What Is My IP
Your public IP, location, ISP, and exactly what your browser leaks
Auto-detects your public IPv4 and IPv6 via Cloudflare edge headers (no third-party hop for the IP itself), then enriches with city / region / country / ISP / ASN / timezone, plots the coordinates on a map, and resolves reverse DNS. A second section shows what every website learns about your browser independent of your IP — local network IP via WebRTC, GPU, screen, fonts, timezone — and rolls them into a privacy exposure score. Hit Share lookup to copy a deep-link to the IP Lookup tool, pre-filled with your IP. We don't store or sell your IP.
Detecting your IP and location…
How people use this page
Check if your VPN is actually on
Confirm IPv6 connectivity
Get your IP to share with support
Verify what your browser leaks
See if your IP has been flagged
Investigate suspicious server log entries
Related tools
What this page actually shows you
Your public IP is the address every website you visit can see. It is assigned by your internet service provider (ISP) and is shared across every device on your network thanks to NAT — your phone, laptop, and TV all show the same public IP. This page reads your IP from Cloudflare's edge headers(we're proxied through Cloudflare), which means detection happens on the first hop with no third-party round-trip.
The geo-location, ISP, and ASNare not extracted from your IP packet — they come from an IP-to-location database (we use ipwho.is). These databases map IP blocks to the ISP's registered service area. Country accuracy is excellent (95-99%); city accuracy is often correct to the nearest metro but can be off by 100+ miles, especially on mobile networks routing through regional hubs.
The browser fingerprint card below shows what websites learn about you independent of your IP — your screen resolution, GPU, timezone, language preferences, fonts, and (via the WebRTC API) your local network IP. This data is what advertisers use to identify you across sessions and across VPNs.
IPv4 vs IPv6
IPv4 uses 32 bits, allowing ~4.3 billion addresses. We ran out of fresh IPv4 blocks in 2011; the internet now relies on NAT to stretch the supply.
IPv6 uses 128 bits — 340 undecillion addresses. About 40% of internet traffic uses IPv6 today. Most mobile networks are IPv6-first, with IPv4 tunneled on demand.
If both are shown above, your network supports dual-stack. If only IPv4, your ISP hasn't rolled out IPv6 yet.
Why the city might be wrong
IP geolocation databases work by mapping IP ranges to the registered location of the assigning ISP — not your physical address.
- Mobile carriers route through regional gateways. You can be in Boston and show as New York.
- Corporate VPNs show the headquarters location.
- Cloud / hosting IPs show the datacenter, not the user.
- New IP blocks may not be in the database yet and fall back to the country centroid.
What hides your IP (and what doesn't)
- VPN — routes all traffic through an exit server. Best general option. Pick one with a no-logs audit.
- Tor — three-hop onion routing. Strongest anonymity, slowest performance.
- Cellular vs Wi-Fi — switching radios gives you a new IP but only changes your network identity, not your browser fingerprint.
- Incognito / private mode does not hide your IP. It only stops your browser from saving local history.
- Browser proxy extensions usually only proxy HTTPS, not WebRTC — your local IP can still leak.
Browser fingerprinting in 30 seconds
Even without your IP, a website can fingerprint your browser using GPU model, installed fonts, timezone, screen size, and audio context quirks. Combined, these signals identify ~85% of browsers uniquely. A VPN changes your IP but not your fingerprint.
To reduce fingerprintability: use a privacy-focused browser (Brave, Tor Browser), block WebRTC, set timezone to UTC, disable WebGL where you don't need it. The fingerprint card on this page shows you what an adversary would see.
Privacy of this tool
We do not store, log, or sell your IP. The detection happens via a Cloudflare-provided header on a request you initiated. Geo enrichment is fetched by your browser from a third-party API — our server never sees the response. The IP reputation check (if a key is configured) hits AbuseIPDB only for your own IP, never an arbitrary one.
This is not a public IP-lookup API.Our endpoint returns the requester's own IP only — you cannot use it to look up someone else's IP. For that, use the dedicated IP Lookup page, which runs the same geo lookups directly from your browser against the third-party provider — no request ever touches our server.
Frequently Asked Questions
IPv4 vs IPv6, geolocation accuracy, what your browser exposes, hiding your IP, ASN, reverse DNS, and how this tool handles your data.