Network
| IP Address | 216.73.216.168 |
| Protocol | HTTPS HTTP/2.0 |
| Proxy / VPN | ⚠ Detected |
| Datacenter IP | ⚠ Detected |
| Mobile Carrier | No |
| Remote Port | 1780 |
Geolocation
| Country | United States (US) |
| Region | Ohio |
| City | Columbus |
| Postal Code | 43215 |
| Timezone | America/New_York |
| Coordinates | 39.9625, -83.0061 |
Provider / ASN
| ISP | Amazon.com |
| Organization | Anthropic, PBC |
| ASN | AS16509 Amazon.com, Inc. |
| AS Name | AMAZON-02 |
Checks for WebDriver, headless browsers, automation frameworks (Selenium, Puppeteer, Playwright, etc.), and tampered browser APIs. These are the primary signals used by bank fraud teams.
22-vector detection: prototype getter bypass, cross-frame navigator mismatch, canvas/audio noise injection, userAgentData vs UA version, WebGL renderer cross-check, Date.now() / performance.timeOrigin clock desync, Intl locale desync, enumerable navigator properties, speechSynthesis absence, hollow window.chrome, and more. Detects Octo Browser, Linken Sphere, Dolphin Anty, MultiLogin, GoLogin, AdsPower, Kameleo, and generic anti-detect profiles.
Canvas, WebGL, and Audio fingerprints are used to create a persistent unique device identifier, even across incognito sessions. VM and software-rendered GPUs are detected here.
Canvas & Audio
| Canvas Hash | computing… |
| Audio Hash | computing… |
| Font Metric Hash | computing… |
| Canvas API | — |
GPU / WebGL
| Renderer | computing… |
| Vendor | computing… |
| Extensions | — loaded |
WebGL Deep Fingerprint
| Param Hash | — |
| Max Texture Size | — |
Camera / Media
| Video Inputs | — |
| Virtual Camera | — |
Enumerates media devices to detect virtual cameras (OBS, Snap Camera, ManyCam, iVCam, XSplit, DroidCam, mmhmm, Camo, etc.) used to bypass liveness checks and video KYC verification.
WebRTC STUN leak detection reveals real IP addresses even through VPN tunnels. All major fintech security teams run WebRTC leak tests.
The IP address may be flagged as VPN, or you may genuinely be using one. Errors can also indicate port overriding or misconfigured routing on your network.
WebRTC IP Leak Test
| Leak Status | Testing… |
| All IPs Found | — |
| Local (LAN) IPs | — |
| Public IPs | — |
| Server-side IP | 216.73.216.168 |
UDP Analysis
| UDP Status | Testing… |
| STUN UDP Reachable | — |
| UDP Candidates | — |
| TCP Candidates | — |
| Candidate Types | — |
| UDP Ports Exposed | — |
| Host Candidates | — |
| Srflx (NAT) | — |
| Relay (TURN) | — |
| IPv6 UDP | — |
| Port Range | — |
Protocol
| Page Protocol | Testing… |
| Probe Protocol | — |
| HTTP/2 | — |
| H2 Multiplexing | — |
| HTTP/3 / QUIC | — |
| HTTP/3 Support | — |
| H3 Advertised | — |
| Alt-Svc Header | — |
| QUIC over UDP | — |
| Server Protocol | HTTP/2.0 |
Connection
| Effective Type | — |
| Downlink | — |
| RTT | — |
| Data Saver | — |
Probes 10 unique subdomains to identify which DNS resolvers handle your traffic. If your DNS exits through a VPN provider or a different country than your IP — it's a strong VPN indicator used by all tier-1 fraud systems.
An error typically means the detected DNS belongs to a different country, is not provided by your ISP, or does not match your IP geolocation — common signs of a VPN or proxy.
Testing DNS…
Scans 30 commonly exploited ports (SSH, RDP, databases, VNC, etc). Open ports on a consumer device are a critical security red flag. Banks use this to detect exposed APIs, databases, or remote access services.
Open Ports
| Ports Opened | Testing… |
| Open Ports List | — |
| Status | — |
| Method | Server-side fsockopen probe |
Risk Indicators
- ✓ 0 ports — Properly firewalled
- ⚠ 1-2 ports — Standard services (HTTP/HTTPS)
- ✗ 3+ ports — Multiple services exposed
- ✗ SSH/RDP open — Critical: brute-force vector
- ✗ DB ports open — Critical: data breach risk
Reads the effective MTU from the server's active network interfaces (via PowerShell on Windows, ip link on Linux). A VPN virtual adapter reports its own reduced MTU — if VPN routes internet traffic, the VPN adapter's MTU is the effective ceiling for the connection.
