When you are connected to a VPN, it's very important to make the DNS queries through the encrypted tunnel, using the DNS server assigned by the VPN server, NOT outside the tunnel using your ISP DNS servers.
1. To check what DNS you are using, visit ipx.ac
after you connect to our VPN.
2. Run the test. The website will detect & display your current DNS servers. If they are different than ours such as your ISP's, then you are leaking and you should fix the issue ASAP to avoid privacy breaches.
Our private DNS resolvers are the following:
184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206 and 220.127.116.11
3. How does a DNS leak affect the users?
- Even if your Internet browsing traffic is passing through the encrypted VPN tunnel, the DNS queries can be logged by who is operating the DNS servers you are using, such as your ISP. In this case, your privacy may be compromised.
4. To solve potential DNS leaks, setup your DNS server manually instead of getting it via DHCP and use 3rd party public DNS services. Note that our client software has built-in DNS leak prevention.
go to Control Panel > Network and Internet > Network Connections
Right click on the Network adapter you are using > Properties > Internet Protocol Version 4 (TCP/IPv4)
Check Use the following DNS server address: 18.104.22.168 (or other 3rd party DNS like http://www.opennicproject.org/)
Once connected to the VPN, your PC should use our private resolvers, regardless of what is the manually assigned DNS server
Main features of our Private resolvers:
- all DNS queries between VPN servers and DNS resolvers are encrypted
- no DNS resolvers are hosted in USA and UK (for obvious reasons)
- no queries are logged on the resolvers
- legitimate DNS queries are mixed with over 10 million queries we are generating to create "noise"