DNS Leak Test
Check whether DNS resolver queries line up with your HTTP exit IP, VPN, proxy, country, ASN, or trusted public DNS provider.
Key Tools and References
Frequently Asked Questions
What is a DNS leak?
A DNS leak happens when domain lookups use a resolver outside your expected VPN, proxy, or secure DNS path, which can expose browsing destinations to an ISP or another network operator.
How do I know if my DNS is leaking?
Compare the DNS resolver IPs with the HTTP exit IP. A resolver in the same VPN network, same organization, same country, or a trusted public DNS network is usually expected; a mismatched local ISP resolver is a strong leak signal.
Is using Google DNS or Cloudflare DNS a DNS leak?
Not always. Public resolvers such as Google DNS or Cloudflare DNS can be intentional and safe, but they may still reveal DNS queries to that resolver instead of to your VPN provider.
Can a VPN still leak DNS?
Yes. DNS leaks can happen when the operating system keeps old DNS servers, IPv6 bypasses the tunnel, split tunneling is enabled, or the browser uses a separate secure DNS setting.
Why does my DNS resolver show a different country?
Many DNS providers use anycast and route you to a nearby or regional node. A different country is a warning sign only when it conflicts with your VPN or proxy expectations and resolver ownership also looks wrong.
Does this test store my DNS queries?
This test uses a short-lived random token and in-memory observations. It does not persist resolver results, tokens, or full user IP addresses in a database.