DNS Leak Test

Check your DNS privacy with an instant DNS leak verification test.

DNS Security Analysis

We are tracing your DNS requests to identify any potential leaks. Your traffic is being analyzed to ensure it travels through secure, encrypted tunnels without unauthorized exposure to ISPs.

Ready to Scan

What causes a DNS leak?

A DNS leak occurs when DNS queries (requests for translating domain names to IP addresses) are inadvertently sent through a network path not intended for privacy or security. This usually happens due to:

Incorrect network configurations

Misconfigured operating systems or network settings might route DNS requests through default or unintended servers.

Transparent DNS proxies

Some ISPs or network providers enforce their own DNS servers, intercepting and handling queries regardless of user settings.

Manual DNS setup errors

Users who manually configure their network settings might accidentally point DNS queries to insecure servers.

IPv6 issues

Devices configured for both IPv4 and IPv6 might unintentionally send DNS queries via IPv6 even if IPv4 is secured.

Software conflicts or misconfigurations

Certain apps or security software might override DNS settings, causing requests to bypass intended secure channels.

How can I guard against DNS leaks?

01

Use Trusted DNS Providers

Configure your devices or routers to use reliable DNS providers like Control D, Cloudflare, or Google DNS instead of your ISP's default servers.

02

Disable IPv6

IPv6 requests sometimes bypass intended security configurations. Temporarily disabling IPv6 prevents DNS queries from routing through unsecured IPv6 networks.

03

Check and Secure Router Settings

Ensure your router settings are manually configured to trusted DNS servers instead of relying on default ISP-provided DNS, which might redirect or intercept queries.

04

Use Encrypted DNS

Implement DNS over HTTPS (DoH) or DNS over TLS (DoT) to encrypt your DNS queries, making it harder for ISPs or third parties to intercept or track DNS requests.

05

Regular DNS Leak Testing

Frequently test your connection using DNS leak detection tools (e.g., ipdekho.com) to ensure DNS requests aren't leaking unexpectedly.

06

Firewall Configuration

Configure firewall rules to block DNS queries from going out through unwanted channels or to restrict queries exclusively to trusted DNS servers.

Supported DNS Types

Understanding the different ways your device resolves domain names.

ISP DNS

The default DNS servers provided by your Internet Service Provider. They are often slower and less private, as ISPs can log your browsing history.

VPN DNS

Private DNS servers provided by your VPN. They encrypt your queries and route them through the VPN tunnel, ensuring your ISP cannot see your requests.

Public DNS

Third-party DNS resolvers like Google (8.8.8.8) or Cloudflare (1.1.1.1). They are generally faster and more reliable than ISP DNS but may still collect some data.

Secure DNS (DoH / DoT)

DNS over HTTPS (DoH) or DNS over TLS (DoT) encrypts your DNS queries, preventing anyone on the network (ISP, hackers) from spying on your web activity.

This tool forces your browser to resolve specific domain names. By analyzing which DNS servers handle those requests, we can determine if your VPN is effectively masking your DNS traffic.
If your DNS is leaking, your ISP can see every website you visit, even if you are using a VPN. This compromises your privacy and allows for tracking and logging of your online history.
Ensure your VPN is active and configured to use its own DNS servers. Disable 'Smart Multi-Homed Name Resolution' in Windows if necessary, and check your browser's secure DNS settings.
This tool forces your browser to resolve specific domain names. By analyzing which DNS servers handle those requests, we can determine if your VPN is effectively masking your DNS traffic.
This tool forces your browser to resolve specific domain names. By analyzing which DNS servers handle those requests, we can determine if your VPN is effectively masking your DNS traffic.