Run 4 deep-packet inspection checks to see if your browser is leaking your identity, location, or DNS traffic behind your VPN.
Identifies your current visible IP address and Internet Service Provider. If this shows your home ISP, your VPN is not working.
Scans for local and public IPs exposed through your browser's WebRTC implementation, bypasses some VPN tunnels.
Checks if your VPN supports IPv6. Many VPNs only tunnel IPv4, leaving your real location exposed via IPv6 traffic.
Determines which DNS server your browser is using. If this matches your local ISP, your browsing history is visible to them.
Analyzing your results...
This tool runs four real-time checks against your browser connection: IP & ISP verification, WebRTC leak detection, IPv6 tunnel bypass testing, and DNS resolver analysis. Together, these checks reveal whether your VPN is truly hiding your identity or silently leaking data to every website you visit.
WebRTC (Web Real-Time Communication) is a browser technology used for video calls and peer-to-peer connections. It can bypass your VPN tunnel and expose your real public IP address directly to websites — even if your VPN is connected. This is one of the most common VPN leaks and is invisible to most users without a dedicated test like this one.
Many VPN providers only tunnel IPv4 traffic. If your Internet Service Provider also provides IPv6 connectivity, your browser may send requests over the unencrypted IPv6 path, completely bypassing the VPN. This exposes your real location and identity. Disabling IPv6 in your network adapter settings is the safest workaround.
A DNS leak occurs when your browser sends DNS queries (which websites you visit) through your ISP's DNS servers instead of your VPN's secure servers. This means your ISP can see your entire browsing history, even though your IP address appears to be hidden. A properly configured VPN should route all DNS traffic through its own resolvers.
No. This tool runs entirely in your browser. No data is stored, logged, or transmitted to Pixel Defence servers. The only external requests made are to public APIs (ipapi.co, Google STUN, icanhazip, Cloudflare DNS) to perform the actual leak checks. Your results are never saved.
If you detect a leak, take these steps: 1) Disconnect and reconnect your VPN. 2) Disable WebRTC in your browser settings or install a WebRTC blocker extension. 3) Disable IPv6 in your operating system's network settings. 4) Switch your VPN's DNS settings to use its own resolvers. 5) If leaks persist, consider switching to a more secure VPN provider. For more privacy tips, explore our Defense Protocols guides.
Any VPN routing all traffic including WebRTC, DNS, and IPv6 through its tunnel will pass. Premium VPNs with built-in leak protection like Mullvad, ProtonVPN, and ExpressVPN are designed to pass all four checks. Free VPNs vary — some pass the IP check but fail WebRTC or DNS.
The tool works on all modern mobile browsers including Chrome and Safari on Android and iOS. WebRTC behavior varies slightly on mobile — some mobile browsers restrict WebRTC by default which will show as a pass on that check.