Cyber Security Solutions for
Organizations with Critical Infrastructure
Content Filters and Proxy Detection
This static snapshot mirrors the BrowserLeaks reference layout for proxy, Tor, adblock, and content filter checks.
Proxy Detection
| HTTP Proxy Headers | ✖ not detected |
|---|
Tor Browser Detection
| Tor IP Address | ✖ not detected |
|---|---|
| Tor Letterboxing | ✖ not detected |
| Canvas Protection | ✖ not detected |
Adblock Detection
| Subscriptions | ✖ not detected |
|---|
Content Filters Detection
| AdGuard | ✖ not detected |
|---|---|
| Dark Reader | ✖ not detected |
TLS Client Test
This page displays your web browser's SSL/TLS capabilities, including supported TLS protocols, cipher suites, extensions, and key exchange groups. It highlights any weak or insecure options and generates a TLS fingerprint in JA3/JA4 formats. Additionally, it tests how your browser handles insecure mixed content requests.
Your Web Browser
| HTTP User-Agent | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36 Edg/142.0.0.0 |
|---|
Protocol Support
| TLS 1.3 | ✔Enabled |
|---|---|
| TLS 1.2 | ✔Enabled |
| TLS 1.1 | ✖Disabled (Good) |
| TLS 1.0 | ✖Disabled (Good) |
Mixed Content Test
| Active Content | ✔Blocked |
|---|---|
| Passive Content | ✔Upgraded to HTTPS |
TLS Fingerprint
| JA4 | t13d1516h2_8daaf6152771_d8a2da3f94cd |
|---|---|
| JA4_r | t13d1516h2_002f,0035,009c,009d,1301,1302,1303,c013,c014,c02b,c02c,c02f,c030,cca8,cca9_0005,000a,000b,000d,0012,0017,001b,0023,002b,002d,0033,44cd,fe0d,ff01_0403,0804,0401,0503,0805,0501,0806,0601 |
| JA4_o | t13d1516h2_acb858a92679_385aedc9e2ce |
| JA4_ro | t13d1516h2_1301,1302,1303,c02b,c02f,c02c,c030,cca9,cca8,c013,c014,009c,009d,002f,0035_0000,ff01,44cd,fe0d,0012,002b,000a,0033,002d,000b,000d,0005,001b,0017,0010,0023_0403,0804,0401,0503,0805,0501,0806,0601 |
| JA3 | 7ee648a7890279b63e03d1a21ff1c03f |
| JA3_r | 771,4865-4866-4867-49195-49199-49196-49200-52393-52392-49171-49172-156-157-47-53,0-65281-17613-65037-18-43-10-51-45-11-13-5-27-23-16-35,4588-29-23-24,0 |
| JA3_n | 8e19337e7524d2573be54efb2b0784c9 |
| JA3_rn | 771,4865-4866-4867-49195-49199-49196-49200-52393-52392-49171-49172-156-157-47-53,0-5-10-11-13-16-18-23-27-35-43-45-51-17613-65037-65281,4588-29-23-24,0 |
TLS Handshake (dec values)
| TLS Protocol | 0x0304 TLS 1.3 |
|---|---|
| Cipher Suite | 0x1301 TLS_AES_128_GCM_SHA256 (Recommended, TLS 1.3) |
| Key Exchange | 0x11ec X25519MLKEM768 |
| Signature Scheme | 0x0403 ecdsa_secp256r1_sha256 |
Encrypted Client Hello
| ECH Success | ✖False |
|---|---|
| Outer SNI | tls.browserleaks.com |
| Inner SNI | n/a |
Supported Cipher Suites (in order as received)
| Cipher Suites |
0xaaaa – GREASE
0x1301 – TLS_AES_128_GCM_SHA256 (Recommended – TLS 1.3)
0x1302 – TLS_AES_256_GCM_SHA384 (Recommended – TLS 1.3)
0x1303 – TLS_CHACHA20_POLY1305_SHA256 (Recommended – TLS 1.3)
0xc02b – TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (Recommended – TLS 1.2)
0xc02f – TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Recommended – TLS 1.2)
0xc02c – TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (Recommended – TLS 1.2)
0xc030 – TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Recommended – TLS 1.2)
