How to Trace an Anonymous Troll or Scammer (IP Tracking Links)

Disclosure: We may earn a small affiliate commission if you purchase through our links, at absolutely no extra cost to you.
💡 Pro Tip for Investigators: When conducting OSINT research or clicking on potentially malicious links, never expose your real IP address. Threat actors can log your IP to find your general location and target your network.

Always route your traffic through a verified, no-log VPN. Our top-tested recommendations for serious OPSEC are NordVPN or ProtonVPN

You keep getting harassing messages on Instagram from a blank profile. Or a scammer is texting your phone, pretending to be the IRS.

You cannot see their email headers (like we taught you in our Email Tracing Guide), and you cannot ask the police to “hack” them. But you can trick them into revealing their exact location.

Cybersecurity professionals use a technique called a Digital Tripwire (or tracking link). You send the anonymous person a link; when they click it, the link silently grabs their IP address, device model, and location, and sends it directly to you.

Here is how to create a legal tracking link to unmask anonymous trolls and scammers.

Normally, when you click a link, your device has to tell the website’s server exactly where to send the webpage data. That means your device is handing over its IP address.

How to Trace an Anonymous Troll

A tracking link intercepts this process. It records the clicker’s IP address and then immediately redirects them to a normal, harmless webpage (like a funny YouTube video or a news article) so they never know they were tracked.

Method 1: The “Grabify” Method (Best for Quick Checks)

Grabify is the most famous IP logger on the internet. It is free, fast, and easy to use.

How to set it up:

  1. Find a normal, interesting link that your harasser would want to click. (e.g., A news article, a meme, or a link to a fake “Document”). Copy that URL.
  2. Go to the official site: https://grabify.link.
  3. Paste the normal link into the box and click “Create URL.”
  4. Grabify will give you two things:

    The New Tracking Link:
    This is what you send to the scammer.
    The Tracking Code: Save this! This is your private password to view the results.

How to deploy it: Send the tracking link to the anonymous account. Use social engineering to make them click.

Example: “Is this picture of you? [Tracking Link]” or “I uploaded the receipt here: [Tracking Link].”

The Results: Once they click, go back to Grabify and enter your Tracking Code. It will reveal their IP address, their city, their internet provider, and exactly what kind of phone they are using.

Method 2: The “CanaryToken” Method (The Pro Choice)

Scammers are getting smarter. Many of them recognize a “Grabify” link and will refuse to click it.

If you are dealing with a sophisticated threat, you need to use CanaryTokens. This is a free tool built by professional cybersecurity researchers at Thinkst Canary.

Instead of just a web link, CanaryTokens allows you to embed a tracker into an actual Word Document or PDF.

How it works:

  1. Go to the official site: https://canarytokens.org.
  2. Select “MS Word Document” from the drop-down menu.
  3. Provide your email address (so the tool can alert you).
  4. The site generates a blank Word document. You can rename it something tempting, like Financial_Records_2026.docx.
  5. Send the document to the scammer.

The Trap: The moment the scammer opens the Word document on their computer, the document silently “calls home” and emails you their exact IP address and location. They never even have to click a web link.

Step 3: What to Do With the IP Address

Once the trap is sprung and you have their IP address, do not confront them.

  1. Geolocate It: Plug the IP address into a database like https://www.iplocation.net to find their physical city and country.
  2. The Server Check: Use our Shodan OSINT Guide to see if the IP address belongs to a VPN or a proxy server farm, which tells you they are trying to hide.
  3. Block and Ignore: If the IP address shows they live in your actual town, take screenshots of the Grabify logs and the harassing messages. You now have actionable evidence to give to local law enforcement or school administrators.

Summary: The Tripwire Protocol

ToolBest ForHow it Works
GrabifyTrolls / Casual ScammersCreates a clickable web link that grabs their IP and redirects them.
CanaryTokensSophisticated ScammersEmbeds a hidden tracker inside a Word or PDF document.

The Bottom Line

You do not have to be a victim to anonymous harassment. By using digital tripwires like Grabify or CanaryTokens, you take the power back.

Remember: Never use these tools for illegal purposes or to harass others. Use them to protect yourself, unmask bad actors, and gather evidence.

Next Step: Did the IP address trace back to an aggressive company trying to collect a fake debt? Use our Corporate OSINT Guide to investigate their legal standing.

Also Read

Editorial Team
Editorial Teamhttps://theintelhub.com
The Intel Hub Editorial Team is a collective of cybersecurity analysts, tech researchers, and privacy advocates. We are dedicated to providing clear, fact-checked intelligence on the latest digital threats, OSINT techniques, and personal security tools. Our mission is to make the internet safer for everyone.

Related

Hardware Security Keys vs. Authenticator Apps (The Ultimate 2FA Defense)

If you read our breakdown on Why SMS 2FA...

Why SMS Two-Factor Authentication (2FA) is Dangerously Insecure (SIM Swapping Explained)

You finally took your digital security seriously. You stopped...

The Best Password Managers for OPSEC (Local vs. Cloud Storage)

As we covered in our breakdown of how credential...

Stop Reusing Passwords: How Credential Stuffing Actually Works

When the average person pictures a cyberattack, they imagine...