŽāĻāĻŋ āĻāĻāĻāĻŋ āϞāĻŋāĻā§āĻ āϤā§āϰāĻŋ āĻāϰāĻŦā§ āϝāĻž āĻāĻŽāĻžāĻĻā§āϰ āĻā§āĻā§āϤāĻā§āĻā§āϰ āĻāĻžāĻā§ āĻĒā§āϰā§āϰāĻŖ āĻāϰāϤ⧠āĻšāĻŦā§, āϞāĻŋāĻā§āĻā§ āĻā§āώāϤāĻŋāĻā§āϰāϏā§āĻĨ āĻā§āϞāĻŋāĻā§āϰ āĻĒāϰ⧠āĻāĻŽāϰāĻž āĻāĻžāϰā§āĻŽāĻŋāύāĻžāϞ⧠āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āĻĒāĻžāĻŦāĨ¤ āĻāĻ āĻāĻžāϏā§āĻāĻāĻŋ āĻ āϰā§āĻāύ āĻāϰāϤ⧠āĻāĻ āϏāϰāĻā§āĻāĻžāĻŽāĻāĻŋ āĻĒā§āϰā§āĻ āĻĢāϰāĻāϝāĻŧāĻžāϰā§āĻĄāĻŋāĻ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰā§āĨ¤ āĻāĻŽāĻŋ āĻāĻĒāύāĻžāϰ āϏāĻŽāϝāĻŧ āύāώā§āĻ āĻāϰāĻŦ āύāĻž āĻāĻŦāĻ āĻāĻĒāύāĻžāĻā§ āϧāĻžāĻĒā§ āϧāĻžāĻĒā§ āĻāĻžāĻāĻĄ āĻĻā§āĻŦā§ āύāĻž āĻāĻŽāĻŋ āϏāĻŽāϏā§āϤ āĻāĻŽāĻžāύā§āĻĄāĻā§ āĻāĻāĻāĻŋ āĻŦāĻĄāĻŧ āĻāĻŽāĻžāύā§āĻĄā§āϰ āϏāĻžāĻĨā§ āĻāĻāϤā§āϰāĻŋāϤ āĻāϰā§āĻāĻŋāĨ¤}
copy-paste this command and this tool will be installed on your system.. This tool will download wget and Git package in termux and then shelphish tool will download from the GitHub repository and allow the executable permission to the shellphish.sh file. { āĻāĻ āĻāĻŽāĻžāύā§āĻĄāĻāĻŋ āĻ āύā§āϞāĻŋāĻĒāĻŋ āĻāϰā§āύ āĻāĻŦāĻ āĻāĻ āϏāϰāĻā§āĻāĻžāĻŽāĻāĻŋ āĻāĻĒāύāĻžāϰ āϏāĻŋāϏā§āĻā§āĻŽā§ āĻāύāϏā§āĻāϞ āĻāϰāĻž āĻšāĻŦā§ .. āĻāĻ āϏāϰāĻā§āĻāĻžāĻŽāĻāĻŋ āĻāĻžāϰā§āĻŽāĻžāĻāϏ⧠āĻāĻāĻā§āĻ āĻāĻŦāĻ āĻāĻŋāĻ āĻĒā§āϝāĻžāĻā§āĻāĻāĻŋ āĻĄāĻžāĻāύāϞā§āĻĄ āĻāϰāĻŦā§ āĻāĻŦāĻ āϤāĻžāϰāĻĒāϰ⧠āĻļā§āϞā§āĻĢāĻŋāĻļ āϏāϰāĻā§āĻāĻžāĻŽāĻāĻŋ āĻāĻŋāĻāĻšāĻžāĻŦ āϏāĻāĻā§āϰāĻšāϏā§āĻĨāϞ āĻĨā§āĻā§ āĻĄāĻžāĻāύāϞā§āĻĄ āĻāϰāĻŦā§ āĻāĻŦāĻ āĻļā§āϞāĻĢāĻŋāĻļ.āĻļ āĻĢāĻžāĻāϞāĻāĻŋāϤ⧠āĻāĻā§āϏāĻŋāĻāĻŋāĻāĻā§āĻŦāϞ āĻ āύā§āĻŽāϤāĻŋ āĻ āύā§āĻŽāϤāĻŋ āĻĻā§āĻŦā§āĨ¤}
 apt update -y && apt upgrade -yf && apt install php wget git -y && git clone https://github.com/khansaad1275/shellphish && cd shellphish && chmod +x shellphish.sh
