IP Address OSINT Verified May 16, 2026

IP Leak

What is your IP, what is your DNS, check your torrent IP, what informations you send to websites.

Open Tool

Investigator Use

IP Leak (ipleak.net) is a comprehensive browser privacy and anonymization testing tool that detects multiple categories of information leakage from web browsers, including IP address, DNS leak detection, WebRTC IP exposure, geolocation disclosure, and browser fingerprint characteristics.

For OSINT investigators, IP Leak is the standard comprehensive anonymization verification tool. Before conducting any investigation where operational security requires that the investigator's identity and location remain concealed, running a complete IP Leak check verifies that all identified leak vectors are properly controlled.

DNS leak detection is IP Leak's most important investigative function. A DNS leak occurs when a device configured to use a VPN continues to send DNS queries through the normal ISP DNS resolver rather than through the VPN tunnel. In this scenario, even though web traffic routes through the VPN, the sites visited are still visible to the ISP through their DNS query logs. IP Leak reveals which DNS servers are actually processing queries, immediately identifying DNS leaks.

WebRTC leak detection verifies that the browser's WebRTC implementation is not exposing local and public IP addresses through JavaScript API calls. WebRTC leaks are a common source of VPN bypass and can expose real IP addresses even to websites that do not have sophisticated detection systems.

IP Leak also tests for IPv6 leaks — when a VPN tunnel handles IPv4 traffic but IPv6 connectivity is unprotected, websites can identify the user's real IPv6 address. This is particularly common on modern networks that have enabled IPv6 by default.

The tool tests all leak vectors simultaneously with a single page load, providing a comprehensive anonymization verification report in seconds. Green results across all categories indicate proper operational security posture before investigation begins.

For investigative environments using Tor, VPNs, or proxy chains, IP Leak should be run at the start of every investigation session. Document the results as evidence that operational security was verified before investigation activities commenced, as this documentation may be relevant in authorized engagement documentation.

#IP Leak #IP Address OSINT tools #IP Address OSINT resources #what #leak #analysis #attribution #capabilities #check #dns

Before You Pivot

Record Context

Capture the target, search terms, and why this source is relevant before you leave the page.

Preserve Evidence

Archive volatile pages, save screenshots, and keep timestamps for anything that may change.

Corroborate

Treat one tool as a lead source. Confirm important findings with independent sources.

Related Tools