Instruction
1
Most just "catch" the sender anonymous if you use the services of "MTS". Scroll through the message text to the end, and you will find a number consisting of four numbers separated by dots. This so-called IP address.
2
Phone (in the presence of unlimited access and a properly configured APN) or computer go to the following website:
http://2ip.ru/
You will see information about your own IP address. But with the help of this resource you can get data (non-classified) and other locations. Please note that this website may not open phone browser UC.
http://2ip.ru/
You will see information about your own IP address. But with the help of this resource you can get data (non-classified) and other locations. Please note that this website may not open phone browser UC.
3
Click on the "Information about IP address or domain". On the download page, there will be a field to enter check the IP address. Replace this field your IP address to the one you received along with the message, made a mistake in one digit, then click on the "Check out".
4
If the site http://2ip.ru you for some reason did not open, and the computer's operating system is Linux, get the same information by entering the following command:
whois aaa.bbb.ccc.ddd, where aaa.bbb.ccc.ddd is the IP address of the sender of the message.
whois aaa.bbb.ccc.ddd, where aaa.bbb.ccc.ddd is the IP address of the sender of the message.
5
You will receive information at least about the services of any service provider used by the sender. If you know subscribers are what providers your friends, this can significantly narrow your search to the author. If someone sent you an SMS with a desktop computer, you will surely get information about the corporate network, what institution it was sent. Remember, who you know works in it.
6
Subscribers of other mobile operators no information about the IP address of the sender of SMS is not receive. Support to report this information to simple users have no rights. In any case, if the message contains a threat, contact law enforcement. Using the System of operative-investigative activities (SORM), there will be able to accurately determine the identity of the author of the threats.
Note
Do not attempt to obtain by hacking more accurate data about the sender than those offered whois service is illegal.