magnifying-glassIP Checker

ProxyShard IP Checker - a free tool for checking your IP address, geolocation, browser data, and detecting WebRTC leaks.

circle-info

Main fields

My IP

Your current external IP address, which is visible to all websites. A country flag and a copy button are shown next to it. If the proxy is connected correctly, this should be the proxy server IP, not your real address.

Browser Score

A numerical indicator: how many anonymity issues were detected. The lower, the better. Click "View details"to see a full report for each parameter.


General IP Info

Provider

The name of the internet service provider (ISP) that your IP belongs to. For example: WYOCORE TECHNOLOGIES LLC. If you are using a proxy, this will be the proxy server provider.

WebRTC IP

triangle-exclamation

WebRTC is a browser protocol for peer-to-peer connections. It can reveal your real IP bypassing proxies and VPNs. The field shows the IP detected by WebRTC. If it differs from My IP, then there is a leak.

Status
What it means

WebRTC is leaked

Leak detected, real IP is visible

WebRTC is blocked

WebRTC is blocked, no leak

(field is empty)

WebRTC not detected, no leak

Fake ISP

Checks whether the provider is "fake." This is typical of some VPN services that mask their origin. No - the provider is real.

Host

Reverse DNS record for your IP (PTR record). Shows which domain name is linked to the address. N/A - no record (typical for proxies and data centers).

Anonymizer

Determines whether your IP belongs to a known anonymizing infrastructure: VPN, proxy, Tor. No means the IP is not listed in anonymizer databases.


Browser Status Report

Expanded by the button "View details". Shows the results of a detailed browser and network analysis, broken down by severity levels:

Level
What it means

Critical

Critical leak, real data is definitely exposed

High

Serious issue, high risk of de-anonymization

Medium

Medium risk, suspicious parameter

Low

Low risk, minor inconsistency

Info

Informational, does not affect anonymity

Checked parameters

ISP / Connection type

Determines the type of IP address: residential (home), datacenter/hosting (data center), mobile (mobile). Data center addresses are marked as mediumbecause they are easily identified by websites with strict anti-bot policies.

Example: ISP: IP 156.226.202.211 - datacenter/hosting (WYOCORE TECHNOLOGIES LLC), ASN AS214413

WebRTC Leak

Checks whether the browser reveals the real IP through the WebRTC API. If an IP different from the proxy is detected, the level is critical.

Timezone

Compares the browser time zone (Intl.DateTimeFormat) with the IP geolocation. If they do not match (for example, the IP is from Germany, but the browser shows UTC+3), this is a sign of proxy use.

Language

Checks navigator.language and navigator.languages of the browser. If the browser language (for example, ru-RU) does not match the IP country, anti-fraud systems will notice it.

Screen Resolution

Analyzes the screen resolution and aspect ratio. Non-standard values may indicate a virtual machine or headless browser.

Canvas Fingerprint

Draws a hidden element on the page and reads its pixel hash. Each device renders it slightly differently, which creates a unique fingerprint. A modified or empty Canvas is a sign of an anti-detect browser.

WebGL / GPU

Reads graphics card information through the WebGL API: RENDERER and VENDOR (for example, ANGLE (NVIDIA GeForce RTX...)). Reveals the real hardware and can help identify the device.

Audio Fingerprint

Generates an audio signal through AudioContext and reads its hash. Works on the same principle as Canvas: it provides a unique fingerprint for each device. Anti-detect browsers spoof this value.

Automation / WebDriver

Checks for signs of automation:

  • navigator.webdriver - this flag is set by Selenium, Puppeteer, Playwright

  • chrome.runtime and other CDP artifacts

  • Non-standard properties window

If detected, the level is high or critical.

Fonts

Determines the list of installed fonts through CSS and Canvas. The font set is unique to each OS and user, and is used for identification even when the IP changes.

Cookies / localStorage

Checks whether cookies and localStorage are enabled in the browser. Disabled storage is unusual behavior typical of special configurations.

Do Not Track (DNT)

Reads the value of the DNTheader. Not critical by itself, but it is part of the overall browser fingerprint.

Geolocation API

Checks whether navigator.geolocation is available and how it relates to IP geolocation. Permission to determine geolocation is not requested; the mere presence of the API is already informative.

Hardware Concurrency

navigator.hardwareConcurrency - the number of logical CPU cores. Non-standard values (for example, 1) are typical of virtual machines.

Device Memory

navigator.deviceMemory - amount of RAM in GB (rounded value). Together with hardwareConcurrency it helps identify a VM or headless environment.

Platform

navigator.platform - browser platform (Win32, MacIntel, Linux x86_64). If it does not match the User-Agent, this is a clear sign of data spoofing.

Ad Blocker

Detects the presence of an ad blocker (uBlock, AdGuard, etc.) by attempting to load known ad scripts. Included in the overall fingerprint profile.

Dark Mode

Reads prefers-color-scheme - the OS dark or light theme. A small but stable fingerprint parameter.

Touch / Pointer

Checks navigator.maxTouchPoints and pointer type (mouse, touch, pen). If the User-Agent says it's a mobile device, but no touchscreen is detected, this is a sign of emulation.


How to read the result

circle-check
circle-exclamation
triangle-exclamation

Last updated

Was this helpful?