nossl.sh

What is nossl.sh?

What is nossl.sh?

A modern diagnostic splash page that mirrors NeverSSL while adding live request details.

Live snapshot

Connection report

IP address

🇺🇸 United States

🌐 Protocol
HTTP/1.0 · HTTP (no TLS)
📡 Ping
Measuring…
🧾 Headers captured
8
🕒 Generated
2025-12-22 11:09:45 UTC

Headers

Request headers

8 headers

Why nossl.sh exists

Many captive portals refuse to load on HTTPS-only sites. nossl.sh serves plain HTTP so restricted networks expose their login forms.

When you load the page it echoes your headers, IP address, and connection type so you can prove what the network sees.

  • Trigger hotel, airport, and campus captive portals.
  • Validate that a device can resolve DNS and negotiate HTTP.
  • Inspect raw headers to debug proxy rewriting or filters.

Key diagnostics you receive

Beyond being a simple landing page, nossl.sh keeps a running counter of HTTP vs HTTPS requests and shows the headers your device transmits.

  • Connection snapshot with scheme, IP, and timestamp.
  • Copyable JSON of every header the request sent.
  • Quick jump to the honeypot dashboard that tracks /.env scans.

Is nossl.sh safe to open?

The site intentionally serves over HTTP to mimic NeverSSL. It does not run scripts that change your system, but you should only use it on networks you trust.

Can I automate checks against nossl.sh?

Yes. Use curl or fetch the /api/request-info endpoint to capture the same data programmatically.

Quick steps to trigger captive portals

Apple captive portal check

Open the official Apple CNA page to force the captive assistant on iOS and macOS devices.

Open Apple captive portal

Android captive portal check

Use the Android connectivity check URL that devices call before presenting the portal dialog.

Open Android captive portal