Privacy awareness demo • No signup • Just a page load

A normal website just learned a lot about you.

No phishing. No malware. No password prompt. Just a standard web request and a modern browser. This page shows what an ordinary site can gather in seconds from your connection, headers, browser, storage, and device fingerprint signals.

Your IP can reveal your network and rough location.Even without GPS, sites can often infer city, region, ISP, and whether you're on consumer broadband, mobile, or hosting infrastructure.
Your browser leaks a fingerprint.Screen size, timezone, language, graphics stack, CPU hints, storage support, and rendering quirks all add up.
This is everyday web telemetry.Ad tech, analytics, fraud systems, and data brokers use pieces of this constantly — often more quietly than this page does.

What your visit revealed

This page combines server-side request details with browser-side fingerprint signals. None of this required a login. Most of it happens automatically every time you visit a modern website.

Connection & request

Server sees this
Public IP
216.73.217.52
Host requested
we-c-u.blacksailsecurity.com
Connection type
HTTPS
Request time (UTC)
2026-05-23 16:33:40 UTC
Referrer
Direct visit / no referrer
Accept-Language header
Unavailable
User-Agent header
Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
First-party cookie already present?
No — this page just set one to prove it can.
Web servers commonly log your IP, timestamp, requested path, status code, and user agent by default — even when the site looks simple.

IP intelligence

Easy external lookup
Approx location
Columbus, Ohio, United States
ISP
Amazon.com, Inc.
Organization
Anthropic, Pbc
ASN
AS16509
Timezone guess
America/New_York
Connection hint
IPv4
That location is usually not exact, but it is often close enough to identify your city, region, employer network, hosting provider, or VPN exit point.

Browser & device fingerprint

Browser exposes this

Environment

Storage & tracking surface

Rendering quirks

Fingerprint ingredients

First-party cookies

Readable here

Why this matters

Real-world use
  • Ad tech can correlate visits across sessions and pages.
  • Fraud systems can score how “normal” or “risky” your setup looks.
  • Data brokers and lead-gen systems can enrich IP + device metadata with outside datasets.
  • A unique-enough browser fingerprint can recognize you even when cookies are limited.

What we cannot see

Important limits
  • Your passwords
  • Other websites’ cookies
  • Your private files
  • Your exact GPS location unless you grant permission
  • Your full browsing history

How to reduce what you leak

You will never be invisible online, but you can absolutely make yourself harder to profile, correlate, and enrich.

Harden the browser

Best first step
  • Use privacy-focused browsers or separate profiles for different activities.
  • Block third-party cookies where possible.
  • Keep extensions minimal — odd extension combos can become fingerprint material too.
  • Update your browser regularly.

Reduce network exposure

IP still matters
  • Use a reputable VPN when your real IP or network identity matters.
  • Avoid mixing personal browsing with sensitive work from the same network profile.
  • Be careful on hotel, conference, coffee-shop, and employer networks.
  • Assume your IP still says something about you.

Limit long-term tracking

Correlation is the game
  • Clear site data for accounts you no longer use.
  • Separate identities into different browser profiles or containers.
  • Do not stay permanently logged into everything in one browser.
  • Treat every convenience feature as a possible tracking surface.
This page is intentionally obvious. Most websites do not stop to explain what they can infer from a simple visit.