VPN Leak Test: Is Your VPN Actually Hiding Your IP?

You paid for a VPN. You clicked connect. The app shows a green checkmark and says "Protected." But is your real IP address actually hidden?

This guide walks you through four quick tests anyone can run in under two minutes.

Run the full VPN leak test now

Test 1: The Basic IP Check (30 Seconds)

Step 1: Disconnect your VPN completely. Visit our IP checker. Write down your IP address, city, country, and ISP.

Step 2: Connect to your VPN. Choose any server location.

Step 3: Refresh the IP checker. You should see a different IP address, a different city/country, and a different ISP.

If your IP hasn't changed, your VPN is not working.

Test 2: The DNS Leak Test (45 Seconds)

Your IP address might be hidden, but your DNS requests might still go through your ISP's servers. This is called a DNS leak.

Why it matters: Your ISP can see every domain you visit even if they can't see the specific page.

How to test: Connect your VPN and visit our VPN leak test. Check the DNS Servers section.

What you want: DNS servers in the same country as your VPN server.

Test 3: The WebRTC Leak Test (30 Seconds)

WebRTC is a browser technology that enables video calls. It has a feature called "ICE" that discovers your network interfaces. The problem: ICE can discover your real IP address even when your VPN is active.

How to test: Connect your VPN and visit our VPN leak test. Check the WebRTC Detection section.

What you want: No local IP addresses (192.168.x.x or 10.x.x.x) visible.

Test 4: The IPv6 Leak Test (Optional, 30 Seconds)

Most ISPs now provide IPv6 addresses alongside IPv4. Some VPNs only tunnel IPv4 traffic, leaving IPv6 exposed.

How to test: Connect your VPN and visit our IP checker. Check if an IPv6 address is displayed.

What to Do If Tests Fail

IP didn't change: Disconnect and reconnect to a different server, restart your VPN app, check for split tunneling settings.

DNS leaking: Enable "DNS leak protection" in your VPN app, manually set DNS to 1.1.1.1.

WebRTC leaking: Chrome: Install WebRTC Leak Prevent extension. Firefox: about:config → media.peerconnection.enabled → false.

IPv6 leaking: Disable IPv6 on your device or switch to a VPN with native IPv6 support.

Verification Checklist

Before trusting your VPN with sensitive activities, confirm:

  • [ ] IP address changed from real location to VPN server location
  • [ ] DNS servers match VPN provider, not home ISP
  • [ ] No WebRTC leaks showing real IP
  • [ ] No IPv6 leaks
  • [ ] Kill switch is enabled

Run all 4 tests now