What to compare
Compare public IP location, DNS resolver owner, DNS country, and whether the DNS path matches the VPN or proxy route.
Learn how to test DNS leaks after connecting to a VPN, proxy, V2Ray node, or Clash subscription, and how to fix resolver mismatches.
Updated: 2026-05-11
A DNS leak means DNS queries may still go to an unexpected resolver, often the original ISP or browser secure DNS provider. Check it after every VPN or proxy change.
Compare public IP location, DNS resolver owner, DNS country, and whether the DNS path matches the VPN or proxy route.
Browser secure DNS, Android private DNS, split tunneling, rule mode, and local network settings can all change resolver behavior.
Use VPN DNS settings, test global mode, disable conflicting secure DNS settings, and retest after each change.
Enable VPN DNS or global mode and disable browser secure DNS for the test.
This may be normal for some providers, but compare multiple nodes and check for ISP exposure.
Check that browser secure DNS or extensions are not overriding system settings.
No. Some VPN providers use third-party resolvers. The key risk is DNS going to the original network or an unexpected resolver.
Yes. Browser-level secure DNS can bypass the expected system or VPN resolver.
Yes. Global mode helps separate node failure from rule or split-tunnel behavior.