One-click vulnerability in Telegram bypasses VPN and proxy protection
Publish Time: 13 Jan, 2026

A newly identified vulnerability in Telegram's mobile apps allows attackers to reveal users' real IP addresses with a single click. The flaw, known as a 'one-click IP leak', can expose location and network details even when VPNs or proxies are enabled.

The issue comes from Telegram's automatic proxy testing process. When a user clicks a disguised proxy link, the app initiates a direct connection request that bypasses all privacy protections and reveals the device's real IP address.

Cybersecurity researcher @0x6rss demonstrated an attack on X, showing that a single click is enough to log a victim's real IP address. The request behaves similarly to known Windows NTLM leaks, where background authentication attempts expose identifying information without explicit user consent.

ONE-CLICK TELEGRAM IP ADDRESS LEAK!

In this issue, the secret key is irrelevant. Just like NTLM hash leaks on Windows, Telegram automatically attempts to test the proxy. Here, the secret key does not matter and the IP address is exposed.
Example of a link hidden behind a... https://t.co/KTABAiuGYI pic.twitter.com/NJLOD6aQiJ

- 0x6rss (@0x6rss) January 10, 2026

Attackers can embed malicious proxy links in chats or channels, masking them as standard usernames. Once clicked, Telegram silently runs the proxy test, bypasses VPN or SOCKS5 protections, and sends the device's real IP address to the attacker's server, enabling tracking, surveillance, or doxxing.

Both Android and iOS versions are affected, putting millions of privacy-focused users at risk. Researchers recommend avoiding unknown links, turning off automatic proxy detection where possible, and using firewall tools to block outbound proxy tests. Telegram has not publicly confirmed a fix.

I’d like Alerts: