INK LAB INK LAB STUDIO

Running fraud checks…

Fraud & Integrity Analyzer v0.5 FREE

60+ signals · IP reputation · Browser fingerprint · Behavioral analysis · WebRTC leak · AML/KYC risk indicators

Overall Risk Score
/100
Analyzing…
US 216.73.216.168 VPN/PROXY DATACENTER
Columbus, Ohio, United States
Amazon.com · AS16509 Amazon.com, Inc.
HTTPS · HTTP/2.0 Unknown Unknown America/New_York
DNS Resolvers
IP / Network Server-side signals
Browser / Device Client-side signals
IP Risk
63/100
Browser
/100
Category Overview
Analyzing…

IP Intelligence

Network

IP Address216.73.216.168
ProtocolHTTPS HTTP/2.0
Proxy / VPN⚠ Detected
Datacenter IP⚠ Detected
Mobile CarrierNo
Remote Port22303

Geolocation

CountryUnited States (US)
RegionOhio
CityColumbus
Postal Code43215
TimezoneAmerica/New_York
Coordinates39.9625, -83.0061

Provider / ASN

ISPAmazon.com
OrganizationAnthropic, PBC
ASNAS16509 Amazon.com, Inc.
AS NameAMAZON-02
Checking…

Automation & Bot Detection

Checks for WebDriver, headless browsers, automation frameworks (Selenium, Puppeteer, Playwright, etc.), and tampered browser APIs. These are the primary signals used by bank fraud teams.

Scanning…

Anti-Detect Browser

22-vector detection: prototype getter bypass, cross-frame navigator mismatch, canvas/audio noise injection, userAgentData vs UA version, WebGL renderer cross-check, Date.now() / performance.timeOrigin clock desync, Intl locale desync, enumerable navigator properties, speechSynthesis absence, hollow window.chrome, and more. Detects Octo Browser, Linken Sphere, Dolphin Anty, MultiLogin, GoLogin, AdsPower, Kameleo, and generic anti-detect profiles.

Scanning…

Browser Fingerprint

Canvas, WebGL, and Audio fingerprints are used to create a persistent unique device identifier, even across incognito sessions. VM and software-rendered GPUs are detected here.

Canvas & Audio

Canvas Hashcomputing…
Audio Hashcomputing…
Font Metric Hashcomputing…
Canvas API

GPU / WebGL

Renderercomputing…
Vendorcomputing…
Extensions loaded

WebGL Deep Fingerprint

Param Hash
Max Texture Size

Fonts

Detected
Sample

Camera / Media

Video Inputs
Virtual Camera
Analyzing…

Camera & Media Spoofing

Enumerates media devices to detect virtual cameras (OBS, Snap Camera, ManyCam, iVCam, XSplit, DroidCam, mmhmm, Camo, etc.) used to bypass liveness checks and video KYC verification.

Checking…

Network Analysis

WebRTC STUN leak detection reveals real IP addresses even through VPN tunnels. All major fintech security teams run WebRTC leak tests.

The IP address may be flagged as VPN, or you may genuinely be using one. Errors can also indicate port overriding or misconfigured routing on your network.

WebRTC IP Leak Test

Leak StatusTesting…
All IPs Found
Local (LAN) IPs
Public IPs
Server-side IP216.73.216.168

UDP Analysis

UDP StatusTesting…
STUN UDP Reachable
UDP Candidates
TCP Candidates
Candidate Types
UDP Ports Exposed
Host Candidates
Srflx (NAT)
Relay (TURN)
IPv6 UDP
Port Range

Protocol

Page ProtocolTesting…
Probe Protocol
HTTP/2
H2 Multiplexing
HTTP/3 / QUIC
HTTP/3 Support
H3 Advertised
Alt-Svc Header
QUIC over UDP
Server ProtocolHTTP/2.0

Connection

Effective Type
Downlink
RTT
Data Saver
Scanning…

DNS Leak Test

Probes 10 unique subdomains to identify which DNS resolvers handle your traffic. If your DNS exits through a VPN provider or a different country than your IP — it's a strong VPN indicator used by all tier-1 fraud systems.

An error typically means the detected DNS belongs to a different country, is not provided by your ISP, or does not match your IP geolocation — common signs of a VPN or proxy.
Testing DNS…
Analyzing DNS resolvers…

Ports Opened

Scans 30 commonly exploited ports (SSH, RDP, databases, VNC, etc). Open ports on a consumer device are a critical security red flag. Banks use this to detect exposed APIs, databases, or remote access services.

Open Ports

Ports OpenedTesting…
Open Ports List
Status
MethodServer-side fsockopen probe

Risk Indicators

  • ✓ 0 ports — Properly firewalled
  • ⚠ 1-2 ports — Standard services (HTTP/HTTPS)
  • ✗ 3+ ports — Multiple services exposed
  • ✗ SSH/RDP open — Critical: brute-force vector
  • ✗ DB ports open — Critical: data breach risk
Scanning open ports…

MTU / Path Analysis

Reads the effective MTU from the server's active network interfaces (via PowerShell on Windows, ip link on Linux). A VPN virtual adapter reports its own reduced MTU — if VPN routes internet traffic, the VPN adapter's MTU is the effective ceiling for the connection.

