How to Check if Your VPN Is Working: 4 Tests [2026]

How to Check if Your VPN Is Working: 4 Tests [2026]

The status light in your VPN app says connected. That doesn't mean it's working. Your VPN is actually doing its job when three things are true: your real IP address is hidden, your DNS requests are routing through the VPN tunnel, and your kill switch cuts your traffic if the connection drops. You can check all three in under five minutes using the four tests below. No technical knowledge needed, just a browser tab and the tools listed at each step.

The tests below work with any provider. Steps that vary by app call out Internxt VPN specifically, as it runs as a Chrome browser extension bundled with every paid Internxt plan, so the extension install and server selection look different from a full desktop app.

Is my VPN actually working? Quick 3-step check

If you want a 30-second answer before running the full tests, open each tool in a new tab with your VPN connected.

Step 1: Check your IP addressGo to whatismyipaddress.com. The location shown should be your VPN server's city, not your actual location. If it shows your real city or ISP, the tunnel is not routing your traffic.

Step 2: Run a DNS leak testGo to dnsleaktest.com and click Standard Test. Every server in the results should belong to your VPN provider, not your home internet provider. If you see your ISP's servers listed, your DNS is leaking outside the tunnel.

Step 3: Verify the kill switchDisconnect your internet for three seconds (toggle Wi-Fi off and back on), then check your IP again immediately after reconnecting. If your kill switch is working, the IP check should either show a connection error or return to your VPN server's IP, not your real one.

All three pass? Your VPN is working. If any step fails, the sections below walk through each fix.

How to test if your VPN is working: 4 tests explained

Your VPN can show a green "connected" status and still be leaking data in three different ways. Each test below catches a different failure type. Run them in order the first time you set up a new VPN, and again any time you switch servers, update the app, or change devices.

Test 1: IP address check

What it confirms: Your traffic is exiting from the VPN server, not from your home internet connection.

Tool: whatismyipaddress.com or ipleak.net

Steps:

  1. Note your current IP address with the VPN disconnected (open the tool, write it down or screenshot it).
  2. Connect to your VPN and choose a server in a specific country.
  3. Reload the tool. The IP address and location shown should now match your VPN server, not your real location.

Pass: The tool shows a new IP address and location belonging to your VPN provider's server, not your home ISP.

Fail: The tool still shows your real IP or your real city. This usually means the VPN tunnel did not establish correctly. Disconnect, reconnect, and test again. If it keeps failing, try a different server.

Test 2: DNS leak test

What it confirms: Your domain name lookups are routing through the VPN tunnel, not bypassing it.

A DNS leak happens when your device sends a domain lookup outside the VPN tunnel. That lookup is the step that translates "google.com" into an IP address, and when it leaks, your ISP sees it even though your traffic is routed through an encrypted tunnel. It's the most common way a VPN can appear connected while still exposing your browsing activity.

Tool: dnsleaktest.com

Steps:

  1. Connect your VPN.
  2. Go to dnsleaktest.com and run the Standard Test. Run the Extended Test if you want to check for IPv6 DNS exposure as well.
  3. Look at the server names and ISP column in the results.

Pass: All results show your VPN provider's DNS servers. For Internxt VPN, the results should show Internxt's servers, not your home internet provider.

Fail: Results show your home ISP's DNS servers (e.g., Comcast, AT&T, BT). Your DNS is leaking. Fix: disconnect the extension, disable and re-enable it, reconnect, and run the test again. If it persists, try a different server location or reinstall the extension.

Internxt VPN: DNS protection is handled automatically by the extension. There is no separate setting to toggle. If the DNS test fails, disconnect and reconnect, or switch to a different server location.

Test 3: WebRTC leak test

What it confirms: Your browser is not exposing your real IP address through WebRTC, a separate communication channel that VPN tunnels don't always cover.

WebRTC is a browser feature that handles real-time communication like video calls. It can bypass the VPN tunnel entirely and send your real IP address directly to websites, even when everything else is encrypted. Chrome, Firefox, and Edge are affected. Safari handles this differently and is less exposed.

Tool: browserleaks.com/webrtc

Steps:

  1. Connect your VPN.
  2. Go to browserleaks.com/webrtc.
  3. Look at the "Public IP Address" and "Local IP Address" fields.

Pass: The Public IP field shows your VPN server's IP, not your real one. The Local IP field may show a private network address (like 10.x.x.x), which is normal.

