What Is My IP

Your public IP, location, ISP, and exactly what your browser leaks

Auto-detects your public IPv4 and IPv6 via Cloudflare edge headers (no third-party hop for the IP itself), then enriches with city / region / country / ISP / ASN / timezone, plots the coordinates on a map, and resolves reverse DNS. A second section shows what every website learns about your browser independent of your IP — local network IP via WebRTC, GPU, screen, fonts, timezone — and rolls them into a privacy exposure score. Hit Share lookup to copy a deep-link to the IP Lookup tool, pre-filled with your IP. We don't store or sell your IP.

Detecting your IP and location…

How people use this page

Check if your VPN is actually on

After connecting to a VPN, reload this page. If the IP, ISP, and city still match your home network, the VPN tunnel did not engage. Also scroll down to the "Local network IP" row in the browser fingerprint card — many VPNs leak the LAN IP via WebRTC even when the public IP is masked.

Confirm IPv6 connectivity

If your network supports IPv6, a separate IPv6 card appears above. ISPs sometimes advertise IPv6 but mis-configure it on the last mile — if you see only IPv4 here, your devices aren't actually using v6.

Get your IP to share with support

When a service's support team asks "what's your IP?", click the Share lookup button. We generate a link to the IP Lookup page pre-filled with your IP, so the support agent can open it and see the same geo / ISP / ASN data you do.

Verify what your browser leaks

The "What your browser exposes" card lists every signal a website can read without permission. The local network IP (from WebRTC) is the one most people don't realize is exposed — and it persists even through most VPNs.

See if your IP has been flagged

If our AbuseIPDB key is configured, an IP reputation card appears. A high score means your IP has been reported for abuse by other operators — usually because it's shared (mobile carrier, dorm room) and someone else on the same NAT pool was malicious. You can dispute false positives at abuseipdb.com.

Investigate suspicious server log entries

For looking up someone else's IP (not your own), open the IP Lookup tool from the share button or related-tools list below. Paste any IPv4 / IPv6 and get the same enrichment.

What this page actually shows you

Your public IP is the address every website you visit can see. It is assigned by your internet service provider (ISP) and is shared across every device on your network thanks to NAT — your phone, laptop, and TV all show the same public IP. This page reads your IP from Cloudflare's edge headers(we're proxied through Cloudflare), which means detection happens on the first hop with no third-party round-trip.

The geo-location, ISP, and ASNare not extracted from your IP packet — they come from an IP-to-location database (we use ipwho.is). These databases map IP blocks to the ISP's registered service area. Country accuracy is excellent (95-99%); city accuracy is often correct to the nearest metro but can be off by 100+ miles, especially on mobile networks routing through regional hubs.

The browser fingerprint card below shows what websites learn about you independent of your IP — your screen resolution, GPU, timezone, language preferences, fonts, and (via the WebRTC API) your local network IP. This data is what advertisers use to identify you across sessions and across VPNs.

IPv4 vs IPv6

IPv4 uses 32 bits, allowing ~4.3 billion addresses. We ran out of fresh IPv4 blocks in 2011; the internet now relies on NAT to stretch the supply.

IPv6 uses 128 bits — 340 undecillion addresses. About 40% of internet traffic uses IPv6 today. Most mobile networks are IPv6-first, with IPv4 tunneled on demand.

If both are shown above, your network supports dual-stack. If only IPv4, your ISP hasn't rolled out IPv6 yet.

Why the city might be wrong

IP geolocation databases work by mapping IP ranges to the registered location of the assigning ISP — not your physical address.

  • Mobile carriers route through regional gateways. You can be in Boston and show as New York.
  • Corporate VPNs show the headquarters location.
  • Cloud / hosting IPs show the datacenter, not the user.
  • New IP blocks may not be in the database yet and fall back to the country centroid.

What hides your IP (and what doesn't)

  • VPN — routes all traffic through an exit server. Best general option. Pick one with a no-logs audit.
  • Tor — three-hop onion routing. Strongest anonymity, slowest performance.
  • Cellular vs Wi-Fi — switching radios gives you a new IP but only changes your network identity, not your browser fingerprint.
  • Incognito / private mode does not hide your IP. It only stops your browser from saving local history.
  • Browser proxy extensions usually only proxy HTTPS, not WebRTC — your local IP can still leak.

Browser fingerprinting in 30 seconds

Even without your IP, a website can fingerprint your browser using GPU model, installed fonts, timezone, screen size, and audio context quirks. Combined, these signals identify ~85% of browsers uniquely. A VPN changes your IP but not your fingerprint.

To reduce fingerprintability: use a privacy-focused browser (Brave, Tor Browser), block WebRTC, set timezone to UTC, disable WebGL where you don't need it. The fingerprint card on this page shows you what an adversary would see.

Privacy of this tool

We do not store, log, or sell your IP. The detection happens via a Cloudflare-provided header on a request you initiated. Geo enrichment is fetched by your browser from a third-party API — our server never sees the response. The IP reputation check (if a key is configured) hits AbuseIPDB only for your own IP, never an arbitrary one.

This is not a public IP-lookup API.Our endpoint returns the requester's own IP only — you cannot use it to look up someone else's IP. For that, use the dedicated IP Lookup page, which runs the same geo lookups directly from your browser against the third-party provider — no request ever touches our server.

Frequently Asked Questions

IPv4 vs IPv6, geolocation accuracy, what your browser exposes, hiding your IP, ASN, reverse DNS, and how this tool handles your data.