ThereYouWere is a real-time browser fingerprinting and threat intelligence demonstration. When you visit, the site silently profiles your browser using a combination of canvas rendering, WebGL parameters, audio processing, font enumeration, and network probing — the same techniques used by fraud detection systems, ad networks, and security researchers worldwide.
Most people have no idea how much their browser reveals about them. This project exists to make that visible. Privacy tools like VPNs and incognito mode offer far less protection than their users believe. ThereYouWere shows you exactly what can be seen.
Your IP is cross-referenced in real time against multiple open-source threat intelligence feeds: AbuseIPDB for reported abuse history, VirusTotal for malicious activity, Shodan for exposed services and vulnerabilities, and URLhaus for blacklisted referrer URLs. Results are delivered directly to your terminal window.
Yes. All data collected is done via passive, client-side browser APIs that operate under standard web behavior. No malware is installed. No credentials are captured. This is a demonstration of open browser behaviors, not an attack.