Fail: Your real public IP appears under "Local IP Address" or "Public IP Address." Fix options:

  • In Firefox: go to about:config, search for media.peerconnection.enabled, set it to false.
  • In Chrome or Edge: install a WebRTC control extension like "WebRTC Leak Prevent."
  • Alternatively, use a browser with WebRTC disabled by default. Brave has this built in.

Test 4: Kill switch test

What it confirms: Your internet traffic stops completely if the VPN connection drops, rather than falling back to your real IP.

A kill switch is only useful if it actually fires. The only way to know is to simulate a dropped connection and check what happens.

Steps:

  1. Connect your VPN and open whatismyipaddress.com in a browser tab.
  2. Confirm the IP shown is your VPN server's IP.
  3. Turn off Wi-Fi (or unplug your ethernet cable) for three seconds, then turn it back on.
  4. The moment Wi-Fi reconnects, reload the IP check page immediately. Do this before the VPN has time to reconnect.

Pass: You see a connection error page, a blank page, or the same VPN server IP. Any of these means the kill switch held.

Fail: The IP check page loads and shows your real IP address. The kill switch did not fire during the gap.

Note: This test applies to standalone VPN apps only. Browser extension VPNs, including Internxt VPN, do not have a kill switch. If you use Internxt VPN, skip this test and focus on Tests 1, 2, and 3.

Internxt VPN

Internxt VPN: included with every paid Internxt plan

Most VPNs are sold as standalone subscriptions. Internxt bundles the VPN into its paid plans alongside post-quantum encrypted cloud storage and antivirus protection, all under one account and one zero-knowledge architecture.

Plan Storage VPN server locations Antivirus
Essential 1 TB 1 (France) Yes
Premium 3 TB 3 (France, Germany, Poland) Yes
Ultimate 5 TB 5 (France, Germany, Poland, UK, Canada) Yes

What Internxt VPN does and doesn't do

Internxt VPN is a Chrome extension. It is not a standalone VPN app like NordVPN or ProtonVPN.

What that means in practice:

  • It protects your browser traffic only. Other apps on your device (email clients, torrent software, desktop apps) route outside the tunnel.
  • There is no kill switch. If the VPN connection drops, your browser continues without interruption rather than cutting traffic.
  • It works on any device running Chrome or a Chromium-based browser. No separate mobile app required.
  • Server locations are limited to 5. No US servers are currently available.

If you need whole-device VPN coverage, a kill switch, or US server access, a standalone VPN app is the right tool. If you want browser-level privacy on public Wi-Fi, protection while travelling, or geolocation shifting for regional content, Internxt VPN covers that use case.

Which tests apply to Internxt VPN

Test Applies? Notes
Test 1: IP address check Yes Run in the same browser the extension is active in
Test 2: DNS leak test Yes DNS is routed through the extension automatically
Test 3: WebRTC leak test Yes Especially relevant for browser extensions
Test 4: Kill switch test No Browser extensions don't have kill switches

How to check if your VPN is working on each device

The four tests above work in any browser on any device. The steps below cover how to find the VPN status indicator on each platform, and what to look for before running a full test.

How to check if your VPN is working on iPhone

The quickest way: look for the VPN icon in your iPhone status bar. It appears as a small "VPN" label at the top of the screen when a connection is active.

For a more thorough check:

  1. Go to Settings → General → VPN & Device Management → VPN.
  2. Your VPN should show "Connected" under the provider name.
  3. Open Safari and go to whatismyipaddress.com. Confirm the location matches your VPN server, not your real city.

One thing to watch: iOS can reconnect to a VPN silently after an interruption without telling you the connection was dropped and re-established. The status indicator will show "Connected" either way. Run the IP check to confirm, not just the status screen.

How to check if your VPN is working on Android

  1. Pull down the notification shade. If your VPN is active, you'll see a key icon and a "VPN" notification.
  2. Go to Settings → Network & Internet → VPN to see the connection status.
  3. Open Chrome and go to whatismyipaddress.com. The IP and location should match your VPN server.

Same caveat as iOS: the system VPN indicator tells you the connection state, not whether the tunnel is routing your traffic correctly. Always confirm with the IP check.

How to check if your VPN is working on Windows

  1. Look for the VPN app icon in the system tray (bottom right of your taskbar). Most providers show a lock or shield icon when connected.
  2. Go to Settings → Network & Internet → VPN. Your provider should appear with "Connected" status.
  3. Open any browser and go to whatismyipaddress.com to confirm the IP matches your server.

For Windows built-in VPN connections: Settings → Network & Internet → VPN → click your connection name → Properties → shows connection status and duration.

