This project mimics a Cloudflare-style "Attention Required!" page with a deceptive verification UI that gathers extensive browser fingerprinting and system data. It collects user information and transmits it to a Telegram bot, including geolocation, browser metadata, WebRTC/IP, audio fingerprinting, a webcam snapshot, and more.
⚠️ Disclaimer: This project is for educational and ethical research purposes only. Do not deploy this without proper consent. Unauthorized usage may violate privacy laws and platform policies.
- Mimics Cloudflare-style verification page.
- Collects:
- Public IP address
- Geolocation (latitude, longitude)
- Browser metadata
- WebGL fingerprint
- Canvas fingerprint
- Audio fingerprint
- LocalStorage/IndexedDB unique IDs
- Installed fonts
- WebRTC IPs
- Network info (downlink, RTT, etc.)
- Autofill leakage detection
- Webcam snapshot (if allowed)
- Battery status
- Plugins & mimeTypes
- Sends all collected data (and image snapshot) to a Telegram bot.
-
Clone or copy the project files.
-
Create your configuration file:
Copy the example config and fill in your Telegram credentials:
cp config.example.js config.js
Then edit
config.jsand replace the placeholder values:const CONFIG = { TELEGRAM_BOT_TOKEN: "your-actual-bot-token", TELEGRAM_CHAT_ID: "your-actual-chat-id", };
⚠️ Never commitconfig.jsto version control. It is listed in.gitignoreto prevent accidental exposure of your credentials. -
Host the project files on a web server (e.g. GitHub Pages, Vercel, Netlify, or your own server). Make sure
config.jsis deployed alongside the HTML files. -
Open the hosted URL in a browser or share the link with users (only with permission).
- The user is shown a verification-style box.
- Upon clicking, the page:
- Collects fingerprint & environment info.
- Captures webcam snapshot (if permission is granted).
- Sends the data and image to the configured Telegram bot.
- Displays a fake "verification success" and redirects to google.com.
This tool should only be used:
- In controlled environments (e.g. red teaming, honeypots).
- With full user consent.
- For research or detection of browser fingerprinting.
Do NOT use it for malicious activity.
-
HTML5, CSS3
-
Vanilla JavaScript
-
Web APIs:
getUserMediagetBatterynavigator.plugins,navigator.mimeTypesindexedDB,localStorageRTCPeerConnectionCanvas,WebGL,AudioContext
verify.html # Simple verification page
needsmoreperm.html # Advanced Cloudflare-style verification page
config.example.js # Template for Telegram credentials
config.js # Your actual credentials (git-ignored)
.gitignore # Excludes config.js from version control
✅ Try it after hosting. The fake Cloudflare box will collect data and redirect.
This code includes surveillance and fingerprinting logic. You are fully responsible for how you use it. Unauthorized data collection is illegal in many jurisdictions.
Always inform and obtain consent from your users.
This project is released under the MIT License — feel free to modify and use responsibly.
---