See what information websites can collect about you just by visiting. No cookies required - this is all from your browser.
Initializing scan...
IP reveals physical location, ISP, and organization. Attackers use this for geotargeting, identifying corporate networks, and VPN detection.
Location-based phishing, ISP-specific exploits, network reconnaissance for targeted attacks.
WebRTC leaks reveal internal network structure. Canvas/audio fingerprints create unique identifiers that persist across sessions and sites.
Cross-site tracking without cookies, identifying users even in incognito mode, internal network mapping for lateral movement.
Browser version reveals potential vulnerabilities. Language preferences indicate nationality/location. Ad blocker detection affects malvertising strategies.
Browser-specific exploits (CVEs), language-targeted phishing, evading ad blocker detection for malicious ads.
Detected Extensions:
Extensions reveal security awareness (ad blockers), profession (dev tools), crypto holdings (wallets), and password management habits.
Extension-specific vulnerabilities, targeting crypto wallet users, exploiting password manager weaknesses, bypassing security extensions.
Sites can detect if you're logged into these services:
Reveals active accounts and services used. Confirms identity across platforms and indicates personal/professional tools.
Targeted phishing for specific services, credential stuffing prioritization, social engineering with confirmed account knowledge.
OS version reveals patch level and potential vulnerabilities. CPU cores and memory indicate device value and processing capabilities for cryptomining.
OS-specific exploits, device-targeted malware, identifying high-value targets (expensive hardware), tailoring payloads to available resources.
Screen resolution and available screen area reveal monitor setup, taskbar position, and potential multi-monitor configuration. Unique combinations aid fingerprinting.
Crafting phishing pages that match victim's resolution, detecting virtual machines (unusual resolutions), identifying dual-monitor setups for targeted attacks.
GPU details are highly unique identifiers. Specific GPU models indicate device age, value, and gaming/professional use. Virtual machine GPUs have distinctive signatures.
VM/sandbox detection to evade security researchers, GPU-specific exploits, identifying valuable targets (workstations with professional GPUs), cryptojacking capability assessment.
Sample of detected fonts:
Installed fonts are extremely unique. Professional software (Adobe, Microsoft Office) installs distinctive fonts. Developer fonts reveal coding activity. Language fonts indicate nationality.
Highly reliable cross-session tracking, identifying professionals by software fonts, detecting security researchers by dev tool fonts, persistent identification despite cookie clearing.
Timezone confirms physical location even with VPN. Date/time format reveals cultural background. Unusual timezones may indicate travelers or expats.
Timing attacks based on victim's active hours, VPN detection (timezone mismatch with IP), scheduling phishing for optimal response times, regional attack campaigns.
Battery status reveals mobile vs. desktop use. Charging patterns indicate user behavior. Low battery users may make hasty security decisions.
Urgency-based phishing when battery is low, device type confirmation, tracking via battery level changes over time, identifying mobile targets for SMS phishing.
Storage capabilities indicate browser features and potential for persistent tracking. Service Worker support enables background execution.
Persistent malware via Service Workers, evercookies using multiple storage mechanisms, offline attack payloads, background cryptocurrency mining.
Any website can read all data stored in your browser for their domain:
Stored data often contains authentication tokens, user preferences, tracking IDs, and cached personal information. XSS attacks can exfiltrate all stored data.
XSS payload stealing tokens/sessions, persistent tracking via stored identifiers, account takeover via stolen auth tokens, privacy profiling from preferences.
Media capabilities indicate device type and codec support. WebRTC reveals camera/microphone presence. Media device IDs can be persistent identifiers.
Identifying targets with cameras for sextortion, codec-based fingerprinting, WebRTC IP leaks, unauthorized media access attempts via permission prompts.
This hash is generated from your browser characteristics. It's likely unique to you among millions of users.
Uniqueness estimate: Calculating...
Browser fingerprinting combines all collected data into a unique identifier that persists across sessions, VPNs, and cookie clearing. Used for tracking and de-anonymization.
Persistent cross-site tracking, identifying users despite privacy measures, linking anonymous accounts to real identities, fraud detection evasion research.