What "my IP" actually means
Every device on the internet has a public IP address that servers can see when you connect. It is your return address on the network. Our server reads it from the connection headers (or from the Cloudflare / Vercel proxy in front), then queries the public Team Cymru DNS database for your provider's ASN number and organization name.
We show this information the moment you load the page. Next to it you see what only your browser knows about you (timezone, language, user-agent) because that data is local and cannot be inspected from the server without a request.
How to read this data
- IP - the public address every site you visit can see. We show IPv4 (the classic one) and IPv6 (the newer version, if your provider gives you one).
- ASN and organization - your internet provider's number and name. For example AS5617 is Orange Polska, AS16509 is Amazon AWS. This tells you who actually routes your traffic.
- Reverse DNS (PTR) - the DNS name pointing back to your IP. Home connections usually have a generic name like `abc.dynamic.example.net`, datacenters tend to use more "technical" PTRs.
- Datacenter - whether your ASN is one of 30 known cloud providers (AWS, GCP, Azure, Cloudflare, Hetzner, OVH, DigitalOcean and similar). If yes - you are most likely on a VPN or a server, not a home line.
- Timezone and language - these come from your browser, not from your IP. You can fake them in browser settings, which is exactly why servers use them as an additional signal.
- User-Agent - a string your browser sends with every HTTP request. It says which browser and OS you use. This is the most revealing piece of data in plain HTTP traffic.
When this is useful
Situations where it pays to know how the internet sees you:
- Confirming your VPN works - you enable a VPN, refresh, see a different IP, a different ASN (e.g. Mullvad instead of your ISP) and a different country. If the ASN still matches your provider - the VPN is leaking or off.
- Diagnosing geo blocks - many services block IPs from datacenters or specific countries. You see what a site knows about you before opening a support ticket.
- Firewall allowlists - you want to add your home IP to a server allowlist. Open this page, copy IPv4 plus IPv6 (if you have one), paste into the rule.
- Browser fingerprint awareness - the "what your browser sends" section is essentially a fingerprint. It shows how much sites already know about you without you logging in.
- Testing your domain's DNS propagation - if your domain has an A record pointing at your current IP, you can compare DNS Lookup output with what shows up here.
- Reverse DNS for outbound mail - if you run your own mail server, the PTR record must match the HELO domain or Gmail will mark you as spam. This page shows the current PTR in one click.
Related: DNS Lookup (check someone else's domain), WHOIS (who owns this IP block), CIDR / subnet calculator (range arithmetic), ASN lookup (details of a specific ASN).