Ip-tracker (Chakravyuh) is a reconnaissance tool designed for red teaming and authorized security research.
It combines passive OSINT capabilities with active social engineering modules to extract precise target data.
Features Auto-Tunneling, Telegram Real-time Alerts, and Advanced Device Fingerprinting
without requiring manual port forwarding.
| MODULE | DESCRIPTION |
|---|---|
| IP INTELLIGENCE | Geo-locate targets with map generation. Integrates Shodan to detect OS, open ports, and vulnerabilities. |
| DEVICE TRAPPER | Deploys social engineering pages (Fake Cloudflare / Update). Captures GPU model, CPU, RAM, battery, network type, and timezone. |
| PHONE RECON | Validates phone numbers and extracts carrier, location, and timezone information globally. |
| PORT SCANNER | Multi-threaded active scan for critical open ports (21, 22, 80, 443, 3389, etc.). |
| DOMAIN INTEL | Resolves host IPs and enumerates subdomains via Shodan DNS database. |
| REAL-TIME ALERTS | Sends captured victim details instantly to your Telegram bot. |
| AUTO-TUNNELING | Built-in support for Cloudflared and Serveo. No manual configuration needed. |
Upon first launch, the tool automatically installs missing dependencies (shodan, folium, phonenumbers, etc.).
# Update repositories
pkg update && pkg upgrade -y
# Install dependencies
pkg install python git openssh -y
# Clone repository
git clone https://github.com/trmxvibs/ip-tracker
# Navigate and run
cd ip-tracker
python chakravyuh.py# Update system
sudo apt update
# Install dependencies
sudo apt install python3 python3-pip git -y
# Clone repository
git clone https://github.com/trmxvibs/ip-tracker
# Navigate and run
cd ip-tracker
python3 chakravyuh.pyDownload and install Python 3.x (check “Add to PATH”).
Download this repository.
Open CMD inside the folder. Run
python chakravyuh.pyEnter any IP address to retrieve city, country, ISP, and map file (
.html).
If Shodan API is active, it also fetches vulnerabilities and ports.
Checks for open ports on the target IP (FTP, SSH, Telnet, HTTP, HTTPS, SMB, RDP, etc.).
Enter number with country code (example:
+919876543210).
Returns valid carrier, region, and timezone data.
Resolves domain names to IP addresses and lists subdomains found in public databases.
Hosts a fake page (Cloudflare / System Update) via secure tunnel.
- GPU model
- Battery percentage
- Screen resolution
- Browser
- Public IP
- Saves data to loot_log.txt
- Sends captured data to Telegram.
-
Configure API keys:
-
Shodan API Key — for deep reconnaissance
-
Telegram Bot Token & Chat ID — receive captured data alerts
This repository and the code provided are for educational purposes and authorized security research only. The developer (Lokesh Kumar) assumes no liability and is not responsible for any misuse or damage caused by this program. Using this tool to track or exploit targets without prior mutual consent may be illegal. It is the end user's responsibility to obey all applicable local, state, and federal laws.