How to Use BrowserScan to Detect Browser Fingerprints
Risks of Multi-Accounting
Whether in the e-commerce sector, social media platforms, advertising placements, or affiliate marketing, multi-account operations have become a common operational strategy. However, the implementation of this strategy may face a neglected risk, that is, the leakage of browser fingerprints!
Browser fingerprints
are unique sets of information composed of your device and browser settings. If you use the same device and browser while operating multiple accounts, then the browser fingerprints of these accounts will be identical. This could attract the attention of the platform, as it may be considered as brushing or fraudulent behavior, leading to account bans.
For example, on e-commerce platforms, sellers often create multiple accounts to increase product exposure and sales. However, if the browser fingerprints of these accounts are the same, they may be recognized as spam accounts by the platform, resulting in restrictions or bans. Similarly, on social media platforms, marketers also create multiple accounts to promote products or brands. If the browser fingerprints of these accounts are the same, they may be recognized as fraudulent behavior by the platform, thereby affecting marketing results and revenue.
Anti-Detect Browsers Are Not a Panacea
Even though many users have become aware of the risks of browser fingerprinting and have started using fingerprint browsers to mask their real device information, this does not mean that their accounts are completely safe. In fact, due to the different technologies used by different fingerprint browsers, or improper use, personal information may still be leaked, or a false browser fingerprint may be generated. This could lead to the user's device being marked as suspicious by the website platform, or multiple accounts being marked as associated.
Therefore, when using a fingerprint browser, users need to utilize a tool to:
-
Check if their browser fingerprint is authentic
-
See if the local real IP address will be leaked
-
Compare the fingerprint of the fingerprint browser with the browser fingerprint of the real device
-
Compare whether there are many repetitions in the browser fingerprints of different accounts
After confirming the authenticity of the browser fingerprint, it is obviously safer to operate multiple accounts.
Using BrowserScan to Detect Browser Fingerprints
By accessing
browserscan.net
with a fingerprint browser or any other browser, you can understand the complete browser fingerprint just by waiting a few seconds.Overview
In this section, you will check the authenticity of the browser fingerprint, giving you a rough understanding of the current browser fingerprint. The main information is as follows:
-
IP address
-
Postal code of the IP address location
-
Geolocation of the IP address (Country, Latitude and Longitude)
-
Time zone of the IP address location
-
Internet service provider of the IP address
-
Browser version being used
-
Operating system of the current device
-
Whether a proxy server is being used
If the authenticity of the browser fingerprint is only 90% or lower, then you need to continue to look at more detailed fingerprint information.
(Values in Red Font are areas of deduction)
IP Address
BrowserScan will use WebRTC to detect if your real IP address will leak. This is because
WebRTC can leak the user's real IP address
. As shown in the figure, the IP address visiting BrowserScan is from the United States, but WebRTC leaked the real IP address (Singapore). In the eyes of some platforms, this user's behavior may be abnormal, especially on some social media platforms.When you use an anti-detect browser, please be sure to check the IP address to see if WebRTC has leaked your real IP address.
Geolocation
This part can understand the attribution of an IP address (country, state/region, city, postal code), latitude and longitude, and other information. If you need to understand more accurate
geolocation
, you can click "Show my location on the map" to view. (It can be displayed normally after allowing BrowserScan to obtain the current location information.)
Browser
This part is mainly to view browser-related information, such as the operating system and version used by the current user, the type and version of the browser.
The information about
UserAgent
, browser plugins, and other information.
Hardware
This part is mainly to view hardware-related fingerprint information, such as GPU information, memory size, CPU concurrency, screen resolution,
media device fingerprints
,Canvas fingerprint
,WebGL fingerprint
, etc.
For example, when the fingerprint browser uses the UserAgent of Mac OS, if the fingerprint browser does not simulate the real Apple computer's GPU information, then the hardware fingerprint information will not match the UserAgent information. This kind of abnormal browser fingerprint will arouse the suspicion of the platform.
Software
The software part is mainly to view the timezone of the IP, check the
local time of the IP address
location,the language used by the browser
,font fingerprint
, whetherDo Not Track
, Cookie and other functions are enabled.
When an IP address is located in the United States, the timezone and local time should also be in the United States, not in other countries.
