Privacy & Security Tools

25+ free tools to check, analyse, and protect your online identity. No account required for most tools.

25+
Free tools
100%
No tracking
0
Credit card needed

Common Use Cases

Many of these tools work best in combination. Here are the most common workflows:

1

Investigate a suspicious IP address

Run an IP lookup to see location and ISP, then check the blacklist checker to see if it is flagged for spam or abuse. Follow with a proxy check to determine if it is a VPN or exit node, and a port scan to see what services are exposed.

2

Audit a domain before connecting

Use WHOIS to check registration age and registrar, DNS lookup to inspect SPF, DKIM, and MX records, SSL check to verify the certificate is valid and not expired, and HTTP headers to review security headers like HSTS and CSP.

3

Verify your VPN is actually working

Connect your VPN, then run the VPN leak test to check for WebRTC and DNS leaks. Follow with the home page IP check to confirm the IP shown is the VPN server, not your real address. Use proxy check to see how the IP is classified.

4

Trace where a spam email came from

Paste the full email headers into the email header tracer to extract the origin IP. Run that IP through the blacklist checker and WHOIS to identify the sending organisation's abuse contact.

Why Use These Tools?

Every time you connect to the internet your IP address and browser reveal more than most people realise. These tools help you see exactly what is visible - And fix it.

1

See What Others See

Your IP address exposes your approximate location, ISP, and whether you are behind a VPN or proxy. Run an IP lookup to see exactly what every website and server you connect to already knows about you.

Run IP lookup →
2

Check for Known Threats

Blacklists are maintained by organisations like Spamhaus and SORBS to flag IP addresses associated with spam, malware, and abuse. If your IP is listed, emails you send may be rejected and some sites may block you.

Check your IP →
3

Protect Your Accounts

Data breaches expose billions of email addresses and passwords each year. Checking whether your email has appeared in a known breach takes seconds and lets you act before an attacker does.

Check for breaches →

Frequently Asked Questions

Are all of these tools completely free?

Yes. Every tool on this page is free to use. Most tools do not require an account at all. A free account is required only for tools that involve server-side execution at scale (such as the port scanner and blacklist check) to prevent automated abuse. Creating an account takes under 60 seconds and requires no credit card.

Do these tools store my IP address or search history?

Lookups you run are not permanently stored unless you explicitly save them to your account dashboard. We collect standard server logs (IP address and timestamp) for security and rate-limiting purposes, which are retained for 30 days. We do not sell or share your data with third parties. See our Privacy Policy for full details.

How accurate is the IP geolocation?

IP geolocation is typically accurate to the city level but not the street or building level. Accuracy varies by ISP and region - It is usually within 25-50 miles for residential IPs. Corporate and VPN IPs may show the data centre location rather than your actual location. For a detailed explanation, see our guide on IP geolocation accuracy.

What is the difference between a blacklist check and a breach check?

They check different types of threat intelligence:

  • A blacklist check queries DNS-based block lists (DNSBLs) to see if an IP address is flagged for sending spam, hosting malware, or conducting abuse. It affects email deliverability and access to some services.
  • A breach check queries databases of known data breaches to see if an email address and its associated password appeared in a leaked dataset. It affects account security.
Can I use these tools to check someone else's IP address?

Most tools accept any publicly routable IP address or domain, not just your own. This is useful for IT administrators verifying server configurations, security researchers investigating threats, or anyone checking a domain before interacting with it. Automated or bulk use of these tools is not permitted - See our Terms of Service.

Why does my IP show a different city than where I am?

ISPs often route traffic through regional hubs that may be hundreds of miles from your physical location. The IP is registered to the ISP's point of presence, not your home. If you are using a VPN, the location shown will be the VPN server's data centre. Mobile carrier IPs frequently show a capital city rather than your actual location because carriers route all mobile traffic centrally.