# IP Checker

<mark style="color:purple;">ProxyShard IP Checker</mark> - a free tool for checking your IP address, geolocation, browser data, and detecting WebRTC leaks, as well as a unique profile quality score!

{% embed url="<https://proxyshard.com/ip-checker>" %}

<figure><img src="https://3044836706-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F3l0uO4OV4DD1gK4uKGC6%2Fuploads%2Fgit-blob-053cb0c08413e0222863b383de98ca187daa348c%2Fimage.png?alt=media" alt="" width="563"><figcaption></figcaption></figure>

***

## Main fields

### My IP

Your current public IP address, visible to all websites. The country flag and a copy button are shown next to it. If the proxy is connected correctly, this should be the <mark style="color:purple;">proxy server IP</mark>, not your real address.

### Browser Score

A numeric indicator: how many anonymity issues were detected. **The lower, the better.**&#x20;

{% hint style="info" %}
Click **"View details"**&#x74;o see a full report for each parameter.
{% endhint %}

***

## General IP Info

### Provider

The name of the internet service provider (ISP) that your IP belongs to. For example: `WYOCORE TECHNOLOGIES LLC`. If you are using a proxy, this will show the proxy server provider.

### WebRTC IP

{% hint style="danger" %}
The most important field. If it shows **"WebRTC is leaked"**, your real IP is visible to websites while the proxy is active. More details: [How WebRTC leakage works](https://docs.proxyshard.com/eng/our-products/about-udp/how-webrtc-leak-works)
{% endhint %}

<mark style="color:purple;">WebRTC</mark> - a browser protocol for P2P connections. It can reveal the real IP bypassing proxies and VPNs. The field shows the IP detected by <mark style="color:purple;">WebRTC</mark>. If it differs from **My IP**, then a leak is present.

| Status              | What it means                     |
| ------------------- | --------------------------------- |
| `WebRTC is leaked`  | Leak detected, real IP is visible |
| `WebRTC is blocked` | WebRTC is blocked, no leak        |
| *(empty field)*     | WebRTC not detected, no leak      |

{% hint style="warning" %}
Under normal circumstances, <mark style="color:purple;">WebRTC</mark> should display the proxy’s IP address
{% endhint %}

### Fake ISP

Checks whether the provider is "fake". This is typical for some VPN services that mask their origin. `No` - the provider is real.

### Host

Reverse DNS record for your IP (PTR record). Shows which domain name is linked to the address.

### Anonymizer

Determines whether your IP belongs to a known anonymizing infrastructure: VPN, proxy, Tor. `No` means that the IP is not listed in anonymizer databases.

***

## Browser Status Report

Opened via the **"View details"**&#x62;utton. Shows the results of a detailed browser and network analysis, broken down by criticality levels:

| Level        | What it means                                  |
| ------------ | ---------------------------------------------- |
| **Critical** | Critical leak, real data is definitely exposed |
| **High**     | Serious issue, high risk of de-anonymization   |
| **Medium**   | Medium risk, suspicious parameter              |
| **Low**      | Low risk, minor mismatch                       |
| **Info**     | Informational, does not affect anonymity       |

### Checked parameters

#### ISP / Connection type

Determines the type of IP address: `residential` (home), `datacenter/hosting` (data center), `mobile` (mobile). Data center addresses are marked as `medium`, because they are easily detected by websites with strict anti-bot policies.

> Example: `ISP: IP 156.226.202.211 - datacenter/hosting (WYOCORE TECHNOLOGIES LLC), ASN AS214413`

{% hint style="info" %}

#### This is typical for a datacenter proxy; if you have an ISP/Residential/Mobile proxy, this parameter should not show anything related to a datacenter here

{% endhint %}

#### WebRTC Leak

Checks whether the browser reveals the real IP through <mark style="color:purple;">WebRTC</mark> API. If an IP different from the proxy is detected, the level is `critical`.

#### Timezone

Compares the browser time zone (`Intl.DateTimeFormat`) with the IP geolocation. If they do not match (for example, the IP is from Germany, but the browser shows UTC+3), this is a sign of proxy use.

#### Language

Checks the browser's `navigator.language` and `navigator.languages` . If the browser language (for example, `ru-RU`) does not match the IP country, anti-fraud systems will notice it.

#### Screen Resolution

Analyzes the screen resolution and aspect ratio. Non-standard values may indicate a virtual machine or a headless browser.

#### Canvas Fingerprint

Draws a hidden element on the page and reads its pixel hash. Each device renders it slightly differently, which gives a unique fingerprint. A modified or empty Canvas is a sign of an anti-detect browser.

#### WebGL / GPU

Reads graphics card information through the WebGL API: `RENDERER` and `VENDOR` (for example, `ANGLE (NVIDIA GeForce RTX...)`). Reveals real hardware and can help identify the device.

#### Audio Fingerprint

Generates an audio signal through `AudioContext` and reads its hash. Works on the same principle as Canvas: gives a unique fingerprint for each device. Anti-detect browsers spoof this value.

#### Automation / WebDriver

Checks for signs of automation:

* `navigator.webdriver` - this flag is set by Selenium, Puppeteer, Playwright
* `chrome.runtime` and other CDP artifacts
* Non-standard properties `window`

If detected, the level is `high` or `critical`.

#### Fonts

Determines the list of installed fonts via CSS and Canvas. The font set is unique to each OS and user, and is used for identification even when the IP changes.

#### Cookies / localStorage

Checks whether cookies and `localStorage` are enabled in the browser. Disabled storage is atypical behavior, characteristic of special configurations.

#### Do Not Track (DNT)

Reads the value of the `DNT`header. Not critical by itself, but part of the overall browser fingerprint.

#### Geolocation API

Checks whether `navigator.geolocation` is available and how it relates to IP geolocation. Location permission is not requested; the mere presence of the API is already informative.

#### Hardware Concurrency

`navigator.hardwareConcurrency` - the number of logical CPU cores. Non-standard values (for example, `1`) are typical for virtual machines.

#### Device Memory

`navigator.deviceMemory` - the amount of RAM in GB (rounded value). Together with `hardwareConcurrency` it helps identify a VM or headless environment.

#### Platform

`navigator.platform` - the browser platform (`Win32`, `MacIntel`, `Linux x86_64`). If it does not match the User-Agent, this is a clear sign of data spoofing.

#### Ad Blocker

Detects the presence of an ad blocker (uBlock, AdGuard, etc.) by attempting to load known ad scripts. Part of the overall fingerprint profile.

#### Dark Mode

Reads `prefers-color-scheme` - the OS dark or light theme. A small but stable fingerprint parameter.

#### Touch / Pointer

Checks the browser's `navigator.maxTouchPoints` and pointer type (`mouse`, `touch`, `pen`). If the User-Agent says it is a mobile device, but no touchscreen is detected, this is a sign of emulation.

***

## How to read the result

{% hint style="success" %}
**Everything is fine:** My IP = proxy IP, WebRTC not detected or blocked, Browser Score = 0, ISP type = `residential`.
{% endhint %}

{% hint style="warning" %}
**Normal for datacenter / ISP proxy:** ISP type = `datacenter/hosting`. This is expected and is not a problem for most tasks.
{% endhint %}

{% hint style="danger" %}
**Problem:** If WebRTC shows an IP different from the proxy, you need to fix the leak immediately.&#x20;

We strongly recommend that everyone use a very universal method for any tasks\
ISP proxy + a good anti-detect browser, setup example on [Vison](https://docs.proxyshard.com/eng/usage-instructions/antidetect-browsers/vision-browser)
{% endhint %}
