Home
My IP
GPS
Find Me
Your Location
4️⃣IPv4:
📍...
6️⃣IPv6:
🌍...
🏢...
📌...
Privacy & Security11 min read

What Your ISP Can See (and Can't) About Your Traffic in 2026

Your ISP sees more than you think, but less than you fear. Here's exactly what your provider can read, what HTTPS hides, and how DNS gives you away.

By WhatIsMyLocation Team·Updated April 28, 2026
Network server room with rows of fiber-optic cables routing internet traffic.

What Your ISP Can See (and Can't) About Your Traffic in 2026

Your internet service provider sits between you and every website you visit. Every packet you send goes through their network, and every response comes back the same way. That position gives them a privileged view of your traffic, but the picture is fuzzier than most people assume.

In 2026, the answer to "what can my ISP see" depends on three things: whether you use HTTPS, which DNS resolver you use, and whether you run a VPN. Get those three right and your provider is reduced to seeing destinations and timing. Get them wrong and they can read almost everything.

Server room with fiber-optic cables routing internet traffic
Server room with fiber-optic cables routing internet traffic

Photo by Brett Sayles on Pexels.

The Short Answer

With modern HTTPS-everywhere browsing, your ISP can typically see:

  • The IP addresses you connect to
  • The domain names you look up (unless DNS is encrypted)
  • The amount of data going to and from each destination
  • Connection timing and patterns
  • The fact that you are using a VPN, Tor, or proxy (but not what flows through it)

What they cannot see on a properly configured connection:

  • The specific pages you load on a website
  • The contents of messages, emails, or form submissions
  • The text of search queries on Google, Bing, or DuckDuckGo
  • Video titles or watch history on YouTube or Netflix
  • Files you upload or download over HTTPS

That is the headline. Now the details.

Why HTTPS Changed Everything

Before HTTPS became universal, your ISP could read most web traffic in plain text. Page contents, search queries, form data, even passwords on poorly configured sites. That world is gone.

According to Google's Transparency Report, more than 95 percent of web traffic now flows over HTTPS. The TLS encryption negotiated between your browser and the server scrambles everything inside the connection. Your ISP sees that you connected to, say, 142.250.190.78 and exchanged 4.2 megabytes of data, but they cannot see which Gmail conversation you read or which YouTube video played.

The ServerName Indication (SNI) field in older TLS versions did leak the hostname you were connecting to, even with HTTPS. Modern Encrypted Client Hello (ECH), now widely deployed by Cloudflare and supported in Firefox and Chromium, hides that field too. When ECH is in use, your ISP only sees the IP address, not the domain.

You can verify your own setup at Cloudflare's Browsing Experience Security Check. If you want to see what your current public IP looks like to the outside world, check My IP Address.

DNS: The Big Privacy Hole

Even with HTTPS locking down content, classic DNS lookups happen in plain text on UDP port 53. When you type "bankofamerica.com" into your browser, your computer asks a DNS server for the IP address, and by default that question travels in the clear.

Your ISP runs the default DNS resolver for most home connections. Even if you switch to Google's 8.8.8.8 or Cloudflare's 1.1.1.1, the DNS query still passes through your ISP's network unless it is encrypted.

This means a default home connection leaks every domain you visit, even when the page itself is encrypted. Your ISP cannot read the email you sent, but they can absolutely log that you visited Gmail at 9:14 PM, then a job site at 9:17 PM, then a competitor's career page at 9:18 PM.

The fix is encrypted DNS. Two protocols dominate in 2026:

  • DNS over HTTPS (DoH) wraps DNS queries inside an HTTPS connection on port 443
  • DNS over TLS (DoT) uses a dedicated TLS connection on port 853

Both prevent your ISP from reading or modifying lookups. Firefox enables DoH by default in many regions. Chrome, Edge, and Safari support it as a setting. iOS and Android support encrypted DNS at the system level. For a deeper walkthrough see our guide to DNS over HTTPS, and verify your resolver leaks nothing with our DNS Leak Test.

Traffic Metadata: What Patterns Reveal

Even with HTTPS and encrypted DNS, your ISP still observes traffic metadata: which IPs you connect to, how much data flows in each direction, and the timing of those connections.

That metadata is more revealing than people assume. A 2 GB download from a Netflix CDN at 8:30 PM looks like a movie. A burst of small connections to messaging-app servers every few seconds looks like an active chat. Hour-long connections to Zoom servers during weekday afternoons look like work meetings.

Researchers have shown that traffic-pattern analysis can identify specific videos being streamed even over HTTPS, by matching bandwidth fluctuations to known encoding profiles. This is academic for now, but the principle is real: shape and size leak information.

A VPN flattens this. Once you connect to a VPN, your ISP sees only one destination (the VPN server) and one big encrypted stream. They cannot tell whether you are watching Netflix, joining a Zoom call, or downloading a Linux ISO.

