How to Test Your VPN for IP & DNS Leaks (Step-by-Step Guide 2026)
Affiliate disclosure: This article contains affiliate links. If you click a link and buy a subscription, we may earn a commission at no cost to you. Our editorial recommendations are never influenced by commissions — read the full disclosure.
A VPN that leaks your real IP address or DNS queries is worse than no VPN at all. It creates a false sense of security while exposing your information. Leak testing takes five minutes and should be done when you first set up a VPN and periodically after that.
What VPN Leaks Are
IP leak: your real IP address visible despite VPN being on. Rare with good VPNs. DNS leak: ISP can see which websites you look up. More common — check explicitly. WebRTC leak: real IP exposed by browser even with VPN active. Common — browser-level issue. IPv6 leak: real IPv6 address visible if VPN only tunnels IPv4. Common if VPN not configured for IPv6.
Quick Check
Use our VPN Matcher tool at /tools/vpn-matcher — the IP check on step one shows your current visible IP. If it shows your real IP while your VPN is connected, you have a leak.
Step 1: Establish Your Baseline
Disconnect VPN completely. Go to ipleak.net. Record: your IPv4 address, IPv6 address (if shown), DNS servers in the leak test section, WebRTC IP addresses. These values should NOT appear after connecting your VPN.
Step 2: Connect Your VPN
Enable your VPN. Connect to a server in a different country from your real location — this makes detection obvious.
Step 3: Reload the Test Page
Reload ipleak.net (hard refresh — Ctrl+Shift+R). Your IP address should show the VPN server's IP. DNS section should show your VPN provider's DNS, not your ISP's. WebRTC section should show VPN IP or nothing.
Step 4: Test on dnsleaktest.com
Run the extended test — it uses a different methodology and catches leaks that ipleak.net misses. All servers in results should be associated with your VPN provider.
Step 5: Test IPv6
Go to ipv6leak.com. If your real IPv6 address appears while VPN is connected, you have an IPv6 leak.
How to Fix Common Leaks
DNS leak: in VPN app settings, enable 'DNS leak protection' or 'use VPN DNS only'. NordVPN, Mullvad, ProtonVPN, ExpressVPN enable this by default. WebRTC leak: this is a browser issue. Chrome/Brave: install WebRTC Leak Shield extension. Firefox: about:config → media.peerconnection.enabled → false. IPv6 leak: enable IPv6 leak protection in VPN app or disable IPv6 at OS level.
When to Test
When you first set up a VPN. After any major VPN app update. After changing router or network configuration. Monthly for high-sensitivity users. NordVPN, Mullvad, ExpressVPN, and ProtonVPN with default settings passed all leak tests in our testing without manual configuration.
Frequently Asked Questions
What's the fastest leak test?
ipleak.net covers IP, DNS, WebRTC, and IPv6 on a single page.
What if I find a leak?
Enable the corresponding protection in your VPN app, switch protocol, or reinstall. If it persists, change providers.
Do I need to test often?
Once at setup, once after app updates, and monthly if privacy is a priority.
VPNTex is published by NorwegianSpark SA (Org no: 834 984 172). We may earn commissions on qualifying purchases via affiliate links. This does not affect our editorial independence. Full disclosure · Privacy policy