At the same time, if you are using automated scripts to control the browser, you should also check whether the
browser behaves like a robot
, because website platforms usually do not welcome "robot" visits.Use the automatic detection function of BrowserScan to see if the current browser has "robot characteristics".
Port scanning
not only risks exposing your personal information but also carries the risk of being hacked. You can use port detection to see if there are any open ports.
Other Tools
In addition to detecting browser fingerprints, BrowserScan also provides other tools. In the previous section, we introduced the automated detection tool and port detection tool. In addition, BrowserScan also offers IP address lookup and Cookie format conversion tools.
IP Address Lookup
BrowserScan's
IP address lookup
feature includes seven major IP databases and can query the ownership information of an IP address in seven different IP databases. Due to database synchronization delays and differences, it is possible that the same IP address will yield different ownership results when queried in different IP databases. Therefore, when you are operating multiple accounts on a website, and the website is sensitive to changes in the IP address of the account, this feature can come in handy. If the proxy IP address used appears to have different ownership, then you might need to consider changing it.
Cookie Converter
You can check whether there are any missing fields in the Cookie.
BrowserScan supports converting Cookies from Netscape format to JSON format.
Conclusion
BrowserScan is constantly researching browser fingerprinting and continuously optimizing techniques to detect browser fingerprints. If you are currently using anti-detect browsers like AdsPower, Multilogin, Gologin, etc., you might as well use BrowserScan for a detection, just like doing a health checkup, to see if there are any abnormalities. Based on the abnormal information detected by BrowserScan, you can then use different solutions to solve these problems, thereby making your account environment more realistic and your account more secure.
In general, BrowserScan.net is a powerful browser fingerprints detection tool that can help you understand browser fingerprints and help you in protecting your personal privacy and network security.
How to add PrivateProxy in ixBrowser
PrivateProxy.me
account. Then click Buy proxies and choose the type of proxy (residential or datacenter proxy, etc.), package, purpose and country;Step 2: After completing the payment go to My Proxies tab and click IPs, which will reveal your proxy list with all the required credentials;
Step 3: Download, install, and login to
ixBrowser
;Step 4: Click "Create Profile" button, in the pop-up page, choose the platform and group, and enter profile info;
Step 5: Go to "Proxy Configuration" page, select the Proxy Method to Custom, and enter the proxy info we generated in Step 2, and press Network Detection;
Step 6: Once the detection passed, you can click create button and start using the proxy with ixBrowser;
How too add Goproxy in ixBrowser
Goproxy
dashboard;Step 2: Click “Get Now” button to go to Pricing page, select the package you want, and follow the guidance to purchase it;
Step 3: Then go to “Username:Password Authentication” page, set the info of the proxy and generate;
Step 4: Download, install, and login to
ixBrowser
;Step 5: Click “Create Profile” button, in the pop-up page, choose the platform and group, and enter profile info;
Step 6: Go to “Proxy Configuration” page, select the Proxy Method to Custom, and enter the proxy info we generated in Step 3, and press Network Detection;
Step 7: Once the detection passed, you can click create button and start using the proxy with ixBrowser;
How to add 922 S5 Proxy in ixBrowser
Step 1:
Register an account on the 922 S5 Proxy official website and download and install the 922 client.
Website:
https://www.922proxy.com/
Step 2:
①On the ProxyList interface, filter by country, state, city, etc., then click Search to find proxies.
②Right-click on the desired proxy, select Forward Port to Proxy, and finally click on a port.
③Open the port forwarding list, copy the proxy information by clicking [Copy].
Step 3:
Open the ixBrowser client, click [Create Profile], choose Socks5 as the proxy type, paste the copied proxy information from Step 2 into the designated area, and finally click [Test] to check if the proxy is working.
Once the proxy test is successful, showing detailed IP information, click [Create] to save the browser configuration. You can now use the browser normally.
The above instructions are for using the 922 S5 Proxy client. Another method is available using username and password authentication, which is web-based and doesn't require downloading a client.
Step 1:
Log in to your account on the 922 S5 Proxy website and navigate to the username/password authentication page.
①Choose the ISP package type.
②Select the country.
③Choose the city.
④Enter the hostname, port, and your username and password information. The username is generated by default and cannot be changed, but the password can be modified.
⑤Select the number of commands to generate.
