Debug captive portals with confidence
nossl.sh lets you trigger and troubleshoot captive portals on public Wi-Fi, enterprise networks, or even tiny embedded systems.
nossl.sh lets you trigger and troubleshoot captive portals on public Wi-Fi, enterprise networks, or even tiny embedded systems.
Live snapshot
IP address
IPv6 address
IPv6 address
🇺🇸 United States
Headers
| Header | Value |
|---|---|
| accept | */* |
| accept-encoding | gzip, br, zstd, deflate |
| cache-control | max-age=259200 |
| connection | close |
| host | nossl.sh |
| user-agent | Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) |
| via | 1.1 squid-proxy-5b5d847c96-788gb (squid/6.13) |
| x-forwarded-for | 216.73.216.63 |
Most operating systems check for internet by making plain old HTTP requests. nossl.sh gives you a clean, predictable endpoint that acts just like these checks, making sure your network’s splash page pops up when it should.
With nossl.sh, you can see exactly how DNS, redirects, and HTTP requests behave during captive portal logins. Spot problems like broken proxies or endless authentication loops in no time.
A captive portal is that web page you get when you connect to public Wi-Fi and have to sign in or agree to terms before you can actually get online.
Absolutely. nossl.sh is built to copy the endpoints devices use to trigger login pages, so it’s perfect for testing Wi-Fi networks and router setups.
Open the official Apple CNA page to force the captive assistant on iOS and macOS devices.
Open Apple captive portalUse the Android connectivity check URL that devices call before presenting the portal dialog.
Open Android captive portal