Live snapshot
Connection report
Headers
Request headers
9 headers
| Header | Value |
|---|---|
| accept | text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 |
| accept-encoding | br,gzip |
| accept-language | en-US,en;q=0.5 |
| connection | close |
| host | nossl.sh |
| user-agent | CCBot/2.0 (https://commoncrawl.org/faq/) |
| x-forwarded-for | 18.97.14.88 |
| x-forwarded-proto | http |
| x-real-ip | 18.97.14.88 |
How to use this page
Plain HTTP for quick checks
See your real IP, request method, and headers without HTTPS in the way. Great for captive portals, firewall tests, or debugging VPN/proxy quirks.
- Open http://nossl.sh to trigger captive portal pages.
- Share a snapshot link if support needs proof.
Need step-by-step help? Browse the full guide index for hotels, cafes, and mobile walkthroughs.
cURL examples
cURL IPv4/IPv6, any HTTP status
cURL your public IP - the alternative to ifconfig.me.
$ curl http://nossl.sh
→ 18.97.14.88
cURL your IPv6:
$ curl http://v6.nossl.sh
→ ipv6
Check any HTTP status:
$ curl -i http://nossl.sh/status/418
→ HTTP/1.1 418 I'm a Teapot
Lookup any IP (Geo + ASN):
$ curl 'http://nossl.sh/api/ip?1.1.1.1'
API references:
- /api/request-info — current IP, scheme, headers.
- /api/counters — request counters snapshot.
- /api/honeypot — honeypot hits as JSON.
- /api/ip?1.1.1.1 — Geo + ASN for any IP.
- /api/as15169 — ASN details, org, and prefixes.
- /status/:code — return any HTTP status; add
?location=for redirects.
Need the honeypot console? Visit the /honeypot dashboard.
Need service counters? Visit the service status page.
FAQ
Why plain HTTP?
- Why no TLS?
- Captive portals and restrictive networks often block HTTPS handshakes. HTTP keeps the splash page visible.
- What can I use this for?
- Spot VPN or proxy issues, capture headers for debugging, and confirm whether the network is online.
- Is there an API?
- Yes — use the request info endpoint for JSON.
Support
Support this page
This is a free-to-use project. If it helps, consider supporting it.
Buy me a coffee