
Whoer (whoer.net) is a free online privacy diagnostic tool that instantly shows what your browser and internet connection reveal to the outside world — your IP address, location, ISP, DNS servers, and browser fingerprint. It doesn’t hide anything on its own; it just tells you what’s already exposed. Think of it as a mirror for your internet identity.
If you use a VPN or proxy and have never actually tested whether it’s working, there is a real chance it isn’t doing what you think. Whoer makes that test take about ten seconds.
What Whoer Actually Shows You
When you open whoer.net, the page runs an automatic scan before you click anything. No signup, no download — results appear instantly. Here’s what you get:
Your public IP address — the IPv4 or IPv6 address that websites log when you visit them. If your VPN is working, this should show the VPN server’s address, not your real one. If it shows your home address, the VPN isn’t doing its job.
Geolocation data — the country, city, region, and time zone attached to your IP. Whoer cross-references this against your browser’s reported time zone and system language. Mismatches are a red flag.
ISP and ASN — your internet service provider and autonomous system number. If you’re connected to a VPN but the ISP still reads as your home provider, something is leaking.
DNS leak status — which DNS servers are handling your browsing requests. A DNS leak means those requests are going directly to your ISP instead of through the VPN tunnel, which exposes which websites you visit even if your IP is hidden.
WebRTC leak detection — WebRTC is a browser technology built for real-time communication like video calls. Its side effect is that it can expose your actual local IP address even when a VPN is active, because it bypasses the VPN tunnel entirely. Whoer’s WebRTC test catches this.
Browser fingerprint data — screen resolution, installed browser plugins, operating system, system fonts, language settings, and canvas fingerprint readings. Sites use these details to identify you across sessions even without cookies.
Anonymity score — a percentage that summarizes how consistent and “normal” your connection looks. A 100% score means your IP, DNS, time zone, language, and WebRTC results all match and look like a typical user in one location. A 60% score means something is contradicting something else.
How the Anonymity Score Works
The score isn’t a measure of how private you are in an absolute sense. It’s a consistency check. Whoer is essentially asking: does everything about your connection tell the same story?
Say your IP shows a location in Germany. If your browser’s time zone reads UTC+5 and your system language is set to English (India), Whoer will flag those mismatches and drop your score. Normal users in Germany don’t have those combinations. That inconsistency is exactly what fraud detection systems, ad platforms, and account security checks look for.
Scores below 80% generally mean there are detectable inconsistencies. Getting to 100% usually requires a reliable VPN with DNS leak protection, a browser configured to match the VPN’s location (time zone, language), and WebRTC disabled or controlled.
The Two Leaks That Actually Matter
Most VPN users don’t realize their setup can be compromised without the VPN itself failing. Two specific leak types do the most damage:
DNS leaks are probably more common than people expect. Your browser needs to translate domain names (like google.com) into IP addresses. Normally when using a VPN, that translation request goes through the VPN’s encrypted tunnel. When a DNS leak happens, those requests go straight to your ISP’s servers instead. The result: your ISP can see every domain you visit, even though your IP looks like it’s in another country. Fixing this usually means configuring your VPN to force DNS through its own servers, or switching to a private DNS provider like Cloudflare (1.1.1.1) with DNS over HTTPS enabled.
WebRTC leaks are trickier because they happen inside the browser itself. WebRTC needs to know real IP addresses to establish peer-to-peer connections. Browsers like Chrome don’t give you a built-in way to disable it, so even with a VPN running, a WebRTC call can hand over your actual local IP address to any site that asks. Firefox lets you disable it through about:config. Chrome users typically need a browser extension like uBlock Origin to block WebRTC requests. Brave and Opera partially mitigate this by default.
What Whoer Is Not
Whoer doesn’t hide anything. It has a VPN service as a separate paid product, but the IP checker tool itself is purely diagnostic. A lot of people confuse the two.
It also isn’t a comprehensive fingerprint analysis tool. It gives you surface-level fingerprint data — OS, browser, plugins — but for deeper analysis of canvas fingerprinting, WebGL, AudioContext, and font enumeration, tools like BrowserLeaks or AmIUnique go further. Whoer is the fast first-pass check; those are the detailed follow-ups.
And it doesn’t guarantee that a 100% score means you’re anonymous. Consistency and anonymity are different things. Your connection can look perfectly consistent and still be attributed to you if you’re logged into an account, your browser fingerprint is unique enough to identify you, or your VPN provider keeps logs.
Who Uses Whoer and Why
Privacy-conscious everyday users run Whoer to confirm their VPN is actually masking their IP before browsing. That’s the most basic use case and probably the most common.
Remote workers on company VPNs use it to troubleshoot connectivity — checking which IP address appears externally helps confirm whether traffic is routing correctly.
Developers and security researchers use it to verify proxy configurations, test anonymization setups, and check whether DNS queries are leaking outside a secure environment.
People managing multiple accounts across platforms — for market research, ad verification, or e-commerce — use Whoer to verify that each browser profile looks consistent and doesn’t mix signals from different identities.
Cybersecurity professionals run it as a quick network posture check before logging into sensitive systems.
How to Actually Get to 100%
Reaching 100% on Whoer requires every signal to match. Here’s the order of operations that works:
Start with a VPN that explicitly supports DNS leak protection and WebRTC blocking. Free VPNs often skip both. Connect to a server in the region you want to appear to be in.
Then match your browser settings to that location. Set your system time zone to match the VPN server’s region. Set your browser language to a language consistent with that country. If your IP says France but your browser speaks Turkish, you’ll lose points.
Disable WebRTC or use a browser that handles it for you. Then reload Whoer and check the results. If DNS is still leaking, force DNS through the VPN or switch to an encrypted DNS provider.
Check again. Repeat until the score stabilizes. Once everything matches — IP, DNS, time zone, language, WebRTC — the score should hit 100%.
Whoer Alternatives Worth Knowing
Whoer isn’t the only tool that does this, and no single tool covers everything.
ipleak.net is probably the most thorough for leak detection specifically — it covers WebRTC, DNS, IPv6, and torrent IP leaks in one place.
BrowserLeaks goes deeper on fingerprinting, giving you detailed readings on canvas, WebGL, audio fingerprinting, and font enumeration. Good for understanding what makes your browser unique.
AmIUnique compares your fingerprint against a large database and tells you how unusual your setup looks. The more unique you are, the easier you are to track.
BrowserScan gives a numerical anonymity percentage and offers specific recommendations for what to fix, which makes it a useful companion to Whoer’s more technical output.
Running two or three of these together gives you a much fuller picture than any one alone.
FAQs
Does Whoer store my data? The IP checker doesn’t log or store personal browsing data. The scan runs in real time and displays results only to you. For the paid VPN service, the no-logs policy applies to VPN traffic.
Is Whoer free? The core tools — IP check, DNS leak test, WebRTC test, port scanner, ping test — are all free with no account required. The VPN service is a separate paid product.
Does Whoer work on mobile? Yes. It runs in any browser on any device, including iOS and Android. Mobile VPN leaks are actually a common oversight, so testing on mobile specifically is worth doing.
Can I trust the anonymity score? It’s reliable as a consistency indicator. A high score means your signals align; a low score means something is off. But it doesn’t tell you whether your VPN provider is logging your traffic, or whether your browser fingerprint is unique enough to track you through other means.
Why is my IP visible even with a proxy? Usually because of a WebRTC leak, an IPv6 leak, or because the proxy doesn’t handle all browser traffic — only HTTP/HTTPS requests in some cases, leaving other traffic outside the tunnel.




