Skip to main content

Test Gluetuns ip address to make sure it is using the VPN (inside docker container)

These methods use the docker containers

Method 1 – built-in wget

docker exec -it gluetun wget -qO- https://ifconfig.co

→ Should return a single IP like `185.193.124.57` (an IVPN Los Angeles IP)

Country:

docker exec -it gluetun wget -qO- https://ifconfig.co/country-iso

→ Should return `US`

City:

docker exec -it gluetun wget -qO- https://ifconfig.co/city

→ Should return `Los Angeles`


Method 2 – even simpler, one-liner from your host


docker run --rm --network container:gluetun alpine wget -qO- https://ifconfig.co

This spins up a tiny Alpine container that shares gluetun’s exact network stack and prints your public IP in one shot.  
If it prints an IVPN IP → your VPN + kill-switch are 100 % working.


Method 3 – check gluetun logs (you already have this)


Just look at the last 10 lines:

docker logs gluetun --tail 10

You should see something like:

[wireguard] Handshake complete
[ivpn] Using city Los Angeles
Public IP: 185.193.124.57
[port forwarding] successfully enabled on port 54321

That “Public IP: xxx” line is exactly what the internet sees — if it’s not your home IP, you’re golden.