Detect IMSI catchers and cell tower interception in real-time. No root required.
IMSI catchers (also called Stingrays) are devices that pretend to be cell towers to intercept your phone calls, messages, and location. Our app detects them.
Validates every tower your phone connects to against a database of 5 million known legitimate towers worldwide. Unknown towers are flagged immediately.
Measures your internet speed to 5 different servers simultaneously. If someone is relaying your traffic, all 5 connections slow down at the same time — that's the signature.
Detects when your phone is forced to use older, weaker connections (2G). Attackers do this because older networks have broken encryption.
Checks if the carrier code broadcast by a tower actually exists. Fake towers often use carrier codes that don't belong to any real operator.
Detects the jamming pattern used before interception: strong signal → sudden drop → brief outage → reconnect to a different tower.
Knows when you're still, walking, or driving. Adjusts detection to avoid false alarms — changing towers on a highway is normal, changing towers while sitting still is not.
Download the APK and install it. The app needs Location permission to read cell tower IDs (not to track you — your location is never sent anywhere).
Pay with USDT (TRC-20) or enter a license key. Your license activates instantly and is tied to your device. You can re-use the same key if you reinstall.
The app runs in the background 24/7. It checks your cellular connection every 2 seconds across 6 different detection methods. You'll see a persistent notification showing the current status.
If something suspicious is detected, you'll get an instant notification. The threat level goes from green (safe) → yellow (watching) → orange (suspicious) → red (likely interception). Multiple indicators must agree before the app escalates.
The app needs Location permission to read cell tower information. This is an Android requirement — the app does NOT track your GPS position, does NOT record where you go, and does NOT send any location data to any server. Everything stays on your device.
Some phone brands (Samsung, Xiaomi, Huawei, OnePlus) aggressively kill background apps. The app will warn you on first launch and guide you to the right settings. Without this, background monitoring may stop working silently.
All checks are passing. No suspicious activity detected. Your cellular connection appears clean.
An anomaly was detected and is being investigated. Could be normal network behavior. The app is watching closely.
Multiple indicators are showing at the same time. This is unusual and may indicate interception. Be cautious with sensitive communications.
High-confidence detection. Several independent checks all agree something is wrong. Your connection may be intercepted. Avoid sensitive calls and messages.
SHA-256: 3ef028a824cc656f532eb8ef62c36f6c0a57294440432c9b23afeaca82711bdb
All data stays on your device — nothing is sent to any server
No account required — fully anonymous
No GPS tracking — we read cell tower IDs, not your location
No analytics or telemetry — zero data collection
License check is the only network request the app makes
Open evidence export — you control your data