Browser Fingerprint Test
Your browser silently reveals dozens of data points that websites can combine into a unique identifier - Without setting a single cookie. This test shows exactly what is exposed and how unique your fingerprint likely is. No data is stored or transmitted.
216.73.217.61
⚠ No VPN DetectedServer-Side Detection (what the server sees)
| IP Address | 216.73.217.61 |
|---|---|
| Country | United States |
| City | Columbus |
| ISP | Amazon.com |
| VPN / Proxy | ⚠ Not detected |
| Tor Exit Node | No |
| Hosting / Datacenter | Yes |
| Browser Family | ClaudeBot |
|---|---|
| Browser Version | 1.0 |
| OS | Other |
| Device Type | Desktop |
| Latitude / Longitude | 39.9625, -83.0061 |
ⓘ Server-side data is derived from your IP address and the User-Agent header your browser sends. This data is visible to every website you visit, regardless of incognito mode.
Client-Side Browser Fingerprint
The data below is collected entirely in your browser using JavaScript - No request is made to our server. This is the same type of data fingerprinting scripts on commercial websites collect about you.
| Property | Value | Privacy Impact |
|---|---|---|
| ◠ Collecting browser fingerprint data… | ||
ⓘ All data is computed locally in your browser. Nothing is sent to or stored by WhatsMyIP.now. Refresh the page to rerun the test.
What Is Browser Fingerprinting?
Browser fingerprinting is a tracking technique that collects technical attributes from your browser and device - Canvas rendering, installed fonts, screen resolution, WebGL renderer, timezone, language, CPU core count, and more. Individually each attribute is unremarkable, but combined they form a profile that is statistically unique for the majority of users.
Unlike cookies, fingerprints:
- Cannot be deleted - Clearing cookies does not change your canvas hash or WebGL renderer
- Persist across private/incognito windows - Your hardware does not change
- Work across different browsers on the same device if hardware attributes are shared
- Do not require any storage permission on your device
How Fingerprinting Is Used
| Use Case | Who Uses It | Impact on You |
|---|---|---|
| Cross-site tracking | Advertising networks (Google, Meta, trade desk) | Your activity is linked across every site that loads their script |
| Fraud detection | Banks, payment processors, e-commerce | Legitimate use - Detects account takeovers and carding fraud |
| Bot detection | Cloudflare, Akamai, reCAPTCHA | Distinguishes real users from automated scripts |
| Re-identification after VPN | Advertisers, state actors | Even with a different IP, the fingerprint links sessions back to you |
| Paywalls and geo-blocks | News sites, streaming services | Enforces article limits even after clearing cookies |
How to Reduce Your Fingerprint
| Browser / Method | Canvas Protection | WebGL Protection | Font Enumeration | JS API Noise | Verdict |
|---|---|---|---|---|---|
| Regular Chrome / Edge | None | None | Exposed | None | Fully fingerprintable |
| Firefox (default) | Partial | Partial | Limited | None | Better than Chromium, not sufficient |
| Firefox + privacy.resistFingerprinting | ✓ Randomised | ✓ Spoofed | ✓ Blocked | ✓ Normalised | Strong - May break some sites |
| Brave Browser | ✓ Randomised | ✓ Randomised | ✓ Blocked | ✓ Noised | Strong - Good everyday usability |
| Tor Browser | ✓ Uniform | ✓ Uniform | ✓ Uniform | ✓ Uniform | Best - All users appear identical; very slow |
Practical Steps to Protect Yourself
- Switch to Brave or Firefox: Both offer built-in fingerprint randomisation. Firefox's
privacy.resistFingerprintingflag (about:config) is the strongest option while maintaining good usability. - Use a VPN: Hides your IP so your fingerprint cannot be trivially linked to a specific ISP subscriber. Our Best VPNs guide covers audited, no-logs options. Test it with our VPN Leak Test.
- Disable WebGL or use a spoofer: WebGL renderer and vendor are highly unique - Brave randomises these per session.
- Block JavaScript trackers: uBlock Origin in medium mode blocks most fingerprinting scripts before they run.
- Standardise your window size: A maximised browser window at an unusual resolution is distinctive. Tor Browser uses a fixed 1000×800 window for all users.
- Use Tor Browser for sensitive sessions: The strongest protection - All users appear identical. Pair it with our Proxy Check to verify Tor is routing correctly.