Blog · VPN

What IP address does a VPN show?

Direct answer: With a VPN connected, IP checkers display the VPN server’s public IP (the “exit” node), not your home or mobile carrier address. What Is My IP Address IP will show that exit IP; disconnect VPN and tap Refresh to see your ISP IP again.

Quick check

Split tunneling and IPv6 leaks

Some VPN apps let selected apps bypass the tunnel. A website might then see your ISP IP for browser traffic while another app uses the VPN. IPv6 can leak around a VPN if the client does not tunnel it—test both address families on our homepage and compare with IPv4 vs IPv6.

What changes when you disconnect

After you disconnect, refresh the checker. You should return to your carrier or home ISP address until the next DHCP rotation. If the number does not change, you may still be proxied or on a different VPN profile.

Geolocation cards

City-level data near the VPN region is normal; it is not GPS. For expectations, read IP geolocation accuracy.

People also ask

Kill switch—what is it? A feature that blocks traffic if the VPN drops, reducing accidental ISP IP leaks during reconnects.

Why Netflix still blocks me? Streaming sites target known VPN ranges; changing server regions may help—policy permitting.

Corporate VPN shows what? Often the office egress, not your home—expected for work resources.

Extended guide: before/after testing

Write down your baseline ISP IP with VPN off. Connect VPN, pick a region, refresh the checker. The country and ISP fields should shift to the provider’s network. If nothing changes, you are not in the tunnel for that browser profile.

Test IPv4 and IPv6 separately. Some clients disable IPv6 by default; leaks can occur if one protocol bypasses the VPN.

For work-from-home, split tunneling might send only corporate subnets through VPN while general browsing uses ISP—both behaviors can be valid; know which path you are testing.

Document timestamps when reporting issues—VPN nodes rotate shared IPs, and support staff need reproducible steps.

DNS, WebRTC, and other leak classes

IP checkers focus on the address your HTTP session presents. Separate classes of leaks exist: DNS queries might still hit your ISP resolver, and WebRTC in some browsers can expose local or public candidates. If your threat model requires strict anonymity, follow vendor hardening guides; for “which IP does support see,” our checker plus a quick DNS leak test usually suffices.

Multi-hop products chain two VPNs or VPN plus Tor; each hop changes the visible exit. Document every hop when filing tickets—otherwise engineers compare your paste to the wrong layer.

Browser extensions labeled “VPN” sometimes proxy only browser traffic while the rest of the OS uses the raw ISP path. That is not wrong by design, but it explains why curl and Chrome disagree until you align which apps participate.

Always-on VPN profiles on mobile may reconnect in the background; a quick refresh before copying prevents sending yesterday’s exit IP into a live chat.

Choosing a server region responsibly

Picking a country far from you increases latency and may trigger banking fraud alerts—legitimate tradeoffs when you need that region, unnecessary when you only wanted “privacy” on generic browsing.

Shared VPN IPs rotate; another user’s abuse might briefly affect captcha rates before providers retire bad nodes—usually not your fault.

Some workplaces forbid consumer VPNs on corporate hardware; follow policy even if the tech “works.”

WireGuard vs OpenVPN debates matter for battery and handshake speed; both change your visible exit when configured correctly.

If streaming breaks, try another city in the same country before filing angry tickets—CDNs differ by metro.

Disconnect fully before speed tests meant to benchmark raw ISP performance; otherwise you measure VPN throughput, not fiber capacity.

Zoom out

VPNs are tools. They change the visible exit IP and encrypt to the provider—useful, popular, and still not a personality trait. Pick one, learn its settings, refresh our checker when things look odd, and move on with your day.

Summary checklist

Baseline IP → connect VPN → pick region → refresh → capture new IP → disconnect → refresh again. Store screenshots only if required; text is better.

If streaming or banking breaks, test split tunnel settings and try another protocol (OpenVPN vs WireGuard) per provider docs.

After any VPN update, redo the before/after IP test—client upgrades silently flip split-tunnel defaults more often than users notice.

Related guides