Instantly detect your public IPv4 and IPv6 address with full geolocation map, ISP and ASN details, VPN/proxy/Tor detection, threat intelligence from 17 sources, WHOIS registration, and abuse contacts — all in one free check. No signup required.
IP addresses recently looked up using the IP intelligence tool.
An IP (Internet Protocol) address is a unique numerical label assigned to every device connected to a network, defined in RFC 791 for IPv4 and RFC 8200 for IPv6. It serves as the internet’s addressing system — without it, data packets cannot find their destination. Every website visited, every email sent, and every API call made requires the sender’s IP address to deliver the response.
Your public IP address is visible to every server you connect to. It reveals your approximate geographic location (typically city-level), your Internet Service Provider, and the network block your connection belongs to. DNSChkr detects your public IP and enriches it with data from MaxMind GeoLite2, all five Regional Internet Registries (ARIN, RIPE NCC, APNIC, LACNIC, AFRINIC), and 17 threat intelligence sources — providing a complete picture of what the internet sees when you connect.
Unlike basic IP checkers that only display your address, DNSChkr runs a full IP intelligence analysis in a single instant check. Every result includes all 10 categories below — for free, with no signup required. The underlying database processes ASN data and threat intelligence daily across 540,000+ IP blocks from all five Regional Internet Registries.
| Category | What DNSChkr Shows | Basic IP Checkers |
|---|---|---|
| IP detection | IPv4 + IPv6 dual-stack (simultaneous) | IPv4 only |
| Geolocation | Interactive map, city, region, postal, coordinates, accuracy radius | Country or city name |
| Network details | ISP, organization, ASN, CIDR block, reverse DNS with PTR validation | ISP name only |
| VPN/proxy detection | 7-tier pipeline: VPN, proxy, Tor, datacenter, relay, iCloud Relay, WARP | Not available |
| Threat intelligence | Score 0-100, 17 sources (Spamhaus, FireHOL, Emerging Threats) | Not available |
| WHOIS/RDAP | Full network registration, org details, registration dates | Not available |
| Abuse contacts | 17 contact categories (abuse, technical, NOC, security, CSAM) | Not available |
| Timezone | ID, abbreviation, UTC offset, local time, DST status | UTC offset only |
| Region data | Country, continent, capital, currency, calling code, EU status | Country only |
| IP classification | Residential, business, datacenter, mobile, satellite, CDN | Not available |
IP geolocation maps numerical IP addresses to physical coordinates using databases maintained by providers like MaxMind, IP2Location, and the Regional Internet Registries. These databases correlate IP block allocations (which are public registry data) with geographic locations through a combination of network topology analysis, latency measurements, and user-submitted corrections.
Accuracy varies by connection type. Fixed broadband typically achieves 80% city-level accuracy and 95-99% country-level accuracy. Mobile networks are less precise because carriers route traffic through centralized gateways — a user in Portland may appear in Denver. VPN and satellite connections show the server or ground station location rather than the user’s actual position.
DNSChkr displays an accuracy radius on the interactive map to indicate confidence. A 10km radius means high confidence; a 200km radius suggests the location is an estimate. The geolocation data is sourced from MaxMind GeoLite2, updated weekly, and cross-referenced with RIR allocation records.
A VPN leak test is the most reliable way to verify your VPN connection. The process requires two checks: first, load this page without a VPN connected and note your real IP address, ISP name, and city. Then connect your VPN and reload. If the VPN is working, you should see the VPN server’s IP, the hosting provider’s name (not your ISP), and the server’s geographic location.
DNSChkr’s 7-tier detection pipeline goes further than a simple IP comparison. It checks for VPN, proxy, Tor, datacenter, and relay signatures using ASN analysis, reverse DNS patterns, known provider databases, and blocklist cross-referencing. A properly working VPN will trigger detection flags for “VPN” and “Datacenter” with the provider name listed.
