What the ISP can and cannot see when you’re using a VPN
When you use a VPN, your internet service provider (ISP) can still see that your connection is going through a VPN server. The difference is that, with a VPN, the ISP sees far less detail about what you’re doing online.
| What your ISP can see | What your ISP can’t see |
|---|---|
| That you're connected to a VPN server | The websites you visit |
| The VPN server IP address you connect to | Your browsing activity |
| Connection times and duration | The specific pages and media you access |
| The amount of traffic that is flowing | The contents of your downloads and uploads |
What does a VPN secure from the ISP?
What a VPN secures and what it doesn’t is something many people aren't sure about. When it comes to your ISP, a VPN secures the “substance” of your online activity by encrypting your connection. Your ISP can still see that online traffic is passing through its network and that you’re connected to a VPN server, but it can’t read the contents or see which websites and services you’re visiting.
A VPN puts the following out of sight:
- The websites you visit. When you use a VPN, your ISP can see that you’re connected to a VPN server, but it can’t see which websites you access through the encrypted tunnel. That limits the ISP’s ability to log your activity by domain.
- Your browsing activity. A VPN reduces what an ISP can infer about your browsing behavior over time, such as the sequence of sites you move between or how your activity clusters during a session.
- The specific pages and media you access. Without a VPN, an ISP may still see which websites you connect to. But with a VPN, the ISP can’t connect your activity to particular sites, pages, or media.
- The contents of your downloads and uploads. A VPN encrypts the contents of your internet traffic, so your ISP can see that traffic is moving but not what data it contains.
What does your ISP see when you use a VPN?
When you turn on a VPN, your ISP doesn’t suddenly go blind. It can still see that you are using a VPN, which VPN server’s IP you’re assigned, how much traffic moves between your device and that server, and how often you connect. More on each of these below.
- That you are using a VPN. Your ISP can tell that your internet traffic is being routed through a VPN server. This does not reveal what you are doing online. It only indicates that a VPN protects your connection.
- The VPN server’s IP address. Your ISP can see the IP address of the VPN server your device connects to. From the ISP’s perspective, this is the destination for all your traffic, replacing the websites and services you actually use.
- The type of VPN connection. In many cases, the ISP can identify the VPN protocol based on traffic patterns and connection characteristics. Even with techniques such as deep packet inspection (DPI), this visibility does not extend to reading the data itself.
- Connection times and duration. Your ISP can see when a VPN connection starts, how long it stays active, and when it ends. This reveals connection timing, not online activity.
- The amount of data transferred. Your ISP can measure how much data moves between your device and the VPN server. Because VPN encryption protects the contents of that traffic, data volume alone cannot reveal what you are viewing, downloading, or uploading.
What can your ISP see when you are not using a VPN?
Without a VPN, your ISP has a much clearer view of your internet activity. Instead of seeing one encrypted connection to a VPN server, it can observe which domains you connect to, what connection metadata is exposed, and how your activity patterns unfold over time. That can include:
- The websites you visit. Your ISP can see the domains you access and log them over time. ISPs are among a small group of parties who can see your internet browsing history in this way, directly at the network level.
- DNS requests. When your device looks up a website’s address, it sends DNS queries that your ISP can typically read unless you’re using encrypted DNS. Those requests reveal which domains you’re trying to reach, even before the page loads.
- Unencrypted data you send and receive. If a site or service uses an unencrypted connection (HTTP instead of HTTPS), your ISP can view the contents of that traffic. This can include pages you load and information you submit, such as form entries or messages.
- Clues about what you download. Even when the content itself is encrypted, your ISP may still be able to infer broad patterns of downloads from connection metadata and traffic characteristics. On unencrypted connections, URLs and file names can reveal much more directly what’s being downloaded.
How can you stop your ISP from tracking you?
You can’t make your ISP disappear from the picture, but you can shrink what it’s able to learn about you. The main levers are encrypting your traffic, changing who can see your DNS lookups, and cutting down on how much of your activity travels in plain view. A VPN is usually the most effective tool to block ISP tracking, but a few other ways can help with that as well.
A VPN encrypts your internet connection and routes it through a VPN server. Your ISP still sees that you are connected to a VPN, which VPN server you use, and how much traffic is moving back and forth. But what it loses is the detail, including the specific websites you visit and the contents of your traffic.
The Tor network is another option. Tor routes your traffic through multiple volunteer-run servers (relays) so no single relay sees both where the traffic comes from and where it’s going. It can provide strong privacy, but it does not protect unencrypted traffic at the final relay (the server that connects to the destination website). That’s why HTTPS is still essential when using Tor.
