Your IP Address
Automated Privacy Risk Analysis
Request Info
- Timestamp
- 2026年 05月 14日 AM 01時 16分 20秒
- Connected Server
- kakunin-ip.click
- Referer
- (none)
- HTTP Method
- GET
- Accept
- */*
- Accept-Encoding
- br,gzip
- Accept-Language
- (none)
- Connection
- (none)
- Do Not Track (opt-out)
- (未設定)
- Client Hints UA (browser info)
- (非対応)
- Client Hints Mobile (mobile detection)
- (非対応)
- Client Hints Platform (OS info)
- (非対応)
Network Info
- IP Address
- 216.73.217.54
- Gateway Name
- Country
- Region
- City
- Latitude
- Longitude
- ISP (Internet Service Provider)
- AS Number (Autonomous System)
- WebRTC Local IP (internal address)
- Connection Type (effective)
- Downlink
- RTT (round-trip time)
- Save Data
Connection Protocol
- HTTP Version
- HTTP/2
- Client ↔ CloudFront
- HTTP/2
- CloudFront ↔ Origin
- HTTP/1.1
- TLS Version
- TLSv1.3
- Cipher Suite
- TLS_AES_128_GCM_SHA256
- ALPN Negotiation (protocol selection)
- fullHandshake
- WebSocket (bidirectional)
Browser & Device Info
- User Agent
- Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
- Browser Language
- Language List
- Timezone
- Touch Support
- Platform
Hardware Info
- CPU Cores
- Device Memory
- GPU Renderer
- GPU Vendor
- Battery
Cookie Info
- Total Cookies
- 0
- Third-Party Cookies (estimated)
- No third-party cookies detected
No cookies sent
Proxy Info
- Proxy Version
- (none)
- Proxy Status
- (none)
Location Map
Approximate location based on IP address. May differ from actual location.
Fingerprint Uniqueness Score
Per-Attribute Entropy Contribution
Security Score
Connection Quality Test
Featured Articles
View all articles →Browser Fingerprinting: How Tracking Works and How to Defend Against It
Learn how browser fingerprinting tracks users, what information is collected, the risks of uniqueness, and effective defense strategies.
Public Wi-Fi Risks: 7 Ways to Stay Safe on Free Networks
Learn about the dangers lurking in free Wi-Fi at cafes and airports, and practical measures to protect yourself from man-in-the-middle attacks and eavesdropping.
Why 404 Is 'Not Found' - The Origin of the Number and the CERN Room Legend
Learn about the HTTP status code numbering system behind 404, the truth about the CERN Room 404 urban legend, creative 404 pages from GitHub and Pixar, and the origin of 418 I'm a teapot.
How Airplane Mode Works and Its Surprising Everyday Uses
Learn which five wireless radios airplane mode disables, the real reason phones must be silenced on planes, and everyday uses like faster charging, focus mode, battery saving, and network reset.
Why Updates Are Annoying but Necessary - The Real Danger of Clicking 'Later'
Learn about the importance of security patches, how zero-day exploits work, the WannaCry (230,000 devices infected 2 months after patch release) and Equifax (147 million records leaked) case studies, and why auto-update is recommended.
5 Privacy-Focused Search Engines: Alternatives to Google
Compare privacy-focused search engines like DuckDuckGo, Startpage, and Brave Search that don't track your search history.