Please Allow permissions if asked while installing. { āĻāύāϏā§āĻāϞ āĻāϰāĻžāϰ āϏāĻŽāϝāĻŧ āĻāĻŋāĻā§āĻāĻžāϏāĻŋāϤ āĻšāϞ⧠āĻ āύā§āĻŽāϤāĻŋāĻā§āϞāĻŋ āĻŽāĻā§āĻā§āϰ āĻāϰā§āύāĨ¤}
Â
Step 1:
Use the below command to run shellPhish.sh file in termux. { āĻāĻžāϰā§āĻŽāĻžāĻā§āϏ⧠āĻļā§āϞāĻĒāĻŋāϏ.āĻļ āĻĢāĻžāĻāϞ āĻāĻžāϞāĻžāϤ⧠āύā§āĻā§āϰ āĻāĻŽāĻžāύā§āĻĄāĻāĻŋ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰā§āύāĨ¤}
 bash shellphish.sh
Step 2:
Just select any options it doesn't matter in this case because we only want the IP-address of the victim but the little important thing here is that the victim will be directed to a social media site so you can select the one which is compatible with your social engineering tactics.
Example: Press 1 and then press Enter : { āĻā§āĻŦāϞ āĻāĻ āĻā§āώā§āϤā§āϰ⧠āϝ⧠āĻā§āύāĻ āĻŦāĻŋāĻāϞā§āĻĒ āύāϝāĻŧ āĻāĻāĻŋ āύāĻŋāϰā§āĻŦāĻžāĻāύ āĻāϰā§āύ āĻāĻžāϰāĻŖ āĻāĻŽāϰāĻž āĻā§āĻŦāϞ āĻā§āĻā§āϤāĻā§āĻā§āϰ āĻāĻāĻĒāĻŋ-āĻ āĻŋāĻāĻžāύāĻž āĻāĻžāĻ āϤāĻŦā§ āĻāĻāĻžāύ⧠āϏāĻžāĻŽāĻžāύā§āϝ āĻā§āϰā§āϤā§āĻŦāĻĒā§āϰā§āĻŖ āĻŦāĻŋāώāϝāĻŧāĻāĻŋ āĻš'āϞ āĻā§āώāϤāĻŋāĻā§āϰāϏā§āĻĨāĻāĻŋāĻā§ āĻāĻāĻāĻŋ āϏāĻžāĻŽāĻžāĻāĻŋāĻ āĻŽāĻŋāĻĄāĻŋāϝāĻŧāĻž āϏāĻžāĻāĻā§ āĻĒāϰāĻŋāĻāĻžāϞāĻŋāϤ āĻāϰāĻž āĻšāĻŦā§ āϝāĻžāϤ⧠āĻāĻĒāύāĻŋ āĻāĻĒāϝā§āĻā§āϤāĻāĻŋāĻā§ āĻŦā§āĻā§ āύāĻŋāϤ⧠āĻĒāĻžāϰā§āύ āĻāĻĒāύāĻžāϰ āϏāĻžāĻŽāĻžāĻāĻŋāĻ āĻĒā§āϰāĻā§āĻļāϞ āĻā§āĻļāϞ āĻĻā§āĻŦāĻžāϰāĻžāĨ¤
āĻāĻĻāĻžāĻšāϰāĻŖ: 1 āĻāĻŋāĻĒā§āύ āĻāĻŦāĻ āϤāĻžāϰāĻĒāϰ⧠āĻāύā§āĻāĻžāϰ āĻāĻŋāĻĒā§āύ:}
Step 3:
This is the most important part of this post: { āĻāĻāĻŋ āĻāĻ āĻĒā§āϏā§āĻā§āϰ āϏāĻŦāĻā§āϝāĻŧā§ āĻā§āϰā§āϤā§āĻŦāĻĒā§āϰā§āĻŖ āĻ āĻāĻļ:}
â Please turn on your hotspot. {āĻĻāϝāĻŧāĻž āĻāϰ⧠āĻāĻĒāύāĻžāϰ āĻšāĻāϏā§āĻĒāĻāĻāĻŋ āĻāĻžāϞ⧠āĻāϰā§āύ}
