DNS Leak
A DNS leak occurs when your DNS requests bypass the VPN and go to your ISP's DNS servers. You think you're protected, but your browsing history is exposed.
Check whether your DNS requests are leaking outside your VPN tunnel. Free DNS leak test tool.
DNS LEAK TEST
This test checks whether your DNS requests leak outside your VPN tunnel. If you are not using a VPN, seeing your ISP's DNS servers is normal.
The test queries multiple checkpoints through your browser. Results are not stored on Secunnix servers.
DNS (Domain Name System) is the internet's 'phone book' — it translates domain names into IP addresses. When using a VPN, your DNS queries should also pass through the tunnel.
A DNS leak occurs when your DNS requests bypass the VPN and go to your ISP's DNS servers. You think you're protected, but your browsing history is exposed.
OS DNS settings, IPv6 leaks, router configurations, or VPN connection drops can all cause DNS leaks.
Trusted VPNs use their own DNS servers, offer kill switches, and provide IPv6 leak protection.
DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) protocols encrypt your DNS queries for better privacy.
DNS (Domain Name System) is the internet's 'phone book' — it translates domain names you type (e.g. google.com) into IP addresses computers understand. Normally your ISP's DNS servers handle this translation, which means your ISP can see which sites you visit.
When using a VPN, your DNS queries should also pass through the VPN tunnel. A DNS leak is when these queries escape the tunnel and go to your ISP's DNS servers. Result: you think you're protected but your browsing history is exposed to your ISP.
| Leak Type | Cause | Risk Level |
|---|---|---|
| OS DNS Leak | Windows Smart Multi-Homed Name Resolution sends DNS queries outside VPN | High |
| IPv6 Leak | VPN only tunnels IPv4 traffic, IPv6 DNS queries are exposed | High |
| Router DNS Leak | Router's own DNS settings bypass the VPN | Medium |
| Configuration Error | DNS leak protection disabled in VPN application | Medium |
| VPN Connection Drop | DNS traffic exposed when VPN drops without kill switch | High |
| VPN | Private DNS | IPv6 Protection | Kill Switch |
|---|---|---|---|
| NordVPN | Yes — own DNS servers | Yes | Yes |
| ExpressVPN | Yes — private DNS on each server | Yes | Yes (Network Lock) |
| Surfshark | Yes — private DNS | Yes | Yes |
| Mullvad | Yes — DNS-over-HTTPS | Yes | Yes (always active) |
| ProtonVPN | Yes — DNS-over-TLS | Yes | Yes |
| Free VPNs | Usually no | Rarely | Rarely |
Traditional DNS queries are sent as unencrypted plaintext. Modern DNS protocols encrypt these queries for better privacy:
A DNS leak is when your DNS requests escape the VPN tunnel despite using a VPN. When this happens, your ISP can see which websites you visit.
A DNS leak test checks which servers handle your DNS requests. If the DNS server belongs to your ISP instead of your VPN provider, there's a leak.
Your ISP and potentially government agencies can monitor which sites you visit. You think you're private but your browsing history is exposed.
Enable DNS leak protection in your VPN app, turn on the kill switch, and make sure your VPN uses its own DNS servers.
Leading VPNs like NordVPN, ExpressVPN, Surfshark, Mullvad, and ProtonVPN all offer built-in DNS leak protection.
Switching to trusted DNS providers like Cloudflare, Google, or Quad9 is better than ISP DNS, but not sufficient alone. Use it with a VPN.
Many VPNs only tunnel IPv4 traffic and ignore IPv6. If your device supports IPv6, DNS queries may leak via IPv6 outside the VPN.
It's recommended to test every time you connect to VPN, switch servers, or change networks.