If your real ISP name or home city still appears after connecting, your VPN has a leak. The three most common causes are WebRTC leaks (browser-level, fixable in settings), DNS leaks (DNS queries bypassing the tunnel), and IPv6 leaks (IPv6 traffic not routed through the VPN). Running DNSChkr’s dual-stack detection catches IPv6 leaks that single-stack tools miss.
| Property | IPv4 (RFC 791) | IPv6 (RFC 8200) |
|---|---|---|
| Address size | 32 bits | 128 bits |
| Format | 192.0.2.1 | 2001:db8::1 |
| Total addresses | ~4.3 billion | 3.4 x 1038 |
| Pool status | Exhausted (2011) | Virtually unlimited |
| Header size | 20-60 bytes (variable) | 40 bytes (fixed) |
| IPsec | Optional | Mandatory support |
| NAT required | Yes (address conservation) | No (end-to-end addressing) |
| Global adoption (2026) | ~55% | ~45% |
| Feature | VPN | Proxy | Tor |
|---|---|---|---|
| Encryption | Full tunnel (AES-256) | None or HTTPS only | Multi-layer (3 relays) |
| Speed impact | 10-30% slower | 5-15% slower | 70-90% slower |
| Anonymity level | Moderate | Low | High |
| Cost | $3-12/month | Free to $10/month | Free |
| Traffic scope | All device traffic | Single application | Tor Browser only |
| DNSChkr detection | VPN + Datacenter flags | Proxy flag | Tor flag + exit node ID |
An IP address alone provides limited but non-trivial information. Any website or service you connect to receives your IP as part of normal network communication. From it, they can determine your approximate city-level location, your ISP, and whether you are connecting from a residential, business, or datacenter network. This data is routinely used for content localization (showing local weather or language), fraud prevention (flagging logins from unexpected countries), and regulatory compliance (enforcing geo-restrictions).
However, an IP address cannot reveal your name, home address, email, phone number, or browsing history. Only your ISP can link an IP to a subscriber identity, and this requires legal process in virtually all jurisdictions. The practical risks of IP exposure are modest for most users: targeted advertising, approximate location tracking, and in rare cases, DDoS attacks directed at a specific IP. Using a VPN eliminates all of these by substituting the VPN server’s IP for your own.
Because this tool shows your own IP address, the abuse contacts displayed are the contacts responsible for your IP block — typically your ISP. This is useful if your IP has been compromised or is being used for malicious activity without your knowledge. Common scenarios include: a device on your network is infected with malware and sending spam or participating in a botnet; someone on a shared network (apartment complex, university, co-working space) is conducting abuse from the same public IP; or your IP has been spoofed in packet headers to make attacks appear to originate from your address.
If DNSChkr shows a non-zero threat score for your IP, it means your address appears on one or more blocklists. This can cause email delivery failures, CAPTCHA challenges on websites, or service denials. Check which blocklists flagged your IP in the threat analysis section, then contact your ISP using the abuse contacts shown — they can investigate whether your IP was involved in malicious activity and request delisting.
If you are receiving unwanted traffic or attacks from a different IP address, use the IP Geolocation Lookup tool to investigate the attacker’s IP. That tool provides the same full analysis for any IP address and includes an abuse report generator — a structured template for filing reports with the attacker’s ISP, hosting provider, or the relevant Regional Internet Registry. The Blacklist Checker can also verify whether the attacking IP is already listed on DNSBL/RBL databases.
DNSChkr uses a 7-tier threat detection pipeline that combines multiple independent data sources to classify IP addresses. Tier 1 checks curated blocklists (Spamhaus DROP/EDROP, FireHOL Level 1, Emerging Threats). Tier 2 performs ASN ownership analysis against known VPN and hosting providers. Tier 3 cross-references datacenter IP ranges from AWS, Azure, GCP, DigitalOcean, and OVH. Tier 4 analyzes reverse DNS patterns for provider-identifiable PTR records. Tier 5 checks iCloud Private Relay and Cloudflare WARP ranges. Tier 6 queries the Tor Project’s exit node list. Tier 7 applies heuristic scoring across all signals.
The pipeline processes 540,000+ IP blocks from all five Regional Internet Registries and produces a threat score from 0 (clean residential) to 100 (confirmed malicious). Each IP is classified as residential, business, datacenter, mobile, satellite, or CDN. For detailed investigation of any IP address, use the companion IP Geolocation Lookup tool, which provides the same analysis for any IP with full WHOIS/RDAP registration data and a structured abuse contact directory across 17 categories.
Investigate any IP address with full geolocation, threat analysis, WHOIS registration, and an abuse report generator for filing reports with ISPs and hosting providers.
Scan TCP and UDP ports on any IP address to check for open services and potential vulnerabilities.
Check if an IP or domain is listed on DNSBL/RBL blacklists used by email servers and firewalls.
Scan any URL against 17 security vendors for malware, phishing, and reputation analysis.