Understanding IP Leaks
Think you're hidden behind a VPN? You might be leaking your true identity without knowing it.
1. DNS Leaks
When you enter a website name, your computer asks a DNS server for its IP. Even with a VPN, these "queries" can sometimes bypass the secure tunnel and go to your ISP's servers.
Impact: Your ISP can still see every website you visit, even if the traffic itself is encrypted.
2. WebRTC Leaks
WebRTC is a technology built into browsers (Chrome, Firefox, Safari) for video calling. Unfortunately, WebRTC can be tricked into revealing your local IP address and your public IP address directly to a website, bypassing any VPN.
Fix: Install a WebRTC block extension or disable WebRTC in your browser's advanced settings.
3. IPv6 Leaks
Many VPNs only support IPv4. If your ISP provides you with an IPv6 address, your computer might send IPv6 traffic outside the VPN tunnel while the IPv4 traffic stays inside.
Fix: Disable IPv6 in your operating system or use a VPN that explicitly supports or blocks IPv6 leaks.
How to Test for Leaks
- Note your real IP address without the VPN.
- Connect your VPN and run our Proxy Checker tool.
- If the tool shows your "ISP Address" or "True IP" matching your step 1 address, you have a leak.
- Check specifically for "Transparent Proxy" headers or WebRTC detection.
Summary of Prevention
- Use a VPN with a Kill Switch (cuts internet if VPN drops).
- Change your DNS servers to Cloudflare (1.1.1.1) or Google (8.8.8.8).
- Regularly test your connection using tools like our Proxy Checker.
Run a Privacy Scan
Our Real-time Proxy Checker can help identify if your headers are leaking your true identity.
Start Leak Test →