GeoLocator Recon

Last updated:

Kalman-filtered multi-sensor geolocation scanner for OSINT reconnaissance and security assessment. Fuses GPS, IP geolocation, Wi-Fi, and WebRTC local IP detection to produce an enhanced location estimate. Detects WebRTC IP leaks, exposes public IP and ISP, fingerprints device metadata. Export full reports as JSON, Markdown, TXT, or PDF.

🧮 Kalman Filter Active 🔌 WebRTC
🗺️ Filtered Location Map
Filtered accuracy: Unknown
📊 Sensor Fusion Dashboard
📡
GPS
Standby
📶
Wi-Fi
Standby
🌐
IP Geo
Standby
🔌
WebRTC
Standby
PUBLIC IP:
Kalman filter combining GPS, Wi-Fi, IP and WebRTC data
📤 Export Report
Run a scan to enable exports
🎯 Scan Controls
Scan Duration
📍 Filtered Location
Coordinates
Not determined yet
Kalman Filter State
Filter not initialized
Map Services
Timezone
Unknown
Device
Collecting...

GeoLocator Recon — Multi-Sensor Location Intelligence

Max Intel's GeoLocator Recon is an advanced geolocation tool that combines multiple positioning signals through a Kalman filter — the same algorithm used in aircraft navigation systems and missile guidance — to produce a more accurate location estimate than any single source can provide. It's designed for OSINT investigators assessing location exposure and security professionals conducting penetration testing engagements.

How Kalman Filter Sensor Fusion Works

The Kalman filter maintains two things: a current best estimate of position, and a measure of uncertainty. When a new measurement arrives (GPS reading, IP geolocation result, WebRTC data), the filter computes a weighted average between its current estimate and the new data, where the weights are inversely proportional to each source's uncertainty. GPS readings with 10-meter accuracy are weighted much more heavily than IP geolocation with 5-kilometer accuracy. Over a 15-60 second scan, the filter progressively narrows its uncertainty as more data points arrive.

WebRTC IP Leak Detection

WebRTC — the technology that enables in-browser video calls — has a well-documented side effect: it can expose your local network IP address (192.168.x.x, 10.x.x.x) to any website, even when you're using a VPN. This tool uses Google's STUN server to probe for this leak, demonstrating exactly what a malicious website could discover about your network topology. For pentesting engagements, this is a concrete, demonstrable privacy vulnerability that clients can act on. For OSINT, local IP ranges can reveal network size, router configuration, and whether a target is on a home or enterprise network.

OSINT Use Cases

Run a scan on yourself to understand exactly what location data your browser exposes to every website you visit. The exported report documents your public IP, ISP, approximate location, device fingerprint, timezone, and any WebRTC-leaked local IPs. This is valuable for privacy assessments, VPN effectiveness testing, and understanding your digital footprint. The JSON export is structured for AI-assisted analysis — feed it to an LLM for automated threat modeling.

Pentesting Use Cases

During authorized security assessments, embed this tool's scanning logic to demonstrate client-side information leakage. The report exports provide professional documentation of findings: what positioning data is exposed, which sensors contributed, and specific remediation recommendations (disabling WebRTC, configuring VPN kill switches, browser hardening). The PDF export includes map links, measurement tables, and Kalman filter statistics for inclusion in pentest reports.

For IP-to-location lookups without browser geolocation, use IP Lookup. The Domain Intelligence tool can resolve domain names to IPs for geolocation. For network analysis, the Threat Intelligence tool checks IPs against abuse databases and blocklists.

GeoLocator Recon — Frequently Asked Questions

What is Kalman filter sensor fusion?

A Kalman filter combines noisy measurements from multiple sources (GPS, IP, Wi-Fi, WebRTC) to produce a more accurate location estimate than any single source alone. It weighs each measurement by its expected accuracy — GPS readings with 10m accuracy are weighted far more than IP geolocation with 5km accuracy.

What is WebRTC IP leak detection?

WebRTC can reveal your local network IP address through STUN server requests, even when using a VPN. This tool probes Google's STUN server to discover what local IPs your browser exposes. This is a well-known privacy vulnerability relevant to both OSINT and penetration testing.

Is my location data sent to any server?

The Kalman filter processing, map rendering, and report generation all run locally. The only external requests are IP geolocation API calls (to determine approximate location from your public IP) and map tile requests to OpenStreetMap/Esri. Your GPS coordinates, device info, and local IPs are never transmitted.

How accurate is the location detection?

GPS on mobile typically provides 5-50m accuracy. IP geolocation is within 1-50km. Wi-Fi positioning achieves 15-150m in urban areas. The Kalman filter combines all available signals for the best possible estimate given available data.

What are the OSINT and pentesting use cases?

For OSINT: assess browser location exposure, identify ISP/network, detect VPN/proxy usage. For pentesting: demonstrate WebRTC IP leaks, test VPN kill switches, audit device fingerprints, generate location exposure reports for security assessments.