You may also try using a proxy server. A proxy server is an intermediary server that can change your IP address to its own and present it to the sites you visit. But it does not typically encrypt the internet connection, so your ISP can still see which websites you access and can read any data that is not protected by HTTPS.
All of this leans on one more element you’ve already seen mentioned, HTTPS. HTTPS is the secure version of the standard web protocol you see as “https://” in your browser, and it encrypts the link between your browser and a website, which limits how much of the content your ISP can read while it’s on the move. But even with HTTPS in place, your ISP can still see the domains you connect to, the volume of data you move, and the timing of the connections.
Can my ISP block a VPN?
Yes, an ISP can block a VPN, but most don’t make a habit of it. In many markets, VPNs are woven into day-to-day work and security, so blocking them outright would break legitimate connections for a lot of customers and invite pushback.
That doesn’t mean interference is impossible. An ISP can block specific VPN servers, refuse certain VPN protocols, or slow down traffic patterns that resemble VPN use. None of this requires reading the contents of your connection. Instead, it’s based on connection metadata, such as which IP addresses your device connects to, which ports it uses, and the timing and consistency of the traffic.
Some providers use these tactics to enforce their own policies or to manage capacity. Others do it in response to local rules or commercial agreements. The goal is usually to discourage or narrow VPN use rather than to erase it completely.
Even then, blocking tends to be patchy. A VPN might work on your home connection but fail on a public Wi-Fi network, or work reliably for weeks and then start dropping at certain times of day. That kind of inconsistency reflects the fact that ISPs target connection types, not track and switch off individual users one by one.
NordVPN can also reduce how much your ISP sees and how easily it can interfere with your connection. With split tunneling, you choose which apps use the VPN and which use a direct connection, so you can selectively protect what you need. And on networks that try to block or restrict VPN connections, NordVPN’s obfuscated servers are designed to make your encrypted traffic resemble regular browsing, which can help keep those connections from being easily flagged or disrupted.
How can I tell if my ISP is blocking a VPN?
You can usually tell your ISP is blocking a VPN when the VPN works on other connections but consistently fails on one specific network. Or when the connection drops in a repeatable pattern:
- The VPN connects on mobile data but not on your home Wi-Fi. When a VPN connects over cellular data but “refuses” to start on your home network, that may mean there’s a restriction on the ISP side rather than an issue with the app.
- The VPN fails only on specific networks. The VPN may work at home but not on a workplace or public Wi-Fi connection that uses a different provider, suggesting that one network is applying stricter rules to VPN connections.
- The VPN connects, but the connection becomes unusually slow. In some cases, an ISP may not block the connection outright but instead throttle your bandwidth and slow down traffic that matches known VPN patterns. But ISP interference isn’t the only cause of slow speeds — performance can also drop if the VPN server is far away or congested.
- The VPN connects, then drops after a short time. Repeat disconnects can suggest filtering or disruption rather than ordinary instability.
- Only specific VPN servers fail. If one location never connects but others do, the ISP may be blocking specific VPN server IP addresses.
- Only specific VPN protocols fail. If switching protocols changes the outcome, the network may be targeting a specific protocol or port.
- The internet works without the VPN but breaks with it. If your connection is normal until you switch the VPN on, and returns to normal the moment you turn it off, that may indicate deliberate interference with the encrypted tunnel.
How to fix an ISP blocking a VPN
The quickest way to troubleshoot and fix ISP blocking is to change one variable at a time until the connection stops getting filtered or disrupted. You may try:
- Switching VPN servers. If a provider is filtering specific VPN server IP addresses, moving to a different server location can restore connectivity.
- Changing the VPN protocol. Some networks block or interfere with specific protocols or the ports they use. Switching protocols can change how the connection is established and may resolve the issue.
- Using obfuscated servers. Obfuscated connections are designed to make VPN tunnels resemble regular HTTPS browsing, which makes it harder for networks that filter or flag VPN use to pick them out.
- Connecting to a different network. Testing the same VPN on mobile data or another Wi-Fi network can confirm whether the problem is tied to one ISP and, in the short term, give you a way around the restriction.
- Updating the VPN app. VPN providers regularly adjust how their connections work in response to new blocks. Sometimes using the latest version of the app can resolve issues caused by outdated connection methods.
Online security starts with a click.
Stay safe with the world’s leading VPN