DNS leak test of Anonsurf

Briefly describe your issue below:
I am using anonsurf in parrotsec 4.6 and i checked about DNS leak on this website and found something suspicious. It showed me this:

  • The owners of the servers above have the ability to associate your personal IP address with the names of all the sites you connect to and store this data indefinitely. This does not mean that they do log or store it indefinitely but they may and you need to trust whatever their policy says .
  • If you are connected to a VPN service and ANY of the servers listed above are not provided by the VPN service then you have a DNS leak and are choosing to trust the owners of the above servers with your private data.

this website is:
What does this means? Isn’t anonsurf VPN servers trusted?

What version of Parrot are you running? (include version, edition, and architecture)
Parrotsec 4.6 64bit architecture
What method did you use to install Parrot? (Debian Standard / Debian GTK / parrot-experimental)
Debian Standard
Configured to multiboot with other systems? (yes / no)
If there are any similar issues or solutions, link to them below:

If there are any error messages or relevant logs, post them below:

But our anonsurf isn’t a VPN service

1 Like

Anonsurf is not a VPN.

dnsleaktest will simply tell you what IP’s are being used, to resolve your DNS queries. Whether you trust them or not, is up to you.

When using anonsurf, parrot will force your DNS through tor.

Feel free to post the IP’s dnsleaktest says you are leaking, just to confirm.

when you use a vpn service or tor it` s the most importent thing that all the traffic goes through the tunnel / tor to hide the dns querries from data collectors.
Most people use a vpn service /proxy for web traffic and forget that the leak all the visited sites to the dns provider or isp cause dns is unencrypted

Try https://www.doileak.com/ instead of https://www.dnsleaktest.com/. It will give you a lot more information than https://www.dnsleaktest.com/.

Connection type:

You are connected via Ethernet or modem and have made 8 hops.

Remember you are going through multiple TOR exit nodes, any one or more could leak, that does not mean they are leaking your DNS. I like to see one server too, but that is not always the case. As long as they can’t see your DNS you are okay. Also your time zone may be giving you away, use a different time zone for more security.

This topic was automatically closed 60 minutes after the last reply. New replies are no longer allowed.