WhoerIP Glossary - whoeripcom/whoeripcom GitHub Wiki
📖 WhoerIP Glossary of Terms
Welcome to the WhoerIP Glossary, your comprehensive reference for terms related to IP analysis, browser fingerprinting, VPN/proxy detection, anti-fraud techniques, and online anonymity. Use this resource to better understand the technology behind internet privacy, tracking, and defense tools.
A
Account Farming – Creating or buying large numbers of online accounts to bypass restrictions or for malicious use.
Account Verification Bypass – Techniques used to circumvent email, phone, or identity verification mechanisms.
Ad Blocker Detection – A method used by websites to detect if a user is running an ad blocker.
Ad Fraud Prevention – Strategies to identify and block fake ad impressions or fraudulent clicks.
Aged Cookies – Browser cookies that have been stored over time and used to track long-term behavior.
Anti-Bot Detection – Systems that identify and mitigate bot traffic based on behavior or fingerprints.
Anti-Fingerprint Browser – Browsers designed to prevent or reduce the uniqueness of a user's fingerprint.
Antidetect Browser – Specialized browsers that mimic real-user environments and randomize identifiers to bypass detection.
API Blocking – Preventing access to public or private APIs to stop automated or malicious usage.
Audio Fingerprinting – Tracking method based on analyzing the sound card and audio stack of a device.
Automated Browsing Detection – Identifying non-human browsing behavior using pattern recognition and JavaScript tests.
B
Behavioral Analytics – Tracking and analyzing user behavior to detect anomalies or fraudulent patterns.
Bot Detection – Methods used to identify and prevent access by automated scripts and crawlers.
Bot Detection Software – Tools specifically built to flag and handle bot activity in web environments.
Bot Detection Test – A diagnostic process to see if a bot detection system flags the current session.
Bot Traffic – Non-human traffic generated by scripts, crawlers, or bots.
Browser Automation – Automating browser tasks using tools like Selenium or Puppeteer.
Browser Extension – Add-ons or plugins installed in browsers that can affect privacy or behavior.
Browser Fingerprinting – Collecting and analyzing browser properties to create a unique user identifier.
Browser Isolation – Security approach that runs browsing sessions in a sandboxed or virtual environment.
Browser Session Spoofing – Imitating or modifying session data to appear as a different user.
Browser Tracking – Monitoring and storing a user's activity across sessions or sites.
Browser User-Agent – A browser's identifier string sent to websites indicating its type and version.
C
Canvas Fingerprinting – Drawing invisible elements on canvas and analyzing rendering differences to identify devices.
Canvas Graphics – Graphics rendered using HTML5 Canvas, often used in fingerprinting.
CAPTCHA – Test used to distinguish humans from bots, often via puzzles or image selection.
CAPTCHA Solving Bots – Automated scripts or services designed to solve CAPTCHA challenges.
Clickjacking Protection – Techniques to prevent users from unknowingly clicking hidden UI elements.
Client Hints Test – Analyzing additional headers provided by the browser to aid fingerprinting or optimization.
Client Rects – Browser-rendered coordinates of DOM elements used in fingerprinting.
Client-Side Encryption – Encrypting data directly in the browser before sending it to a server.
ClientRects Fingerprinting – Using client rectangle data from DOM elements for device identification.
Cloaking – Serving different content to users and search engines to hide behavior or bypass detection.
Cloud Browsing – Using cloud-based browsers to isolate or anonymize activity.
Content Blocking – Preventing loading of specific scripts, ads, or third-party elements.
Content Security Policy (CSP) – HTTP header that defines rules for content loading to prevent XSS and injection attacks.
Cookie Isolation – Separating cookies by site or context to prevent cross-site tracking.
Cookie Manager – Tools or settings that let users manage and delete browser cookies.
Cross-Site Tracking – Tracking users across different domains using shared identifiers or cookies.
D
Data Scraping – Automatically extracting data from websites or services.
Datacenter Proxy – Proxy servers hosted in data centers, often flagged as non-residential.
Dedicated Proxy – A proxy IP used by a single client or session to avoid detection.
Deep Packet Inspection (DPI) – Analyzing internet traffic in detail for filtering or monitoring.
Device Emulation – Simulating a specific device in the browser or scraper.
Device ID Tracking – Tracking users based on unique device identifiers.
Device Spoofing – Faking device properties like resolution or OS to mask identity.
Digital Fingerprint – A combination of attributes that uniquely identify a device or browser.
Digital Fingerprinting – The process of collecting a digital fingerprint.
Digital Footprint – The trail of data left behind from online activity.
DNS Leak Protection – Preventing DNS queries from escaping encrypted tunnels (VPNs).
DNS Leak Test – Checking whether DNS requests are routed securely.
DNS Prefetching – Browser optimization that resolves domain names in advance.
DOM Mutation – Changes to the structure of a webpage, often tracked or exploited.
E
Evercookie – A super-persistent cookie technique using multiple storage methods to regenerate itself.
F
Fingerprint Masking – Changing certain fingerprint elements to make a user harder to track.
Fingerprint Randomization – Randomly rotating fingerprint properties on each session or request.
Fingerprint Spoofing – Faking fingerprint attributes to appear as another device.
Flash Cookie Tracking – Obsolete method of tracking via Flash storage objects.
Font Data – Information about installed or rendered fonts, often used in fingerprinting.
Fonts Fingerprint – Unique identifier created based on font availability and rendering.
G
Geolocation Access – Requesting permission to access user location via the browser.
