Digital Awareness

See what information websites can collect about you just by visiting. No cookies required - this is all from your browser.

Why does this matter?

Every website you visit can access this information. Combined, these data points create a unique "fingerprint" that can track you across the web - even without cookies.

Initializing scan...

🌐 Network

Public IP Detecting...
Location (approx) Detecting...
ISP / Org Detecting...
Connection Type Detecting...
Downlink Speed Detecting...
OSINT Value

IP reveals physical location, ISP, and organization. Attackers use this for geotargeting, identifying corporate networks, and VPN detection.

Attack Vectors

Location-based phishing, ISP-specific exploits, network reconnaissance for targeted attacks.

🚨 Privacy Leaks

Local IP (WebRTC) Detecting...
Private Browsing Detecting...
Referrer Detecting...
Canvas Fingerprint Detecting...
Audio Fingerprint Detecting...
OSINT Value

WebRTC leaks reveal internal network structure. Canvas/audio fingerprints create unique identifiers that persist across sessions and sites.

Attack Vectors

Cross-site tracking without cookies, identifying users even in incognito mode, internal network mapping for lateral movement.

🔍 Browser

Browser Detecting...
Engine Detecting...
Language Detecting...
Cookies Enabled Detecting...
Do Not Track Detecting...
Ad Blocker Detecting...
OSINT Value

Browser version reveals potential vulnerabilities. Language preferences indicate nationality/location. Ad blocker detection affects malvertising strategies.

Attack Vectors

Browser-specific exploits (CVEs), language-targeted phishing, evading ad blocker detection for malicious ads.

🧩 Extensions & Plugins

PDF Viewer Detecting...
Plugins Count Detecting...

Detected Extensions:

Scanning...
OSINT Value

Extensions reveal security awareness (ad blockers), profession (dev tools), crypto holdings (wallets), and password management habits.

Attack Vectors

Extension-specific vulnerabilities, targeting crypto wallet users, exploiting password manager weaknesses, bypassing security extensions.

👤 Social Login Detection

Sites can detect if you're logged into these services:

OSINT Value

Reveals active accounts and services used. Confirms identity across platforms and indicates personal/professional tools.

Attack Vectors

Targeted phishing for specific services, credential stuffing prioritization, social engineering with confirmed account knowledge.

💻 System

Operating System Detecting...
Platform Detecting...
CPU Cores Detecting...
Device Memory Detecting...
Touch Support Detecting...
Device Type Detecting...
OSINT Value

OS version reveals patch level and potential vulnerabilities. CPU cores and memory indicate device value and processing capabilities for cryptomining.

Attack Vectors

OS-specific exploits, device-targeted malware, identifying high-value targets (expensive hardware), tailoring payloads to available resources.

🖥️ Display

Screen Resolution Detecting...
Available Screen Detecting...
Viewport Size Detecting...
Color Depth Detecting...
Pixel Ratio Detecting...
HDR Support Detecting...
OSINT Value

Screen resolution and available screen area reveal monitor setup, taskbar position, and potential multi-monitor configuration. Unique combinations aid fingerprinting.

Attack Vectors

Crafting phishing pages that match victim's resolution, detecting virtual machines (unusual resolutions), identifying dual-monitor setups for targeted attacks.

🎮 Graphics

GPU Vendor Detecting...
GPU Renderer Detecting...
WebGL Version Detecting...
Max Texture Size Detecting...
OSINT Value

GPU details are highly unique identifiers. Specific GPU models indicate device age, value, and gaming/professional use. Virtual machine GPUs have distinctive signatures.

Attack Vectors

VM/sandbox detection to evade security researchers, GPU-specific exploits, identifying valuable targets (workstations with professional GPUs), cryptojacking capability assessment.

🔤 Font Fingerprinting

Detected Fonts Detecting...
Font Hash Detecting...

Sample of detected fonts:

Enumerating fonts...
OSINT Value

Installed fonts are extremely unique. Professional software (Adobe, Microsoft Office) installs distinctive fonts. Developer fonts reveal coding activity. Language fonts indicate nationality.

Attack Vectors

Highly reliable cross-session tracking, identifying professionals by software fonts, detecting security researchers by dev tool fonts, persistent identification despite cookie clearing.

🕐 Time & Locale

Timezone Detecting...
UTC Offset Detecting...
Local Time Detecting...
Date Format Detecting...
OSINT Value

Timezone confirms physical location even with VPN. Date/time format reveals cultural background. Unusual timezones may indicate travelers or expats.

Attack Vectors

Timing attacks based on victim's active hours, VPN detection (timezone mismatch with IP), scheduling phishing for optimal response times, regional attack campaigns.

🔋 Battery

Battery Level Detecting...
Charging Status Detecting...
Time to Full Detecting...
Time to Empty Detecting...
OSINT Value

Battery status reveals mobile vs. desktop use. Charging patterns indicate user behavior. Low battery users may make hasty security decisions.

Attack Vectors

Urgency-based phishing when battery is low, device type confirmation, tracking via battery level changes over time, identifying mobile targets for SMS phishing.

💾 Storage & Features

Local Storage Detecting...
Session Storage Detecting...
IndexedDB Detecting...
Web Workers Detecting...
Service Workers Detecting...
OSINT Value

Storage capabilities indicate browser features and potential for persistent tracking. Service Worker support enables background execution.

Attack Vectors

Persistent malware via Service Workers, evercookies using multiple storage mechanisms, offline attack payloads, background cryptocurrency mining.

🗃️ Storage Inspector

Any website can read all data stored in your browser for their domain:

Total Items Scanning...
Sensitive Items Scanning...

LocalStorage 0

Scanning...

SessionStorage 0

Scanning...
OSINT Value

Stored data often contains authentication tokens, user preferences, tracking IDs, and cached personal information. XSS attacks can exfiltrate all stored data.

Attack Vectors

XSS payload stealing tokens/sessions, persistent tracking via stored identifiers, account takeover via stolen auth tokens, privacy profiling from preferences.

🎵 Media

Audio Formats Detecting...
Video Formats Detecting...
WebRTC Support Detecting...
Media Devices Detecting...
OSINT Value

Media capabilities indicate device type and codec support. WebRTC reveals camera/microphone presence. Media device IDs can be persistent identifiers.

Attack Vectors

Identifying targets with cameras for sextortion, codec-based fingerprinting, WebRTC IP leaks, unauthorized media access attempts via permission prompts.

🔐 Your Browser Fingerprint

This hash is generated from your browser characteristics. It's likely unique to you among millions of users.

Calculating fingerprint...

Uniqueness estimate: Calculating...

OSINT Value

Browser fingerprinting combines all collected data into a unique identifier that persists across sessions, VPNs, and cookie clearing. Used for tracking and de-anonymization.

Attack Vectors

Persistent cross-site tracking, identifying users despite privacy measures, linking anonymous accounts to real identities, fraud detection evasion research.