Your IP Address

Your IP Address
216.73.217.54
Location
Gateway Name

Automated Privacy Risk Analysis

Analyzing...

Request Info

Timestamp
2026年 05月 14日 AM 01時 16分 20秒
Connected Server
kakunin-ip.click
Referer
(none)
HTTP Method
GET
Accept
*/*
Accept-Encoding
br,gzip
Accept-Language
(none)
Connection
(none)
Do Not Track (opt-out)
(未設定)
Client Hints UA (browser info)
(非対応)
Client Hints Mobile (mobile detection)
(非対応)
Client Hints Platform (OS info)
(非対応)

Network Info

IP Address
216.73.217.54
Gateway Name
Country
Region
City
Latitude
Longitude
ISP (Internet Service Provider)
AS Number (Autonomous System)
WebRTC Local IP (internal address)
Connection Type (effective)
Downlink
RTT (round-trip time)
Save Data

Connection Protocol

HTTP Version
HTTP/2
Client ↔ CloudFront
HTTP/2
CloudFront ↔ Origin
HTTP/1.1
TLS Version
TLSv1.3
Cipher Suite
TLS_AES_128_GCM_SHA256
ALPN Negotiation (protocol selection)
fullHandshake
WebSocket (bidirectional)

Browser & Device Info

User Agent
Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
Browser Language
Language List
Timezone
Touch Support
Platform

Hardware Info

CPU Cores
Device Memory
GPU Renderer
GPU Vendor
Battery

Proxy Info

Proxy Version
(none)
Proxy Status
(none)

Location Map

Approximate location based on IP address. May differ from actual location.

Fingerprint Uniqueness Score

Per-Attribute Entropy Contribution

Security Score

Connection Quality Test

Start Test Measure response times to servers worldwide and see which regions your connection is fastest to.

Featured Articles

View all articles →

Browser Fingerprinting: How Tracking Works and How to Defend Against It

Learn how browser fingerprinting tracks users, what information is collected, the risks of uniqueness, and effective defense strategies.

Read more →

Public Wi-Fi Risks: 7 Ways to Stay Safe on Free Networks

Learn about the dangers lurking in free Wi-Fi at cafes and airports, and practical measures to protect yourself from man-in-the-middle attacks and eavesdropping.

Read more →

Why 404 Is 'Not Found' - The Origin of the Number and the CERN Room Legend

Learn about the HTTP status code numbering system behind 404, the truth about the CERN Room 404 urban legend, creative 404 pages from GitHub and Pixar, and the origin of 418 I'm a teapot.

Read more →

How Airplane Mode Works and Its Surprising Everyday Uses

Learn which five wireless radios airplane mode disables, the real reason phones must be silenced on planes, and everyday uses like faster charging, focus mode, battery saving, and network reset.

Read more →

Why Updates Are Annoying but Necessary - The Real Danger of Clicking 'Later'

Learn about the importance of security patches, how zero-day exploits work, the WannaCry (230,000 devices infected 2 months after patch release) and Equifax (147 million records leaked) case studies, and why auto-update is recommended.

Read more →

5 Privacy-Focused Search Engines: Alternatives to Google

Compare privacy-focused search engines like DuckDuckGo, Startpage, and Brave Search that don't track your search history.

Read more →

Security Glossary

View all terms →
Share your results