Now select the second option Ngrok. {āĻāĻāύ āĻĻā§āĻŦāĻŋāϤā§āϝāĻŧ āĻŦāĻŋāĻāϞā§āĻĒāĻāĻŋ āĻāύāĻā§āϰā§āĻ āύāĻŋāϰā§āĻŦāĻžāĻāύ āĻāϰā§āύāĨ¤}
Step 4:
Now you will get a link, just send this link to the Victim and wait, when the user will click on the link you will instantly see the IP Adress of the victim on the terminal. { āĻāĻāύ āĻāĻĒāύāĻŋ āĻāĻāĻāĻŋ āϞāĻŋāĻā§āĻ āĻĒāĻžāĻŦā§āύ, āĻā§āĻŦāϞ āĻāĻ āϞāĻŋāĻā§āĻāĻāĻŋ āĻāĻŋāĻāĻāĻŋāĻŽā§ āĻĒā§āϰā§āϰāĻŖ āĻāϰā§āύ āĻāĻŦāĻ āĻ āĻĒā§āĻā§āώāĻž āĻāϰā§āύ, āϝāĻāύ āĻŦā§āϝāĻŦāĻšāĻžāϰāĻāĻžāϰ⧠āϞāĻŋāĻā§āĻāĻāĻŋ āĻā§āϞāĻŋāĻ āĻāϰāĻŦā§āύ āĻāĻĒāύāĻŋ āϤāĻžāϤā§āĻā§āώāĻŖāĻŋāĻāĻāĻžāĻŦā§ āĻāĻžāϰā§āĻŽāĻŋāύāĻžāϞ⧠āĻā§āĻā§āϤāĻā§āĻā§āϰ āĻāĻāĻĒāĻŋ āĻ ā§āϝāĻžāĻĄā§āϰā§āϏ āĻĻā§āĻāϤ⧠āĻĒāĻžāĻŦā§āύāĨ¤}
Â
Working:
In the below screenshot you can see that where you will find the Ip address of the Victim. { āύā§āĻā§āϰ āϏā§āĻā§āϰāĻŋāύāĻļāĻā§ āĻāĻĒāύāĻŋ āĻĻā§āĻāϤ⧠āĻĒāĻžāĻŦā§āύ āϝā§āĻāĻžāύ⧠āĻāĻĒāύāĻŋ āĻāĻŋāĻāĻāĻŋāĻŽā§āϰ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āĻĒāĻžāĻŦā§āύāĨ¤}
Finding the IP address is a simple task but there is not a single tool that is only there to find IP using termux. A lot of times we get messages from unknown people and they waste our time asking random questions, the simplest way is to just send them the IP logger link and Get the required information without asking. I have full post on how you can find the information about any IP-address. Please Don't Miss use this information. its responsibility to provide you better content and it's your responsibility to use that information for good purpose only. { āĻāĻāĻĒāĻŋ āĻ ā§āϝāĻžāĻĄā§āϰā§āϏ āϏāύā§āϧāĻžāύ āĻāϰāĻž āĻāĻāĻāĻŋ āϏāĻšāĻ āĻāĻžāĻ āϤāĻŦā§ āĻāĻžāϰā§āĻŽāĻžāĻā§āϏ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰ⧠āĻāĻāĻĒāĻŋ āĻā§āĻāĻā§ āĻĒāĻžāĻāϝāĻŧāĻžāϰ āĻāύā§āϝ āĻāĻāĻāĻŋāĻŽāĻžāϤā§āϰ āϏāϰāĻā§āĻāĻžāĻŽ āύā§āĻāĨ¤ āĻ āĻāĻžāύāĻž āϞā§āĻāĻĻā§āϰ āĻāĻžāĻ āĻĨā§āĻā§ āĻŦāĻžāϰ āĻŦāĻžāϰ āĻāĻŽāϰāĻž āĻŦāĻžāϰā§āϤāĻž āĻĒāĻžāĻ āĻāĻŦāĻ āĻāϞā§āĻŽā§āϞ⧠āĻĒā§āϰāĻļā§āύ āĻāĻŋāĻā§āĻāĻžāϏāĻž āĻāϰāϤ⧠āĻāĻŽāĻžāĻĻā§āϰ āϏāĻŽāϝāĻŧ āύāώā§āĻ āĻšāϝāĻŧ, āĻāϰ āϏāĻšāĻ āĻāĻĒāĻžāϝāĻŧ āĻš'āϞ āϤāĻžāĻĻā§āϰ āĻāĻāĻĒāĻŋ āϞāĻāĻžāϰ āϞāĻŋāĻā§āĻāĻāĻŋ āĻĒā§āϰā§āϰāĻŖ āĻāϰāĻž āĻāĻŦāĻ āĻāĻŋāĻā§āĻāĻžāϏāĻž āύāĻž āĻāϰ⧠āĻĒā§āϰāϝāĻŧā§āĻāύā§āϝāĻŧ āϤāĻĨā§āϝ āĻĒāĻžāĻāϝāĻŧāĻžāĨ¤ āĻāĻĒāύāĻŋ āϝ⧠āĻā§āύāĻ āĻāĻāĻĒāĻŋ-āĻ āĻŋāĻāĻžāύāĻž āϏāĻŽā§āĻĒāϰā§āĻāĻŋāϤ āϤāĻĨā§āϝ āĻā§āĻāĻžāĻŦā§ āϏāύā§āϧāĻžāύ āĻāϰāϤ⧠āĻĒāĻžāϰā§āύ āϏ⧠āϏāĻŽā§āĻĒāϰā§āĻā§ āĻāĻŽāĻžāϰ āϏāĻŽā§āĻĒā§āϰā§āĻŖ āĻĒā§āϏā§āĻ āϰāϝāĻŧā§āĻā§āĨ¤ āĻ āύā§āĻā§āϰāĻš āĻāϰ⧠āĻāĻ āϤāĻĨā§āϝāĻāĻŋ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰāĻŦā§āύ āύāĻžāĨ¤ āĻāĻĒāύāĻžāĻā§ āĻāϰāĻ āĻāĻžāϞ āϏāĻžāĻŽāĻā§āϰ⧠āϏāϰāĻŦāϰāĻžāĻš āĻāϰāĻžāϰ āĻāύā§āϝ āĻāĻāĻŋāϰ āĻĻāĻžāϝāĻŧāĻŋāϤā§āĻŦ āĻāĻŦāĻ āĻā§āĻŦāϞāĻŽāĻžāϤā§āϰ āϏāĻ āĻŋāĻ āĻāĻĻā§āĻĻā§āĻļā§āϝ⧠āϏā§āĻ āϤāĻĨā§āϝāĻāĻŋ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰāĻž āĻāĻĒāύāĻžāϰ āĻĻāĻžāϝāĻŧāĻŋāϤā§āĻŦāĨ¤}
IP tracer is a great tool Created by Rajkumrdusad, that allows you to trace anyone's IP address and collect some extra information like country code, time zone city name Etc. { āĻāĻāĻĒāĻŋ āĻā§āϰā§āϏāĻžāϰ āĻš'āϞ āϰāĻžāĻāĻā§āĻŽāĻžāϰāĻĻā§āϏāĻžāĻĻ āĻĻā§āĻŦāĻžāϰāĻž āύāĻŋāϰā§āĻŽāĻŋāϤ āĻāĻāĻāĻŋ āĻĻā§āϰā§āĻĻāĻžāύā§āϤ āϏāϰāĻā§āĻāĻžāĻŽ, āĻāĻāĻŋ āĻāĻĒāύāĻžāĻā§ āϝ⧠āĻā§āύāĻāϰ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻžāĻāĻŋ āϏāύāĻžāĻā§āϤ āĻāϰāϤ⧠āĻāĻŦāĻ āĻĻā§āĻļā§āϰ āĻā§āĻĄ, āϏāĻŽāϝāĻŧ āĻ āĻā§āĻāϞ āĻļāĻšāϰā§āϰ āύāĻžāĻŽ āĻāϤā§āϝāĻžāĻĻāĻŋ āĻāϤā§āϝāĻžāĻĻāĻŋāϰ āĻŽāϤ⧠āĻāĻŋāĻā§ āĻ āϤāĻŋāϰāĻŋāĻā§āϤ āϤāĻĨā§āϝ āϏāĻāĻā§āϰāĻš āĻāϰāϤ⧠āĻĻā§āϝāĻŧ allows}Â
