Passive OS fingerprint masking (TCP/IP fingerprint) in Multilogin
What is TCP/IP fingerprinting?
Websites can identify a device’s operating system (OS) by analyzing network traffic patterns. Each OS has a unique way of handling network data (TCP/IP stack), creating an OS fingerprint that can be detected passively – meaning no extra requests are needed.
How to check your OS fingerprint
You can check this fingerprint on browserleaks.com/ip under "TCP/IP Fingerprint". But keep in mind:
- Using a proxy? Your proxy server repackages your network data, which can result in a different OS fingerprint than your real one
- Running Multilogin on a VM? The test might show your actual OS, no matter what OS you set in the profile
How to mask TCP/IP fingerprint
TCP/IP fingerprinting happens at the connection level, so Multilogin can't change it. But don’t worry – most websites ignore this detail because mismatches are common due to network setups and devices.
Want to mask your OS fingerprint? Some proxy services like iproxy.online specialize in hiding this info.