How to check if your VPN is working on Mac

  1. Check the menu bar at the top of your screen for your VPN provider's icon.
  2. Go to System Settings → Network → VPN. Your connection should show a green dot and "Connected."
  3. Open Chrome and go to whatismyipaddress.com to verify the server IP.

How to check if your VPN is working on Firestick

Fire OS does not have a system-level VPN status screen. All verification has to go through the VPN app itself.

  1. Open your VPN app from the Firestick home screen. The app dashboard should show a connected server and a timer.
  2. Open the Silk browser and go to whatismyipaddress.com. The location shown should match your VPN server, not your real location.

VPN not working? How to fix the most common test failures

Failing one of the four tests doesn't mean your VPN is broken. Each failure type has a specific fix. Work through the one that matches what you saw.

DNS leak

Symptom: dnsleaktest.com shows your home ISP's servers instead of your VPN provider's.

  1. Disconnect from the VPN.
  2. Go to VPN settings and toggle DNS leak protection off, then back on.
  3. Reconnect and run the DNS leak test again.

If it still fails: open your system DNS settings (Windows: Control Panel → Network → Adapter Settings; Mac: System Settings → Network → DNS) and check whether a custom DNS server is configured at the OS level. A system-level DNS override will bypass the VPN's DNS protection regardless of what the app setting says. Remove the custom DNS entry, let the VPN control DNS, and re-test.

IP address not changing after connecting

Symptom: whatismyipaddress.com still shows your real IP after you connect.

  1. Disconnect and reconnect. Try a different server location.
  2. Check whether split tunneling is enabled in your VPN settings. If the browser you're using is excluded from the tunnel, it will show your real IP even when the VPN is active for other apps.
  3. Clear your browser cache. A cached IP lookup can show your previous location even after the tunnel connects.
  4. If you're on IPv6, run the Extended test on dnsleaktest.com. Some VPNs only tunnel IPv4 traffic, which means your real IPv6 address can still be visible even when the rest of your connection is protected.

Kill switch not firing

Symptom: During the kill switch test, your real IP appeared after reconnecting Wi-Fi.

  1. Open VPN settings and confirm the kill switch toggle is on. On many standalone VPN apps this is not enabled by default.
  2. On Windows, check that the VPN app has the network permissions it needs (it may prompt on first install).
  3. Repeat the test: VPN connected, open IP check tab, drop Wi-Fi for 3 seconds, reconnect, reload immediately.

If the kill switch still fails after enabling it, the app may need to be reinstalled with full permissions, or the platform may have an OS-level restriction. Check the provider's support documentation for your specific OS version.

VPN blocked by your network or a website

Symptom: VPN connects but certain websites block access, or the VPN connection itself won't establish on a specific network.

On corporate or school networks: These networks often block VPN protocols by default. Switch from WireGuard to OpenVPN using TCP on port 443. Traffic on port 443 looks identical to standard HTTPS and is not filtered by most corporate firewalls.

On streaming services: Services like Netflix and iPlayer block known VPN IP ranges rather than VPN protocols. If you get an error screen, try a different server in the same country. If the provider doesn't actively maintain unblocked server IPs, no settings change will fix it. The issue is on the provider's infrastructure side.

On ISPs that throttle bandwidth: Some internet providers throttle high-bandwidth connections. If your VPN drops frequently, switching from WireGuard to OpenVPN TCP on port 443 can help. That traffic type is treated as standard HTTPS and is less likely to be subject to throttling rules.

What your internet provider can see when a VPN is active is a separate question from whether the tunnel is routing correctly, and depends more on which leak types are present than whether the connection status shows green.

Does my VPN work for specific use cases?

Does my VPN work for Netflix?

Connect to a server in the country whose Netflix library you want to access, then open Netflix. If the regional library loads, the VPN is working for that purpose. If you get the proxy error screen ("You seem to be using an unblocker or proxy"), the server IP you're using has been flagged. Try a different server in the same country. Not all VPN providers maintain servers that reliably unblock Netflix. Check your provider's website for confirmed streaming server locations before testing.

Does VPN work for Grok?

A VPN changes the IP address Grok reads, which affects its geolocation. Connect before opening Grok and confirm the IP at whatismyipaddress.com. If the location matches your server country, the VPN test passes. Note that some Grok restrictions are tied to the account registration country rather than the connecting IP, in which case the VPN test passes but the platform applies its own rules separately.

Does my VPN work for torrenting?