Geolocation Data – Information about a user's physical location.
Geolocation Spoofing – Faking geolocation data to appear in another location.
Google FLoC – Deprecated method for grouping users into cohorts for ad targeting.
Google Penalty – Search ranking punishment due to policy violations.
Google Topics API – Privacy-oriented alternative to tracking cookies using topic-based ads.
H
Hardware Concurrency – Number of processor threads available, used in fingerprinting.
Hardware Fingerprinting – Identifying a device using hardware-level attributes.
Headless Browsing – Running a browser without GUI, typically for automation.
Heuristic Detection – Detecting bots based on rule-based behavior patterns.
HSTS – Security mechanism enforcing HTTPS for a domain.
HTML5 Canvas – Element used for rendering graphics, often involved in fingerprinting.
HTML5 Storage – Local and session storage in browsers.
HTTP Headers – Metadata sent with HTTP requests, often revealing browser info.
HTTP/2 Fingerprinting – Identifying clients by patterns in HTTP/2 traffic.
Human Typing Simulation – Mimicking natural typing speed and pauses to bypass bot detection.
I
Identity Spoofing – Faking identity or credentials in a digital context.
Incognito Mode – Private browsing mode that doesn't save history or cookies.
IndexedDB – Browser-based database storage.
Invisible CAPTCHA – CAPTCHA tests that run in the background to detect bots silently.
IP Address – A numeric label assigned to each device connected to a network.
IP Quality Score – A score indicating the trustworthiness or risk of an IP address.
IP Risk Score – Metric representing how likely an IP is to be flagged or blocked.
IP Rotation – Regularly changing IP addresses to avoid detection.
IP Spoofing – Falsifying the source IP address of network traffic.
J
JavaScript Behavioral Tests – Scripts that analyze user behavior to detect automation.
K
Keystroke Dynamics – Behavioral biometrics based on typing rhythm.
M
Malware Fingerprinting – Identifying malware via its behavioral or code fingerprint.
Mouse Movement Emulation – Simulating cursor movement to appear human.
Multi-Session Browsing – Managing multiple isolated browser sessions.
O
Online Anonymity – State of using the internet without revealing identity.
P
P2P Networks – Decentralized peer-to-peer systems.
Page Visibility API – Browser API showing if a page is visible or hidden.
Port Scan Protection – Blocking attempts to scan open ports on a device.
Pre-Made Cookies – Predefined cookies injected into browser profiles.
Privacy Sandbox – Google's initiative to replace third-party cookies with privacy-preserving alternatives.
Private Proxy – A proxy IP used exclusively by one user.
Proxy Chaining – Using multiple proxy servers in sequence.
Proxy Management – Tools and methods to rotate, manage, and configure proxies.
Proxy Server – An intermediary server between user and destination website.
R
Referrer Spoofing – Modifying the referrer header to hide the source page.
Residential Proxy – Proxy that routes traffic through real residential IPs.
Reverse Fingerprinting – Attempting to identify users who are trying to avoid fingerprinting.
Reverse Proxy – A server that routes incoming traffic to other servers internally.
Rotating Proxy – A proxy that changes its IP on every request or session.
S
Sandbox Browsing – Running browser sessions in isolated environments.
Script Injection – Inserting malicious scripts into web pages.
Secure Browsing – Practices and tools that ensure safe web navigation.
Session Hijacking – Taking over a user session to impersonate or steal data.
Session Management – Handling user sessions securely and efficiently.
Session Replay – Recording and replaying user interactions for analytics or debugging.
Shadow Ban – Blocking or limiting a user's visibility without their knowledge.
Shared Proxy – A proxy used by multiple users simultaneously.
SSL Pinning – Ensuring a client connects to a specific certificate.
SSL/TLS Client Test – Diagnosing SSL/TLS properties for client fingerprinting.
Static Residential Proxy – Residential IPs that don't change during use.
Stealth Browsing – Browsing without leaving detectable traces.
Supercookies – Tracking mechanisms stored outside regular cookies.
T
TCP Stack – The implementation of TCP used by a system, often fingerprintable.
Timezone Spoofing – Faking timezone settings to obscure true location.
TLS Fingerprinting – Identifying clients based on TLS handshake patterns.
Traffic Fingerprinting – Analyzing encrypted traffic patterns to infer activity.
Transparent Proxy – A proxy that doesn't modify requests or hide itself.
U
Unmasked Renderer – The actual graphics renderer revealed by WebGL.
URL Parameter Obfuscation – Hiding or encoding tracking data in URLs.
User Agent Spoofing – Faking browser user-agent string.
User-Agent Redirection – Redirecting users based on their user-agent string.
V
Virtual Browser – A browser running in a virtual environment.
VPN Kill Switch – A feature that blocks traffic if the VPN connection drops.
W
WebDriver Detection – Detecting automation tools like Selenium.
WebGL – JavaScript API for rendering graphics in browsers.
WebGL Fingerprint – Unique ID based on WebGL rendering.
WebGL Renderer – The graphics engine identified via WebGL.
WebGPU Browser – Browsers that support the new WebGPU API.
WebGPU Metadata – Fingerprint data derived from WebGPU.
WebRTC Leak – Real IP exposure via WebRTC.
WebRTC Protocol – Protocol suite enabling browser-based real-time communication.
WebRTC STUN – Protocol component that may reveal internal IPs.
Z
Zombie Cookies – Cookies that resurrect themselves from multiple storage locations.
Want to see what websites know about you? 👉 Test your IP and fingerprint now