Check whether you are exposing your real IP address
If you are trying to keep online activities anonymous and private with VPN service, it is extremely important that all traffic originating from your computer is routed through the VPN network. If any traffic leaks and goes out through the underlying connection, any entity monitoring your traffic will be able to log your activity. You need to know if the supposedly secure VPN connection you are using is actually WebRTC leak-free.
Firefox and Chrome have implemented WebRTC that allow requests to STUN servers be made that will return the local and public IP addresses for the user. TorGuard applications protects you againest WebRTC leaks and keeps your identity hidden at all times.
At TorGuard we are happy to help our customers by sharing a link to a free, safe, easy-to-use tool on this page to test if you are affected by the WebRTC leak.
After running the test, if any of your ISP or location information displays on the following page then you have a DNS leak. You will need to set static DNS. It is normal to see Google DNS or TorGuard DNS or OpenDNS servers on a test – this is not considered a leak.