sysinfo.szerver1.eu (v.1.0.3.0 / 2020-07-15)

Contents:

IP

GEOIP - webhosting based

GEOIP - php-based

Javascript values

$_SERVER

Flash

Webrtc leak

Last visits






IP:

Your IP adreess: 18.215.185.97

Your hostname: ec2-18-215-185-97.compute-1.amazonaws.com

Dumping GeoIP info from $_SERVER variables (webhosting-specified):


GEOIP_ADDR: 18.215.185.97
HTTP_GEOIP_COUNTRY_NAME: United States
HTTP_GEOIP_COUNTRY_CODE: US
HTTP_GEOIP_CONTINENT_CODE: NA
HTTP_GEOIP_ADDR: 18.215.185.97
GEOIP_COUNTRY_NAME: United States
GEOIP_COUNTRY_CODE: US
GEOIP_CONTINENT_CODE: NA

GeoIP data (GeoIP included into php, date of file: 2015-08-05):


IP: 18.215.185.97
country_code: US
country_code3: USA
country_name: United States
region: MA
city: Cambridge
postal_code: 02139
latitude: 42.3646
longitude: -71.1028
area_code: 617
dma_code: 506
metro_code: 506
continent_code: NA

Dumping interesting Javascript values :

loading...

Dumping whole $_SERVER variable:


PATH: /sbin:/usr/sbin:/bin:/usr/bin
DOCUMENT_ROOT: /web/htdocs3/szerver1eu/home//subdoms/sysinfo
PHPRC: /web/htdocs3/szerver1eu/php.ini
MAGICK_THREAD_LIMIT: 1
SCRIPT_NAME: /index.php
REQUEST_URI: /index.html
QUERY_STRING:
REQUEST_METHOD: GET
SERVER_PROTOCOL: HTTP/1.1
GATEWAY_INTERFACE: CGI/1.1
GEOIP_COUNTRY_NAME: United States
GEOIP_COUNTRY_CODE: US
GEOIP_CONTINENT_CODE: NA
GEOIP_ADDR: 18.215.185.97
REDIRECT_URL: /index.html
REMOTE_PORT: 52124
SCRIPT_FILENAME: /web/htdocs3/szerver1eu/home/subdoms/sysinfo/index.php
SERVER_ADMIN: admin@forpsi.com
REMOTE_ADDR: 18.215.185.97
SERVER_PORT: 80
SERVER_ADDR: 81.2.195.30
SERVER_NAME: sysinfo.szerver1.eu
SERVER_SOFTWARE: Apache
SERVER_SIGNATURE: Apache Server at sysinfo.szerver1.eu Port 80
HTTP_GEOIP_COUNTRY_NAME: United States
HTTP_GEOIP_COUNTRY_CODE: US
HTTP_GEOIP_CONTINENT_CODE: NA
HTTP_GEOIP_ADDR: 18.215.185.97
HTTP_CONNECTION: close
HTTP_HOST: sysinfo.szerver1.eu
HTTP_ACCEPT_ENCODING: br,gzip
HTTP_ACCEPT_LANGUAGE: en-US,en;q=0.5
HTTP_ACCEPT: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
HTTP_USER_AGENT: CCBot/2.0 (https://commoncrawl.org/faq/)
UNIQUE_ID: YATR8X8AAAEAAAPYIUYAAABR
REDIRECT_STATUS: 200
REDIRECT_GEOIP_COUNTRY_NAME: United States
REDIRECT_GEOIP_COUNTRY_CODE: US
REDIRECT_GEOIP_CONTINENT_CODE: NA
REDIRECT_GEOIP_ADDR: 18.215.185.97
REDIRECT_REMOTE_PORT: 52124
REDIRECT_SCRIPT_FILENAME:
REDIRECT_SERVER_ADMIN: admin@forpsi.com
REDIRECT_DOCUMENT_ROOT: /web/htdocs3/szerver1eu/home//subdoms/sysinfo
REDIRECT_REMOTE_ADDR: 18.215.185.97
REDIRECT_SERVER_PORT: 80
REDIRECT_SERVER_ADDR: 81.2.195.30
REDIRECT_SERVER_NAME: sysinfo.szerver1.eu
REDIRECT_SERVER_SOFTWARE: Apache
REDIRECT_SERVER_SIGNATURE: Apache Server at sysinfo.szerver1.eu Port 80
REDIRECT_PATH: /sbin:/usr/sbin:/bin:/usr/bin
REDIRECT_HTTP_CONNECTION: Keep-Alive
REDIRECT_HTTP_HOST: sysinfo.szerver1.eu
REDIRECT_HTTP_ACCEPT_ENCODING: br,gzip
REDIRECT_HTTP_ACCEPT_LANGUAGE: en-US,en;q=0.5
REDIRECT_HTTP_ACCEPT: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
REDIRECT_HTTP_USER_AGENT: CCBot/2.0 (https://commoncrawl.org/faq/)
REDIRECT_UNIQUE_ID: YATR8X8AAAEAAAPYIUYAAABR
FCGI_ROLE: RESPONDER
PHP_SELF: /index.php
REQUEST_TIME_FLOAT: 1610928625.4828
REQUEST_TIME: 1610928625
argv: [array]
argc: 0

Flash:

Detecting...

Check if your IP address leaks via the WebRTC technology...


      WebRTC is a free, open project that provides browsers and mobile applications with Real-Time Communications (RTC) capabilities via simple APIs.
It includes the fundamental building blocks for high-quality communications on the web, such as network, audio and video components used in voice and video chat applications, these components, when implemented in a browser, can be accessed through a JavaScript API, enabling developers to easily implement their own RTC web app.
Browsers have implemented WebRTC that allow requests to STUN servers be made that will return the local and public IP addresses for the user. These request results are available to javascript, so you can now obtain a users local and public IP addresses in javascript.
Additionally, these STUN requests are made outside of the normal XMLHttpRequest procedure, so they are not visible in the developer console and cannot be blocked by plugins such as AdBlockPlus or Ghostery. This makes these types of requests available for online tracking, de-anonymize and trace users behind common privacy protection services such as: VPN, SOCKS Proxy, HTTP Proxy and (in the past) TOR users.
If you see here one or more IP adresses, then your system is leaking WebRTC requests

Last 50 visits (first is yours):