ping123 Transparent IP Check
Auto IP check No silent WebRTC

VPN privacy workflow

VPN detection test

A VPN leak test confirms whether the session really presents the VPN identity you expect. Compare IP before and after connecting, then check DNS, WebRTC, IPv6, timezone, language, and fingerprint consistency.

Example ping123 result screenshot

The screenshot below uses the designated sample IP 89.116.88.34, not a current visitor IP. Use it as a visual reference for the fields explained on this page.

ping123 VPN leak workflow result showing score and network privacy signals
An example ping123 VPN leak result using the designated sample IP 89.116.88.34.

Compare before and after the VPN connects

The most reliable VPN test starts before the VPN is connected. Record the public IP, country, ASN, DNS behavior, and browser timezone. Then connect the VPN and repeat the same checks. The public IP should change to the VPN exit, and the supporting browser signals should stop pointing to the original network.

If only the public IP changes, the VPN may still be usable for simple browsing, but it is not enough for sensitive account workflows. DNS, WebRTC, IPv6, timezone, and browser fingerprint clues can still make the session look inconsistent to risk systems.

Why account login and payment need stricter checks

A streaming or news site may only care that your IP country changed. A bank, ad platform, marketplace, social account, or developer dashboard may compare more signals: historical account country, current IP reputation, proxy type, DNS country, browser timezone, device profile, and unusual ASN changes.

That is why this VPN leak test treats privacy as consistency instead of a single green badge. If your VPN exit is in Germany but the browser timezone is Asia/Shanghai, DNS is from an ISP in another country, and WebRTC exposes a different public IP, the safest action is to stop before logging in.

Interpreting VPN risk labels

Many VPNs use datacenter networks. That does not automatically mean the VPN is broken. It does mean some websites may classify the IP as hosting, shared infrastructure, or proxy-like. For casual privacy this may be acceptable; for account trust it can be a problem.

Use ping123 to decide whether the current VPN exit is good enough for the task. A clean VPN result means the exit IP, DNS resolver, WebRTC candidates, IPv6 behavior, timezone, language, and risk score tell one coherent story.

What the result fields mean

VPN exit IP The public IP websites see after your VPN connects.
DNS route Whether DNS follows the VPN or a chosen resolver.
WebRTC candidate Whether browser peer discovery exposes another public path.
IPv6 Whether IPv6 bypasses the VPN tunnel.
Timezone and language Browser context that should match the intended region.
Risk score A practical warning signal for hosting, proxy, shared, or suspicious networks.

Normal signals vs. risk signals

Usually normal

  • Public IP changes to the VPN exit and stays stable during the session.
  • DNS resolver matches the VPN or expected secure DNS provider.
  • WebRTC shows no original public IP outside the tunnel.
  • Browser timezone and language are reasonable for the account or region.

Needs attention

  • VPN connects but public IP remains the original ISP address.
  • DNS or WebRTC points to the original network after the VPN connects.
  • IPv6 leaks while IPv4 uses the VPN.
  • The VPN exit has high reputation risk before a sensitive login or payment.

Next action

Test your VPN before account login or payment

Continue with the live ping123 check before trusting this browser session.

Fixes and next steps

DNS leak Turn on DNS leak protection in the VPN or proxy client, disable browser Secure DNS if it bypasses the tunnel, set system DNS to the provider's DNS or a trusted encrypted resolver, then rerun the DNS check.
WebRTC leak Limit or disable WebRTC direct candidates, use a browser profile that blocks WebRTC IP exposure, restart the browser, then rerun the WebRTC check before logging in.
Datacenter ASN If the task needs a consumer-looking account environment, switch from a datacenter/VPS ASN to a stable residential, mobile, or dedicated ISP exit and keep the region consistent.
Blacklist or abuse history Do not keep using a high-risk or listed IP for important accounts. Change the IP range or provider, wait for reputation to stabilize, and retest before continuing.
Timezone or language mismatch Align the IP country, system timezone, browser language, account region, and DNS/WebRTC routes so the session tells one consistent location story.
  1. Switch VPN nodes when the current exit has poor reputation or wrong country.
  2. Enable the VPN kill switch and DNS leak protection options.
  3. Disable IPv6 if the VPN does not tunnel IPv6 reliably.
  4. Close and reopen the browser after changing VPN routes.
  5. Use a browser profile with timezone and language aligned to the intended region.
  6. Run an IP risk check before logging into important accounts.

FAQ

How do I know if my VPN is leaking?

Look for mismatches: original ISP IP, DNS outside the VPN, WebRTC public candidates, IPv6 bypass, or browser region conflicts.

Is a datacenter VPN IP bad?

Not always. Many VPN exits are datacenter IPs. It becomes a concern when the site or account workflow is sensitive to proxy-like infrastructure.

Should I test before every payment?

Yes when account safety matters. Check IP, reputation, DNS, WebRTC, and browser consistency first.

Can split tunneling cause leaks?

Yes. If the browser is excluded from the VPN tunnel, public IP, DNS, or WebRTC can use the direct network.

What should I do after switching VPN nodes?

Run the same test sequence again: public IP, DNS, WebRTC, IPv6, timezone, fingerprint, then risk score.

Before you continue

Run the check before you continue

A quick check now is easier than troubleshooting a login warning, proxy mismatch, or privacy leak later.