Detect IMSI catchers and cell tower interception in real-time. No root required.
See how X Cellular Shield protects you in real-time.
Real-time monitoring — all 6 detection methods active
Instant alerts when interception is detected
Every tower verified against 5M+ global database
IMSI catchers (also called Stingrays) are devices that pretend to be cell towers to intercept your phone calls, messages, and location. Our app detects them.
Validates every tower your phone connects to against a database of 5 million known legitimate towers worldwide. Unknown towers are flagged immediately.
Measures your internet speed to 5 different servers simultaneously. If someone is relaying your traffic, all 5 connections slow down at the same time — that's the signature.
Detects when your phone is forced to use older, weaker connections (2G). Attackers do this because older networks have broken encryption.
Checks if the carrier code broadcast by a tower actually exists. Fake towers often use carrier codes that don't belong to any real operator.
Detects the jamming pattern used before interception: strong signal → sudden drop → brief outage → reconnect to a different tower.
Knows when you're still, walking, or driving. Adjusts detection to avoid false alarms — changing towers on a highway is normal, changing towers while sitting still is not.
Download the APK and install it. The app needs Location permission to read cell tower IDs (not to track you — your location is never sent anywhere).
Pay with USDT (TRC-20) directly in the app or enter a license key. Your license activates instantly and is tied to your device. You can re-use the same key if you reinstall.
The app runs in the background 24/7. It checks your cellular connection every 2 seconds across 6 different detection methods. You'll see a persistent notification showing the current status.
If something suspicious is detected, you'll get an instant notification. The threat level goes from green (safe) → yellow (watching) → orange (suspicious) → red (likely interception). Multiple indicators must agree before the app escalates.
The app needs Location permission to read cell tower information. On Android 14 and above, you must also enable Location in your phone's Settings (Settings → Location → toggle ON). Without system-level Location enabled, Android will not provide Cell ID data and the app cannot function properly. The app does NOT track your GPS position, does NOT record where you go, and does NOT send any location data to any server. Everything stays on your device.
Some phone brands (Samsung, Xiaomi, Huawei, OnePlus) aggressively kill background apps. The app will warn you on first launch and guide you to the right settings. Without this, background monitoring may stop working silently.
All checks are passing. No suspicious activity detected. Your cellular connection appears clean.
An anomaly was detected and is being investigated. Could be normal network behavior. The app is watching closely.
Multiple indicators are showing at the same time. This is unusual and may indicate interception. Be cautious with sensitive communications.
High-confidence detection. Several independent checks all agree something is wrong. Your connection may be intercepted. Avoid sensitive calls and messages.
SHA-256: 3ef028a8…82711bdb
All data stays on your device — nothing is sent to any server
No account required — fully anonymous
No GPS tracking — we read cell tower IDs, not your location
No analytics or telemetry — zero data collection
License check is the only network request the app makes
Open evidence export — you control your data