Understanding your connection's security indicators
Note: These security checks help you understand how your connection appears to websites and services. They can reveal potential privacy concerns or confirm that your privacy tools are working correctly.
This check determines whether your IP address appears to be coming from a VPN (Virtual Private Network) or proxy server rather than a regular residential or business connection.
Not Detected Your connection appears to be a regular ISP connection.
Detected Your IP is associated with a known VPN provider, proxy service, or datacenter hosting.
What it means: If you're using a VPN but it shows "Not Detected," your VPN is effectively masking its identity. If it shows "Detected" when you're not using a VPN, your ISP might route traffic through infrastructure that resembles VPN/datacenter IPs.
↑ Back to Your DataChecks if your IP address is a known Tor network exit node. Tor is a privacy network that routes your traffic through multiple servers to anonymize your connection.
No Your connection is not coming from the Tor network.
Yes Your traffic is exiting through the Tor network.
What it means: If you're using Tor Browser, this should show "Yes." Many websites restrict or block Tor exit nodes due to abuse concerns. If you're not using Tor but this shows "Yes," something unusual is happening with your connection.
↑ Back to Your DataDNS (Domain Name System) translates website names like "google.com" into IP addresses. When using a VPN, your DNS requests should also go through the VPN tunnel.
Protected Your DNS requests are going through secure channels (VPN active).
OK DNS is working normally.
No VPN You're not using a VPN - DNS goes through your ISP (normal behavior).
Leak detected Your DNS requests are bypassing your VPN and going directly to your ISP!
What it means: Even with a VPN, if DNS leaks, your ISP can see which websites you're visiting. The location shown (e.g., "DNS: CZ") indicates where your DNS resolver is located.
What to do if leak is detected:
Many VPNs only protect IPv4 traffic. If your network supports IPv6, traffic might bypass the VPN tunnel entirely, exposing your real location. We detect leaks by comparing the geo-location of your IPv4 and IPv6 addresses.
Protected Your IPv6 is either blocked or tunneled through VPN/Tor (same location as IPv4).
Leak detected! Your IPv6 has a different location than IPv4 - your real location is exposed!
IPv6 visible IPv6 is visible but we couldn't verify if it's leaking (unable to compare locations).
No VPN You're not using a VPN - IPv6 visibility is normal.
No IPv6 Your network doesn't support IPv6 - no leak possible.
What it means: If you see "Leak detected!", your VPN is protecting IPv4 but not IPv6. Websites can see your real IPv6 address and determine your true location.
What to do if leak is detected:
WebRTC (Web Real-Time Communication) is a browser technology used for video calls and file sharing. It can sometimes reveal your real IP address even when using a VPN.
Possible statuses (from best to worst protection):
No leak (WebRTC disabled) WebRTC is completely disabled in your browser - maximum privacy.
No leak (VPN protected) You're using a VPN and WebRTC is not exposing any public IP. This means WebRTC is blocked or restricted, providing the best protection while using VPN.
No leak (protected) WebRTC is not exposing any public IP addresses.
No leak (VPN working) You're using a VPN and WebRTC only shows the VPN's IP - your real IP is protected. WebRTC is active but only reveals your VPN server's address, not your actual location.
No leak WebRTC shows the same IP as your public IP - no additional IPs are exposed.
No VPN You're not using a VPN and WebRTC shows your public IP - this is normal.
Leak detected WebRTC is revealing an IP address different from your public IP - your real location may be exposed!
What to do if leak is detected:
Browser fingerprinting collects information about your browser and device to create a unique identifier. This can be used to track you across websites even without cookies.
Common Your browser configuration is shared by many users - harder to track.
Somewhat unique Your configuration is less common - you may be trackable.
Very unique Your browser is highly identifiable - easy to track across sites.
For a detailed breakdown of all fingerprint components and how to reduce your uniqueness, visit the dedicated Browser Fingerprint page.
↑ Back to Your DataPrivacy Check: If you're using privacy tools (VPN, Tor), these tests help verify they're working correctly. If a test shows unexpected results, your privacy might be compromised.