Analyzing Connection...

ISP:

Hostname:

N/A

OS:

Browser:

Canvas:

Generating...

IP Type:

Checking...

DNS:

Proxy:

No

Anonymizer:

No

Blacklist:

Fraud Score:

10 (Low Risk)

ASN:

LOCATION

Country:

Bangladesh

Region:

C

City:

Dhaka

Hostname:

103.54.149.196-megaspeednet.com

IP Range:

N/A

ISP:

Mega Speed

Organization:

N/A

AS Number:

AS134128 Mega Speed Net

TIME

Zone:

Local:

System:

  • Asia/Dhaka
  • N/A
  • N/A

BROWSER

Headers:

N/A

JavaScript:

N/A

JAVASCRIPT

JavaScript:

N/A

WEBRTC

WebRTC:

N/A

FLASH

Flash:

N/A

SOCIAL NETWORKS

N/A

LANGUAGE

Language:

N/A

JAVA

Java:

N/A

ACTIVEX

ActiveX:

N/A

COOKIES

Cookies:

N/A

IP ADDRESS

Hostname:

megaspeednet.com

Reversed:

N/A

Mail Server:

N/A

IP range:

N/A

ISP:

Mega Speed

Organization:

N/A

AS Organization:

AS134128 Mega Speed Net

AS Number:

N/A

SOCIAL NETWORKS

N/A

INTERACTIVE DETECTION

Run test

IP Address:

103.165.162.197 🇧🇩 Bangladesh (BD)

Flash:

N/A

WebRTC:

103.165.162.197

Java (TCP):

N/A

Java (UDP):

N/A

DNS

Browser:

172.217.38.21

OS

Headers:

Linux

JavaScript:

UNIX

Ports

Open ports:

N/A

LANGUAGE

Headers:

(zh-CN,zh;q=0.9 | zh-CN)

JavaScript:

🇧🇩 BD

HTTP HEADERS

HTTP_ACCEPT

application/json, text/plain, */*

HTTP_ACCEPT_ENCODING

gzip, deflate

HTTP_ACCEPT_LANGUAGE

zh-CN,zh;q=0.9

HTTP_CACHE_CONTROL

max-age=0

HTTP_CONNECTION

close

HTTP_COOKIE

HTTP_HOST

whoer.cc

HTTP_USER_AGENT

Mozilla/5.0 (X11; Linux x86_64)

REMOTE_ADDR

103.165.162.197

REQUEST_METHOD

GET

SCRIPTS

JavaScript:

Enable

Flash:

Disable

Java:

Disable

ActiveX:

Disable

WebRTC:

103.165.162.197

AdBlock:

Disable

LOCATION

Country:

🇧🇩 Bangladesh (BD)

Continent:

Asia

Region:

Dhaka Division

City:

Dhaka

Latitude:

23.8672

Longitude:

90.3927

TIME

Zone:

Local:

System:

  • Asia/Dhaka
  • Mon Oct 21 2024 11:32:32 GMT+0600
  • Mon Oct 21 2024 11:32:32 GMT+0600

UTC:

Tue, 22 Oct 2024 03:29:16 GMT

GMT:

Tue, 22 Oct 2024 03:29:16 GMT

DST:

YES

Plugins

PDF Viewer:

internal-pdf-viewer

Chrome PDF Viewer:

mhjfbmdgcfjbbpaeojofohoefgiehjai

WebKit built-in PDF:

internal-pdf-viewer

Navigator

productSub:

20030107

vendor:

Google Inc.

userAgent:

Mozilla/5.0 (X11; Linux x86_64)

platform:

Linux x86_64

Screen

colorDepth:

24

height:

1080

width:

1920

window size:

1920x1080

What websites see about you

Show your IP address type, operator, network environment and geographical location. These pieces of information are usually used by websites for risk control, pricing and localization.

Digital Footprinting

Every interaction between a client device and a server generates a complex trail of metadata. This "digital footprint" is composed of two primary categories: Passive Network Signals and Active Browser Fingerprints.

The data displayed above is a real-time aggregation of these signals, revealing exactly what advertising networks, fraud detection systems, and potential threat actors can see about you the moment you land on a webpage.

IP & Geolocation

Country Malaysia
City Kuala Lumpur
Timezone Asia/Kuala_Lumpur

Browser Fingerprinting

Canvas Fingerprinting: Forces the browser to render a hidden image. Subtle differences in OS, font rendering, and GPU drivers produce unique pixel data, creating a persistent "hash" even if cookies are cleared.

WebGL Telemetry: Queries the GPU vendor and renderer (e.g., "NVIDIA RTX 3080"). Combined with screen resolution and color depth, this drastically narrows down your anonymity set.

