Good, stable, never-SSL alternative - nossl.sh
nossl.sh is engineered to never negotiate SSL/TLS on its primary endpoint while delivering real diagnostics for every request.
nossl.sh is engineered to never negotiate SSL/TLS on its primary endpoint while delivering real diagnostics for every request.
Live snapshot
IP address
IPv6 address
IPv6 address
🇺🇸 United States
Headers
| Header | Value |
|---|---|
| accept | */* |
| accept-encoding | gzip, br, zstd, deflate |
| cache-control | max-age=259200 |
| connection | close |
| host | nossl.sh |
| user-agent | Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) |
| via | 1.1 squid-proxy-5b5d847c96-788gb (squid/6.13) |
| x-forwarded-for | 216.73.216.63 |
This endpoint exists for one purpose: stay on classic HTTP so captive portals reveal themselves. There are no surprise upgrades, HSTS headers, or certificate detours.
Teams rely on it when they need a deterministic NeverSSL clone that is actively maintained and monitored for uptime.
While the page remains plain HTTP, it also gives you concrete evidence of what the network sees so you can troubleshoot confidently.
nossl.sh adds operational context without breaking the all-HTTP contract meant to mimic NeverSSL.
No. The main helper endpoint stays on HTTP by design so captive portals cannot dodge it. A separate HTTPS preview exists, but the default route never upgrades.
The project is monitored 24/7, deployed across redundant regions, and backed by simple service checks so travelers and ops teams can trust it in the field.
Open the official Apple CNA page to force the captive assistant on iOS and macOS devices.
Open Apple captive portalUse the Android connectivity check URL that devices call before presenting the portal dialog.
Open Android captive portal