Why Test Your Fingerprint?
Setting up an antidetect browser profile is just the first step. You need to verify that your fingerprint is actually working correctly. A misconfigured profile can leak your real identity or produce inconsistent data that flags your account.
Important: Always test your fingerprint setup before using a profile for real accounts. A 5-minute test can save you from account bans.
Step-by-Step Testing Workflow
Step 1: Prepare Your Profile
Before testing, make sure your antidetect browser profile is properly configured:
- Open your antidetect browser (MoreLogin, AdsPower, GoLogin, etc.)
- Create a new profile or select an existing one
- Assign a proxy β residential proxy recommended for best results
- Set the profile timezone and language to match your proxy location
- Launch the profile
Step 2: Test with BrowserLeaks
Visit: browserleaks.com
BrowserLeaks is the most comprehensive fingerprint testing suite. Test each section in order:
2a. Canvas Fingerprint β browserleaks.com/canvas
- Look at the Signature hash β it should be unique per profile
- Open 2 profiles side by side β their Canvas hashes should be different
- If they match, your antidetect browser isn't spoofing Canvas properly
- Expected result: β
Unique hash like
4a8b2c1d9e7f3a5b
2b. WebGL Report β browserleaks.com/webgl
- Check the Unmasked Renderer field β it should show a real GPU model
- Verify it matches the OS you're spoofing (e.g., no NVIDIA RTX on a "macOS" profile)
- Expected result: β
GPU like
ANGLE (NVIDIA, NVIDIA GeForce GTX 1660 SUPER)
2c. WebRTC Leak Test β browserleaks.com/webrtc
- CRITICAL CHECK β WebRTC can expose your real IP even behind a proxy
- Your real local IP should NOT appear anywhere
- The public IP should match your proxy IP
- Expected result: β Only proxy IP shown, no local IP leaks
2d. Font Detection β browserleaks.com/fonts
- The number and list of fonts should match the spoofed OS
- Windows profiles should show Windows fonts, macOS profiles should show macOS fonts
- Expected result: β Font list consistent with the spoofed operating system
2e. Audio Context β browserleaks.com/javascript
- The AudioContext fingerprint should be unique per profile
- Expected result: β Unique audio hash
Step 3: Test with CreepJS
Visit: abrahamjuliot.github.io/creepjs
CreepJS is the most advanced detection test. Wait 10-15 seconds for all tests to complete.
What to check:
- Trust Score β higher is better, aim for 70%+
- Lies Detected β should be 0 for best results
- Fingerprint Grade β A or B is good, C or below needs fixing
- Browser/OS consistency β CreepJS checks if all parameters tell a coherent story
How to read results:
- π’ Green items = passing, your fingerprint is good
- π‘ Yellow items = suspicious, may need adjustment
- π΄ Red items = detected tampering, needs immediate fixing
Common CreepJS warnings and fixes:
- "Navigator lies detected" β Update your antidetect browser to the latest version
- "Canvas/WebGL mismatch" β Reset fingerprint settings and regenerate
- "Timezone inconsistency" β Match timezone to proxy location
Step 4: Test with Pixelscan
Visit: pixelscan.net
Pixelscan provides a quick visual check with clear pass/fail indicators:
Expected results:
- IP/Timezone β β Match (green)
- Browser/OS β β Consistent (green)
- WebRTC β β No Leak (green)
- Overall Status β β Consistent
If any item shows β (red), refer to the troubleshooting section below.
Step 5: Test with IPHey
Visit: iphey.com
IPHey focuses on IP and browser consistency:
- Overall Score β aim for "Real" or "Good" rating
- IP Quality β check your proxy isn't flagged
- Browser Fingerprint β should show as unique and consistent
Detailed Parameter Checklist
| Parameter | Where to Test | What to Look For | Fix If Wrong |
|---|---|---|---|
| Canvas Hash | BrowserLeaks /canvas | Unique per profile | Regenerate fingerprint |
| WebGL Renderer | BrowserLeaks /webgl | Real GPU model | Update GPU settings |
| WebRTC IP | BrowserLeaks /webrtc | Only proxy IP | Enable WebRTC blocking |
| Timezone | Pixelscan | Match proxy location | Set correct timezone |
| Language | BrowserLeaks /javascript | Match proxy country | Update language settings |
| Screen Size | BrowserLeaks /javascript | Common resolution | Use 1920x1080 or 1366x768 |
| User Agent | BrowserLeaks /javascript | Current Chrome/Firefox | Update browser version |
| Fonts | BrowserLeaks /fonts | Match spoofed OS | Reset font settings |
| Audio | BrowserLeaks /javascript | Unique hash | Regenerate audio fingerprint |
| Platform | CreepJS | Match other parameters | Ensure OS consistency |
Troubleshooting Common Issues
Problem: Same Canvas hash across all profiles
Cause: Canvas spoofing is disabled or using the same seed
Fix: In your antidetect browser settings:
- Find the Canvas/Fingerprint section
- Set Canvas mode to "Noise" or "Unique per profile"
- Regenerate the profile fingerprint
- Retest on BrowserLeaks
Problem: WebRTC leaking real IP
Cause: WebRTC protection is not enabled
Fix:
- In profile settings, find WebRTC section
- Set to "Disabled" or "Proxy Only"
- Relaunch the profile
- Verify at browserleaks.com/webrtc
Problem: Timezone doesn't match IP location
Cause: Profile timezone not matching proxy location
Fix:
- Check your proxy's actual location (e.g., New York)
- Set profile timezone to match (America/New_York)
- Also update the language (en-US) and geolocation coordinates
Problem: CreepJS shows "Lies detected"
Cause: Fingerprint parameters are inconsistent
Fix:
- Don't mix parameters from different OS/browser combinations
- Use your antidetect browser's auto-fingerprint feature
- Avoid manually overriding individual parameters unless necessary
Problem: Pixelscan shows "Inconsistent"
Cause: One or more parameters don't match each other
Fix:
- Check the specific red items in Pixelscan
- Most common: timezone/IP mismatch or browser/OS mismatch
- Reset the profile and use automatic fingerprint generation
Testing Best Practices
- Test every new profile before using it for real accounts
- Test after proxy changes β a new proxy might need timezone/language adjustments
- Test periodically β antidetect browser updates can change fingerprint behavior
- Use multiple test tools β no single tool catches everything
- Compare profiles β open 2 profiles side by side and verify they look different
- Save working configurations β once a profile passes all tests, note the settings for future reference