Simple Telegram self to scrape info about groups and users using Telethon
MIT License
Installing requirement
You need to install python
, pip
and virtualenv
before using this bot. simply install them via your package manager
Clone repository
git clone https://github.com/Kourva/TgLook
Navigate to script directory
cd TgLook
Activate virtual environment
virtualenv venv && source venv/bin/activate
Install requirements
python -m pip install -r requirements.txt
Configure credential
run setup.py
and enter your api-ID and api-Hash. you can get it from Telegram.
python setup.py
Run self bot
python main.py
Group members scraper
Send $chats
to self bot and it will show you list of your groups which you are member of it.
ΓΝΓ Please choose group to get member from it:
β Idx0: Group 1
β Idx1: Text group
... and so on
ββ΄ Send $get [index] to get members.
E.G. $get 0
Then send $get
with index as argument to get list of members in the group.
chat_id,first_name,last_name,username,phone,access_hash,group_title,group_id
123xxxx890,John,Doe,JohnDoe,+1xxxxxx,188420xxxxxxxx58432,Group 1,12xxxx7662
Username availability checker
Send $username
following username as argument to check its status:
$username username_without_at
User info checker
Send $whois
following username as argument to check its account status:
ΓΝΓ Who IS Lookup
β Chat-ID: 123xxxx789
β Access Hash: 12313xxxxxx876969
β First Name: Alex
β Last Name: None
β Username: xxx
π£ Account status
β Is restricted: False
β Is scam: False
β Is fake: False
β Is bot: False
β Is self: True
β Is premium: True
βΉ Bio
Hey, I'm a developer :)
α¨ Restriction Reason:
And that is, self bot will send you inforamtion when you use these commands.
Note: Don't use @ in usernames, send it witout @. Here is list of examples
$username johndoe -> look for username
$chats -> show all groups
$get 0 -> get first groups members
$whois johndoe -> get information abour user
If you have limitation for your region, you can simply use tor and proxychains to run your bot with proxy
# Use -q for quiet mode
proxychains -q python main.py
sudo pkill -HUP tor
Using TorProject API:
proxychains -q https://check.torproject.org/api/ip
# Output e.g {"IsTor":true,"IP":"111.222.333.444"}
Using AmazonAws API:
proxychains -q https://checkip.checkip.amazonaws.com
# Output e.g 111.222.333.444
Thank you for using this tool. hope you like it :D