sysinfo.szerver1.eu (v.1.0.3.0 / 2020-07-15)

Contents:

IP

GEOIP - webhosting based

GEOIP - php-based

Javascript values

$_SERVER

Flash

Webrtc leak

Last visits






IP:

Your IP adreess: 3.236.231.61

Your hostname: ec2-3-236-231-61.compute-1.amazonaws.com

Dumping GeoIP info from $_SERVER variables (webhosting-specified):


GEOIP_ADDR: 3.236.231.61
HTTP_GEOIP_COUNTRY_NAME: United States
HTTP_GEOIP_COUNTRY_CODE: US
HTTP_GEOIP_CONTINENT_CODE: NA
HTTP_GEOIP_ADDR: 3.236.231.61
GEOIP_COUNTRY_NAME: United States
GEOIP_COUNTRY_CODE: US
GEOIP_CONTINENT_CODE: NA

GeoIP data (GeoIP included into php, date of file: 2015-08-05):


IP: 3.236.231.61
country_code: US
country_code3: USA
country_name: United States
region: CT
city: Fairfield
postal_code: 06828
latitude: 41.1412
longitude: -73.2637
area_code: 203
dma_code: 501
metro_code: 501
continent_code: NA

Dumping interesting Javascript values :

loading...

Dumping whole $_SERVER variable:


PATH: /sbin:/usr/sbin:/bin:/usr/bin
DOCUMENT_ROOT: /web/htdocs3/szerver1eu/home//subdoms/sysinfo
PHPRC: /web/htdocs3/szerver1eu/php.ini
MAGICK_THREAD_LIMIT: 1
SCRIPT_NAME: /index.php
REQUEST_URI: /
QUERY_STRING:
REQUEST_METHOD: GET
SERVER_PROTOCOL: HTTP/1.1
GATEWAY_INTERFACE: CGI/1.1
HTTP_GEOIP_COUNTRY_NAME: United States
HTTP_GEOIP_COUNTRY_CODE: US
HTTP_GEOIP_CONTINENT_CODE: NA
HTTP_GEOIP_ADDR: 3.236.231.61
GEOIP_COUNTRY_NAME: United States
GEOIP_COUNTRY_CODE: US
GEOIP_CONTINENT_CODE: NA
GEOIP_ADDR: 3.236.231.61
REMOTE_PORT: 56272
SCRIPT_FILENAME: /web/htdocs3/szerver1eu/home/subdoms/sysinfo/index.php
SERVER_ADMIN: admin@forpsi.com
REMOTE_ADDR: 3.236.231.61
SERVER_PORT: 80
SERVER_ADDR: 81.2.195.30
SERVER_NAME: sysinfo.szerver1.eu
SERVER_SOFTWARE: Apache
SERVER_SIGNATURE: Apache Server at sysinfo.szerver1.eu Port 80
HTTP_CONNECTION: close
HTTP_HOST: sysinfo.szerver1.eu
HTTP_ACCEPT_ENCODING: br,gzip
HTTP_IF_MODIFIED_SINCE: Sun, 07 Mar 2021 20:11:12 GMT
HTTP_ACCEPT_LANGUAGE: en-US,en;q=0.5
HTTP_ACCEPT: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
HTTP_USER_AGENT: CCBot/2.0 (https://commoncrawl.org/faq/)
UNIQUE_ID: YJtSa38AAAEAAXX6NEcAAAAW
FCGI_ROLE: RESPONDER
PHP_SELF: /index.php
REQUEST_TIME_FLOAT: 1620791915.5275
REQUEST_TIME: 1620791915
argv: [array]
argc: 0

Flash:

Detecting...

Check if your IP address leaks via the WebRTC technology...


      WebRTC is a free, open project that provides browsers and mobile applications with Real-Time Communications (RTC) capabilities via simple APIs.
It includes the fundamental building blocks for high-quality communications on the web, such as network, audio and video components used in voice and video chat applications, these components, when implemented in a browser, can be accessed through a JavaScript API, enabling developers to easily implement their own RTC web app.
Browsers have implemented WebRTC that allow requests to STUN servers be made that will return the local and public IP addresses for the user. These request results are available to javascript, so you can now obtain a users local and public IP addresses in javascript.
Additionally, these STUN requests are made outside of the normal XMLHttpRequest procedure, so they are not visible in the developer console and cannot be blocked by plugins such as AdBlockPlus or Ghostery. This makes these types of requests available for online tracking, de-anonymize and trace users behind common privacy protection services such as: VPN, SOCKS Proxy, HTTP Proxy and (in the past) TOR users.
If you see here one or more IP adresses, then your system is leaking WebRTC requests

Last 50 visits (first is yours):