Use our free browser info tool to instantly check my browser details including user-agent string, screen resolution, operating system info, hardware acceleration, and device pixel ratio. This online browser inspector runs a complete browser fingerprint test checking canvas fingerprinting, WebGL vendor, WebRTC leak detection, font enumeration, Do Not Track (DNT) status, cookie status, LocalStorage availability, battery level privacy leak, language settings, and JavaScript status. A professional browser compatibility checker and system information for browser audit that reveals what websites see about you.
Quick Answer: What Does Your Browser Reveal?
Every website you visit reads your User-Agent string, screen resolution, CPU cores, device memory, timezone, language, and more — without asking permission. Our browser info tool shows all 25+ data points in real time. Combined, these create a browser fingerprint that can track you across sites even without cookies. Check your WebRTC leak status, canvas fingerprint hash, and WebGL vendor to understand your privacy posture.
Scanning...
Browser Fingerprint Uniqueness Score
Calculating your fingerprint entropy...

Cybersecurity Threat Researcher
Jessica specializes in browser fingerprinting research, digital privacy, user tracking prevention, and web application security. She helps organizations understand and mitigate browser-based privacy leaks.
View All ArticlesA browser info tool reveals all the metadata your browser sends to every website you visit — without your permission or knowledge. Every HTTP request includes your User-Agent string, and JavaScript APIs expose your screen resolution, operating system info, CPU cores, device memory, timezone, language settings, cookie status, and more. Our online browser inspector checks 25+ data points in real time.
This data exists because websites need it for legitimate purposes: serving the right CSS for your screen size, choosing the correct language, and detecting mobile vs desktop. However, advertisers and trackers combine these data points into a browser fingerprint — a unique identifier that tracks you without cookies. Understanding what your browser leaks is the first step toward protecting your digital privacy.
25+ Data Points: Our browser info tool checks User-Agent, browser name/version/engine, OS, platform, screen resolution, viewport, device pixel ratio, color depth, CPU cores, device memory, cookies, DNT, LocalStorage, language, timezone, connection type, battery level, canvas hash, WebGL vendor, WebRTC leak, touch support, dark mode, PDF viewer, and JavaScript status.
The User-Agent string is the most visible piece of browser metadata. Sent with every HTTP request, it identifies your browser name, version, browser engine (Blink/Gecko/WebKit), and operating system. Our tool parses this string into readable components so developers can use it for testing, debugging, and browser compatibility checking.
// Example Chrome User-Agent string
Mozilla/5.0 (Windows NT 10.0; Win64; x64)
AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/131.0.0.0 Safari/537.36
// Parsed components:
Browser: Chrome 131 | Engine: Blink (AppleWebKit)
OS: Windows 10/11 | Platform: Win64
The Mozilla/5.0 prefix is a legacy compatibility flag from the 1990s "browser wars" — every modern browser includes it. The actual browser identity is deeper in the string. Check how servers interpret your User-Agent with our Headers Analyzer. Verify your SSL connection with our SSL Checker.
For Developers: Copy your User-Agent string from our tool to include in bug reports, API requests, and browser testing. Different browsers send different UA strings, which is why websites sometimes render differently across browsers.
A browser fingerprint test measures how uniquely identifiable your browser is by combining all available data points into a single hash. Even without cookies, your combination of screen resolution, device pixel ratio, CPU cores, timezone, language, canvas fingerprint, and WebGL vendor is often unique enough to identify you among millions of users.
Each data point has an "entropy" value — how much it narrows down your identity. Common values (1920x1080 resolution, English language) add little entropy. Rare values (2560x1440 at 1.25x DPR, 6 CPU cores, Slovenian language) make you highly unique. Our privacy score estimates your uniqueness on a scale.
| Data Point | Entropy Level | Privacy Risk |
|---|---|---|
| User-Agent string | High | Strongly identifying |
| Canvas fingerprint | Very High | Nearly unique per device |
| WebGL vendor/renderer | High | GPU-specific identifier |
| Screen resolution + DPR | Medium | Narrows to device class |
| Timezone + Language | Medium | Narrows to region |
| CPU cores + Memory | Low-Medium | Common hardware values |
Check your IP-level privacy with our IP Fraud Checker. Read our full guide on how to clear your digital footprint.
WebRTC (Web Real-Time Communication) is built into every modern browser for video calls and peer-to-peer connections. The problem: WebRTC can leak your real IP address even when you are using a VPN. Our tool creates a test peer connection and checks whether your local or public IP is exposed through STUN/TURN servers.
// WebRTC leak test (what our tool does)
1. Create RTCPeerConnection with STUN server
2. Generate SDP offer
3. Parse ICE candidates for IP addresses
4. Compare with expected VPN IP
5. If local/public IP found → LEAK DETECTED
VPN Users: If our WebRTC leak test shows your real IP while VPN is active, your VPN is not fully protecting you. Disable WebRTC in Firefox via about:config → media.peerconnection.enabled = false. Chrome users need extensions like WebRTC Leak Prevent. Read our IP reputation guide.