What Your ISP Logs (and for How Long)

ISP retention varies wildly by country. A few examples based on public regulatory filings and industry reports:

RegionTypical Retention
European UnionVaries by member state, often 6 to 24 months for metadata
United Kingdom12 months under the Investigatory Powers Act
United StatesNo federal mandate, often 12 to 18 months in practice
Australia24 months for metadata under data-retention law
CanadaNo mandate, typically 6 to 12 months

What is logged usually includes: subscriber identity, IP address assignments and timestamps, connection metadata (source, destination, port, bytes), and DNS queries when the ISP runs the resolver.

What is not usually logged on consumer connections: full packet captures (storage cost is prohibitive), encrypted payload contents, or specific page-level activity inside HTTPS sessions.

Note that "not logged" does not mean "cannot be logged." With a court order or wiretap, ISPs can be compelled to enable deeper interception on specific accounts.

Can ISPs Sell Your Data?

This depends entirely on jurisdiction.

In the United States, the 2017 repeal of the FCC's broadband privacy rules allowed ISPs to monetize browsing data unless customers opt out. Comcast, Verizon, and AT&T have all run advertising-targeting programs based on subscriber browsing. Some are now opt-in only following state-level laws in California, Nevada, and elsewhere.

In the European Union, GDPR makes monetizing browsing history without explicit consent essentially impossible. Most EU ISPs do not run targeted-ad businesses on subscriber traffic.

To see what categories your ISP may have inferred about you, check their privacy settings page. In the US, search "[your ISP name] internet privacy" and look for terms like "Cross-Context Behavioral Advertising" or "Customer Proprietary Network Information."

How VPNs Change the Picture

A VPN encrypts every packet leaving your device and tunnels it to the VPN provider's server. From your ISP's perspective, all that is visible is:

  • A connection to a single IP address (the VPN server)
  • Encrypted data flowing in both directions
  • Connection timing and approximate volume
  • The fact that the connection looks like VPN traffic (most VPN protocols have recognizable signatures)

Your ISP can no longer see which sites you visit, what DNS lookups you make, or what content you exchange. The trade-off is that the VPN provider now sees what your ISP used to see. That is why the choice of VPN provider matters: a logging VPN is just trading one observer for another. See our VPN Comparison for providers with audited no-logs policies, and confirm your tunnel is leak-free with our VPN Leak Test.

Some networks, particularly corporate, school, and certain national networks, block known VPN protocols. Obfuscated VPN modes disguise traffic to look like regular HTTPS, working around those blocks at the cost of some speed.

Tor: The Strongest Defense Against ISP Surveillance

Tor goes a step further. Your ISP sees you connect to a Tor entry node and nothing else. The entry node sees your IP but not your destination. The exit node sees your destination but not your IP. No single party in the chain knows both ends.

The trade-offs are real: Tor is much slower than a VPN, some sites block known Tor exit nodes, and the fact that you are using Tor is itself visible to your ISP, which can attract attention in some jurisdictions. For most people most of the time, a reputable VPN strikes a better balance. Compare them in Tor vs VPN.

What About HTTPS Inspection at Work or School?

If your employer or school issues a device, install a custom root certificate, or routes your traffic through a corporate proxy, the rules change. They can install a TLS-inspecting proxy that decrypts HTTPS, reads the contents, then re-encrypts and forwards it. Browsers usually flag this with a non-public certificate authority in the connection details.

You can spot this by clicking the padlock icon in your browser and inspecting the certificate chain. If the issuer is your employer's name rather than DigiCert, Let's Encrypt, or another public CA, you are being inspected. On a managed device, assume any traffic, including over HTTPS, is visible to the network owner.

This does not happen on home ISP connections to consumer devices, because there is no way for your ISP to install a trusted root certificate on your laptop without your cooperation.

Practical Steps to Minimize ISP Visibility

In rough order of impact:

  1. Enable encrypted DNS in your browser or operating system. DoH or DoT closes the biggest leak that remains after HTTPS.
  2. Use a reputable no-logs VPN for sensitive browsing. This collapses everything your ISP sees into a single encrypted stream.
  3. Verify HTTPS is in use before submitting anything sensitive. Modern browsers warn on insecure forms, but the padlock is still worth a glance.
  4. Update your router firmware. ISP-supplied routers often run outdated firmware with known vulnerabilities. See our Router Security Checklist.
  5. Check for DNS leaks after configuring encrypted DNS. Our DNS Leak Test shows which resolver your queries actually reach.
  6. For maximum privacy, use Tor Browser. Slower, but the strongest defense against an observing ISP.

The Bottom Line

Your ISP in 2026 sees a lot of metadata, almost no content. They know which servers you talk to, when, and how much. They do not know what you say to those servers if HTTPS and encrypted DNS are properly configured.

The default home setup leaks more than necessary, mainly through unencrypted DNS. Fixing that takes ten minutes and costs nothing. Adding a VPN on top reduces visibility to a single encrypted stream that reveals only that "this user is online and using a VPN."

Privacy on the modern internet is achievable, but it is not the default. A few deliberate choices, applied consistently, get you most of the way there.

Related Articles

W

WhatIsMyLocation Team

Our team of network engineers and web developers builds and maintains 25+ free networking and location tools used by thousands of users every month. Every article is reviewed for technical accuracy using real-world testing with our own tools.

Related Articles

Try Our Location Tools

Find your IP address, GPS coordinates, and more with our free tools.