{"id":625,"date":"2022-08-25T09:13:51","date_gmt":"2022-08-25T09:13:51","guid":{"rendered":"https:\/\/cybersecuritynest.com\/?p=625"},"modified":"2022-08-25T09:14:22","modified_gmt":"2022-08-25T09:14:22","slug":"get-anyones-ip-locationosbrowserisp-etc-with-just-a-link","status":"publish","type":"post","link":"https:\/\/cybersecuritynest.com\/?p=625","title":{"rendered":"Get anyones IP, location,OS,Browser,ISP etc with just a link"},"content":{"rendered":"<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D625\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=625&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47--><h3 dir=\"auto\">[+] Warning<\/h3>\n<p dir=\"auto\"><em><b>This tool is developed for educational purposes. Here it demonstrates how ip-trackers work. If anybody wants to gain unauthorised access to someones IP-Address, he\/she may try out this at his\/her own risk. You have your own responsibilities and you are liable to any damage or violation of laws by this tool. The author\/CSNEST is not responsible for any misuse of IP-Tracker!<\/b><\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"h4ht7kGAhK\"><p><a href=\"https:\/\/cybersecuritynest.com\/?page_id=535\">Disclaimer<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Disclaimer&#8221; &#8212; Cyber Security Nest\" src=\"https:\/\/cybersecuritynest.com\/?page_id=535&#038;embed=true#?secret=kW59Xmv28T#?secret=h4ht7kGAhK\" data-secret=\"h4ht7kGAhK\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><strong>[+] Description<\/strong><\/p>\n<p>IP-Tracker is a tool that simply take a website as input and generate a phishing link. That phishing link looks normal; if anyone opens the link his\/her ip will be captured and he\/she will be redirected to the website taken as input.<\/p>\n<p><strong>[+] Installation<\/strong><\/p>\n<ul>\n<li>git clone https:\/\/github.com\/KasRoudra\/IP-Tracker<\/li>\n<li>cd IP-Tracker<\/li>\n<li>bash ip.sh<\/li>\n<li>Need an authtoken from ngrok, can be obtained by creating a free account on ngrok<\/li>\n<\/ul>\n<p><strong>Or run directly<\/strong><\/p>\n<p>wget https:\/\/raw.githubusercontent.com\/KasRoudra\/IP-Tracker\/main\/ip.sh &amp;&amp; bash ip.sh<\/p>\n<p><strong>[+] Features<\/strong><\/p>\n<ul>\n<li>Tricky link<\/li>\n<li>Concurrent triple tunneling (Ngrok, Cloudflared and Loclx)<\/li>\n<li>Redirect to website according to wish<\/li>\n<li>Get many details along with ip like location, geolocation<\/li>\n<\/ul>\n<p><strong>Docker<\/strong><\/p>\n<ul>\n<li>sudo docker pull kasroudra\/ip-tracker<\/li>\n<li>sudo docker run &#8211;rm -it kasroudra\/ip-tracker<\/li>\n<\/ul>\n<p><strong>[+] Previews<\/strong><\/p>\n<p><strong>Waiting for victim to open link<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/github.com\/KasRoudra\/IP-Tracker\/raw\/main\/files\/before.jpg\" \/><\/p>\n<p><strong>After victim opened link<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/github.com\/KasRoudra\/IP-Tracker\/raw\/main\/files\/after.jpg\" \/><\/p>\n<p><strong>[+] Dependencies<\/strong><\/p>\n<ul>\n<li>php<\/li>\n<li>wget<\/li>\n<li>curl<\/li>\n<li>unzip<\/li>\n<\/ul>\n<p><strong>[*] Usage<\/strong><\/p>\n<p>Usage: bash ip.sh [-h] [-o OPTION] [-U URL] [-p PORT] [-t TUNNELER] [-u] [-nu]<\/p>\n<p>&nbsp;<\/p>\n<p>Options:<\/p>\n<p>-h, &#8211;help\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Show this help message and exit<\/p>\n<p>-o OPTION, &#8211;option OPTION\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Index of the template<\/p>\n<p>-p PORT, &#8211;port PORT\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Port of IP-Tracker&#8217;s Server (Default: 8080)<\/p>\n<p>-t TUNNELER, &#8211;tunneler TUNNELER\u00a0\u00a0\u00a0\u00a0 Name of the tunneler for url shortening (Default: cloudflared)<\/p>\n<p>-U URL, &#8211;url URL\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 URL to be redirected<\/p>\n<p>&#8211;update(-u), &#8211;no-update (-nu)\u00a0\u00a0\u00a0\u00a0\u00a0 Check for update (Default: true)<\/p>\n<p>All necessary dependencies will be automatically installed on first run!<\/p>\n<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D625\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=625&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47-->","protected":false},"excerpt":{"rendered":"<p>[+] Warning This tool is developed for educational purposes. Here it demonstrates how ip-trackers work. If anybody wants to gain unauthorised access to someones IP-Address, he\/she may try out this at his\/her own risk. You have your own responsibilities and you are liable to any damage or violation of laws by this tool. The author\/CSNEST [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[8],"tags":[],"class_list":["post-625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/625"}],"collection":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=625"}],"version-history":[{"count":2,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/625\/revisions"}],"predecessor-version":[{"id":628,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/625\/revisions\/628"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/media\/626"}],"wp:attachment":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}