GeoLocator Recon — Multi-Sensor Location Intelligence
Max Intel's GeoLocator Recon is an advanced geolocation tool that combines multiple positioning signals through a Kalman filter — the same algorithm used in aircraft navigation systems and missile guidance — to produce a more accurate location estimate than any single source can provide. It's designed for OSINT investigators assessing location exposure and security professionals conducting penetration testing engagements.
How Kalman Filter Sensor Fusion Works
The Kalman filter maintains two things: a current best estimate of position, and a measure of uncertainty. When a new measurement arrives (GPS reading, IP geolocation result, WebRTC data), the filter computes a weighted average between its current estimate and the new data, where the weights are inversely proportional to each source's uncertainty. GPS readings with 10-meter accuracy are weighted much more heavily than IP geolocation with 5-kilometer accuracy. Over a 15-60 second scan, the filter progressively narrows its uncertainty as more data points arrive.
WebRTC IP Leak Detection
WebRTC — the technology that enables in-browser video calls — has a well-documented side effect: it can expose your local network IP address (192.168.x.x, 10.x.x.x) to any website, even when you're using a VPN. This tool uses Google's STUN server to probe for this leak, demonstrating exactly what a malicious website could discover about your network topology. For pentesting engagements, this is a concrete, demonstrable privacy vulnerability that clients can act on. For OSINT, local IP ranges can reveal network size, router configuration, and whether a target is on a home or enterprise network.
OSINT Use Cases
Run a scan on yourself to understand exactly what location data your browser exposes to every website you visit. The exported report documents your public IP, ISP, approximate location, device fingerprint, timezone, and any WebRTC-leaked local IPs. This is valuable for privacy assessments, VPN effectiveness testing, and understanding your digital footprint. The JSON export is structured for AI-assisted analysis — feed it to an LLM for automated threat modeling.
Pentesting Use Cases
During authorized security assessments, embed this tool's scanning logic to demonstrate client-side information leakage. The report exports provide professional documentation of findings: what positioning data is exposed, which sensors contributed, and specific remediation recommendations (disabling WebRTC, configuring VPN kill switches, browser hardening). The PDF export includes map links, measurement tables, and Kalman filter statistics for inclusion in pentest reports.
For IP-to-location lookups without browser geolocation, use IP Lookup. The Domain Intelligence tool can resolve domain names to IPs for geolocation. For network analysis, the Threat Intelligence tool checks IPs against abuse databases and blocklists.