Tool — 100% Browser-Side · No Server · No Logs

VPN & IP Leak Tester

Your VPN may be leaking your real identity to every site you visit. Run four checks in seconds — WebRTC, DNS, IPv6, and public IP — to find out exactly what corporations and trackers can see.

Your IP Addressdetecting…
Locationdetecting…
ISP / Networkdetecting…
VPN Detectedchecking…


Four-Point Leak Check

No data leaves your browser. Tests use WebRTC APIs, Cloudflare DNS-over-HTTPS, and public IP lookups — nothing touches our servers.

Public IPWaiting
Your visible address. With a VPN active, this should be the VPN server's IP — not your home connection.
WebRTC LeakWaiting
WebRTC can expose your real IP through the browser even with a VPN active. Chrome and Firefox are vulnerable by default.
DNS ResolverWaiting
If DNS queries go to your ISP instead of your VPN, your ISP sees every domain you visit — even with VPN on.
IPv6 ExposureWaiting
Most VPNs only tunnel IPv4. An active IPv6 address can bypass the tunnel entirely and expose your real location.

VPN leak detected? Time to upgrade.

These providers have independently verified no-log policies and built-in WebRTC and DNS leak protection.

How your identity leaks

Public IP
Your VPN's entire job is to replace your IP with the server's IP. If the address shown here belongs to your home ISP, your VPN is not working — or not running at all.
WebRTC Leak
Browsers use WebRTC for real-time communication. The protocol can expose your real IP directly to any website — bypassing your VPN tunnel entirely. Advertising networks actively exploit this.
DNS Leak
Every domain you visit is a DNS query. If those queries go to your ISP instead of your VPN's resolver, your ISP has a complete log of your browsing — even with VPN active. ISPs sell this data.
IPv6 Exposure
Most VPNs only route IPv4. If your connection has an IPv6 address, it may route outside the tunnel — revealing your real ISP, location, and network identity to every server you contact.