Detect IMSI catchers and cell tower interception in real-time. No root required.
IMSI catchers (also called Stingrays) are devices that pretend to be cell towers to intercept your phone calls, messages, and location. Our app detects them.
Validates every tower your phone connects to against a database of 5 million known legitimate towers worldwide. Unknown towers are flagged immediately.
Measures your internet speed to 5 different servers simultaneously. If someone is relaying your traffic, all 5 connections slow down at the same time — that's the signature.
Detects when your phone is forced to use older, weaker connections (2G). Attackers do this because older networks have broken encryption.
Checks if the carrier code broadcast by a tower actually exists. Fake towers often use carrier codes that don't belong to any real operator.
Detects the jamming pattern used before interception: strong signal → sudden drop → brief outage → reconnect to a different tower.
Knows when you're still, walking, or driving. Adjusts detection to avoid false alarms — changing towers on a highway is normal, changing towers while sitting still is not.
The app doesn't just check a static database — it learns your cellular environment and gets smarter every day.
Every tower your phone connects to is recorded locally. Over time, the app builds a profile of your normal cellular environment — your home, office, commute. When a tower appears that has never been seen before in your area, it's flagged for deeper inspection.
Not every cell tower is in the global database. Carriers add new towers regularly. When the app encounters an unknown BTS (Base Transceiver Station), it doesn't just ignore it — it cross-checks the tower's signal strength, carrier code, network type, and location against what's normal for your area. A legitimate new tower will match your carrier and behave normally. A fake one won't.
After 2 weeks of daily use, the app has a solid baseline of your normal cellular patterns — which towers you typically connect to, what signal strengths are normal, and how often handoffs occur. Any deviation from this baseline triggers additional checks. The longer you use the app, the fewer false positives and the more accurate the detection becomes.
Each tower earns a trust score based on repeated verified connections. A tower you've connected to 500 times over 3 months with consistent behavior is highly trusted. A tower that appeared 5 minutes ago with unusual characteristics gets zero trust. This layered approach means the app can distinguish between a new legitimate tower your carrier just installed and a fake tower an attacker just turned on.
💡 Why this matters: Government-grade IMSI catchers can clone a real tower's identity, but they can't clone its history. If a tower ID that's been 2km away suddenly appears next to you with different signal characteristics, the self-learning engine catches it — even if the tower passes the global database check.
Download the APK and install it. The app needs Location permission to read cell tower IDs (not to track you — your location is never sent anywhere).
Pay with USDT (TRC-20) directly in the app or enter a license key. Your license activates instantly and is tied to your device. You can re-use the same key if you reinstall.
The app runs in the background 24/7. It checks your cellular connection every 2 seconds across 6 different detection methods. You'll see a persistent notification showing the current status.
If something suspicious is detected, you'll get an instant notification. The threat level goes from green (safe) → yellow (watching) → orange (suspicious) → red (likely interception). Multiple indicators must agree before the app escalates.
The app needs Location permission to read cell tower information. On Android 14 and above, you must also enable Location in your phone's Settings (Settings → Location → toggle ON). Without system-level Location enabled, Android will not provide Cell ID data and the app cannot function properly.
Enabling Location in Settings does NOT mean you're being tracked. Here's what actually happens:
In short: Location ON ≠ being tracked. It just unlocks the modem data that our app needs to check your cell towers.
Some phone brands (Samsung, Xiaomi, Huawei, OnePlus) aggressively kill background apps. The app will warn you on first launch and guide you to the right settings. Without this, background monitoring may stop working silently.
All checks are passing. No suspicious activity detected. Your cellular connection appears clean.
An anomaly was detected and is being investigated. Could be normal network behavior. The app is watching closely.
Multiple indicators are showing at the same time. This is unusual and may indicate interception. Be cautious with sensitive communications.
High-confidence detection. Several independent checks all agree something is wrong. Your connection may be intercepted. Avoid sensitive calls and messages.
SHA-256: 5b39f92e…df213f1f
All data stays on your device — nothing is sent to any server
No account required — fully anonymous
No GPS tracking — we read cell tower IDs, not your location
No analytics or telemetry — zero data collection
License check is the only network request the app makes
Open evidence export — you control your data