Â
Â
Â
IP address or internet protocol address is a unique address on the internet that specifically identifies your device on the internet. Everyone has a unique IP address, and that IP address contains some information about the device. { āĻāĻāĻĒāĻŋ āĻ ā§āϝāĻžāĻĄā§āϰā§āϏ āĻŦāĻž āĻāύā§āĻāĻžāϰāύā§āĻ āĻĒā§āϰā§āĻā§āĻāϞ āĻ āĻŋāĻāĻžāύāĻž āĻāύā§āĻāĻžāϰāύā§āĻā§ āĻāĻāĻāĻŋ āĻ āύāύā§āϝ āĻ āĻŋāĻāĻžāύāĻž āϝāĻž āϏā§āĻĒāώā§āĻāĻāĻžāĻŦā§ āĻāύā§āĻāĻžāϰāύā§āĻā§ āĻāĻĒāύāĻžāϰ āĻĄāĻŋāĻāĻžāĻāϏ āϏāύāĻžāĻā§āϤ āĻāϰā§āĨ¤ āĻĒā§āϰāϤā§āϝā§āĻā§āϰ āĻāĻāĻāĻŋ āϏā§āĻŦāϤāύā§āϤā§āϰ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻž āϰāϝāĻŧā§āĻā§ āĻāĻŦāĻ āϏā§āĻ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻžāϝāĻŧ āĻĄāĻŋāĻāĻžāĻāϏ āϏāĻŽā§āĻĒāϰā§āĻā§ āĻāĻŋāĻā§ āϤāĻĨā§āϝ āϰāϝāĻŧā§āĻā§āĨ¤}
Step 1:
Install the Git package in your termux app to which will allow us to clone any project from the github repository. { āĻāĻĒāύāĻžāϰ āĻāĻžāϰā§āĻŽāĻžāĻā§āϏ āĻ ā§āϝāĻžāĻĒā§āϞāĻŋāĻā§āĻļāύāĻāĻŋāϤ⧠āĻāĻŋāĻ āĻĒā§āϝāĻžāĻā§āĻāĻāĻŋ āĻāύāϏā§āĻāϞ āĻāϰā§āύ āϝāĻž āĻāĻŽāĻžāĻĻā§āϰ āĻāĻŋāĻĨā§āĻŦ āϏāĻāĻā§āϰāĻšāĻļāĻžāϞāĻž āĻĨā§āĻā§ āĻā§āύāĻ āĻĒā§āϰāĻāϞā§āĻĒ āĻā§āϞā§āύ āĻāϰāϤ⧠āĻĻā§āϝāĻŧāĨ¤}
 pkg install git -y
Step 2:
Type below command to clone the IP tracer project from the GitHub repository to your termux app. {āĻāĻŋāĻāĻšāĻžāĻŦ āϏāĻāĻā§āϰāĻšāĻļāĻžāϞāĻž āĻĨā§āĻā§ āĻāĻĒāύāĻžāϰ āĻāĻžāϰā§āĻŽāĻžāĻā§āϏ āĻ ā§āϝāĻžāĻĒā§āϞāĻŋāĻā§āĻļāύāĻāĻŋāϤ⧠āĻāĻāĻĒāĻŋ āĻā§āϰā§āϏāĻžāϰ āĻĒā§āϰāĻāϞā§āĻĒāĻāĻŋ āĻā§āϞā§āύ āĻāϰāϤ⧠āύā§āĻā§āϰ āĻāĻŽāĻžāύā§āĻĄāĻāĻŋ āĻāĻžāĻāĻĒ āĻāϰā§āύāĨ¤}
 git clone https://github.com/khansaad1275/IP-Tracer.git