0xcca9 – TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (Recommended – TLS 1.2)
0xcca8 – TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (Recommended – TLS 1.2)
0xc013 – TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (CBC, SHA-1 – TLS 1.0,1.1,1.2)
0xc014 – TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (CBC, SHA-1 – TLS 1.0,1.1,1.2)
0x009c – TLS_RSA_WITH_AES_128_GCM_SHA256 (NO PFS – TLS 1.2)
0x009d – TLS_RSA_WITH_AES_256_GCM_SHA384 (NO PFS – TLS 1.2)
0x002f – TLS_RSA_WITH_AES_128_CBC_SHA (NO PFS, CBC, SHA-1 – TLS 1.0,1.1,1.2)
0x0035 – TLS_RSA_WITH_AES_256_CBC_SHA (NO PFS, CBC, SHA-1 – TLS 1.0,1.1,1.2)
|
|---|
Supported TLS Extensions (in order as received)
| TLS Extensions |
0x0a0a – GREASE
0x0000 – server_name
0xff01 – renegotiation_info
0x44cd – application_settings
0xfe0d – encrypted_client_hello
0x0012 – signed_certificate_timestamp
0x002b – supported_versions
0x000a – supported_groups
0x0033 – key_share
0x002d – psk_key_exchange_modes
0x000b – ec_point_formats
0x000d – signature_algorithms
0x0005 – status_request
0x001b – compress_certificate
0x0017 – extended_main_secret
0x0010 – application_layer_protocol_negotiation
0x0023 – session_ticket
0x2a2a – GREASE
application_layer_protocol_negotiation
protocol_name_list: h2, http/1.1
application_settings
supported_protocols: h2
compress_certificate
algorithms: 0x0002 (brotli)
ec_point_formats
ec_point_format_list: 0x0000 (uncompressed)
encrypted_client_hello
type: outer
kdf_id: 0x0001 (HKDF-SHA256)
aead_id: 0x0001 (AES-128-GCM)
config_id: 108
enc_length: 32
payload_length: 208
key_share
client_shares: 0x5a5a (GREASE); 0x11ec (X25519MLKEM768); 0x001d (x25519)
psk_key_exchange_modes
ke_modes: 0x0001 (psk_dhe_ke)
server_name: tls.browserleaks.com
signature_algorithms
algorithms: 0x0403, 0x0804, 0x0401, 0x0503, 0x0805, 0x0501, 0x0806, 0x0601
status_request
status_type: 0x0001 (ocsp)
responder_id_list: 0
request_extensions: 0
supported_groups
named_group_list: 0x5a5a (GREASE); 0x11ec (X25519MLKEM768); 0x001d (x25519); 0x0017 (secp256r1); 0x0018 (secp384r1)
supported_versions
versions: 0x6a6a (GREASE); 0x0304 (TLS 1.3); 0x0303 (TLS 1.2)
|
|---|
Features Detection
The Web Browser's Features Detection Tool has many web browser feature tests that may impact your online identity if you decide to enable or disable them in your browser settings.
The fingerprint is an MD5 hash of the results of all tests. You can also get a JSON data for an easy table comparison between browsers.
Font Fingerprinting
Font fingerprinting techniques rely on measuring the dimensions of HTML elements filled with text or single Unicode glyphs. However, font rendering in web browsers can be affected by multiple factors, leading to subtle differences in these measurements.
Font metrics measurement is a brute force method that tries different fonts from a large dictionary of known typefaces. By comparing the size of the rendered element to the default values, this method can determine if a font is present on the system.
Unicode glyphs measurement technique uses special Unicode characters with a large font size and default letterforms as a font-family to create fingerprints by hashing the obtained measurement results.
WebGL Browser Report
| Your Web Browser | |
|---|---|
| HTTP User-Agent | |
| WebGL Support Detection | |
| This browser supports WebGL | |
| This browser supports WebGL 2 | |
| WebGL Fingerprint | |
| WebGL Report Hash | |
| Pretty-print | |
| WebGL Image Hash | |
| WebGL Image | |
| WebGL Context Info | |
| Supported Context Name(s) | |
| GL Version | |
| Shading Language Version | |
| Vendor | |
| Renderer | |
| Debug Renderer Info | |
| Unmasked Vendor | |
| Unmasked Renderer | |
| Context Attributes | |
| Alpha Buffer | |
| Depth Buffer | |
| Stencil Buffer | |
| Desynchronized | |
| Anti-Aliasing | |
| Major Performance Caveat | |
| Power Preference | |
| Pre-multiplied Alpha | |
| Preserve Drawing Buffer | |
| XR Compatible | |
| Drawing Buffer Color Space | |
| Unpack Color Space | |
| Vertex Shader | |
| Max Vertex Attributes | |
| Max Vertex Uniform Vectors | |
| Max Vertex Texture Image Units | |
| Max Varying Vectors | |
| Best Float Precision | |
| Max Vertex Uniform Components | |
| Max Vertex Uniform Blocks | |
| Max Vertex Output Components | |
| Max Varying Components | |
| Transform Feedback | |
| Max Interleaved Components | |
| Max Separate Attribs | |
| Max Separate Components | |
| Rasterizer | |
| Aliased Line Width Range | |
| Aliased Point Size Range | |
| Fragment Shader | |
| Max Fragment Uniform Vectors | |
| Max Texture Image Units | |
| Float/Int Precision | |
| Best Float Precision | |
| Max Fragment Uniform Components | |
| Max Fragment Uniform Blocks | |
| Max Fragment Input Components | |
| Min Program Texel Offset | |
| Max Program Texel Offset | |
| Framebuffer | |
| Max Draw Buffers | |
| Max Color Attachments | |
| Max Samples | |
| Max Color Buffers | |
| Max Render Buffer Size | |
| Max Viewport Dimensions | |
| Red Bits | |
| Green Bits | |
| Blue Bits | |
| Alpha Bits | |
| Depth Bits | |
| Stencil Bits | |
| Textures | |
| Max Texture Size | |
| Max Cube Map Texture Size | |
| Max Combined Texture Image Units | |
| Max Anisotropy | |
| Max 3D Texture Size | |
| Max Array Texture Layers | |
| Max Texture LOD Bias | |
| Uniform Buffers | |
| Max Uniform Buffer Bindings | |
| Max Uniform Block Size | |
| Uniform Buffer Offset Alignment | |
| Max Combined Uniform Blocks | |
| Max Combined Vertex Uniform Components | |
| Max Combined Fragment Uniform Components | |
| WebGL 2 Extensions | |
| Supported WebGL Extensions | |
IP Address & Network
| IPv4 | |
|---|---|
| IPv6 | |
| Hostname | |
| Country | |
| Region | |
| City | |
| ZIP | |
| Timezone | |
| Local Time | |
| ISP | |
| Organization | |
| AS / Network | |
| Usage Type | |
| Coordinates |
WebRTC Leak Test
| WebRTC Support Detection | |
|---|---|
| Browser Support | |
| IP Leak Possible | |
| RTCPeerConnection | |
| RTCDataChannel | |
| Media Devices | |
| Your Remote IP | |
| ICE Candidates | |
| Local IPs | |
| Public IPs (STUN) | |
| Host Candidates | |
| Server Reflexive | |
| Relay | |
| Status | |
| Permissions | |
| Audio Permissions | |
| Video Permissions | |
| Media Devices | |
| Audio Inputs | |
| Video Inputs | |
IP WHOIS / RDAP Summary
| Handle | |
|---|---|
| Name | |
| IP Version | |
| Start Address | |
| End Address | |
| Country | |
| Type | |
| Registered | |
| Last Changed | |
| Abuse Email |
Browser & JavaScript Details
| JavaScript Enabled | |
|---|---|
| Inline Scripts | |
| Same-Origin Scripts | |
| Third-Party Scripts | |
| Document Referrer | |
