What Are You Leaking?
Browser fingerprint, IP address, and DNS resolver — we check it all without asking you anything.
No signup. No data stored. Results generated live in your browser.
Analyzing Your Browser
Detecting IP address...
0% complete
What We Analyze
IP Address
Your public IP and ISP
Location
City, region, coordinates
Fingerprint
Canvas, WebGL, audio
WebRTC Leaks
VPN bypass detection
Device Info
Hardware, screen, GPU
Browser Config
Settings, plugins, flags
DNS Leak
VPN tunnel integrity
Is Your VPN Leaking DNS?
Even with a VPN active, your DNS requests may still go to your ISP — exposing every site you visit.
This test checks which DNS servers are handling your requests.
Understanding Browser Fingerprinting
Every time you visit a website, your browser reveals dozens of data points that can be combined to create a unique "fingerprint." This fingerprint can track you across websites, even if you clear cookies, use private browsing, or switch accounts.
Unlike cookies, browser fingerprints are invisible and persistent. You can't delete them because they're not stored on your device — they're calculated fresh each time based on your browser's configuration.
What makes your fingerprint unique?
- • Screen resolution and color depth
- • Installed fonts and plugins
- • Graphics card (GPU) model via WebGL
- • Audio processing characteristics
- • Timezone and language settings
- • Hardware specs (CPU cores, memory)
The irony of privacy settings like "Do Not Track" is that enabling them makes you more identifiable, since fewer people have them enabled. True privacy requires either blending in with the crowd or using tools specifically designed to resist fingerprinting.
Get your exposure report
We'll email you a summary of your browser exposure with privacy recommendations.
No spam. Unsubscribe anytime.
This is 1 of 6 checks in the full Privacy Audit
Browser and connection exposure is just one layer. The full audit also scans your website for trackers, checks email security, WHOIS registration, and builds a personalized threat model. Run all 6 checks at once and get a prioritized action plan with one-click fixes.