DNS leak test (and quick fixes)
3 min read
Intermediate
Troubleshooting
Quick take
If a leak test shows your ISP’s DNS instead of your VPN’s DNS, fix that before assuming your connection is private.
What a clean result looks like
- You should see DNS servers that belong to your VPN or to a resolver the VPN intentionally uses.
- You should not see your home ISP, hotel Wi-Fi provider, or mobile carrier in the result list.
- If you use split tunneling, test both the protected app and the browser you actually browse with.
How to test in under a minute
- Connect to your VPN.
- Open a DNS leak test site and run a standard test.
- Refresh once or reconnect and run it again.
- Compare the provider name in the results with the network you are actually on.
Fast fixes to try
- Turn on the VPN app’s DNS leak protection if it has one.
- Disable split tunneling temporarily and test again.
- Reconnect after switching protocol.
- Check whether IPv6 handling is causing a leak on your device or network.
Bottom line
Run a leak test after any big change to your VPN app, protocol, or split tunneling setup. One clean result is good; two or three matching clean results are better.
