VPN SecurityApril 2026 ยท 7 min read

DNS Leaks:
Your VPN Might Be Lying to You.

You turned on the VPN. The icon went green. You figured you were covered. Meanwhile, every website you visited could still see exactly who you are and where you're browsing from. This is how that happens.

Diagram showing how a DNS leak exposes traffic outside the VPN tunnel

What DNS Is

Quick background before we get to the leak.

Every time you type a website address into your browser, your device needs to translate that human-readable name into a numeric IP address. That translation happens through something called DNS: the Domain Name System. Think of it as the phone book of the internet.

Your DNS queries go to a resolver, usually run by your ISP unless you've changed it. That resolver looks up the address and sends it back. Simple enough. The problem is those queries are logged. The resolver knows every domain you asked about, when you asked, and which IP address made the request.

Your ISP can see every site you visit through DNS logs alone, even if the actual page content is encrypted. That's the list your VPN is supposed to hide.

๐Ÿ“– DNS in Plain English
You type "netflix.com" into your browser. Before anything loads, your device asks a DNS resolver: "what's the IP address for netflix.com?" The resolver answers, your browser connects, the page loads. That first question is logged. Every single time.

What a DNS Leak Is

The VPN tunnel with a hole in it.

A DNS leak is when your device sends DNS queries outside the VPN tunnel. Your internet traffic goes through the encrypted tunnel, your IP address looks like it belongs to a VPN server in Amsterdam, but your DNS requests are still going straight to your ISP's resolver.

The result: the VPN hides your IP, but your ISP can still log every domain you're visiting. Any third party running a DNS lookup on that session can see exactly where you are and who you are. The encryption was working. The DNS was not.

What happens during a DNS leak

1
You connect to your VPN
Encrypted tunnel established. Your IP is masked. So far, so good.
2
You type a website address
Browser needs to resolve the domain to an IP address.
3
DNS query exits the tunnel
Instead of routing through the VPN, the query goes directly to your ISP's resolver.
Leaked
4
ISP logs your request
Your ISP now knows what site you're visiting, when, and from which real IP.
Leaked
5
Page loads normally
The VPN tunnel carries the actual content. You never notice anything went wrong.
โš ๏ธ Why This Matters More Than Most People Think
Your ISP doesn't need to read your encrypted traffic to profile you. Domain names alone are enough. "He visited webmd.com, then a pharmacy site, then a specialist clinic" tells a complete story without a single byte of content being decrypted. DNS logs are that powerful.

How It Happens

Four ways a working VPN still leaks your DNS.

Most people assume a DNS leak means a broken VPN. Often, it's a perfectly functional VPN running on a system that's doing something the VPN didn't account for. These are the four most common culprits:

๐ŸชŸ

Windows Smart Multi-Homed DNS

Windows 8 and later has a feature that sends DNS queries to multiple resolvers simultaneously and uses whichever responds first. A VPN might own one resolver. Your ISP owns the others. Guess who usually wins.

๐Ÿ”

IPv6 Traffic Bypassing the Tunnel

Most VPNs tunnel IPv4 traffic properly but leave IPv6 unprotected. If your connection uses IPv6, those DNS queries go out in the open. Many providers still don't handle this correctly.

๐ŸŒ

Browser DNS-over-HTTPS (DoH)

Chrome and Firefox can be configured to use their own DNS resolver regardless of what your system or VPN says. If your browser is pointed at Google's 8.8.8.8 or Cloudflare's 1.1.1.1, that's where your queries are going.

๐Ÿ“ก

ISP DHCP Overrides

Some ISPs forcibly push their own DNS server via DHCP when you connect. Depending on how your VPN handles this, the ISP's resolver can end up in the mix without you knowing.

How to Test for One

Takes about 60 seconds. Do it right now.

Testing for a DNS leak is easy. Connect your VPN, then visit one of these tools and look at what DNS servers show up in the results. If you see servers belonging to your ISP or your home country when you're connected to a VPN server elsewhere, you have a leak.

dnsleaktest.com

Run the extended test for full results.

ipleak.net

Also checks WebRTC and IPv6 simultaneously.

browserleaks.com

Most thorough. Checks every vector.

What you're looking for: all DNS servers in the results should belong to your VPN provider, not your ISP, not Google, not Cloudflare. If anything shows your real location or your ISP's nameservers, run the extended test to confirm, then test on a second site.

โœ… Reading the Results
Good result: DNS servers from your VPN provider's country or generic anonymous resolvers. Bad result: DNS servers named after your ISP, or servers geolocated to your real city when your VPN is connected to a different country.

Why VPNs Still Leak

Why 'just use a VPN' isn't always enough.

Budget VPNs and older VPN clients often don't run their own DNS resolver. They route your traffic through an encrypted tunnel but leave DNS handling up to the operating system, which defaults right back to your ISP. The tunnel is real. The DNS protection is missing.

Even reputable VPNs can have edge cases. Reconnection events are a common one: if your VPN drops and reconnects, there's a window where traffic including DNS goes out unprotected. A kill switch cuts the internet entirely during that window. Without one, you leak.

The other issue is split tunneling. If you've configured your VPN to let certain apps bypass the tunnel, and your browser is one of them, every DNS query from that browser is unprotected. People set this up for streaming and forget it applies to everything.

What to Look For in a VPN

What a VPN needs to actually protect your DNS.

Not all VPNs handle DNS the same way. When you're evaluating one, these are the specific things worth checking:

โœ“
Private DNS resolver: The VPN should run its own DNS servers, not forward your queries to a third party.
โœ“
DNS leak protection enabled by default: Should not require manual configuration. If you have to hunt for a setting to turn it on, assume most users never do.
โœ“
IPv6 leak protection: IPv6 traffic bypassing the tunnel is extremely common. The VPN should explicitly block or tunnel IPv6.
โœ“
Kill switch: Cuts all traffic if the VPN connection drops. Prevents the exposure window during reconnection.
โœ“
Independent audit: Providers that have been audited for DNS leaks specifically give you something to go on beyond marketing claims.

How major VPNs handle DNS

VPNDNS HandlingRating
NordVPNPrivate DNS, DNS leak protection built in, auditedSolid
ExpressVPNRuns its own encrypted DNS on every serverSolid
ProtonVPNPrivate DNS with full IPv6 leak protectionSolid
MullvadExtremely strict DNS handling, one of the bestExcellent
Generic free VPNUsually no DNS protection at allAvoid

The Bottom Line

The short version.

A VPN that leaks DNS is like a door with a deadbolt and a hole in the wall next to it. The lock works. The hole is the problem. And because everything looks normal on your end, you can run a leaky VPN for years without knowing.

Run the test. Takes sixty seconds. If you find a leak, either fix your current VPN's settings or switch to one that handles DNS properly by default. If you're already on NordVPN, ProtonVPN, ExpressVPN, or Mullvad, you're in good shape, assuming you haven't done anything weird with split tunneling or browser DNS settings.

Privacy is only as strong as its weakest point. DNS is usually that point.

"Turns on VPN, feels safe, forgets the DNS is still talking to the ISP. Classic. Test your setup before you trust it."

โ€” Frank Cache ยท BuyWiseGuy