Probe Result
| Effective MTU | Testing… |
| Classification | — |
| Method | Server-side interface query (PowerShell / ip link) |
MTU Reference
| 1500 | Standard Ethernet / WiFi | ✓ |
| 1492 | PPPoE / DSL broadband | ✓ |
| 1420 | WireGuard VPN | ⚠ |
| 1400 | OpenVPN UDP | ⚠ |
| 1360 | L2TP / IPSec | ✗ |
| 1280 | Proxy-over-VPN / WARP | ✗ |
requestAnimationFrame (rAF) timing reveals whether a real display is driving the browser. Headless environments produce near-zero or perfectly uniform frame intervals — statistically impossible on real hardware.
rAF Frame Timing
| Median Interval | — |
| Jitter (σ) | — |
| Frames Sampled | — |
Real 60 Hz display: ~16.6 ms median, 1–4 ms jitter. Headless: near-zero or perfectly flat.
CSS media queries expose pointer type, hover capability, color gamut, and update speed. Contradictions between these values and the User-Agent string expose UA spoofing.
Input & Interaction
| Pointer Type | — |
| Hover Capable | — |
| Update Speed | — |
Color & Display
| Color Gamut | — |
| HDR Support | — |
| Color Scheme | — |
| Orientation | — |
The Network Information API reports connection type, speed, and latency as seen by the OS — not the VPN. High RTT on a "4G" connection is a classic VPN proxy-chain artifact.
Connection Metrics
| Effective Type | — |
| Downlink | — |
| RTT | — |
| Data Saver | — |
| Interface Type | — |
Real mobile devices continuously stream accelerometer and gyroscope data via DeviceMotion events. Absence of motion data on a mobile UA is a strong emulator indicator.
Motion Sensors
| DeviceMotion API | — |
| DeviceOrientation API | — |
| Motion Events | — |
Desktop browsers always show N/A. Only runs on mobile User-Agent strings.
Hardware metrics like CPU core count, RAM, and screen dimensions help detect virtual machines and devices inconsistent with their claimed User-Agent.
CPU & Memory
| CPU Cores | — |
| Device Memory | — |
| Platform | — |
| Battery | — |
Display
| Screen | — |
| Available | — |
| Color Depth | — |
| Pixel Ratio | — |
Input
| Pointer Type | — |
| Touch Points | — |
| Plugins | — |
Cross-reference checks between browser-declared parameters. Timezone/IP mismatch is the strongest single signal of VPN use — all tier-1 banks flag it.
Identity Checks
| JS Timezone | — |
| IP Timezone | America/New_York |
| Browser Lang | — |
| IP Country | US |
| UA Browser | Unknown |
| UA OS | Unknown |
| Reported Device | Desktop |
| Keyboard Layout | — |
HTTP Headers
| Accept | */* |
| Accept-Language | — |
| Sec-CH-UA | — |
| Sec-CH-UA-Platform | — |
| Sec-CH-UA-Mobile | — |
Incognito mode, disabled cookies, ad blockers, and storage restrictions are used to evade device fingerprinting systems deployed by banks and payment processors.
Storage & Cookies
| Cookies | — |
| localStorage | — |
| Session Mode | — |
| Ad Blocker | — |
| Do Not Track | — |
| Service Worker | — |
Permissions
| Notifications | — |
| Camera | — |
| Microphone | — |
| Geolocation | — |
Bot traffic has no mouse movement, scrolling, or human interaction patterns. Banks' behavioral biometrics engines analyze interaction cadence, typing rhythm, cursor entropy, and velocity patterns.
No interaction — likely bot
Interact with the page to update
Move mouse
Scroll down
Click anywhere
Biometric Analysis
Results appear after sufficient interaction.
Session depth and navigation context reveal whether a browser is driven by automation or a real user. Banks analyze paint timings, history depth, and resource load patterns as primary bot-detection signals.
Session Context
| History Depth | — |
| Referrer Present | — |
| First Contentful Paint | — |
| Resource Timeline | — |
| PDF Viewer | — |
| Screen Extended | — |
| Scrollbar Width | — |
Video and audio codec support is a unique browser fingerprint. Missing H.264 or VP9 indicates a headless build or VM. AudioContext sample rate (44.1 kHz / 48 kHz) and base latency reveal whether real audio hardware is present.
Video Codecs
| H.264 (AVC) | — |
| VP9 | — |
| AV1 | — |
| HEVC / H.265 | — |
AudioContext
| Sample Rate | — |
| Base Latency | — |
Browser storage quota is allocated from available disk space (~60% in Chrome). A quota above 50 GB is typical of a VPS or VM with large disk allocation — not a consumer laptop or smartphone.
Storage Quota
| Quota | — |
| Current Usage | — |
| Persistent Storage | — |
All detected signals sorted by severity. Each entry includes the reason it matters to financial institutions or anti-fraud systems.
Waiting for all checks to complete…
Step-by-step remediation for every flagged signal, sorted by priority. Follow these to improve your trust score with financial platforms and anti-fraud systems.
Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
| Browser | Unknown |
| Engine | WebKit 537.36 |
| OS | Unknown |
| Device | Desktop |
| Bot detected | ⚠ Yes — Crawler UA: Bot |