VPN

Also known as: Virtual Private Network

A Virtual Private Network that encrypts a device's internet traffic and tunnels it through a remote server, masking the user's real IP address and location.

Last updated:

What is a VPN?

A VPN (Virtual Private Network) creates an encrypted tunnel between a user's device and a remote VPN server, routing all (or selected) internet traffic through that tunnel. From the destination server's perspective, the traffic appears to originate from the VPN's IP address — the user's real IP is hidden. The ISP between the user and the VPN can see that a tunnel exists but cannot see the contents or the final destination of the traffic.

Originally designed so employees could securely access corporate networks over untrusted public internet, VPNs are now widely used by consumers for privacy, bypassing geographic restrictions, and defeating ISP-level tracking or throttling.

How a VPN actually works

A VPN client on the user's device negotiates an encrypted session with a VPN server using a tunneling protocol:

  • WireGuard — modern, fast, simple (~4,000 lines of code)
  • OpenVPN — mature, widely supported, slower setup
  • IKEv2/IPsec — strong mobile reconnection behavior
  • L2TP/IPsec, SSTP, PPTP — older protocols, PPTP is broken and should not be used

Once the tunnel is up, packets leaving the device are encrypted, wrapped with the VPN server's IP as the destination, and sent into the tunnel. The VPN server decrypts them and forwards them to the actual destination.

VPN vs. proxy vs. Tor

  • A proxy usually forwards only one application's traffic and is often unencrypted.
  • A VPN handles all traffic from the device with authenticated encryption, but you must trust the VPN operator not to log.
  • Tor spreads trust across three independent relays, providing stronger anonymity but much higher latency.

How VPN IPs are detected

VPN IPs are easy to identify because they cluster on hosting-provider ASNs (DigitalOcean, OVH, M247, etc.) and appear on hundreds of threat feeds. GeoIP providers and risk scoring services maintain lists of known VPN/proxy ranges; our IP lookup flags them on every result so you can tell a residential visitor from a VPN exit.

Frequently Asked Questions

Yes. A VPN replaces your real IP address with the VPN server's IP when talking to the internet. Websites and services see the VPN's IP, not yours, though your ISP still sees you connecting to the VPN itself.
Yes, often. VPN exit IPs cluster on datacenter ASNs (hosting providers rather than residential ISPs), appear on commercial VPN-detection databases, and frequently match known VPN provider ranges.
Usually a little. VPNs add encryption overhead and an extra network hop through the VPN server, typically costing 5-30% of throughput. Modern protocols like WireGuard minimize the loss, while older ones like OpenVPN over TCP can be much slower.
In most countries, yes. Some jurisdictions (China, Iran, Russia, UAE) restrict or ban unauthorized VPN use. Using a VPN for illegal activity remains illegal regardless of the VPN itself.
A VPN encrypts all traffic from your device and routes it through a VPN server. A proxy typically handles traffic from just one application (like a browser) and is often unencrypted. VPNs offer stronger privacy; proxies are lighter and faster for single-app use.