Scanning your connection...
Exposure Check

What Are You Leaking?

Browser fingerprint, IP address, and DNS resolver — we check it all without asking you anything.

No signup. No data stored. Results generated live in your browser.

Analyzing Your Browser

Detecting IP address...

0% complete

What We Analyze

IP Address

Your public IP and ISP

Location

City, region, coordinates

Fingerprint

Canvas, WebGL, audio

WebRTC Leaks

VPN bypass detection

Device Info

Hardware, screen, GPU

Browser Config

Settings, plugins, flags

DNS Leak

VPN tunnel integrity

Is Your VPN Leaking DNS?

Even with a VPN active, your DNS requests may still go to your ISP — exposing every site you visit.

This test checks which DNS servers are handling your requests.

Understanding Browser Fingerprinting

Every time you visit a website, your browser reveals dozens of data points that can be combined to create a unique "fingerprint." This fingerprint can track you across websites, even if you clear cookies, use private browsing, or switch accounts.

Unlike cookies, browser fingerprints are invisible and persistent. You can't delete them because they're not stored on your device — they're calculated fresh each time based on your browser's configuration.

What makes your fingerprint unique?

  • • Screen resolution and color depth
  • • Installed fonts and plugins
  • • Graphics card (GPU) model via WebGL
  • • Audio processing characteristics
  • • Timezone and language settings
  • • Hardware specs (CPU cores, memory)

The irony of privacy settings like "Do Not Track" is that enabling them makes you more identifiable, since fewer people have them enabled. True privacy requires either blending in with the crowd or using tools specifically designed to resist fingerprinting.

Get your exposure report

We'll email you a summary of your browser exposure with privacy recommendations.

No spam. Unsubscribe anytime.

This is 1 of 6 checks in the full Privacy Audit

Browser and connection exposure is just one layer. The full audit also scans your website for trackers, checks email security, WHOIS registration, and builds a personalized threat model. Run all 6 checks at once and get a prioritized action plan with one-click fixes.

Run Full Audit