Probe Result

Effective MTUTesting…
Classification
MethodServer-side interface query (PowerShell / ip link)
1280 1340 1380 1420 1492

MTU Reference

1500Standard Ethernet / WiFi
1492PPPoE / DSL broadband
1420WireGuard VPN
1400OpenVPN UDP
1360L2TP / IPSec
1280Proxy-over-VPN / WARP
Probing MTU…

Performance & rAF Timing

requestAnimationFrame (rAF) timing reveals whether a real display is driving the browser. Headless environments produce near-zero or perfectly uniform frame intervals — statistically impossible on real hardware.

rAF Frame Timing

Median Interval
Jitter (σ)
Frames Sampled

Real 60 Hz display: ~16.6 ms median, 1–4 ms jitter. Headless: near-zero or perfectly flat.

Measuring rAF…

CSS & Display Profile

CSS media queries expose pointer type, hover capability, color gamut, and update speed. Contradictions between these values and the User-Agent string expose UA spoofing.

Input & Interaction

Pointer Type
Hover Capable
Update Speed

Color & Display

Color Gamut
HDR Support
Color Scheme
Orientation
Reading media queries…

Network Connection Profile

The Network Information API reports connection type, speed, and latency as seen by the OS — not the VPN. High RTT on a "4G" connection is a classic VPN proxy-chain artifact.

Connection Metrics

Effective Type
Downlink
RTT
Data Saver
Interface Type
Reading network info…

Hardware Sensors

Real mobile devices continuously stream accelerometer and gyroscope data via DeviceMotion events. Absence of motion data on a mobile UA is a strong emulator indicator.

Motion Sensors

DeviceMotion API
DeviceOrientation API
Motion Events

Desktop browsers always show N/A. Only runs on mobile User-Agent strings.

Checking sensors…

Hardware Profile

Hardware metrics like CPU core count, RAM, and screen dimensions help detect virtual machines and devices inconsistent with their claimed User-Agent.

CPU & Memory

CPU Cores
Device Memory
Platform
Battery

Display

Screen
Available
Color Depth
Pixel Ratio

Input

Pointer Type
Touch Points
Plugins
Analyzing…

Consistency Matrix

Cross-reference checks between browser-declared parameters. Timezone/IP mismatch is the strongest single signal of VPN use — all tier-1 banks flag it.

Identity Checks

JS Timezone
IP TimezoneAmerica/New_York
Browser Lang
IP CountryUS
UA BrowserUnknown
UA OSUnknown
Reported DeviceDesktop
Keyboard Layout

HTTP Headers

Accept*/*
Accept-Language
Sec-CH-UA
Sec-CH-UA-Platform
Sec-CH-UA-Mobile
Checking…

Privacy & Anonymization

Incognito mode, disabled cookies, ad blockers, and storage restrictions are used to evade device fingerprinting systems deployed by banks and payment processors.

Storage & Cookies

Cookies
localStorage
Session Mode
Ad Blocker
Do Not Track
Service Worker

Permissions

Notifications
Camera
Microphone
Geolocation
Checking…

Behavioral Analysis

Bot traffic has no mouse movement, scrolling, or human interaction patterns. Banks' behavioral biometrics engines analyze interaction cadence, typing rhythm, cursor entropy, and velocity patterns.

No interaction — likely bot
Interact with the page to update
Move mouse
Scroll down
Click anywhere

Biometric Analysis

Results appear after sufficient interaction.

Navigation & Session Intelligence

Session depth and navigation context reveal whether a browser is driven by automation or a real user. Banks analyze paint timings, history depth, and resource load patterns as primary bot-detection signals.

Session Context

History Depth
Referrer Present
First Contentful Paint
Resource Timeline
PDF Viewer
Screen Extended
Scrollbar Width
Analyzing…

Media Codec Fingerprint

Video and audio codec support is a unique browser fingerprint. Missing H.264 or VP9 indicates a headless build or VM. AudioContext sample rate (44.1 kHz / 48 kHz) and base latency reveal whether real audio hardware is present.

Video Codecs

H.264 (AVC)
VP9
AV1
HEVC / H.265

AudioContext

Sample Rate
Base Latency
Analyzing…

Storage & Device Profile

Browser storage quota is allocated from available disk space (~60% in Chrome). A quota above 50 GB is typical of a VPS or VM with large disk allocation — not a consumer laptop or smartphone.

Storage Quota

Quota
Current Usage
Persistent Storage
Analyzing…

Complete Signal Report

All detected signals sorted by severity. Each entry includes the reason it matters to financial institutions or anti-fraud systems.

Waiting for all checks to complete…

How to Fix Detected Issues

Step-by-step remediation for every flagged signal, sorted by priority. Follow these to improve your trust score with financial platforms and anti-fraud systems.

Waiting for analysis…

Raw HTTP Request Headers

Accept */*
Accept-Encoding gzip, br, zstd, deflate
Content-Length
Content-Type
Cookie PHPSESSID=dldcb81sald4ubkv0mjlcgt28l
Host inklab.ink
Referer https://inklab.ink/checksystem.php
User-Agent Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)

User-Agent String

Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
BrowserUnknown
EngineWebKit 537.36
OSUnknown
DeviceDesktop
Bot detected⚠ Yes — Crawler UA: Bot

This is a free version of the checker that briefly shows problems with your system. For a detailed analysis, you can purchase the PRO version.

Get PRO Version