Android IMSI-Catcher Detector icon
Android IMSI-Catcher Detector icon

Android IMSI-Catcher Detector

 9 likes

Detect attacks of fake base stations such as IMSI-Catcher and StingRay on your GSM/UMTS network. Look for silent SMS used by police and intelligence services.

Android IMSI-Catcher Detector screenshot 1

License model

  • FreeOpen Source

Country of Origin

  • DE flagGermany
  • European Union flagEU

Platforms

  • Android  Requires Root privalage
Discontinued

the project is dead since 2017, the only commits since are translations. Two revival attempts are also dead…

5 / 5 Avg rating (1)
9likes
0comments
0news articles

Features

Suggest and vote on features

Android IMSI-Catcher Detector News & Activities

Highlights All activities

Recent News

No news, maybe you know any news worth sharing?
Share a News Tip

Recent activities

Show all activities

Android IMSI-Catcher Detector information

  • Developed by

    DE flagCellularPrivacy
  • Licensing

    Open Source (GPL-3.0) and Free product.
  • Written in

  • Alternatives

    8 alternatives listed
  • Supported Languages

    • English

AlternativeTo Category

Security & Privacy

GitHub repository

  •  4,951 Stars
  •  983 Forks
  •  177 Open Issues
  •   Updated Apr 23, 2025 
View on GitHub

Our users have written 0 comments and reviews about Android IMSI-Catcher Detector, and it has gotten 9 likes

Android IMSI-Catcher Detector was added to AlternativeTo by Doc Flay on Mar 30, 2017 and this page was last updated May 26, 2022.
No comments or reviews, maybe you want to be first?
Post comment/review

What is Android IMSI-Catcher Detector?

AIMSICD is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as "StingRay", "Cellular Interception" and alike. Find out more in our Wiki on GitHub.

AIMSICD attempts to detect IMSI-Catchers through detection methods such as these: Check Tower Information Consistency Check LAC/Cell ID Consistency Check Neighboring Cell Info Prevent silent app installations Monitor Signal Strength Detect silent SMS Detect FemtoCells

Why use it ? The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at protests to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location or to find out who is in a given geographic area at what time. Identity thieves can use freely available tools and even build their own rogue GSM BTS to monitor and manipulate communications from a parked car in your residential neighborhood - notably for stealing passwords or credit card data from people nearby who make purchases on their phones. The reason IMSI-Catchers are so commonly used is that it is very easy to get away with using them since they leave no traces. Our app aims to make it possible to detect the IMSI-Catchers so that using them becomes a risky proposition. It also aims to make users safer by alerting on possible interception and tracking. Fight for your privacy!

Official Links