Shield Active · Privacy Guard

Is My VPN
Working? — Free Leak Test

Run 4 deep-packet inspection checks to see if your browser is leaking your identity, location, or DNS traffic behind your VPN.

Public IP & ISP Check Pending
Waiting for start...

Identifies your current visible IP address and Internet Service Provider. If this shows your home ISP, your VPN is not working.

WebRTC Leak Detection Pending
Waiting for start...

Scans for local and public IPs exposed through your browser's WebRTC implementation, bypasses some VPN tunnels.

IPv6 Connectivity Test Pending
Waiting for start...

Checks if your VPN supports IPv6. Many VPNs only tunnel IPv4, leaving your real location exposed via IPv6 traffic.

DNS Resolver Leak Pending
Waiting for start...

Determines which DNS server your browser is using. If this matches your local ISP, your browsing history is visible to them.

Check Complete

Analyzing your results...

What does this VPN leak test check?

This tool runs four real-time checks against your browser connection: IP & ISP verification, WebRTC leak detection, IPv6 tunnel bypass testing, and DNS resolver analysis. Together, these checks reveal whether your VPN is truly hiding your identity or silently leaking data to every website you visit.

What is a WebRTC leak?

WebRTC (Web Real-Time Communication) is a browser technology used for video calls and peer-to-peer connections. It can bypass your VPN tunnel and expose your real public IP address directly to websites — even if your VPN is connected. This is one of the most common VPN leaks and is invisible to most users without a dedicated test like this one.

Why is IPv6 a VPN risk?

Many VPN providers only tunnel IPv4 traffic. If your Internet Service Provider also provides IPv6 connectivity, your browser may send requests over the unencrypted IPv6 path, completely bypassing the VPN. This exposes your real location and identity. Disabling IPv6 in your network adapter settings is the safest workaround.

What is a DNS leak?

A DNS leak occurs when your browser sends DNS queries (which websites you visit) through your ISP's DNS servers instead of your VPN's secure servers. This means your ISP can see your entire browsing history, even though your IP address appears to be hidden. A properly configured VPN should route all DNS traffic through its own resolvers.

Is my data stored or uploaded?

No. This tool runs entirely in your browser. No data is stored, logged, or transmitted to Pixel Defence servers. The only external requests made are to public APIs (ipapi.co, Google STUN, icanhazip, Cloudflare DNS) to perform the actual leak checks. Your results are never saved.

What should I do if a leak is detected?

If you detect a leak, take these steps: 1) Disconnect and reconnect your VPN. 2) Disable WebRTC in your browser settings or install a WebRTC blocker extension. 3) Disable IPv6 in your operating system's network settings. 4) Switch your VPN's DNS settings to use its own resolvers. 5) If leaks persist, consider switching to a more secure VPN provider. For more privacy tips, explore our Defense Protocols guides.

Which VPNs pass this leak test?

Any VPN routing all traffic including WebRTC, DNS, and IPv6 through its tunnel will pass. Premium VPNs with built-in leak protection like Mullvad, ProtonVPN, and ExpressVPN are designed to pass all four checks. Free VPNs vary — some pass the IP check but fail WebRTC or DNS.

Does this tool work on mobile?

The tool works on all modern mobile browsers including Chrome and Safari on Android and iOS. WebRTC behavior varies slightly on mobile — some mobile browsers restrict WebRTC by default which will show as a pass on that check.