You're running into a
very common and frustrating issue when working with fingerprint masking: different websites (like
pixelscan.net,
browserscan.net, and
whoer.net) use
different detection algorithms, heuristics, and thresholds to determine whether you're masking your browser or device fingerprint.
Let’s break this down
step-by-step, so you can understand what’s going on and how to fix it.
1. Why Pixelscan.net Still Says You're Masking Your Fingerprint
What pixelscan.net is checking
Pixelscan.net uses advanced techniques to detect:
- Inconsistencies in the browser environment
- Use of browser isolation, remote sessions, headless browsers, virtual machines
- Mismatches between:
- JavaScript APIs (Canvas, WebGL, WebRTC)
- OS-level system calls (e.g., CPU, GPU info)
- Font lists
- Audio fingerprint
- Device memory
- Battery status
- Touch support
- TLS stack fingerprints
Even if your browser passes basic fingerprint spoofing checks, pixelscan.net might still detect subtle signs that you're using an anti-detect setup — especially if:
- You're using a fingerprint-spoofing browser like Multilogin, GoLogin, Kameleo, Incogniton, etc.
- You're using a remote browser (RBI) or headless browser
- You're behind a containerized or sandboxed environment
- Your browser's TLS stack doesn't match the claimed platform
- Your system fonts are mismatched
- You’re using WebGL spoofing but not audio or canvas
- Your navigator.userAgentData doesn’t match navigator.userAgent
2. How to Fix This / Investigate Further
Since pixelscan.net doesn't show you exactly which part of your setup is triggering the "masking fingerprint" flag, here's what you can do:
A. Use Debug Tools
Try these tools to inspect your browser fingerprint in detail:
Use these to compare your current setup vs. a real machine.
B. Check for Obvious Red Flags
Here are some
common red flags that may be causing pixelscan.net to flag you:
Metric | Problem | Solution |
---|
Canvas/WebGL rendering | Too perfect or inconsistent | Use partial spoofing instead of full canvas override |
AudioContext fingerprint | Not spoofed or mismatched | Enable audio fingerprint spoofing |
Fonts list | Too clean or missing standard fonts | Add back default fonts (Arial, Times New Roman, etc.) |
devicePixelRatiomismatch | Doesn’t match screen size | Match DPR to actual display scaling |
navigator.platform,oscpu,appVersion | Doesn't match claimed OS | Ensure spoofed values match target OS |
TLS stack signature | Doesn't match Chrome/Windows | Use native Chromium builds or avoid emulation layers |
Battery API | Disabled or spoofed unnaturally | Leave battery enabled unless necessary |
WebGL vendor/renderer | Fake or mismatched | Use realistic values like Intel/AMD/NVIDIA drivers |
C. Try These Fixes in Your Antidetect Browser
If you're using an antidetect browser like
Multilogin,
GoLogin,
Kameleo, etc., try the following:
1.
Turn off full fingerprint spoofing temporarily
Instead of applying a full fingerprint profile, manually tweak only the parts you need (e.g., IP + User-Agent + Timezone). Some systems trigger alerts if too much is spoofed.
2.
Disable stealth mode / fingerprint protection modules
Some antidetect browsers have stealth modes that aggressively mask everything — which can look suspicious. Disable them and apply selective spoofing.
3.
Use native resolution and DPR
Don’t spoof screen size to something unusual. Also, ensure your DPI/DPR matches the expected value for your resolution.
4.
Use a real Windows VM or RDP
If you're using Linux-based containers or emulators, switch to a
real Windows VPS or RDP. This reduces the chance of TCP/IP stack mismatches and OS-level inconsistencies.
5.
Avoid browser isolation services
Services like Incogniton, Tenebris, ZeroTab, RemoteBrowsers.net stream video or proxy traffic from a remote browser. They often get flagged because they don’t behave like real local browsers.
3. Why Browserscan.net and Whoer.net Give Different Scores
This is
completely normal.
Site | Focus | Detection Level |
---|
pixelscan.net | High-end fingerprint detection | Very strict, detects even minor spoofing |
browserscan.net | Uniqueness score | Looks at general entropy, less aggressive |
whoer.net | Privacy leak test | Mainly focused on leaks (IP, DNS, WebRTC), not deep fingerprinting |
So it's possible to score
95% unique on browserscan.net and still be flagged by pixelscan.net as “masking fingerprint” — because they measure
different things.
4. Best Setup That Passes All Tests
Here's a setup that
passes most fingerprint tests, including pixelscan.net:
Option 1: Real Machine with Controlled Spoofing
- Use a clean Windows PC or laptop
- Run a real Chrome browser
- Use User-Agent switcher or Proxy SwitchyOmega for minimal spoofing
- Don’t use any antidetect software
- Set up a real residential proxy (not shared)
Option 2: Clean Windows VPS + Local Profile
- Rent a Windows VPS (Contabo, Hetzner, AWS, etc.)
- Connect via RDP
- Use native Chrome (no antidetect browser)
- Apply spoofing selectively (UA + Proxy + TZ)
- Avoid sandboxed environments
Option 3: Use Native Chromium Builds (Advanced)
- Compile or download a real Chromium build
- Avoid wrapping it inside Electron or Puppeteer
- Run without automation flags (--disable-blink-features=AutomationControlled)
- Manually spoof only needed fields
TL;DR – Summary Table
Tool | Detects Masking? | Notes |
---|
pixelscan.net | Yes | Most sensitive to spoofing/fake environments |
browserscan.net | Partial | Shows uniqueness %, less aggressive |
whoer.net | No | Focuses on leaks, not deep fingerprinting |
Setup | Likely to Pass pixelscan.net? |
---|
Antidetect browser (GoLogin, Multilogin, etc.) | Often flagged |
Headless browser (Puppeteer, Playwright) | Almost always flagged |
Remote browser isolation (Incogniton, ZeroTab) | Usually flagged |
Clean Windows VM or VPS + real Chrome | Most reliable |
Real physical PC + real Chrome | Best option |
Bonus: Chrome Flags to Check
Open chrome://flags and disable these if enabled:
- #enable-automation
- #disable-blink-features=AutomationControlled
- #headless
Also check for:
JavaScript:
navigator.__proto__.webdriver
It should return undefined.
Final Advice
If you're being flagged by pixelscan.net, it's likely due to:
- Over-spoofing or unnatural spoofing patterns
- Use of non-native environments (containers, Electron wrappers)
- Mismatched subsystems (TLS stack, fonts, DPR, etc.)
To truly pass all fingerprint checks:
- Use a real Windows machine or VPS
- Use native Chrome
- Only spoof what’s necessary
- Avoid automated or isolated browser environments
Would you like me to help you test your current setup or suggest a specific configuration based on your goals (e.g., Amazon, eBay, social media, etc.)?