WhoerIP Glossary - whoeripcom/whoeripcom GitHub Wiki

📖 WhoerIP Glossary of Terms

Welcome to the WhoerIP Glossary, your comprehensive reference for terms related to IP analysis, browser fingerprinting, VPN/proxy detection, anti-fraud techniques, and online anonymity. Use this resource to better understand the technology behind internet privacy, tracking, and defense tools.

A

Account Farming – Creating or buying large numbers of online accounts to bypass restrictions or for malicious use.

Account Verification Bypass – Techniques used to circumvent email, phone, or identity verification mechanisms.

Ad Blocker Detection – A method used by websites to detect if a user is running an ad blocker.

Ad Fraud Prevention – Strategies to identify and block fake ad impressions or fraudulent clicks.

Aged Cookies – Browser cookies that have been stored over time and used to track long-term behavior.

Anti-Bot Detection – Systems that identify and mitigate bot traffic based on behavior or fingerprints.

Anti-Fingerprint Browser – Browsers designed to prevent or reduce the uniqueness of a user's fingerprint.

Antidetect Browser – Specialized browsers that mimic real-user environments and randomize identifiers to bypass detection.

API Blocking – Preventing access to public or private APIs to stop automated or malicious usage.

Audio Fingerprinting – Tracking method based on analyzing the sound card and audio stack of a device.

Automated Browsing Detection – Identifying non-human browsing behavior using pattern recognition and JavaScript tests.

B

Behavioral Analytics – Tracking and analyzing user behavior to detect anomalies or fraudulent patterns.

Bot Detection – Methods used to identify and prevent access by automated scripts and crawlers.

Bot Detection Software – Tools specifically built to flag and handle bot activity in web environments.

Bot Detection Test – A diagnostic process to see if a bot detection system flags the current session.

Bot Traffic – Non-human traffic generated by scripts, crawlers, or bots.

Browser Automation – Automating browser tasks using tools like Selenium or Puppeteer.

Browser Extension – Add-ons or plugins installed in browsers that can affect privacy or behavior.

Browser Fingerprinting – Collecting and analyzing browser properties to create a unique user identifier.

Browser Isolation – Security approach that runs browsing sessions in a sandboxed or virtual environment.

Browser Session Spoofing – Imitating or modifying session data to appear as a different user.

Browser Tracking – Monitoring and storing a user's activity across sessions or sites.

Browser User-Agent – A browser's identifier string sent to websites indicating its type and version.

C

Canvas Fingerprinting – Drawing invisible elements on canvas and analyzing rendering differences to identify devices.

Canvas Graphics – Graphics rendered using HTML5 Canvas, often used in fingerprinting.

CAPTCHA – Test used to distinguish humans from bots, often via puzzles or image selection.

CAPTCHA Solving Bots – Automated scripts or services designed to solve CAPTCHA challenges.

Clickjacking Protection – Techniques to prevent users from unknowingly clicking hidden UI elements.

Client Hints Test – Analyzing additional headers provided by the browser to aid fingerprinting or optimization.

Client Rects – Browser-rendered coordinates of DOM elements used in fingerprinting.

Client-Side Encryption – Encrypting data directly in the browser before sending it to a server.

ClientRects Fingerprinting – Using client rectangle data from DOM elements for device identification.

Cloaking – Serving different content to users and search engines to hide behavior or bypass detection.

Cloud Browsing – Using cloud-based browsers to isolate or anonymize activity.

Content Blocking – Preventing loading of specific scripts, ads, or third-party elements.

Content Security Policy (CSP) – HTTP header that defines rules for content loading to prevent XSS and injection attacks.

Cookie Isolation – Separating cookies by site or context to prevent cross-site tracking.

Cookie Manager – Tools or settings that let users manage and delete browser cookies.

Cross-Site Tracking – Tracking users across different domains using shared identifiers or cookies.

D

Data Scraping – Automatically extracting data from websites or services.

Datacenter Proxy – Proxy servers hosted in data centers, often flagged as non-residential.

Dedicated Proxy – A proxy IP used by a single client or session to avoid detection.

Deep Packet Inspection (DPI) – Analyzing internet traffic in detail for filtering or monitoring.

Device Emulation – Simulating a specific device in the browser or scraper.

Device ID Tracking – Tracking users based on unique device identifiers.

Device Spoofing – Faking device properties like resolution or OS to mask identity.

Digital Fingerprint – A combination of attributes that uniquely identify a device or browser.

Digital Fingerprinting – The process of collecting a digital fingerprint.

Digital Footprint – The trail of data left behind from online activity.

DNS Leak Protection – Preventing DNS queries from escaping encrypted tunnels (VPNs).

DNS Leak Test – Checking whether DNS requests are routed securely.

DNS Prefetching – Browser optimization that resolves domain names in advance.

DOM Mutation – Changes to the structure of a webpage, often tracked or exploited.

E

Evercookie – A super-persistent cookie technique using multiple storage methods to regenerate itself.

F

Fingerprint Masking – Changing certain fingerprint elements to make a user harder to track.

Fingerprint Randomization – Randomly rotating fingerprint properties on each session or request.

Fingerprint Spoofing – Faking fingerprint attributes to appear as another device.

Flash Cookie Tracking – Obsolete method of tracking via Flash storage objects.

Font Data – Information about installed or rendered fonts, often used in fingerprinting.

Fonts Fingerprint – Unique identifier created based on font availability and rendering.

G

Geolocation Access – Requesting permission to access user location via the browser.

