You can use the following VPN tests to verify the operation of your VPN. You can also use these tests to check your device and network configurations.
Never “just assume” the proper operation of your VPN. Periodically verify it to ensure that you enjoy the safest possible online experience.
Use the following tests to make sure you’re not leaking your actual IP address to the world.
When you connect to your VPN, your VPN should replace your ISP’s DNS with an anonymous DNS server.
Use these tools to verify that you are not using your ISP’s DNS.
Who is my DNS?
Make sure your email app isn’t revealing your actual IP address.
What is your IP address?
Hackers, Your ISP, corporations, marketers, attorneys, government agencies, and law enforcement can trace your online activity to your ISP-assigned IP address.
Your IP address is a unique number assigned to your devices. Every online resource you visit logs your IP address, leaving indellible tracks that reveal everywhere you go online and everything you do.
Use these tests to find out if you’re leaking your IP address.
- What’s My IP? (Courtesy, TorGuard).
- What is my IP address? (Courtesy, CactusVPN).
- What is my IP address: NordVPN.
- What is My IP? (Courtesy ExpressVPN).
Check for canvas fingerprinting and more. Don’t let your web browser give away your identity.
WebRTC is an HTML5 specification that communications directly between your browser and devices. It can disclose your true IP address despite your VPN connection.
Look up IP addresses, domains, trace routes, etc.
Who is My ISP?
Don’t download any files P2P until you verify that you’ve correctly set up your bit torrent client for use with your VPN.
Check your connection speed before and after you connect to your VPN. Do this to find out how much bandwidth overhead your VPN uses.
Find out who owns any IP address using this test from NordVPN:
- Password Generator (Courtesy of ExpressVPN).
ThisPersonDoesNotExist.com. Get a realistic computer-generated anonymous profile photo.
Internet Tools and Resources for Open Source Intelligence http://www.onstrat.com/osint/
Metasploit Project – The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development
Nessus is a very popular vulnerability scanner. It can be used to check how vulnerable your network is by using various plugins to test for vulnerabilities. Also, Nessus can perform compliance auditing, like internal and external PCI DSS audit scans.
Nmap – The nmap tool is a port scanner. https://nmap.org/
Autopsy is used in digital forensic investigations. https://www.autopsy.com/download/
Hping allows you to map out firewall rule sets. It is also great for learning more about TCP/IP and experimenting with IP protocols. http://hping.org/
Ptunnel is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies. Ptunnel is used as a covert channel, not to elicit a response from a host using TCP. https://www.mit.edu/afs.new/sipb/user/golem/tmp/ptunnel-0.61.orig/web/
Traceroute and tracert are computer network diagnostic commands for displaying the route and measuring packets’ transit delays across an Internet Protocol network. Traceroute uses ICMP and not TCP.
AI Humanizer – https://www.aihumanizer.org/
I Want My VPN links to the above tools for your convenience. We neither own nor operate these tools. Therefore, we cannot provide any warranty of their accuracy, validity, or efficacy. Use these tools at your own risk.
Learn more about VPN
Use the below links to explore the VPN reviews and resources published by I Want My VPN!
- Protect Your Digital Footprint with VPN
- Future Trends in VPN Technology
- NordVPN and Cyber Threats
- NordVPN for Families
- NordVPN for Journalists and Activists