0%
Analyzing your digital fingerprint...
0 signals detected
Filter by Risk:CriticalHighMediumLow
Network & Identity
IP addresses, connection details, and geolocation data.
Public IP
ISP / Organization
City
Region
Country
Coordinates
ASN
Timezone (Server)
Postal Code
Local IP (WebRTC)
N/A
Connection Type
N/A
Downlink Speed
N/A
RTT
N/A
Save Data
N/A
Referrer
N/A
Proxy & VPN Detection
Analysis of connection proxying, VPN usage, and network masking techniques.
Proxy/VPN Detected
Datacenter IP
Mobile Network
Reverse DNS
ISP
AS Name
Forwarded Chain
Hop Count
Proxy Headers
Connection Security
Client Timezone
N/A
Timezone Mismatch
N/A
WebRTC Leak
N/A
Server-Side Analysis
HTTP headers, Client Hints, and protocol information received by the server.
User-Agent (Server)
Accept-Language
Accept-Encoding
Accept
DNT Header
Upgrade-Insecure-Requests
Cache-Control
Referer (Server)
Client Hints
Structured device and preference hints sent by the browser.
TLS / Protocol
Transport layer security and connection protocol details.
Protocol
HTTP Version
TLS Version
TLS Cipher
JA3 Fingerprint
Hardware Fingerprint
GPU, CPU, RAM, battery, screen, and connected devices.
GPU Renderer
GPU Vendor
CPU Cores
Device Memory
Battery Level
Battery Charging
Charging Time
Discharging Time
Screen Resolution
Available Screen
Viewport
Pixel Ratio
Color Depth
Max Touch Points
Screen Orientation
Screen Position
Screen Extended
Gamepads Supported
WebGPU Supported
Connected Devices
Cameras, microphones, and speakers detected via MediaDevices API.
Cameras
0
Microphones
0
Speakers
0
Device Sensors
Motion and environmental sensors available on this device.
Accelerometer
Gyroscope
Magnetometer
Ambient Light
Software & Configuration
Operating system, browser, language, timezone, and preferences.
Platform
User-Agent
Primary Language
All Languages
Timezone
Timezone Offset
Cookies Enabled
Do Not Track
PDF Viewer
AdBlock Detected
Java Enabled
Keyboard Layout
Detected Fonts
Installed fonts reveal your OS, profession, and installed software.
Computed Fingerprint Hashes
Unique signatures generated by your hardware and software. These invisible tests produce a code that identifies your device.
Canvas Hash
Audio Hash
WebGL Hash
WebGL2 Hash
ClientRects Hash
Combined Hash (SHA-256)
Emoji Rendering Hash
Math Precision Hash
Speech Voices Hash
WebGL Render Hash
CSS Computed Styles Hash
Audio Context Properties
Raw AudioContext parameters that reveal your audio hardware configuration.
Sample Rate
N/A
Base Latency
N/A
Output Latency
N/A
Max Channel Count
N/A
Behavioral Biometrics
Real-time tracking of mouse, keyboard, scroll, and focus behavior. Updates live.
Mouse Movement Trail
SlowFast
0 tracked pointsClick Heatmap
0 clicks recorded
Each click produces an expanding, fading ring. This demonstrates how precise click coordinates and timing can uniquely identify a user.
Text Selection Capture
Any text you select on this page is instantly captured. Websites can monitor what interests you.
selection-capture
>Select any text on this page...
Storage Capabilities
Available storage mechanisms and their quotas.
localStorage
sessionStorage
IndexedDB
Cache API
Storage Quota
Storage Usage
Media Preferences
CSS media query results revealing your display settings, accessibility preferences, and input capabilities.
Navigation Timing
Precise measurements of how this page loaded. Timing patterns can identify connection and hardware.
DNS Lookup
TCP Connect
TLS Negotiation
TTFB
Content Download
DOM Interactive
DOM Complete
Full Page Load
Redirect Count
Transfer Size
Resources Loaded
JavaScript Memory
Memory usage information (Chrome only).