Geolocation Data – Information about a user's physical location.

Geolocation Spoofing – Faking geolocation data to appear in another location.

Google FLoC – Deprecated method for grouping users into cohorts for ad targeting.

Google Penalty – Search ranking punishment due to policy violations.

Google Topics API – Privacy-oriented alternative to tracking cookies using topic-based ads.

H

Hardware Concurrency – Number of processor threads available, used in fingerprinting.

Hardware Fingerprinting – Identifying a device using hardware-level attributes.

Headless Browsing – Running a browser without GUI, typically for automation.

Heuristic Detection – Detecting bots based on rule-based behavior patterns.

HSTS – Security mechanism enforcing HTTPS for a domain.

HTML5 Canvas – Element used for rendering graphics, often involved in fingerprinting.

HTML5 Storage – Local and session storage in browsers.

HTTP Headers – Metadata sent with HTTP requests, often revealing browser info.

HTTP/2 Fingerprinting – Identifying clients by patterns in HTTP/2 traffic.

Human Typing Simulation – Mimicking natural typing speed and pauses to bypass bot detection.

I

Identity Spoofing – Faking identity or credentials in a digital context.

Incognito Mode – Private browsing mode that doesn't save history or cookies.

IndexedDB – Browser-based database storage.

Invisible CAPTCHA – CAPTCHA tests that run in the background to detect bots silently.

IP Address – A numeric label assigned to each device connected to a network.

IP Quality Score – A score indicating the trustworthiness or risk of an IP address.

IP Risk Score – Metric representing how likely an IP is to be flagged or blocked.

IP Rotation – Regularly changing IP addresses to avoid detection.

IP Spoofing – Falsifying the source IP address of network traffic.

J

JavaScript Behavioral Tests – Scripts that analyze user behavior to detect automation.

K

Keystroke Dynamics – Behavioral biometrics based on typing rhythm.

M

Malware Fingerprinting – Identifying malware via its behavioral or code fingerprint.

Mouse Movement Emulation – Simulating cursor movement to appear human.

Multi-Session Browsing – Managing multiple isolated browser sessions.

O

Online Anonymity – State of using the internet without revealing identity.

P

P2P Networks – Decentralized peer-to-peer systems.

Page Visibility API – Browser API showing if a page is visible or hidden.

Port Scan Protection – Blocking attempts to scan open ports on a device.

Pre-Made Cookies – Predefined cookies injected into browser profiles.

Privacy Sandbox – Google's initiative to replace third-party cookies with privacy-preserving alternatives.

Private Proxy – A proxy IP used exclusively by one user.

Proxy Chaining – Using multiple proxy servers in sequence.

Proxy Management – Tools and methods to rotate, manage, and configure proxies.

Proxy Server – An intermediary server between user and destination website.

R

Referrer Spoofing – Modifying the referrer header to hide the source page.

Residential Proxy – Proxy that routes traffic through real residential IPs.

Reverse Fingerprinting – Attempting to identify users who are trying to avoid fingerprinting.

Reverse Proxy – A server that routes incoming traffic to other servers internally.

Rotating Proxy – A proxy that changes its IP on every request or session.

S

Sandbox Browsing – Running browser sessions in isolated environments.

Script Injection – Inserting malicious scripts into web pages.

Secure Browsing – Practices and tools that ensure safe web navigation.

Session Hijacking – Taking over a user session to impersonate or steal data.

Session Management – Handling user sessions securely and efficiently.

Session Replay – Recording and replaying user interactions for analytics or debugging.

Shadow Ban – Blocking or limiting a user's visibility without their knowledge.

Shared Proxy – A proxy used by multiple users simultaneously.

SSL Pinning – Ensuring a client connects to a specific certificate.

SSL/TLS Client Test – Diagnosing SSL/TLS properties for client fingerprinting.

Static Residential Proxy – Residential IPs that don't change during use.

Stealth Browsing – Browsing without leaving detectable traces.

Supercookies – Tracking mechanisms stored outside regular cookies.

T

TCP Stack – The implementation of TCP used by a system, often fingerprintable.

Timezone Spoofing – Faking timezone settings to obscure true location.

TLS Fingerprinting – Identifying clients based on TLS handshake patterns.

Traffic Fingerprinting – Analyzing encrypted traffic patterns to infer activity.

Transparent Proxy – A proxy that doesn't modify requests or hide itself.

U

Unmasked Renderer – The actual graphics renderer revealed by WebGL.

URL Parameter Obfuscation – Hiding or encoding tracking data in URLs.

User Agent Spoofing – Faking browser user-agent string.

User-Agent Redirection – Redirecting users based on their user-agent string.

V

Virtual Browser – A browser running in a virtual environment.

VPN Kill Switch – A feature that blocks traffic if the VPN connection drops.

W

WebDriver Detection – Detecting automation tools like Selenium.

WebGL – JavaScript API for rendering graphics in browsers.

WebGL Fingerprint – Unique ID based on WebGL rendering.

WebGL Renderer – The graphics engine identified via WebGL.

WebGPU Browser – Browsers that support the new WebGPU API.

WebGPU Metadata – Fingerprint data derived from WebGPU.

WebRTC Leak – Real IP exposure via WebRTC.

WebRTC Protocol – Protocol suite enabling browser-based real-time communication.

WebRTC STUN – Protocol component that may reveal internal IPs.

Z

Zombie Cookies – Cookies that resurrect themselves from multiple storage locations.

Want to see what websites know about you? 👉 Test your IP and fingerprint now