
We ask your browser to resolve a handful of unique random subdomains under a zone we host authoritatively, then show you every recursive resolver that came knocking. If you are on a VPN and any of the resolvers belong to your ISP, your DNS is leaking.
If your browser has Secure DNS (DNS-over-HTTPS) enabled — common in recent versions of Chrome and Firefox — DNS queries bypass your operating system and this test will show few or no resolvers. Disable browser-level Secure DNS if you want to see the resolvers your OS or VPN is really using.
A DNS leak happens when your device sends DNS queries outside of the secure tunnel provided by your VPN or proxy. Even when your traffic appears to be encrypted, the DNS resolver your operating system is using may still reveal the domains you visit to your ISP. A DNS leak test verifies which DNS resolvers your machine is actually talking to, so you can confirm that your privacy setup works.
We offer a variety of static and dynamic IP solutions designed for legitimate business and technical use, with global coverage tailored to your project requirements.

Buy Proxy now HTTP Proxies or SOCKS5, Dedicated or Shared, Residential or Datacenter. Fully Anonymous and Premium.
Buy ProxyGot questions? We've got answers! Dive into our frequently asked questions below.
A DNS leak happens when your device sends DNS queries outside of the secure tunnel provided by your VPN or proxy. Even if your traffic appears to be encrypted, the DNS resolver your operating system uses may still reveal the sites you visit to your ISP. A DNS leak test verifies which DNS resolvers your machine is actually talking to.
When you start the test, we generate a unique random session and ask your browser to resolve several one-time subdomains of a zone we run authoritatively. Our DNS server records which recursive resolvers (by source IP) ultimately forward those queries to us. Since every subdomain is random, DNS caching cannot hide a resolver from the test.
If you are connected to a VPN but one or more of the resolvers detected in the test belong to your ISP, your VPN is leaking DNS. That means websites you visit can be observed by your ISP even though your IP appears to be hidden. Reconfiguring the VPN to push its own DNS or enabling its built-in leak protection usually fixes this.
If your browser is using Secure DNS (DNS-over-HTTPS) — a feature built into Chrome, Firefox and some other browsers — DNS queries are sent directly to the browser's DoH provider and bypass the operating system entirely. In that case our authoritative server never sees them. Disable browser-level Secure DNS to measure your real system/VPN resolver.
Yes. The test works over IPv4 and IPv6 depending on which protocol your resolver uses to reach our authoritative server. Either way, we record the source IP and show it in the results.
Yes. The test only triggers harmless DNS lookups for random subdomains we control. It does not transmit any sensitive data, and the results of each run are isolated to a short-lived session that expires automatically.


