My Trackers
Loading your trackers...
Bulk Processing Not Available
The IP Tracker tool is designed for creating individual tracking links. Bulk creation is not a supported feature for this tool.
Please use the main tool form to generate your stealth links, pixels, and QR codes one by one.
Covert IP Tracker - Help & Documentation
Quick Start Guide
Enter a label for your tracker (e.g., 'Phishing Test'). This helps you identify it later.
Provide a 'Redirect URL' where the target will be sent after their information is logged.
(Pro Feature) Alternatively, upload a 'Decoy File' (like an image or PDF). The target will see this file instead of being redirected.
Choose your tracker type:
Stealth Link: A standard link disguised as a file path.
1x1 Email Pixel (Pro): An invisible image to embed in emails to track when they are opened.
QR Code (Pro): A scannable QR code for physical media or digital sharing.
(Pro Feature) Configure advanced options like self-destruction (link works only once), expiry time, or country blocking.
Click 'Generate Tracker'.
Copy the provided link, image tag, or QR code and share it with your target.
View detailed logs, including IP, location, device, and a map of all hits, in the 'My Trackers' dashboard below the form.
Frequently Asked Questions (FAQ)
Q: Is this legal to use?
A: This tool is designed for ethical and legal purposes, such as anti-fraud investigations, cybersecurity research, and tracking your own marketing leads. Using it for malicious or illegal activities is strictly prohibited. Always comply with local privacy laws and regulations in your jurisdiction.
Q: How is this different from Grabify?
A: This is a self-hosted, private solution integrated with your own site. All data is stored on your server, giving you 100% control and ownership. There is no third-party branding, no external dependencies, and the links are designed to be more stealthy and less suspicious.
Q: What information is logged?
A: The Free Tier logs the target's IP address and the timestamp of the click/open. The Pro Tier provides much more detailed information, including full geolocation (country, region, city), browser type, operating system, device type, and other available metadata from the user agent string.
Q: How does the email pixel work?
A: It's a tiny, invisible 1x1 pixel image. When you embed the provided tag in an email, the recipient's email client (like Gmail or Outlook) must request the image from our server to display it. That request is what allows us to log their information, effectively confirming when and where the email was opened.
Usage Examples
Example 1: Tracking a Scammer
Goal: Find the real location of a scammer who is asking for payment.
Setup:
Tracker Label: Scammer John Smith
Redirect URL: https://i.imgur.com/fake-payment.png (a link to an image of a payment confirmation)
Type: Stealth Link
Action: Send the generated stealth link to the scammer, claiming it's proof of your payment. When they click to see it, their real IP and location will be logged in your dashboard.
Example 2: Confirming an Email was Opened
Goal: Confirm that a client has opened a critical proposal email.
Setup:
Type: 1x1 Email Pixel (Pro)
Redirect URL: https://bulkcreator.com (a fallback URL)
Email Notification (Pro): Checked
Action: Copy the generated
tag and paste it into the bottom of your email. You will receive an email alert the moment the client opens the message, and you can see their location in your dashboard.
Need comprehensive documentation, advanced features, and best practices?
View Complete Documentation →Usage Limits
| Plan | Daily Limit | Best For |
|---|