IP Checker
ProxyShard IP Checker - a free tool for checking your IP address, geolocation, browser data, and detecting WebRTC leaks.
Open the tool: proxyshard.com/ip-checker
Main fields
My IP
Your current external IP address, which is visible to all websites. A country flag and a copy button are shown next to it. If the proxy is connected correctly, this should be the proxy server IP, not your real address.
Browser Score
A numerical indicator: how many anonymity issues were detected. The lower, the better. Click "View details"to see a full report for each parameter.
General IP Info
Provider
The name of the internet service provider (ISP) that your IP belongs to. For example: WYOCORE TECHNOLOGIES LLC. If you are using a proxy, this will be the proxy server provider.
WebRTC IP
The most important field. If it shows "WebRTC is leaked"your real IP is visible to websites even when a proxy is active. More details: How WebRTC leaks work
WebRTC is a browser protocol for peer-to-peer connections. It can reveal your real IP bypassing proxies and VPNs. The field shows the IP detected by WebRTC. If it differs from My IP, then there is a leak.
WebRTC is leaked
Leak detected, real IP is visible
WebRTC is blocked
WebRTC is blocked, no leak
(field is empty)
WebRTC not detected, no leak
Fake ISP
Checks whether the provider is "fake." This is typical of some VPN services that mask their origin. No - the provider is real.
Host
Reverse DNS record for your IP (PTR record). Shows which domain name is linked to the address. N/A - no record (typical for proxies and data centers).
Anonymizer
Determines whether your IP belongs to a known anonymizing infrastructure: VPN, proxy, Tor. No means the IP is not listed in anonymizer databases.
Browser Status Report
Expanded by the button "View details". Shows the results of a detailed browser and network analysis, broken down by severity levels:
Critical
Critical leak, real data is definitely exposed
High
Serious issue, high risk of de-anonymization
Medium
Medium risk, suspicious parameter
Low
Low risk, minor inconsistency
Info
Informational, does not affect anonymity
Checked parameters
ISP / Connection type
Determines the type of IP address: residential (home), datacenter/hosting (data center), mobile (mobile). Data center addresses are marked as mediumbecause they are easily identified by websites with strict anti-bot policies.
Example:
ISP: IP 156.226.202.211 - datacenter/hosting (WYOCORE TECHNOLOGIES LLC), ASN AS214413
WebRTC Leak
Checks whether the browser reveals the real IP through the WebRTC API. If an IP different from the proxy is detected, the level is critical.
Timezone
Compares the browser time zone (Intl.DateTimeFormat) with the IP geolocation. If they do not match (for example, the IP is from Germany, but the browser shows UTC+3), this is a sign of proxy use.
Language
Checks navigator.language and navigator.languages of the browser. If the browser language (for example, ru-RU) does not match the IP country, anti-fraud systems will notice it.
Screen Resolution
Analyzes the screen resolution and aspect ratio. Non-standard values may indicate a virtual machine or headless browser.
Canvas Fingerprint
Draws a hidden element on the page and reads its pixel hash. Each device renders it slightly differently, which creates a unique fingerprint. A modified or empty Canvas is a sign of an anti-detect browser.
WebGL / GPU
Reads graphics card information through the WebGL API: RENDERER and VENDOR (for example, ANGLE (NVIDIA GeForce RTX...)). Reveals the real hardware and can help identify the device.
Audio Fingerprint
Generates an audio signal through AudioContext and reads its hash. Works on the same principle as Canvas: it provides a unique fingerprint for each device. Anti-detect browsers spoof this value.
Automation / WebDriver
Checks for signs of automation:
navigator.webdriver- this flag is set by Selenium, Puppeteer, Playwrightchrome.runtimeand other CDP artifactsNon-standard properties
window
If detected, the level is high or critical.
Fonts
Determines the list of installed fonts through CSS and Canvas. The font set is unique to each OS and user, and is used for identification even when the IP changes.
Cookies / localStorage
Checks whether cookies and localStorage are enabled in the browser. Disabled storage is unusual behavior typical of special configurations.
Do Not Track (DNT)
Reads the value of the DNTheader. Not critical by itself, but it is part of the overall browser fingerprint.
Geolocation API
Checks whether navigator.geolocation is available and how it relates to IP geolocation. Permission to determine geolocation is not requested; the mere presence of the API is already informative.
Hardware Concurrency
navigator.hardwareConcurrency - the number of logical CPU cores. Non-standard values (for example, 1) are typical of virtual machines.
Device Memory
navigator.deviceMemory - amount of RAM in GB (rounded value). Together with hardwareConcurrency it helps identify a VM or headless environment.
Platform
navigator.platform - browser platform (Win32, MacIntel, Linux x86_64). If it does not match the User-Agent, this is a clear sign of data spoofing.
Ad Blocker
Detects the presence of an ad blocker (uBlock, AdGuard, etc.) by attempting to load known ad scripts. Included in the overall fingerprint profile.
Dark Mode
Reads prefers-color-scheme - the OS dark or light theme. A small but stable fingerprint parameter.
Touch / Pointer
Checks navigator.maxTouchPoints and pointer type (mouse, touch, pen). If the User-Agent says it's a mobile device, but no touchscreen is detected, this is a sign of emulation.
How to read the result
Everything is fine: My IP = proxy IP, WebRTC not detected or blocked, Browser Score = 0, ISP type = residential.
Normal for a data center / ISP proxy: ISP type = datacenter/hosting. This is expected and is not a problem for most tasks.
Problem: If WebRTC shows an IP that differs from the proxy, the leak must be fixed immediately. Instructions: How to install Tampermonkey and a script for debugging WebRTC
Last updated
Was this helpful?

