nossl.sh

// Trigger the captive hotel/airport Wi‑Fi login page, never HTTPS, never SSL

Live snapshot

Connection report

IP address

🇺🇸 United States

🌐 Protocol
HTTP/1.0 · HTTP (no TLS)
📡 Ping
Measuring…
🧾 Headers captured
8
🕒 Generated
2025-12-23 10:13:29 UTC

Headers

Request headers

8 headers

How to use this page

Plain HTTP for quick checks

See your real IP, request method, and headers without HTTPS in the way. Great for captive portals, firewall tests, or debugging VPN/proxy quirks.

  • Open http://nossl.sh to trigger captive portal pages.
  • Share a snapshot link if support needs proof.

Need step-by-step help? Browse the full guide index for hotels, cafes, and mobile walkthroughs.

cURL examples

cURL IPv4/IPv6, any HTTP status

cURL your public IP - the alternative to ifconfig.me.

$ curl http://nossl.sh
→ 216.73.216.63

cURL your IPv6:

$ curl http://v6.nossl.sh
→ ipv6

Check any HTTP status:

$ curl -i http://nossl.sh/status/418
→ HTTP/1.1 418 I'm a Teapot

API references:

Need the honeypot console? Visit the /honeypot dashboard.

FAQ

Why plain HTTP?

Why no TLS?
Captive portals and restrictive networks often block HTTPS handshakes. HTTP keeps the splash page visible.
What can I use this for?
Spot VPN or proxy issues, capture headers for debugging, and confirm whether the network is online.
Is there an API?
Yes — use the request info endpoint for JSON.