A VPN is supposed to hide your real IP address and encrypt your traffic — but many VPNs suffer from leaks that expose your true location and browsing activity. This test checks the most common vulnerability points: DNS 泄漏, WebRTC 泄漏, and IP 地址不一致.
点击下方按钮运行全面的泄漏测试。无需注册。结果几秒内显示。
Tests DNS, WebRTC, and multiple IP sources simultaneously. Takes ~5–10 seconds.
🔍正在运行测试…
详细结果
什么是 VPN 泄漏?
A VPN 泄漏 occurs when your real IP address, DNS queries, or other identifying information bypasses your VPN tunnel and is exposed to websites, your ISP, or third-party observers. Even with an active VPN connection, these leaks can reveal your actual location, identity, and browsing habits — completely defeating the purpose of using a VPN in the first place.
The most common types of VPN leaks are DNS 泄漏, where your domain name lookups go through your ISP's DNS servers instead of the VPN's secure DNS; WebRTC 泄漏, where browser WebRTC features expose your local network IP addresses; and IP 地址泄漏, where some traffic routes outside the VPN tunnel due to misconfiguration or software bugs.
为什么 VPN 会泄漏?
VPN 泄漏可能有以下原因:
VPN 客户端配置错误 — The VPN software isn't set up correctly, allowing certain traffic to bypass the tunnel.
DNS 服务器回退 — The system falls back to your ISP's default DNS when the VPN's DNS is slow or unreachable.
浏览器中的 WebRTC — Chrome, Firefox, and other browsers use WebRTC for video calls and chat, which can expose your real local IP even behind a VPN.
IPv6 泄漏 — Some VPNs only tunnel IPv4 traffic, leaving IPv6 connections exposed through your normal internet connection.
终止开关故障 — If your VPN disconnects unexpectedly and the kill switch doesn't activate, all traffic flows unencrypted.
应用级白名单 — Some VPN "split tunneling" features accidentally exclude apps that should be protected.
此泄漏检测工具如何工作?
此工具同时执行三个独立测试:
IP 交叉检查 — We query multiple public IP detection APIs (freeipapi, ip.sb, ipwho.is, ipinfo.io) and compare the results. If all APIs return the same IP, your connection is consistent. If different IPs appear, you may have a routing leak or proxy inconsistency.
DNS 泄漏测试 — We perform DNS lookups via Google's secure DNS-over-HTTPS (DoH) service and analyze whether your DNS requests could be intercepted or logged by comparing response patterns. A proper VPN should route all DNS through its own encrypted DNS servers.
WebRTC 泄漏测试 — We use the browser's WebRTC API to request STUN candidates from Google's public STUN server. This reveals any local network IPs (including your real WAN IP) that WebRTC might expose to websites using peer-to-peer features.
所有测试完全在您的浏览器中运行。除了用于 IP 检测的标准 API 调用外,不会向我们的服务器发送数据,这些调用与任何网站可以进行的调用相同。
如何修复 VPN 泄漏?
如果此工具检测到泄漏,以下是修复方法:
启用 DNS 泄漏保护 — Most premium VPN clients have a "DNS leak protection" toggle. Make sure it's turned on.
在浏览器中禁用 WebRTC — Install a WebRTC blocking extension or disable WebRTC in browser settings (about:config in Firefox, chrome://flags in Chrome).
启用终止开关 — Ensure your VPN's kill switch is active so no traffic leaks if the VPN disconnects.
选择支持 IPv6 的 VPN — If you have an IPv6 connection, make sure your VPN tunnels both IPv4 and IPv6 traffic.
在系统范围内禁用 IPv6 — If your VPN doesn't support IPv6, disabling it at the OS level prevents IPv6 leaks.
更新您的 VPN 客户端 — Outdated VPN software may have known leak vulnerabilities. Always keep it updated.
每次更改后测试 — Re-run this tool after making changes to verify the leak is fixed.