VPN & Proxy Detection Test

Check whether your VPN or proxy connection is detectable using TCP handshake latency analysis.

How This Test Works

This test measures network latency in two different ways: first, by timing the round trip between your browser and our server through a WebSocket, and second, by capturing the raw TCP handshake timing at our server. If these two measurements differ significantly, it often indicates that your connection is passing through an extra node (e.g., a VPN or proxy) before reaching our server.

Your IP address

3.142.248.196

Country

United States of America

Region

Ohio

City

Columbus

Measuring latencies…

How to Interpret Your Results

This test produces a 'detection score' ranging from 0% (very unlikely) to 100% (highly likely). If your WebSocket RTT is near your handshake RTT (within about 20%), you'll see 0%. If your WebSocket RTT is roughly twice as large, you'll see about 100%. Scores in between reflect partial differences that may or may not indicate a VPN/proxy.

This is a heuristic test and isn't 100% foolproof. Network congestion, unusual routing, or mobile carriers can cause misleading results. However, compared to many alternatives, it's fairly accurate for detecting most proxies and some less efficient or misconfigured VPNs. If your VPN is physically close to your location, configured to efficiently NAT your traffic and the networking is stable, the overhead might be minimal and the test may not detect it.

What does this test do?

How does it measure my browser's latency?

What is the 'server-side handshake'?

Why does a VPN or proxy cause a big difference in these measurements?

Could normal usage cause a big discrepancy (false positive)?

Is it safe to run this test?

What does 'extra hop' mean?

Do you store my personal data or IP address?

Why is this test good at detecting proxies but not always VPNs?

Will a well-configured VPN always pass undetected?