Network Routing (ASN)

Residential vs. Datacenter:
Residential (Comcast, BT): Trusted. Assumed human.
Hosting (AWS, DigitalOcean): High risk. Often VPNs/bots.

BGP Routing: The Border Gateway Protocol determines your data's path. Anomalies can indicate "BGP Hijacking," where traffic is maliciously rerouted through compromised networks.

WebRTC & DNS Leaks

WebRTC Leaks: The protocol used for video chat can query local network interfaces, potentially revealing your real LAN or public IP, bypassing VPN tunnels.

DNS Leaks: If your VPN doesn't force secure DNS, your computer may still query your ISP's DNS servers. This allows your ISP to see every domain you visit, even if the content is encrypted.

Risk Assessment

The "Fraud Score" considers:

  • Proxy Detection: Open ports (8080, 3128) or headers.
  • Blacklists: Reports on Spamhaus/AbuseIPDB.
  • Velocity: Abnormal request rates.
  • Timezone: Mismatches between system time and IP location.

Privacy Recommendations

Achieving total anonymity is difficult, but you can reduce exposure:

  • Use a Reputable VPN: strict "no-logs" policy.
  • Browser Hardening: Firefox/Brave with "Strict" protection.
  • Canvas Blocking: Extensions to add noise to fingerprints.

Mitigation Strategies

  • User-Agent Spoofing: Rotate strings to prevent categorization.
  • Disable 3rd-Party Cookies: Essential to stop cross-site tracking pixels.

Data is for informational purposes only.

ASN Info

ASN Info displays the autonomous system and ISP associated with the IP, helping assess whether its network origin is trustworthy.

ASN CIDR Information Routing address Registry
AS45839 111.90.148.0/22 Shinjiru Technology Sdn Bhd Kuala Lumpur, MY APNIC

Aggregated IP Information

A consolidated list of IP information automatically collected, deduplicated, and unified from multiple independent data sources.

Data Sources Country/Area City Time zone IP type
CheckIP United States Smithtown America/New_York Broadband/ISP
IP-API-IS United States Smithtown America/New_York Broadband/ISP

Risk Assessment

Fraud Score: 10
Low Risk High Risk
IP address 173.56.230.18 is a broadband/ISP address managed by Verizon Business. This IP has a low fraud score and is generally considered safe.

Other site fraud scores


abuse
ipapi
scamalytics

IP Abuse Reports

A comprehensive fraud-risk assessment for 111.90.150.204, leveraging multi-dimensional data such as geolocation, network attributes, behavioral history, and reputation scoring to support accurate security decisions.

Fraud Risk Breakdown

80
Fraud Score
Low Risk High Risk
0 100

IP address 111.90.150.204 is managed by Shinjiru Technology Sdn Bhd. Recent analysis indicates this IP is likely a Data Center/Proxy connection and presents high fraud risk.

Other Scores

abuse 15%
ipapi 80%
ipqs 75%
scamaly 90%

Distribution

By Country
Mainly Malaysia
By Service
Data Center
By Organisation
Shinjiru Technology

IP Reverse Search

IP Address 111.90.150.204
Region Kuala Lumpur, MY
Domains Resolved 12 (Hosting IP)

Abuse Reports for 173.56.230.18

This IP was reported 0 times.
Confidence of Abuse is 0%

Historical Report Data

Access past abuse reports and ownership verification details to understand the long-term reputation and security status of this IP address.

Old Reports

This IP address has been reported a total of 0 times from 0 distinct sources. It is possible that this IP is no longer involved in abusive activities.

Is this your IP?

You may request to takedown any associated reports. We will attempt to verify your ownership.

Request Takedown →

Frequently Asked Questions

Common questions and answers regarding IP address analysis, geolocation accuracy, and security risk assessment.

Which country and city is 111.90.150.204 located in?

This IP is located in Kuala Lumpur, Malaysia (Asia/Kuala_Lumpur).

Who is the Internet Service Provider (ISP) for 111.90.150.204?

The ISP is Shinjiru Technology Sdn Bhd, a web hosting provider in Malaysia.

What type of IP address is 111.90.150.204?

It is a Data Center / Web Hosting IP address.

Is 111.90.150.204 a proxy server IP?

Yes, this IP is detected as a proxy/VPN endpoint (Data Center).

Is 111.90.150.204 blacklisted as an IP?

It may be listed on some blacklists due to its nature as a hosting/proxy IP.

What is the fraud score for 111.90.150.204?

The fraud score is 80 (High Risk), indicating potential for abuse.

What fingerprint information does 111.90.150.204 have?

As a data center IP, it may have consistent server-side fingerprints or be used for anonymization.