ipv4.ipleak.net
Open in
urlscan Pro
95.85.16.212
Public Scan
Submitted URL: http://ipv4.ipleak.net/
Effective URL: https://ipv4.ipleak.net/
Submission: On September 30 via manual from US — Scanned from DE
Effective URL: https://ipv4.ipleak.net/
Submission: On September 30 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOM<form><input placeholder="Search an IP Address or a domain name" id="query" name="q" value=""><input type="submit" value="Search"></form>
Text Content
powered by This is the kind of information that all the sites you visit, as well as their advertisers and any embedded widget, can see and collect about you. YOUR IP ADDRESSES JavaScript required. 216.131.114.169 Germany - Hesse No forwarded IP detected. If you are using a proxy, it's a transparent proxy. IPv6 test not reachable. (error) Browser default: IPv4 (123 ms) Fallback: YOUR IP ADDRESSES - WEBRTC DETECTION JavaScript required. If you are now connected to a VPN and you see your ISP IP, then your system is leaking WebRTC requests DNS Address detection JavaScript required. If you are now connected to a VPN and between the detected DNS you see your ISP DNS, then your system is leaking DNS requests TORRENT ADDRESS DETECTION JavaScript required. Activate GEOLOCATION MAP (GOOGLE MAP) BASED ON BROWSER JavaScript required. Activate (may prompt a user permission on the browser) If the above map is your correct location and you don't want to allow this kind of tracking, ensure that geolocation feature of your browser is disabled or asking a permission, or install an extension that fake your position. IP DETAILS IP: 216.131.114.169AirVPN Exit Node: NoCountry: Germany (DE)Region: Hesse (HE)City: Frankfurt am MainTime Zone: Europe/BerlinLatitude & Longitude: 50.1188 , 8.6843 Geolocation map (Google Map) based on IP Address Map require JavaScript. Activate Accuracy Radius:1000 KMLast data update:Thu, 30 Sep 2021 19:45:56 +0000 GEEK DETAILS Detected information Your User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36What document you can accept: text/html, application/xhtml+xml, application/xml;q=0.9, image/avif, image/webp, image/apng, */*;q=0.8, application/signed-exchange;v=b3;q=0.9What language you can accept: de-DE, de;q=0.9What encoding you can accept: gzip, deflate, br System information (your browser, your language, your operating system, etc) JavaScript required. Platform: Linux x86_64Cookie enabled: trueJava enabled: falseOnline: true Screen information (your display hardware) JavaScript required. Your screen: 1600 x 1200Available screen: 1600 x 1200Color depth: 24Pixel depth: 24 Plugins information (your browser plugins) JavaScript required. No data available. Mime-Types information (what document you can read) JavaScript required. No data available. HTTP Request Headers Accept-Encoding: gzip, deflate, brSec-Fetch-Dest: documentSec-Fetch-User: ?1Sec-Fetch-Mode: navigateSec-Fetch-Site: noneAccept: text/html, application/xhtml+xml, application/xml;q=0.9, image/avif, image/webp, image/apng, */*;q=0.8, application/signed-exchange;v=b3;q=0.9Accept-Language: de-DE, de;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36Upgrade-Insecure-Requests: 1Cache-Control: no-cachePragma: no-cacheHost: ipv4.ipleak.net WHAT ARE WEBRTC LEAKS? WebRTC implement STUN (Session Traversal Utilities for Nat), a protocol that allows to discover the public IP address. To disable it: * Mozilla Firefox: Type "about:config” in the address bar. Scroll down to “media.peerconnection.enabled”, double click to set it to false. * Google Chrome: Install Google official extension WebRTC Network Limiter. * Opera: Type "about:config" in the address bar or go to "Settings". Select "Show advanced settings" and click on "Privacy & security". At "WebRTC" mark select "Disable non-proxied UDP". WHAT ARE DNS LEAKS? In this context, with "DNS leak" we mean an unencrypted DNS query sent by your system OUTSIDE the established VPN tunnel. WHY DOES MY SYSTEM LEAK DNS QUERIES? In brief: Windows lacks the concept of global DNS. Each network interface can have its own DNS. Under various circumstances, the system process svchost.exe will send out DNS queries without respecting the routing table and the default gateway of the VPN tunnel, causing the leak. SHOULD I BE WORRIED FOR A DNS LEAK? If you don't want that your ISP, and anybody with the ability to monitor your line, knows the names your system tries to resolve (so the web sites you visit etc.) you must prevent your system to leak DNS. If you feel that you're living in a human rights hostile country, or in any way the above mentioned knowledge may harm you, you should act immediately to stop DNS leaks. HOW DOES TORRENT DETECTION WORK? To detect data from your torrent client we provide a magnet link to a fake file. The magnet contains an http url of a controlled by us tracker which archives the information coming from the torrent client. Service available on IPv4 and IPv6, also on alternative ports: :8000 (IPv4,IPv6) and :62222 (IPv4,IPv6) (for detection of routing based on destination ports). Look at the forum for support, feedback, API. Data partially based on MaxMind database. Results may be cached, refer to MaxMind for more accuracy. powered by