The best app for identifying and blocking calls - whoscall -
With whoscall, you can instantly identify the source of calls and text messages even if the caller's number is not in your contact list. whoscall also helps you block specific ...Read more
The best app for identifying and blocking calls - whoscall -
With whoscall, you can instantly identify the source of calls and text messages even if the caller's number is not in your contact list. whoscall also helps you block specific numbers.
Our global database provides more than 600 million numbers. Using whoscall, more than 20 million calls are filtered and about 500,000 malicious calls are blocked by users everyday. Start protecting your phone communication now!
★ One of the Best Apps of 2013 on Google Play in 8 countries ★
★ "Helps Users Avoid Spam Calls" -TechCrunch ★
Features: • Instant caller ID identification Identify background information of incoming unknown calls in a blink through tags reported by other users, internet search results, and our comprehensive global database. • Block unwanted calls and SMSs forever Block calls and SMSs intelligently to ensure a harassment-free calling experience. • Database with over 600 million phone numbers Search global database of 600,000,000 phone numbers. • Tag Numbers Tag phone numbers and create an integrated phone number database to create a reliable communication network for everyone.
Offline Database - Fast phone number search and offline accessibility Get the complete offline database for FREE • Lightning identification - Accelerate identification for thousands of popular telemarketing and store numbers • Yellow Page Database - Comprehensive phone number directory of local businesses and institutions. By downloading these databases to your phone, you can instantly identify caller IDs even if there is no internet connection. **The offline databases are available only in the following countries (Taiwan, Japan, Hong Kong, Korea and USA, Brazil etc.)
System requirements: • Android v2.2 or higher versions • Stable Internet access required for real-time lookup. • Use of 3rd party SMS apps might cause blocking failure. • Use of battery conservation apps may cause performance issues. • Starting from Android 4.4, Google has revoked SMS/MMS permissions from developers. Due to that fact, whoscall will not be able to block SMS/MMS for Android versions 4.4 and above. Call blocking feature is not affected. • Due to system limitations of dual sim card phones, whoscall have to be customized for each device. If your device is not in the following list, whoscall may have some difficulties operating on that phone. We are sorry for the inconvenience.
HTC one Dual 802d (Android 4.2.2) Samsung Galaxy Y GT-S6102 (Android 2.3.6) Samsung Galaxy win i8552 (Android 4.1.2) Samsung Grand Duos GT-I9082 (Android 4.1.2) RedMi 2013023 (Android 4.2.2) MTK-mini3 (Android 4.2.2)
Follow us: Facebook Page: facebook.com/whoscall
Do you have a question about this app?
UPDATED ON: Feb 16, 2015
SIZE Varies with device
INSTALLATIONS: 10,000,000 - 50,000,000
LATEST VERSION: 4.0.3
REQUIRED ANDROID VERSION: 2.2 and up
act as an account authenticator
Allows an application to use the account authenticator capabilities of the AccountManager, including creating accounts and getting and setting their passwords.
discover known accounts
Allows an application to get the list of accounts known by the phone.
read sync settings
Allows an application to read the sync settings, such as whether sync is enabled for contacts.
read sync statistics
Allows an application to read the sync stats; e.g., the history of syncs that have occurred.
write sync settings
Allows an application to modify the sync settings, such as whether sync is enabled for contacts.
display system-level alerts
Allows an application to show system alert windows. Malicious applications can take over the entire screen of the phone.
Allows an application to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished.
automatically start at boot
Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down overall performance of the phone by constantly running.
intercept outgoing calls
Allows application to process outgoing calls and change the number to be dialed. Malicious applications may monitor, redirect, or prevent outgoing calls.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
Allows the application to control the vibrator.
change your audio settings
Allows application to modify global audio settings such as volume and routing.
YOUR PERSONAL INFORMATION
read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
write contact data
Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data.
full Internet access
Allows an application to create network sockets.
view network state
Allows an application to view the state of all networks.
view Wi-Fi state
Allows an application to view the information about the state of Wi-Fi.
directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
send SMS messages
Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.
read SMS or MMS
Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages.
edit SMS or MMS
Allows application to write to SMS messages stored on your phone or SIM card. Malicious applications may delete your messages.
modify/delete SD card contents
Allows an application to write to the SD card.
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.