Connection report
Headers
Request headers
10 headers
| Header | Value |
|---|---|
| accept | */* |
| accept-encoding | gzip, br, zstd, deflate |
| cache-control | max-age=259200 |
| connection | close |
| host | nossl.sh |
| user-agent | Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) |
| via | 1.1 squid-proxy-5b5d847c96-kvcjn (squid/6.13) |
| x-forwarded-for | 216.73.216.118 |
| x-forwarded-proto | http |
| x-real-ip | 216.73.216.118 |
Links
Guides, tools, and dashboards
Need step-by-step help? Browse the full guide index for hotels, cafes, and mobile walkthroughs.
- Captive portal diagnostics
- Wi‑Fi login page tester
- Mobile Wi‑Fi troubleshooting
- List of countries by IPv4 address allocation
- Top ASNs by IPv4 address space
- Free Geo + ASN lookup
- Free Geo + ASN MMDB database
Need the honeypot console? Visit the /honeypot dashboard.
Need service counters? Visit the service status page.
cURL
cURL your public IP - the alternative to ifconfig.me.
IPv4
$ curl http://nossl.sh
IPv6
$ curl http://v6.nossl.sh
Status
$ curl -i http://nossl.sh/status/418
Geo + ASN
$ curl 'http://nossl.sh/api/ip?1.1.1.1'
APIs
JSON endpoints
Prefer JSON? Try /api/request-info for the full request breakdown.
- /api/request-info — current IP, scheme, headers.
- /api/counters — request counters snapshot.
- /api/honeypot — honeypot hits as JSON.
- /api/ip?1.1.1.1 — Geo + ASN for any IP.
- /api/as15169 — ASN details, org, and prefixes.
- /status/:code — return any HTTP status; add
?location=for redirects.
FAQ
Why plain HTTP?
- Why no TLS?
- Captive portals and restrictive networks often block HTTPS handshakes. HTTP keeps the splash page visible.
- What can I use this for?
- Spot VPN or proxy issues, capture headers for debugging, and confirm whether the network is online.
- Is there an API?
- Yes — use the request info endpoint for JSON.
- Can I see my DNS resolver?
- Yes — the connection report shows the DNS resolver IP using a beacon lookup to surface recursive resolver details.
How to use this page
Plain HTTP for quick checks
See your real IP, request method, and headers without HTTPS in the way. Great for captive portals, firewall tests, or debugging VPN/proxy quirks.
- Open http://nossl.sh to trigger captive portal pages.
- Share a snapshot link if support needs proof.
- See the DNS resolver IP via the beacon lookup on the connection report.
Support
Support this project
This is a free-to-use project. If it helps, consider supporting it.
Buy me a coffee