AlphaSierraGaming
► LAYER 1 — Server-Side Collection

Passive — collected before you clicked anything.

IP Address216.73.216.201
EncryptedYes (HTTPS)
Port443
Host Requestedwww.alphasierragaming.com
Referrer(none - direct navigation or referrer suppressed)
User AgentMozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
Languages
Encodingsgzip, br, zstd, deflate
Query String(none)
► LAYER 2 — Client-Side Collection

JavaScript — your browser reports in.

Screen Resolutioncollecting...
Viewport Sizecollecting...
Color Depthcollecting...
Pixel Ratiocollecting...
Platformcollecting...
Browser Languagecollecting...
Timezonecollecting...
UTC Offsetcollecting...
Cookies Enabledcollecting...
Local Storagecollecting...
Touch Capablecollecting...
Online Statuscollecting...
Do Not Trackcollecting...
CPU Corescollecting...
Page Load Timecollecting...
► RAW HTTP HEADERS — Everything Your Browser Transmitted
Connection: close Accept: */* Accept-Encoding: gzip, br, zstd, deflate Host: www.alphasierragaming.com User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
► LAYER 3 — What This Site Has Stored In Your Browser
Scope: This only shows what alphasierragaming.com has stored in your browser. Every other site you visit maintains its own equivalent store — tokens, credentials, preferences, tracking identifiers — invisible unless you look. Keys flagged like this contain patterns associated with auth tokens or session data.
● Cookies (0)
● sessionStorage (0 items)
(none)
● localStorage (0 items)
(none)
► LAYER 4 — Device Battery Status
Battery Level
checking...
Charging
Time to Full
Time to Empty
OPSEC implication: Battery level can be used as a cross-site tracking vector. A low battery device visiting multiple sites can be correlated even across VPNs and private browsing sessions because the battery state is consistent regardless of identity measures. Firefox and Safari have restricted this API specifically because of this.
► WHAT THIS MEANS — OPSEC TAKEAWAY

Every item above was collected without your consent, without a login, and without you clicking anything. This is standard browser behavior — not an exploit.

  • IP Address — Geolocatable to city/region. VPNs mask this; many mobile carriers do not.
  • Referrer — Reveals where you came from, including search terms in some cases.
  • User Agent — Identifies OS, browser, and version. Partial fingerprint on its own.
  • Accept-Language — Reveals locale even when IP is masked by a foreign VPN exit node.
  • Screen + Timezone + Platform — Together these form a browser fingerprint capable of tracking you across sessions with no cookies required.
  • Do Not Track — A request, not a requirement. Most sites ignore it entirely.
  • CPU Cores / Pixel Ratio — Hardware fingerprinting. Narrows device identification significantly.
  • Browser Storage — Sites leave tokens, identifiers, and cached data in your browser. Most users never see it.
  • Battery Status — A persistent hardware fingerprint that survives VPNs and private browsing.
The parallel: This is EMCON discipline applied to your browser. Every HTTP request your machine makes is a transmission. Adversaries — commercial, criminal, and state-level — collect this passively, at scale, continuously. You are always broadcasting. The question is who is listening.

That was passive collection.

Want to see what an active intelligence sweep finds on your IP?
Or see exactly what our server logged about your visit today?

▲ Generate Intelligence Dossier on My IP ► What My Server See's - Log Entries ★ Generate Full Intelligence Dossier
Copyright © 2020-2026 AlphaSierraGaming - All Rights Reserved