JS Heap Limit
Total JS Heap
Used JS Heap
JS Engine Fingerprint
JavaScript engine behavior that differs between Chrome (V8), Firefox (SpiderMonkey), and Safari (JSC).
eval.toString().length
Error Stack Format
Navigator Extended Properties
Hidden navigator properties that reveal browser identity, automation, and privacy settings.
Vendor
Vendor Sub
Product Sub
App Code Name
App Name
App Version
Build ID (Firefox)
OS/CPU (Firefox)
WebDriver (Automation)
Global Privacy Control
window.chrome
Is Brave Browser
UA Client Hints
Online Status
CSS Feature Detection
Modern CSS features tested via CSS.supports(). Different browsers support different subsets.
Frequently Asked Questions
Learn more about browser fingerprinting, privacy risks, and how to protect yourself.
What is browser fingerprinting?
Browser fingerprinting is a tracking technique that collects dozens of technical attributes from your browser — screen resolution, installed fonts, GPU model, audio processing characteristics, and more — to create a unique identifier. Unlike cookies, this fingerprint persists even in private browsing mode and cannot be easily deleted because it is computed from your device's inherent properties rather than stored data.
Can a VPN protect me from browser fingerprinting?
A VPN hides your IP address and encrypts your traffic, but it does NOT prevent browser fingerprinting. Your canvas rendering, WebGL output, installed fonts, and hardware configuration remain identical with or without a VPN. A VPN is one important layer of privacy, but fingerprinting bypasses it entirely by relying on non-network signals that are unique to your device and browser.
How unique is my browser fingerprint?
Studies from the Electronic Frontier Foundation (EFF) show that browser fingerprints are unique for over 90% of users. The combination of your screen resolution, timezone, language, installed fonts, GPU renderer, and dozens of other signals creates a nearly unique identifier — even without cookies. On this tool, we analyze over 100 different signals to demonstrate just how identifiable your browser is.
Is browser fingerprinting legal?
Under GDPR (EU) and the ePrivacy Directive, fingerprinting for tracking purposes requires explicit user consent, just like cookies. In practice, many websites use fingerprinting without proper consent notices. The legal landscape varies by jurisdiction, but the global trend is toward stricter regulation of all tracking technologies, including fingerprinting.
How can I protect myself from browser fingerprinting?
Use a privacy-focused browser like Firefox with the resist fingerprinting (privacy.resistFingerprinting) option enabled, or use Tor Browser which normalizes most fingerprinting vectors. Browser extensions like uBlock Origin can block known fingerprinting scripts. Avoid installing unique fonts or plugins that increase your uniqueness. Keep in mind that no single measure provides complete protection — a combination of tools and practices is most effective.
What data does this tool collect?
This tool does not collect or store your fingerprint data. All fingerprint analysis runs locally in your browser using JavaScript. No fingerprint or personal information is ever sent to our servers or stored anywhere. The only server-side calls fetch your public IP address and HTTP headers for display purposes. Minimal server logs (IP, timestamp, user-agent) may be retained for up to 90 days for security and abuse prevention.
What is a canvas fingerprint?
A canvas fingerprint exploits the HTML5 Canvas API by drawing hidden text and shapes, then reading the pixel data back. Due to subtle differences in GPU hardware, graphics drivers, font rendering engines, and anti-aliasing implementations, the resulting image is slightly different on each device — creating a unique hash that can identify your browser without storing any data.
What is the difference between cookies and browser fingerprinting?
Cookies are small files stored on your device that you can see, block, or delete through your browser settings. Fingerprinting is invisible — it reads technical properties of your browser and hardware that you cannot easily change. Cookies require explicit storage on your device; fingerprinting is stateless and computed on each visit. Deleting cookies resets cookie-based tracking, but fingerprinting persists because it relies on your device's inherent characteristics.