A browser IP check is not enough to confirm VPN coverage for torrenting. Torrent clients use a different network stack and can leak your real IP to trackers even when the browser IP check shows the VPN server.

The right tool is ipleak.net. Use the "Torrent Address Detection" section. It provides a magnet link. Add it to your torrent client while the VPN is running, and the tool shows which IP your client is broadcasting to trackers.

Pass: The IP shown matches your VPN server.

Fail: Your real IP appears. Check whether your torrent client is excluded from split tunneling, or whether your kill switch is enabled. Torrenting without a kill switch means any connection drop will expose your real IP to trackers automatically.

Which VPNs include a kill switch and DNS leak protection?

The answer depends on whether you're using a standalone VPN app or a browser extension. Full VPN apps include both features. Browser extension VPNs include DNS leak protection but not a kill switch, because the browser handles connection continuity rather than the extension.

Provider Type Kill switch DNS leak protection Servers Standalone purchase?
Internxt VPN Browser extension No Yes 5 No (included in Internxt plans)
ProtonVPN Full app Yes Yes 3,000+ Yes
Mullvad Full app Yes Yes 700+ Yes
NordVPN Full app Yes Yes 6,800+ Yes
ExpressVPN Full app Yes Yes 3,000+ Yes

If a kill switch is a requirement for your use case (torrenting, journalism, or any situation where a dropped connection must not expose your real IP), a standalone VPN app is the right choice. If you want browser-level privacy bundled with post-quantum encrypted cloud storage and antivirus under one plan, Internxt's privacy suite covers that use case.

Frequently Asked Questions

How do I know if a VPN is working?

Your VPN is working when your IP address changes to your VPN server's location and your DNS requests route through the VPN's servers rather than your home ISP. Visit whatismyipaddress.com with the VPN connected: if the location shown matches your server and not your real location, the first check passes.

How to check for an active VPN connection?

An active connection indicator (the VPN label in iPhone's status bar, the key icon in Android's notification shade, or the shield icon in your Windows system tray) confirms the connection was established, not that the tunnel is routing correctly. Always confirm with an IP check at whatismyipaddress.com.

Can my VPN be connected but not actually working?

Yes: the "connected" status confirms the connection was established, not that your IP is hidden, your DNS is protected, or your kill switch is active. DNS leaks and WebRTC leaks can both expose your real location and browsing data while the app shows a green indicator.

What is a DNS leak and how do I test for one?

A DNS leak happens when your device sends domain name lookups outside the VPN tunnel to your ISP's servers, which means your ISP can see which sites you're visiting even if your traffic is encrypted. Test for one at dnsleaktest.com with your VPN connected: if the results show your home ISP's servers rather than your VPN provider's, your DNS is leaking.

What is a WebRTC leak?

WebRTC is a browser feature used for video calls and peer connections that can send your real IP address directly to websites, bypassing the VPN tunnel entirely. Check for WebRTC leaks at browserleaks.com/webrtc: the Public IP Address shown should match your VPN server, not your real IP.

How do I check if my VPN kill switch is working?

Connect your VPN, confirm the IP at whatismyipaddress.com matches your server, then turn Wi-Fi off for three seconds and back on. If the kill switch held, you'll see a connection error or your VPN server's IP when you reload immediately after reconnecting, not your real IP.

Does a VPN work for Grok?

A VPN changes the IP address Grok reads, which affects location-based access; connect first and verify the IP at whatismyipaddress.com to confirm the location matches your server country. Some Grok restrictions are tied to the account registration country rather than the connecting IP, so the VPN test can pass while the platform still applies its own account-level rules.

Can I use a VPN on an ISP that throttles bandwidth?

Yes. If your VPN connection drops frequently due to ISP throttling, switching from WireGuard to OpenVPN TCP on port 443 is the most reliable fix, as that traffic type is treated as standard HTTPS and is less subject to bandwidth throttling rules.

Which VPNs include DNS leak protection and a kill switch?

All major standalone VPN apps, including NordVPN, ExpressVPN, ProtonVPN, and Mullvad, include both DNS leak protection and a kill switch. Browser extension VPNs include DNS leak protection but not a kill switch; if a kill switch is required, a standalone app is the right choice.

Beyond the network: encrypting the files you store and share

Keeping your browsing private is one half of the equation. The files you store and share are the other. Secure cloud storage with zero-knowledge encryption means your data is encrypted on your device before it ever leaves it. Internxt Drive and Internxt VPN work under the same account, the same system architecture, and the same GDPR jurisdiction, so you're not managing two separate privacy tools from two different providers.