Quick version: a surprising number of devices are routing traffic through some kind of tunnel without the user knowing. Work VPNs, security suite VPNs, Apple Private Relay, Google One VPN, mobile carrier 'safety' middleboxes - they all silently change your effective IP.
Things that secretly are a VPN
iCloud Private Relay (iPhone, iPad, Mac)
If you're an iCloud+ subscriber and you use Safari, Apple silently routes your DNS and a portion of your HTTPS traffic through a two-hop relay - first hop via Apple, second hop via a partner (Cloudflare, Akamai, Fastly). Websites see a Cloudflare IP, not your real one. Effectively a VPN for browser traffic.
Toggle: Settings -> [your name] -> iCloud -> Private Relay.
Google One VPN
If you have Google One (the storage upgrade), VPN access is bundled in many countries. The Google One app on Android/iOS or the desktop client routes all traffic through Google's edge. Often turned on once during onboarding and forgotten about.
Antivirus / security suite VPNs
Norton, McAfee, Avast, Bitdefender, Kaspersky all ship VPN modules. They sometimes auto-enable when you connect to public Wi-Fi or when an "unsafe" site is detected. Users blame the VPN for "slow internet" without realizing it's even on.
Corporate VPN auto-connect
IT departments configure work laptops to auto-connect to the corporate VPN whenever you're outside the office network. Your traffic - including personal browsing - gets routed through your employer's exit IPs. Visible in our checker as a corporate-looking org name.
Mobile carrier "boost" features
T-Mobile's "Web Guard", Verizon's "Safe Mode", and various MVNO offerings sometimes route traffic through middlebox proxies that look VPN-ish to detection tools. Less common than they used to be but still around.
How to read our verdict
- VPN WORKS! - we detected at least one strong VPN signal. You're using something - either a deliberate VPN or one of the silent-VPN cases above.
- NO VPN! - we couldn't detect a VPN. You're connecting from what looks like a residential ISP. If you thought you had a VPN on, something's wrong with that VPN.
- VPN LEAKING! - your VPN is detected, but one of the leak tests caught your real IP escaping. Use the WebRTC, DNS, IPv6 detail rows to see which one.
What websites see vs. what you see
The big number on this page is the IP and country your computer presents to the public internet. Websites you visit see exactly that - so it's also the IP that geo-restricts you on Netflix, the IP your bank fraud-checks, the IP your government sees if it's monitoring traffic.
If that number isn't what you want to be visible, you're using the wrong VPN (or none at all). If it is what you want, you're set.
Bottom line
The fastest way to answer "am I using a VPN" is to check what the public internet sees. That's exactly what this page does, in your browser, no signup. If the answer surprises you, the next step is figuring out which app or feature is doing it - and whether you actually want it on.