⑥Choose the format for the username and password.
⑦Click to generate.
⑧Click to copy.
Step 2:
Open the ixBrowser client, click [Create Profile], choose Socks5 as the proxy type, paste the copied proxy information from Step 1 into the designated area, and finally click [Test] to check if the proxy is working.
Note: When pasting in the blue box labeled ②, Proxy Port, Proxy Account, and Proxy Password will be automatically filled.
After a successful proxy test, showing detailed IP information, click [Create] to save the browser configuration. You can now use the browser normally.
For more features and promotional information, visit the official website:
https://www.922proxy.com/
The Best Practices of Facebook Account Transactions
Over recent years, Facebook's user count has shown consistent growth. With its position as the foremost platform in social media marketing, Facebook undeniably offers immense opportunities for business expansion and growth. Facebook is no longer a simple social tool for people. It has also become one of the important ways to attract fans, acquire customers, publish advertisements, etc.
Whether they are employees of advertising agencies, e-commerce sellers, or other groups in need, a single Facebook account obviously cannot meet their needs. Compared with the time-consuming and laborious process of creating accounts in batches, many people choose to meet their needs for multiple accounts by purchasing accounts.
However, during the account transaction process, a situation may occur. The account is obviously running well with the seller, but when you log in after receiving the account, you find that the account has been banned.
What causes these problems? What's a good solution? In this article, we will talk about these two questions.
What causes Facebook account bans?
The answer is Facebook's risk control rules and detection mechanism. There is no doubt that Facebook's advertising effect is good, and it is also the preferred platform for many cross-border e-commerce sellers. However, as more and more people join, Facebook's risk control rules are becoming more and more strict. If you are not careful, you will Facing the risk of account closure.
What are Facebook's risk control rules?
Facebook Community Standards & User Regulations Rules
These rules include not posting malicious content, not using false identities, not harassing other users, and more. If users violate these rules, their accounts may be banned. However, as long as we abide by these rules and operate the account for a period of time to increase the weight of the account, these problems can be easily avoided.
Digital Fingerprint Isolation + IP Isolation
Facebook does not allow a user to have multiple accounts, so they try to detect correlations between accounts. The two most important ones are environmental (digital fingerprint) detection and IP detection.
Therefore, you need to ensure that the environment and IP of each of your accounts are not marked as risky by Facebook, and these environments and IPs need to be completely independent and stable.
How can we ensure that the account environment and IP are safe and completely independent?
The answer is anti-detect browser. Although, this purpose can be achieved by using traditional isolation methods (like VPS or multiple network cable). However, compared to anti-detect browsers, these methods are more expensive, have higher technical requirements, and are less flexible.
Of course, even for anti-detect browsers, most products on the market have higher basic package fees and usage restrictions, which is still a considerable expense. Therefore, as a permanently free fingerprint browser, ixBrowser is your best choice. It not only can generate a completely independent and real fingerprint environment for each of your accounts, but also equipped with a cost-effective proxies so that you can use it directly bind with the profile after purchase, thereby achieving the dual isolation effect of fingerprints and IPs.
Profile Transfer Function in ixBrowser
ixBrowser does seem to be effective in preventing account association, but as mentioned above, if the user purchases the account from a seller, how to ensure that the purchased account will not be banned due to changes in environment and IP?
Don't worry, in the latest version of ixBrowser V1.7.28, we have updated the window transfer function. The birth of this function makes ixBrowser the best tool for account buying and selling transactions.
Sellers can use ixBrowser to create independent profiles for each account and configure an independent IPs. After a buyer purchases an account, the seller can transfer the Facebook account to the buyer's ixBrowser account through profile transfer function. At the same time, based on user needs, sellers can also transfer the bound IPs in the profile. Because account information, fingerprint configuration, cookie information, proxy configuration are all transferred together and remain unchanged during the transfer process, account bans caused by changes in the fingerprint environment and IP can be minimized.
If you want to get the idea about how to use this function, please check our video:
https://youtu.be/BLF6HiCs1fA
The window transfer function can not only be used to transfer Facebook accounts, but is also suitable for account transfers on other platforms. If you want to know more about ixBrowser, you can contact our customer service:
Telegram:
https://t.me/+7WWG4XRaiCxjM2E1
Skype: