What Is a DNS Leak

Understand DNS leaks, why they happen, and why they matter for privacy.

DNS Leak Test
Open Tool

Definition

A DNS leak occurs when DNS queries bypass your VPN or proxy tunnel. Even if your IP address appears protected, the resolver can still see which domains you are trying to reach.

This is a privacy issue because DNS reveals browsing intent. It can also be a security issue in environments that require DNS to follow policy.

Why DNS Leaks Happen

Some VPN clients fail to override system DNS settings, so the operating system continues to use the ISP resolver.

Routers can enforce DNS at the network level, ignoring device settings. Browser features like DNS over HTTPS can also bypass the VPN path.

Impact on Privacy

DNS leaks expose which sites you visit, even if the page content is encrypted. On shared networks, this can reveal sensitive activity.

A leak can also undermine geo-hiding. If DNS resolves through your ISP while IP traffic exits through a VPN, the mismatch can reveal your true location.

Common Symptoms

The DNS resolver belongs to your ISP while your IP test shows a VPN exit. This indicates DNS is escaping the tunnel.

Inconsistent resolver results across tests often indicate DoH usage, network changes, or an unstable VPN connection.

How Tests Detect Leaks

DNS leak tests observe resolver IPs and compare them to expected ownership. If resolvers are not owned by your VPN or a trusted provider, the test flags a leak.

The test does not need your browsing history; resolver identity is enough to determine the leak status.

Why It Matters for Organizations

Organizations use DNS for monitoring, compliance, and malware defense. Leaks can bypass these controls and create audit gaps.

Remote employees on VPNs are a common source of DNS leakage, which is why periodic testing is recommended.

Mitigation Overview

Use VPNs with DNS protection or block local DNS. Configure trusted resolvers and avoid split tunneling unless necessary.

Retest after OS or browser updates, as DNS settings can be reset without notice.

Related Checks

Pair DNS leak testing with IP and WebRTC tests to ensure your network identity is consistent across layers.

If any tool shows a different country or ISP, investigate for partial leaks or proxy bypass.

DoH and DoT

DNS over HTTPS and DNS over TLS encrypt DNS queries, but they do not guarantee that the queries go through your VPN.

If the DoH provider is reached directly, your DNS can still bypass the tunnel. Align DoH with your VPN or disable it while testing.

Some browsers enable DoH by default, so verify settings after updates.

Split Tunneling Risks

Split tunneling routes only certain traffic through a VPN. DNS often follows the non-VPN path unless explicitly configured.

This is a frequent cause of leaks in corporate setups or advanced VPN profiles.

Router and Network Controls

Some routers force ISP DNS regardless of device settings. If you control the router, update its DNS to your VPN provider or a trusted resolver.

Public Wi-Fi may intercept or redirect DNS for captive portals. Retest after connecting to untrusted networks.

Mitigation Checklist

Enable VPN DNS protection and kill switch features.

Disable or align DoH with the VPN path, and verify router DNS settings.

Retest after any OS or browser update that might reset DNS behavior.

Testing Best Practices

Test in a fresh browser session to avoid cached DNS results.

Check multiple times across different networks and devices to ensure consistent protection.

Enterprise and Compliance Impact

Many organizations rely on DNS monitoring for security and compliance. Leaks can bypass those controls and create blind spots in audit logs.

For regulated environments, DNS should follow approved resolvers and be verifiable through periodic testing.

Streaming and Geo-Restrictions

Some streaming services detect location through DNS. If DNS leaks outside your VPN, the service can see your real region even if the IP appears protected.

This mismatch often leads to region errors or unexpected content catalogs.

When VPNs Fail

VPN reconnects, network switches, or sleep/resume cycles can temporarily drop DNS protection. A short leak window is still a leak.

Use kill switch features and retest after any reconnection to ensure DNS is still protected.

ISP vs Public Resolvers

ISP resolvers are tied to your network provider and often reveal your region. Public resolvers like Cloudflare or Google are more neutral but still expose DNS outside the VPN if not routed properly.

The safest option is to use the VPN’s own resolver or a trusted resolver that is explicitly routed through the VPN tunnel.

If you choose a public resolver, verify its ownership in the leak test to ensure it matches your expectations.

Caching and Split DNS

Operating systems and browsers cache DNS results. A cached resolver can persist even after you change VPN settings, creating confusing test results.

Some networks use split DNS for internal domains. If misconfigured, split DNS can leak internal queries to external resolvers.

Troubleshooting Steps

Clear DNS caches, restart the VPN client, and repeat the test. If the leak persists, check router DNS or disable DoH temporarily.

If you manage a fleet, enforce DNS settings via policy and monitor for deviations over time.

Keep a baseline of expected resolver IPs so you can detect drift quickly.

Related Tools