← Home

IP Security Analysis

Understanding your connection's security indicators

Your Current Data

VPN/Proxy Detected Checking...
Tor Exit Node Checking...
DNS Leak Checking...
IPv6 Leak Checking...
WebRTC Leak Checking...
Browser Fingerprint Checking...

Note: These security checks help you understand how your connection appears to websites and services. They can reveal potential privacy concerns or confirm that your privacy tools are working correctly.

How Security Analysis Works

🔍 Anonymization Detection
First, we detect what privacy tools you're using
VPN/Proxy Detection Tor Exit Node
🔓 Leak Tests
Then, we check if your protection has any leaks
DNS Leak IPv6 Leak WebRTC Leak
👁️ Trackability
Finally, we measure how easily you can be identified
Browser Fingerprinting

Security Indicators Explained

VPN/Proxy Detection

Your status: Checking...

This check determines whether your IP address appears to be coming from a VPN (Virtual Private Network) or proxy server rather than a regular residential or business connection.

Not Detected Your connection appears to be a regular ISP connection.

Detected Your IP is associated with a known VPN provider, proxy service, or datacenter hosting.

What it means: If you're using a VPN but it shows "Not Detected," your VPN is effectively masking its identity. If it shows "Detected" when you're not using a VPN, your ISP might route traffic through infrastructure that resembles VPN/datacenter IPs.

↑ Back to Your Data

Tor Exit Node

Your status: Checking...

Checks if your IP address is a known Tor network exit node. Tor is a privacy network that routes your traffic through multiple servers to anonymize your connection.

No Your connection is not coming from the Tor network.

Yes Your traffic is exiting through the Tor network.

What it means: If you're using Tor Browser, this should show "Yes." Many websites restrict or block Tor exit nodes due to abuse concerns. If you're not using Tor but this shows "Yes," something unusual is happening with your connection.

↑ Back to Your Data

DNS Leak

Your status: Checking...

DNS (Domain Name System) translates website names like "google.com" into IP addresses. When using a VPN, your DNS requests should also go through the VPN tunnel.

Protected Your DNS requests are going through secure channels (VPN active).

OK DNS is working normally.

No VPN You're not using a VPN - DNS goes through your ISP (normal behavior).

Leak detected Your DNS requests are bypassing your VPN and going directly to your ISP!

What it means: Even with a VPN, if DNS leaks, your ISP can see which websites you're visiting. The location shown (e.g., "DNS: CZ") indicates where your DNS resolver is located.

What to do if leak is detected:

  • Enable "DNS leak protection" in your VPN settings
  • Use a VPN with built-in DNS servers
  • Manually configure secure DNS (Cloudflare 1.1.1.1, Google 8.8.8.8)
↑ Back to Your Data

IPv6 Leak

Your status: Checking...

Many VPNs only protect IPv4 traffic. If your network supports IPv6, traffic might bypass the VPN tunnel entirely, exposing your real location. We detect leaks by comparing the geo-location of your IPv4 and IPv6 addresses.

Protected Your IPv6 is either blocked or tunneled through VPN/Tor (same location as IPv4).

Leak detected! Your IPv6 has a different location than IPv4 - your real location is exposed!

IPv6 visible IPv6 is visible but we couldn't verify if it's leaking (unable to compare locations).

No VPN You're not using a VPN - IPv6 visibility is normal.

No IPv6 Your network doesn't support IPv6 - no leak possible.

What it means: If you see "Leak detected!", your VPN is protecting IPv4 but not IPv6. Websites can see your real IPv6 address and determine your true location.

What to do if leak is detected:

  • Enable IPv6 leak protection in your VPN settings
  • Disable IPv6 on your device/router while using VPN
  • Use a VPN that fully supports IPv6 tunneling
↑ Back to Your Data

WebRTC Leak

Your status: Checking...

WebRTC (Web Real-Time Communication) is a browser technology used for video calls and file sharing. It can sometimes reveal your real IP address even when using a VPN.

Possible statuses (from best to worst protection):

No leak (WebRTC disabled) WebRTC is completely disabled in your browser - maximum privacy.

No leak (VPN protected) You're using a VPN and WebRTC is not exposing any public IP. This means WebRTC is blocked or restricted, providing the best protection while using VPN.

No leak (protected) WebRTC is not exposing any public IP addresses.

No leak (VPN working) You're using a VPN and WebRTC only shows the VPN's IP - your real IP is protected. WebRTC is active but only reveals your VPN server's address, not your actual location.

No leak WebRTC shows the same IP as your public IP - no additional IPs are exposed.

No VPN You're not using a VPN and WebRTC shows your public IP - this is normal.

Leak detected WebRTC is revealing an IP address different from your public IP - your real location may be exposed!

What to do if leak is detected:

  • Disable WebRTC in your browser (extensions are available for this)
  • Use a VPN that includes WebRTC leak protection
  • Use a browser with built-in WebRTC blocking (like Tor Browser or Brave with Tor)
↑ Back to Your Data

Browser Fingerprinting

Your status: Checking...

Browser fingerprinting collects information about your browser and device to create a unique identifier. This can be used to track you across websites even without cookies.

Common Your browser configuration is shared by many users - harder to track.

Somewhat unique Your configuration is less common - you may be trackable.

Very unique Your browser is highly identifiable - easy to track across sites.

For a detailed breakdown of all fingerprint components and how to reduce your uniqueness, visit the dedicated Browser Fingerprint page.

↑ Back to Your Data

Why Security Analysis Matters

Privacy Check: If you're using privacy tools (VPN, Tor), these tests help verify they're working correctly. If a test shows unexpected results, your privacy might be compromised.

On This Page