- The allocation is probable in nature and creates fewer unique combinations of addresses than true randomness.
- The company admits the existence of the privacy vulnerability.
- It states some of the behavior is deliberate while other parts of it are not.

A recent technical analysis has uncovered a privacy lapse in Mullvad VPN’s IP address assignment system. The VPN provider allocates exit IP addresses in a predictable pattern rather than using true randomization.
The system relies on each user’s WireGuard key to determine which IP address to assign on every server, this means the same person receives addresses that tend to occupy similar positions within the available pools across different server locations. The discovery raises concerns about user anonymity and cross-session connections.
While acknowledging the issue, Mullvad disclosed that though a part of the behavior was intentional, there’s another part that was not. The company is currently testing a correction to address the unintended aspect of the flaw, but the VPN provider has not yet announced a timeline for deploying the fix to all users.
Predictable IP Assignment Creates Recognizable User Patterns
The WireGuard key serves as a deterministic input to Mullvad’s IP allocation algorithm. Instead of random distribution, the system produces a consistent mapping between user keys and IP addresses. This deterministic approach generates observable patterns that third parties could potentially recognize.
Although multiple users share the same IP addresses simultaneously, the assignment mechanism creates a distinct fingerprint. An observer could potentially link connections from the same user account even when that individual switches between different VPN servers. This undermines the anonymity that VPN users typically expect.
Practically, the number of unique IP combinations seen across the network is far below the value true randomness can generate. With time, an observer would be able to correlate user’s connection patterns based on repeating IP address combinations. Security researchers note that this predictability reduces the privacy protection Mullvad promises to its customers.
Users, such as journalists, activists, whistleblowers, and any regular users who depend on Mullvad for the anonymity of their web activity will be at a greater risk to correlation attacks due to these lapses. Also, a criminal with access to Mullvad’s server logs could potentially track individual users by monitoring their web activity using the same IP address in multiple sessions.
Deterministic Allocation Produces Far Fewer Combinations than Expected
The number of observed unique IP combinations remains much lower than statistical randomness would generate. This limited variety creates a significant privacy weakness for users who switch between different servers. An attacker monitoring the network could narrow down possible user identities based on observed IP patterns.
Mullvad VPN has a wide reputation as one of the leading services in regard to both privacy and security. Also, it has a strict no-log policy and has records of its recent completion of multiple third-party audits to verify the claims. This particular oversight is an unfortunate hit on a provider that has a long-standing, well-established reputation for strong privacy protections.
The discovery came from a technical analysis of Mullvad’s IP assignment mechanisms. The researcher found that the WireGuard key directly influences which exit IP address the system assigns. This design choice prioritized consistency or performance over randomness and anonymity.
Other VPN providers may use similar deterministic assignment methods without public disclosure. Security researchers encourage all VPN companies to publish details about their IP allocation algorithms. Notably, transparency about these technical decisions helps the security community to identify potential privacy issues.
Mullvad Tests Fix While Users Await Permanent Solution
Mullvad has already begun testing a correction for the unintended portion of the flaw. The company confirmed that some aspects of the behavior were intentionally designed, likely for operational reasons. However, the provider acknowledges that the predictable pattern creates an unwanted privacy risk.
Concerned users should monitor official Mullvad channels for updates on the fix deployment. The company has not specified when the corrected assignment mechanism will reach all customers. Meanwhile, if you would seek a stronger anonymity experience online, you can consider using two separate VPN providers or combining your privacy arrangement with Tor.
Based on the issues that Mullvad encountered, it is evident that no online privacy tool is foolproof or 100% secure. Even reputable service providers could potentially encounter a new unintentional pattern that poses a serious risk to user anonymity or overall trust in the provider’s service. In addition to continued responsible disclosure of identified problems and the ongoing investigation of problems, these developments will ultimately strengthen the overall VPN ecosystem.
The same principle applies to tech giants. OpenAI’s growing threat to Google amid regulatory scrutiny shows that even the most dominant players can face unexpected challenges to their position, a reminder that no company is immune to disruption or oversight.