sysinfo.szerver1.eu (v.1.0.3.0 / 2020-07-15)

Contents:

IP

GEOIP - webhosting based

GEOIP - php-based

Javascript values

$_SERVER

Flash

Webrtc leak

Last visits






IP:

Your IP adreess: 3.94.21.209

Your hostname: ec2-3-94-21-209.compute-1.amazonaws.com

Dumping GeoIP info from $_SERVER variables (webhosting-specified):


GEOIP_ADDR: 3.94.21.209
HTTP_GEOIP_COUNTRY_NAME: United States
HTTP_GEOIP_COUNTRY_CODE: US
HTTP_GEOIP_CONTINENT_CODE: NA
HTTP_GEOIP_ADDR: 3.94.21.209
GEOIP_COUNTRY_NAME: United States
GEOIP_COUNTRY_CODE: US
GEOIP_CONTINENT_CODE: NA

GeoIP data (GeoIP included into php, date of file: 2015-08-05):


IP: 3.94.21.209
country_code: US
country_code3: USA
country_name: United States
region: CT
city: Fairfield
postal_code: 06828
latitude: 41.1412
longitude: -73.2637
area_code: 203
dma_code: 501
metro_code: 501
continent_code: NA

Dumping interesting Javascript values :

loading...

Dumping whole $_SERVER variable:


PATH: /sbin:/usr/sbin:/bin:/usr/bin
DOCUMENT_ROOT: /web/htdocs3/szerver1eu/home//subdoms/sysinfo
PHPRC: /web/htdocs3/szerver1eu/php.ini
MAGICK_THREAD_LIMIT: 1
SCRIPT_NAME: /index.php
REQUEST_URI: /
QUERY_STRING:
REQUEST_METHOD: GET
SERVER_PROTOCOL: HTTP/1.1
GATEWAY_INTERFACE: CGI/1.1
HTTP_GEOIP_COUNTRY_NAME: United States
HTTP_GEOIP_COUNTRY_CODE: US
HTTP_GEOIP_CONTINENT_CODE: NA
HTTP_GEOIP_ADDR: 3.94.21.209
GEOIP_COUNTRY_NAME: United States
GEOIP_COUNTRY_CODE: US
GEOIP_CONTINENT_CODE: NA
GEOIP_ADDR: 3.94.21.209
REMOTE_PORT: 40022
SCRIPT_FILENAME: /web/htdocs3/szerver1eu/home/subdoms/sysinfo/index.php
SERVER_ADMIN: admin@forpsi.com
REMOTE_ADDR: 3.94.21.209
SERVER_PORT: 80
SERVER_ADDR: 81.2.195.30
SERVER_NAME: sysinfo.szerver1.eu
SERVER_SOFTWARE: Apache
SERVER_SIGNATURE: Apache Server at sysinfo.szerver1.eu Port 80
HTTP_CONNECTION: close
HTTP_HOST: sysinfo.szerver1.eu
HTTP_ACCEPT_ENCODING: br,gzip
HTTP_IF_MODIFIED_SINCE: Mon, 21 Sep 2020 14:40:26 GMT
HTTP_ACCEPT_LANGUAGE: en-US,en;q=0.5
HTTP_ACCEPT: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
HTTP_USER_AGENT: CCBot/2.0 (https://commoncrawl.org/faq/)
UNIQUE_ID: X8hXp38AAAEAAFWAVCMAAACV
FCGI_ROLE: RESPONDER
PHP_SELF: /index.php
REQUEST_TIME_FLOAT: 1606965159.6643
REQUEST_TIME: 1606965159
argv: [array]
argc: 0

Flash:

Detecting...

Check if your IP address leaks via the WebRTC technology...


      WebRTC is a free, open project that provides browsers and mobile applications with Real-Time Communications (RTC) capabilities via simple APIs.
It includes the fundamental building blocks for high-quality communications on the web, such as network, audio and video components used in voice and video chat applications, these components, when implemented in a browser, can be accessed through a JavaScript API, enabling developers to easily implement their own RTC web app.
Browsers have implemented WebRTC that allow requests to STUN servers be made that will return the local and public IP addresses for the user. These request results are available to javascript, so you can now obtain a users local and public IP addresses in javascript.
Additionally, these STUN requests are made outside of the normal XMLHttpRequest procedure, so they are not visible in the developer console and cannot be blocked by plugins such as AdBlockPlus or Ghostery. This makes these types of requests available for online tracking, de-anonymize and trace users behind common privacy protection services such as: VPN, SOCKS Proxy, HTTP Proxy and (in the past) TOR users.
If you see here one or more IP adresses, then your system is leaking WebRTC requests

Last 50 visits (first is yours):