Canvas fingerprinting exploits the HTML5 Canvas API by drawing invisible text and shapes, then reading the pixel data. Due to differences in GPU, drivers, operating system, and font rendering, each browser produces slightly different pixel output — creating a hash that is nearly unique per device. Advertisers use this to track you without cookies.
WebGL fingerprinting goes deeper by reading your GPU's WebGL vendor (e.g., Google Inc.) and renderer (e.g., ANGLE - Intel HD Graphics 630). Combined with canvas data, this creates an extremely precise hardware fingerprint. Our tool displays both values so you can see exactly what trackers see.
Defense: Use browsers like Brave or Firefox with privacy.resistFingerprinting = true to return uniform canvas fingerprint hashes. This makes your browser look identical to millions of others, breaking the tracking chain. Check your headers with our Headers Analyzer.
Modern browsers expose surprisingly detailed system information through JavaScript APIs. The Battery Status API reveals your exact battery percentage and charging status — research shows this can be used to track users across sessions. The Network Information API exposes your connection type (4G, WiFi, Ethernet) and estimated downlink speed.
These APIs serve legitimate purposes but create privacy risks when combined into a fingerprint. Check for email-based tracking with our Email Verifier and Temp Email Checker.
Our browser compatibility checker goes beyond basic identification. It tests whether your browser supports key web APIs that modern applications depend on: LocalStorage, cookies, JavaScript status, Clipboard API, touch events, dark mode media query, and PDF viewer. This is essential for web developers deploying applications that require specific browser features.
Use our tool before deploying web applications to verify that your target audience's browsers support the features you need. Check your server's response headers with our Headers Analyzer. Test DNS resolution with our DNS Lookup. Verify domain ownership with WHOIS.
Dev Tip: Copy all results from our browser info tool and include them in QA bug reports. This eliminates guesswork about which browser, version, OS, and hardware configuration triggered the bug. Encode test data with our Base64 Encoder and format JSON payloads with our JSON Formatter.
privacy.resistFingerprinting normalizes canvas, WebGL, timezone, and screen values.about:config → media.peerconnection.enabled = false.Paradox: Using too many anti-fingerprinting tools can make you MORE unique. A browser with 15 privacy extensions has a rarer configuration than a default Chrome install. Balance is key. Read our digital footprint guide for a balanced approach.
Google is deprecating the traditional User-Agent string in favor of User-Agent Client Hints (UA-CH). Instead of sending a massive string by default, browsers will only share minimal data (browser name) — websites must explicitly request additional details like OS version or device model. This "privacy by default" approach reduces passive browser fingerprinting.
Chrome already supports Client Hints via the Sec-CH-UA header family. Developers should migrate from UA parsing to Client Hints APIs. Our tool detects both traditional UA strings and Client Hints support. Check your security headers with our Headers Analyzer. Secure credentials with our Password Generator. Convert domains with our Punycode Converter.
A browser info tool reveals all metadata your browser exposes: User-Agent, screen resolution, CPU cores, device memory, cookies, DNT status, canvas fingerprint, WebGL vendor, WebRTC leak, and more. Our tool checks 25+ data points for a complete browser fingerprint test.
Use our online browser inspector. It shows all data websites read without permission: User-Agent, resolution, device pixel ratio, hardware info, language settings, and privacy signals including canvas fingerprinting hash and WebRTC leak status.
Likely yes. Our browser fingerprint test calculates a uniqueness score. The combination of your UA, resolution, timezone, canvas hash, and WebGL renderer is often unique among millions. Use privacy browsers to reduce fingerprint entropy.
Our tool creates a test peer connection and checks for IP addresses in ICE candidates. If your local/public IP address appears while VPN is active, WebRTC is leaking. Disable it in browser settings or use extensions.
Canvas fingerprinting draws invisible graphics via the Canvas API. Due to GPU/driver/OS differences, each browser produces unique pixel data. The resulting hash tracks you without cookies. Our tool shows your canvas hash value.
Websites read screen resolution via JavaScript's screen.width API for responsive design. However, your exact resolution combined with device pixel ratio creates a fingerprinting data point. Unusual resolutions make you more identifiable.
Our browser info tool displays your full User-Agent string and parses it into browser name, version, engine (Blink/Gecko/WebKit), and OS. Copy it with one click for development, testing, or support tickets.
Our browser compatibility checker shows exact version, browser engine, API support (LocalStorage, cookies, touch, dark mode, PDF), and JavaScript status. Use it to verify features before deploying web applications.
Complete your privacy audit.
Our browser info tool checks 25+ data points including User-Agent, canvas fingerprint, WebRTC leak, WebGL vendor, and privacy signals. Know what websites see about you.