Skip to main content
Runtime analysis

Scanning device context

Collecting network, browser, and fingerprint telemetry...

Init session 0%
Awareness experience

Your device just told us more than you think.

This page shows what a simple link can reveal about your device, location, and network. Nothing was installed. Nothing was hacked. This is what every website can see when you connect.

Digital footprint LIVE DATA --:--:--
YOU SCANNED AN UNTRUSTED QR CODE

This one was harmless, but next one might not be.

A random QR code can send you to phishing, steal session context, fingerprint your device, and set up credential theft before you notice. Treat unknown QR codes as hostile until verified.

Approximate location
NETWORK LOCATION
IPv4
IPv6
Based on your IP address

We can estimate your region from the network alone. If you allow browser location, we can show how much more precise that becomes.

PATH DETECTING
TZ
ASN
ORG
Approximate position unavailable
Derived from public network data Coordinates unavailable on this connection
Hardware

Device model

Detecting...
System

Operating system

Detecting...
Browser

Browser signature

Detecting...
Display

Screen resolution

Detecting...
What This Means

This is not just trivia. It is reusable context.

Tap a card to see how the same signals can be turned into targeting, tracking, or more convincing scams.

Location A rough location already narrows the search. A city or region guess tells a site where you probably live, work, or travel. See how this can be abused

That is enough to localise phishing messages, fake parcel alerts, language choice, and timing so a scam feels familiar instead of random.

Fingerprint Your browser can become recognisable without a login. Screen size, GPU, language, timezone, and canvas output can combine into a repeatable signature. See how this can be abused

Used together, those clues can link visits, distinguish you from other users on the same network, and help ad-tech or attackers follow the same person over time.

Network Your connection says more than “online”. IP version, provider, ASN, and route hints reveal whether you are on mobile data, home broadband, office Wi-Fi, or something protected. See how this can be abused

That helps attackers choose the right lure and helps platforms decide whether to trust, challenge, throttle, or profile your session.

Device Your device model changes which lies will work. Knowing whether you use an iPhone, Windows PC, or another device shapes what a believable fake prompt looks like. See how this can be abused

A convincing attack starts with context: the right device, the right browser, the right language, and a story that matches what you are actually using.

Hardware
CPU cores
Device memory
Network
Connection type
Do Not Track
Identity
Timezone
Languages
Display
Screen resolution
Colour depth
GPU
Graphics renderer
Fingerprint
Canvas hash (unique to your device)
Get in touch