nossl.sh

// Trigger the captive hotel/airport Wi‑Fi login page, never HTTPS, never SSL

Connection report

IP address

🇺🇸 United States - Columbus / AMAZON-02

Free Geo + ASN lookup
🗼 Your DNS Resolver
...
🌐 Protocol
HTTP/1.0
📡 Ping
Measuring…
🧾 Headers captured
10
🕒 Generated
2026-02-07 08:08:20 UTC

Headers

Request headers

10 headers

Links

Need step-by-step help? Browse the full guide index for hotels, cafes, and mobile walkthroughs.

Need the honeypot console? Visit the /honeypot dashboard.

Need service counters? Visit the service status page.

cURL

cURL your public IP - the alternative to ifconfig.me.

IPv4 $ curl http://nossl.sh
IPv6 $ curl http://v6.nossl.sh
Status $ curl -i http://nossl.sh/status/418
Geo + ASN $ curl 'http://nossl.sh/api/ip?1.1.1.1'

APIs

JSON endpoints

Prefer JSON? Try /api/request-info for the full request breakdown.

FAQ

Why plain HTTP?

Why no TLS?
Captive portals and restrictive networks often block HTTPS handshakes. HTTP keeps the splash page visible.
What can I use this for?
Spot VPN or proxy issues, capture headers for debugging, and confirm whether the network is online.
Is there an API?
Yes — use the request info endpoint for JSON.
Can I see my DNS resolver?
Yes — the connection report shows the DNS resolver IP using a beacon lookup to surface recursive resolver details.

How to use this page

Plain HTTP for quick checks

See your real IP, request method, and headers without HTTPS in the way. Great for captive portals, firewall tests, or debugging VPN/proxy quirks.

  • Open http://nossl.sh to trigger captive portal pages.
  • Share a snapshot link if support needs proof.
  • See the DNS resolver IP via the beacon lookup on the connection report.

Support

Support this project

This is a free-to-use project. If it helps, consider supporting it.

Buy me a coffee