Step 3:
Move into the IP-Tracer Folder. If you want to know basic commands of termux you should must read Termux Basic To Advance Commands { āĻāĻāĻĒāĻŋ-āĻā§āϰā§āϏāĻžāϰ āĻĢā§āϞā§āĻĄāĻžāϰ⧠āϏāϰāĻžāύāĨ¤ āĻāĻĒāύāĻŋ āϝāĻĻāĻŋ āĻāĻžāϰā§āĻŽāĻžāĻā§āϏā§āϰ āĻŦā§āϏāĻŋāĻ āĻāĻŽāĻžāύā§āĻĄāĻā§āϞāĻŋ āĻāĻžāύāϤ⧠āĻāĻžāύ āĻāĻĒāύāĻžāϰ āĻ āĻŦāĻļā§āϝāĻ āĻāĻžāϰā§āĻŽāĻžāĻā§āϏ āĻŦā§āϏāĻŋāĻ āĻā§ āĻ ā§āϝāĻžāĻĄāĻāĻžāύā§āϏ āĻāĻŽāĻžāύā§āĻĄ āĻĒāĻĄāĻŧāϤ⧠āĻšāĻŦā§}
 cd IP-Tracer
Step 4:
Allow executable permission To the installation file by typing : { āύāĻŋāϰā§āĻŦāĻžāĻšāϝā§āĻā§āϝ āĻ āύā§āĻŽāϤāĻŋ āĻŽāĻā§āĻā§āϰ āĻāϰā§āύ āĻāύāϏā§āĻāϞā§āĻļāύ āĻĢāĻžāĻāϞāĻāĻŋāϤ⧠āĻāĻžāĻāĻĒ āĻāϰā§:}
 chmod +x install
Step 5:
Install the Requirements of the project which will do the background processing to Get the desired Information of the Ip-Adress. { āĻĒā§āϰāĻāϞā§āĻĒā§āϰ āĻĒā§āϰāϝāĻŧā§āĻāύā§āϝāĻŧāϤāĻžāĻā§āϞāĻŋ āĻāύāϏā§āĻāϞ āĻāϰā§āύ āϝāĻž āĻāĻāĻĒāĻŋ-āĻ ā§āϝāĻžāĻĄā§āϰā§āϏā§āϰ āĻĒāĻāύā§āĻĻāϏāĻ āϤāĻĨā§āϝ āĻĒā§āϤ⧠āĻŦā§āϝāĻžāĻāĻā§āϰāĻžāĻāύā§āĻĄ āĻĒā§āϰāϏā§āϏāĻŋāĻ āĻāϰāĻŦā§āĨ¤}
 bash install
Trace Your Own IP-Adress:
Below command will give you information about Your Own IP-Adress. {āύā§āĻā§ āĻāĻŽāĻžāύā§āĻĄ āĻāĻĒāύāĻžāĻā§ āĻāĻĒāύāĻžāϰ āύāĻŋāĻā§āϰ āĻāĻāĻĒāĻŋ-āĻ āĻŋāĻāĻžāύāĻž āϏāĻŽā§āĻĒāϰā§āĻā§ āϤāĻĨā§āϝ āĻĻā§āĻŦā§āĨ¤}
 trace -m
Â
You will see this kind of Output. {āĻāĻĒāύāĻŋ āĻāĻ āϧāϰāĻŖā§āϰ āĻāĻāĻāĻĒā§āĻ āĻĻā§āĻāϤ⧠āĻĒāĻžāĻŦā§āύ}
Trace Victims IP-Adress:
You Can Trace anyone's IP-address by using the below command. { āĻāĻĒāύāĻŋ āύā§āĻā§āϰ āĻāĻŽāĻžāύā§āĻĄāĻāĻŋ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰ⧠āĻāĻžāϰāĻ āĻāĻāĻĒāĻŋ-āĻ āĻŋāĻāĻžāύāĻž āĻā§āϰā§āϏ āĻāϰāϤ⧠āĻĒāĻžāϰā§āύāĨ¤}
 trace -t 192.168.0.1
Please change the above IP-Adress with the IP of the victim. { āĻāĻĒāϰā§āϰ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻžāĻāĻŋ āĻā§āĻā§āϤāĻā§āĻā§āϰ āĻāĻāĻĒāĻŋ āĻĻāĻŋāϝāĻŧā§ āĻĒāϰāĻŋāĻŦāϰā§āϤāύ āĻāϰā§āύāĨ¤}
Â
IP tracer is a great tool to gather some extra information about the victim. This will also give you the location of the victim in the longitude and latitude format. I have personally tested it and several websites but you will never get the pinpoint location of the victim by the IP address. Other than that you will get the city name and also the record of the victim. Check out my other post and how you can Gather information about any username on the internet. {āĻāĻāĻĒāĻŋ āĻā§āϰā§āϏāĻžāϰ āĻā§āĻā§āϤāĻā§āĻā§ āϏāĻŽā§āĻĒāϰā§āĻā§ āĻāĻŋāĻā§ āĻ āϤāĻŋāϰāĻŋāĻā§āϤ āϤāĻĨā§āϝ āϏāĻāĻā§āϰāĻšā§āϰ āĻāύā§āϝ āĻĻā§āϰā§āĻĻāĻžāύā§āϤ āϏāϰāĻā§āĻāĻžāĻŽāĨ¤ āĻāĻāĻŋ āĻāĻĒāύāĻžāĻā§ āĻĻā§āϰāĻžāĻāĻŋāĻŽāĻžāĻāĻļ āĻāĻŦāĻ āĻ āĻā§āώāĻžāĻāĻļ āĻŦāĻŋāύā§āϝāĻžāϏ⧠āĻā§āώāϤāĻŋāĻā§āϰāϏā§āĻĨā§āϰ āĻ āĻŦāϏā§āĻĨāĻžāύ āĻĻā§āĻŦā§āĨ¤ āĻāĻŽāĻŋ āĻŦā§āϝāĻā§āϤāĻŋāĻāϤāĻāĻžāĻŦā§ āĻāĻāĻŋ āĻāĻŦāĻ āĻŦā§āĻļ āĻāϝāĻŧā§āĻāĻāĻŋ āĻāϝāĻŧā§āĻŦāϏāĻžāĻāĻ āĻĒāϰā§āĻā§āώāĻž āĻāϰ⧠āĻĻā§āĻā§āĻāĻŋ āϤāĻŦā§ āĻāĻĒāύāĻŋ āĻāĻāύāĻ āĻāĻāĻĒāĻŋ āĻ āĻŋāĻāĻžāύāĻžāϰ āĻŽāĻžāϧā§āϝāĻŽā§ āĻā§āĻā§āϤāĻā§āĻā§āϰ āĻĒāĻŋāύāĻĒāϝāĻŧā§āύā§āĻ āĻ āĻŦāϏā§āĻĨāĻžāύ āĻĒāĻžāĻŦā§āύ āύāĻžāĨ¤ āĻāϰ āĻŦāĻžāĻāϰ⧠āĻāĻĒāύāĻŋ āĻļāĻšāϰā§āϰ āύāĻžāĻŽ āĻāĻŦāĻ āĻā§āĻā§āϤāĻā§āĻā§āϰ āϰā§āĻāϰā§āĻĄ āĻĒāĻžāĻŦā§āύāĨ¤ āĻāĻŽāĻžāϰ āĻ āύā§āϝāĻžāύā§āϝ āĻĒā§āϏā§āĻ āĻāĻŦāĻ āĻāĻĒāύāĻŋ āĻā§āĻāĻžāĻŦā§ āĻāύā§āĻāĻžāϰāύā§āĻā§ āĻā§āύāĻ āĻŦā§āϝāĻŦāĻšāĻžāϰāĻāĻžāϰā§āϰ āύāĻžāĻŽ āϏāĻŽā§āĻĒāϰā§āĻā§ āϤāĻĨā§āϝ āϏāĻāĻā§āϰāĻš āĻāϰāϤ⧠āĻĒāĻžāϰā§āύ āϤāĻž āĻĒāϰā§āĻā§āώāĻž āĻāϰ⧠āĻĻā§āĻā§āύāĨ¤}
Â
Â