| Screen Resolution | |
| Viewport | |
| Color Depth | |
| Device Pixel Ratio | |
| System Time | |
| toLocaleString | |
| toLocaleFormat | |
| Intl DateTimeFormat | |
| hourCycle | |
| locale | |
| calendar | |
| numberingSystem | |
| timeZone | |
| year / month / day | |
| User Agent | |
| App Version | |
| App Name | |
| App Code Name | |
| Product | |
| Product Sub | |
| Vendor | |
| Platform | |
| Hardware Concurrency | |
| Device Memory | |
| Language | |
| Languages | |
| Online | |
| Do Not Track | |
| Cookie Enabled | |
| Max Touch Points | |
| WebDriver | |
| PDF Viewer Enabled | |
| Global Privacy Control | |
| UA-CH Brands | |
| UA-CH Platform | |
| UA-CH Version / Arch / Bitness | |
| UA-CH Mobile / Model | |
| UA-CH Full Versions | |
| Plugins | |
| Mime Types | |
| Battery Status | |
| Battery Level | |
| Battery Times | |
| Network Type | |
| Network Effective Type | |
| Network Speed / RTT | |
| Save-Data | |
| Bluetooth API | |
| Web Audio | |
| Speech Voices |
Trusted Over 2300+ Companies in the World
Why Choose Us
Security Services
Integer tincidunt Cras dapibus bivamus ele mentum semper nisienean vulputate eleife nd tellusenean
Learn More
Data Privacy
Lorem ipsum dolor sit ametconsectetuer dipiscing elitaenean commodo ligula eget dolor aenean massa
Learn More
Industry Certified
Integer tincidunt Cras dapibus bivamus ele mentum semper nisienean vulputate eleife nd tellusenean
Learn More
Advanced Cyber Security Provider
Global Projects
Clients Protect
Service Guarantee
Experts Team
Providing Best Cyber Security Solutions
What We Offer
Threat Intelligence
Integer tincidunt Cras dapibus bivamus ele mentum semper nisienean vulputate eleife nd tellusenean
Learn More
Security Assessment
Integer tincidunt Cras dapibus bivamus ele mentum semper nisienean vulputate eleife nd tellusenean
Learn More
Compromise Assessment
Integer tincidunt Cras dapibus bivamus ele mentum semper nisienean vulputate eleife nd tellusenean
Learn More
Incident Response
Integer tincidunt Cras dapibus bivamus ele mentum semper nisienean vulputate eleife nd tellusenean
Learn More
CLoud Security
Integer tincidunt Cras dapibus bivamus ele mentum semper nisienean vulputate eleife nd tellusenean
Learn More
Security Training
Integer tincidunt Cras dapibus bivamus ele mentum semper nisienean vulputate eleife nd tellusenean
Learn More
General Questions Frequently Asked Questions?
How Can I Safely Browse The Internet?
How Does Secuvant's Co-managed Security Model Work?
What Type Frequency Of Alerts And Notifications Will Receive?
How Is Our Data Stored And Protected And For How Long?
Your Pricing Plan
Beginner
Free
/Month
- 30 Days Product Testing
- Upgrade Anytime Protection
- 500 Malware Removal
- 24/7 Live Assistance
- Scan Every 12 Hrs
- Configure Software One-time
Business
$39.99
/Month
- 40 Days Product Testing
- Upgrade Anytime Protection
- 1000 Malware Removal
- 24/7 Live Assistance
- Scan Every 13 Hrs
- Configure Software One-time
Exclusive
$47.85
/Month
- 50 Days Product Testing
- Upgrade Anytime Protection
- Unlimited Malware Removal
- 24/7 Live Assistance
- Scan Every 14 Hrs
- Configure Software One-time
Our Professional Team
Eric T. Parker
Shira Rubinoff
Steve Morgan
Latest News & Blog
Subscribe Our Newsletter
Get in Touch
- Email: info@redlight.com
- Phone: +1 234 567 89 0 0
- Fax: +1 ( 987 ) 654 321 9 9
- Address: King Street Melbourne, 3000, Australia