IP Leak Test
Check whether HTTP exit IP, WebRTC candidates, DNS resolvers, IPv6 stack, VPN or proxy traits, and browser network hints expose unexpected network information.
Key Tools and References
Frequently Asked Questions
What is an IP leak?
An IP leak happens when a browser, DNS resolver, WebRTC candidate, IPv6 route, proxy, or VPN setup exposes network information that differs from the public IP path you expected to use.
Can a VPN still leak my IP address?
Yes. A VPN can leak through WebRTC candidates, DNS resolvers, IPv6 traffic, split tunneling, browser settings, or a disconnected VPN client.
What is the difference between an IP leak and a DNS leak?
An IP leak exposes an address or route outside the expected connection path. A DNS leak exposes the resolver handling domain lookups, which can reveal an ISP or country even when the HTTP IP is a VPN.
Does WebRTC expose my real IP?
Modern browsers often mask local addresses with mDNS, but WebRTC can still expose private candidates or a public candidate that differs from the HTTP exit IP on some networks.
Is IPv6 leaking different from IPv4 leaking?
Yes. A VPN or proxy may protect IPv4 while leaving IPv6 traffic on the normal ISP route. That can reveal an IPv6 address even when the visible IPv4 address looks protected.
Why does my IP look like a datacenter or proxy?
VPNs, hosting networks, cloud services, privacy relays, and corporate gateways often use datacenter or proxy-like IP ranges. That classification is context, not automatic proof of a leak.
Does this IP leak test store my data?
The browser-only WebRTC and fingerprint fields are shown in the current session and are not sent to third parties. The HTTP IP check calls this site's first-party IP endpoint.