DNS Leak Test
Checks which DNS resolvers actually answer for you — even when a VPN is active.
Why DNS leaks happen
When you visit a site, your OS asks a DNS resolver for the IP. Which resolver depends on configuration: typically your ISP's, sometimes a public one you set (1.1.1.1 / 8.8.8.8). Whichever resolver answers sees the full list of every domain you visit.
A VPN that handles DNS internally captures these queries inside the tunnel and forwards them to its own resolver, hiding them from your ISP. A VPN that doesn't — or a misconfigured DoH-in-browser-only setup — lets the OS-level resolver continue answering, leaking the query list to the original provider. This is the DNS leak.
The pure-browser path is also leaky: if you enable DoH in the browser but other apps (chat clients, native YouTube app, system services) keep using OS DNS, only your browsing is private.
Public resolvers vary in what they log. Cloudflare 1.1.1.1 has the strongest no-log policy. Google 8.8.8.8 keeps minimal logs but they're aggregated. Your ISP's resolver typically logs everything and may aggregate it for advertisers in markets where that's legal.
Technical tool for diagnosing the quality of a network connection. Does not provide means of access to information resources whose access is restricted under applicable law.