Privacy & Security Tools
25+ free tools to check, analyse, and protect your online identity. No account required for most tools.
IP & Network Intelligence
Look up any IP address, domain, or hostname - Reveal location, ISP, ASN, and DNS records.
IP Address Lookup
Location, ISP, ASN, and proxy detection for any IP
DNS Lookup
Query A, AAAA, MX, NS, TXT, CNAME, and PTR records
WHOIS Lookup
Domain or IP registration, registrar, and abuse contact
ASN Lookup
Autonomous System Number for any IP or domain
Hostname Lookup
Resolve a hostname to its IP - Detects CDN provider
Reverse DNS Lookup
Convert an IP address back to its hostname (PTR record)
Security & Threat Analysis
Detect blacklisted IPs, open ports, expired certificates, data breaches, and proxy / VPN usage.
Blacklist Check
Check an IP against 80+ spam and abuse DNSBL blacklists
Data Breach Check
See if your email appeared in a known data breach
VPN Leak Test
Check if your VPN is leaking your real IP or DNS
Proxy & VPN Detection
Detect proxies, datacenter IPs, and Tor exit nodes
Port Scanner
Scan 20 common TCP ports - See which services are exposed
SSL Certificate Check
Inspect TLS certificate validity, expiry, and chain
HTTP Headers Check
View security headers a server sends with each response
Privacy Scan
Full privacy risk audit - Blacklists, open ports, and proxy flags
Trace Email Headers
Decode email headers to find the true origin IP of a message
Network Utilities
Calculate subnets, check internet speed, look up phone numbers, and inspect browser fingerprints.
Subnet Calculator
Calculate network, broadcast, and host ranges from CIDR
CIDR Calculator
Compute block size and usable host counts for any CIDR prefix
Speed Test
Test your internet download and upload speed
Phone Number Lookup
Country, carrier, and line type for any international number
Browser Fingerprint
See what canvas hash, WebGL, fonts, and plugins reveal about you
Password & Security Generators
Generate cryptographically random passwords, PINs, and test password strength - All processed client-side.
Privacy Guides
In-depth guides on hiding your IP, choosing a VPN, and staying anonymous online.
Common Use Cases
Many of these tools work best in combination. Here are the most common workflows:
Investigate a suspicious IP address
Run an IP lookup to see location and ISP, then check the blacklist checker to see if it is flagged for spam or abuse. Follow with a proxy check to determine if it is a VPN or exit node, and a port scan to see what services are exposed.
Audit a domain before connecting
Use WHOIS to check registration age and registrar, DNS lookup to inspect SPF, DKIM, and MX records, SSL check to verify the certificate is valid and not expired, and HTTP headers to review security headers like HSTS and CSP.
Verify your VPN is actually working
Connect your VPN, then run the VPN leak test to check for WebRTC and DNS leaks. Follow with the home page IP check to confirm the IP shown is the VPN server, not your real address. Use proxy check to see how the IP is classified.
Trace where a spam email came from
Paste the full email headers into the email header tracer to extract the origin IP. Run that IP through the blacklist checker and WHOIS to identify the sending organisation's abuse contact.
Why Use These Tools?
Every time you connect to the internet your IP address and browser reveal more than most people realise. These tools help you see exactly what is visible - And fix it.
See What Others See
Your IP address exposes your approximate location, ISP, and whether you are behind a VPN or proxy. Run an IP lookup to see exactly what every website and server you connect to already knows about you.
Run IP lookup →Check for Known Threats
Blacklists are maintained by organisations like Spamhaus and SORBS to flag IP addresses associated with spam, malware, and abuse. If your IP is listed, emails you send may be rejected and some sites may block you.
Check your IP →Protect Your Accounts
Data breaches expose billions of email addresses and passwords each year. Checking whether your email has appeared in a known breach takes seconds and lets you act before an attacker does.
Check for breaches →Frequently Asked Questions
Are all of these tools completely free?
Yes. Every tool on this page is free to use. Most tools do not require an account at all. A free account is required only for tools that involve server-side execution at scale (such as the port scanner and blacklist check) to prevent automated abuse. Creating an account takes under 60 seconds and requires no credit card.
Do these tools store my IP address or search history?
Lookups you run are not permanently stored unless you explicitly save them to your account dashboard. We collect standard server logs (IP address and timestamp) for security and rate-limiting purposes, which are retained for 30 days. We do not sell or share your data with third parties. See our Privacy Policy for full details.
How accurate is the IP geolocation?
IP geolocation is typically accurate to the city level but not the street or building level. Accuracy varies by ISP and region - It is usually within 25-50 miles for residential IPs. Corporate and VPN IPs may show the data centre location rather than your actual location. For a detailed explanation, see our guide on IP geolocation accuracy.
What is the difference between a blacklist check and a breach check?
They check different types of threat intelligence:
- A blacklist check queries DNS-based block lists (DNSBLs) to see if an IP address is flagged for sending spam, hosting malware, or conducting abuse. It affects email deliverability and access to some services.
- A breach check queries databases of known data breaches to see if an email address and its associated password appeared in a leaked dataset. It affects account security.
Can I use these tools to check someone else's IP address?
Most tools accept any publicly routable IP address or domain, not just your own. This is useful for IT administrators verifying server configurations, security researchers investigating threats, or anyone checking a domain before interacting with it. Automated or bulk use of these tools is not permitted - See our Terms of Service.
Why does my IP show a different city than where I am?
ISPs often route traffic through regional hubs that may be hundreds of miles from your physical location. The IP is registered to the ISP's point of presence, not your home. If you are using a VPN, the location shown will be the VPN server's data centre. Mobile carrier IPs frequently show a capital city rather than your actual location because carriers route all mobile traffic centrally.