Live Scan Active |

YOU ARE EXPOSED

Everything a website — or attacker — can learn about you right now

0
Exposure
⚠️
This is not theoretical. Every data point below is collected by default when you visit any website — with zero consent prompts. Bad actors, ad networks, and trackers use this data to build profiles, bypass VPNs, serve targeted content, and de-anonymize users.
🌐
Network Identity
High Risk
IP Address
scanning…
City
scanning…
Region
scanning…
Country
scanning…
ISP / Org
scanning…
Postal Code
scanning…
Lat / Long
scanning…
ASN
scanning…
Identifiability
🖥️
Browser & System
Medium Risk
Browser
Version
OS
Device
Engine
Architecture
Platform
Do Not Track
Java Enabled
📺
Display & Graphics
Fingerprint
Resolution
Available
Pixel Ratio
Color Depth
GPU (Renderer)
GPU Vendor
WebGL Version
Max Texture
Orientation
⚙️
Hardware Signals
Medium Risk
CPU Cores
RAM (approx)
Touch Points
Pointers
Battery
Charging
Connection
Bandwidth
Data Saver
🕐
Locale & Time
Traceable
Timezone
UTC Offset
Language
All Languages
Date Format
Num. Format
Currency
Week Start
🔒
Privacy & Features
Feature Detection
Cookies
LocalStorage
SessionStorage
IndexedDB
Service Worker
WebRTC
WebAssembly
Notifications
Clipboard API
Ad Blocker
🔤
Installed Fonts
Fingerprint

Sites can probe which fonts are installed on your device by measuring text rendering. Unique combinations identify you.

Detected
scanning…
🍪
Cookies & Storage
Tracking
🧬
Browser Fingerprint
Unique ID

Your fingerprint is a hash derived from all the above signals. Sites use this to re-identify you across sessions — even without cookies or a login. Canvas rendering, WebGL output, audio processing, and font metrics each contribute unique bits of entropy.

Your Fingerprint Hash
Computing…
Canvas fingerprint (what sites render invisibly)
Entropy by Signal
📊
Exposure Risk Breakdown
Summary