WebRTC Leak Test

    Instantly check if your browser exposes your real IP address through WebRTC. This technology, designed for real-time communication, can bypass VPNs and proxies, revealing your true identity.

    Scanning for WebRTC leaks...

    What Is WebRTC Technology?

    WebRTC (Web Real-Time Communication) is an open-source technology that enables direct peer-to-peer communication between browsers without requiring plugins or third-party software. It powers video calls, voice chats, file sharing, and live streaming directly in your browser.

    Major platforms like Google Meet, Discord, and Twitch rely on WebRTC for low-latency communication. While incredibly useful, this technology requires access to your network information, which can inadvertently expose your IP address.

    Real-time audio and video with minimal latency
    No plugins or installations required
    Open-source and continuously improved
    Built into all major browsers

    What Is a WebRTC Leak?

    A WebRTC leak occurs when your browser reveals your actual IP address through WebRTC connections, even when you're using a VPN or proxy. This happens because WebRTC uses the STUN/TURN protocol to discover your IP, which can bypass your VPN tunnel.

    Unlike other types of leaks, WebRTC leaks happen at the browser level and are independent of your network configuration. As long as WebRTC is enabled and a website makes the right API calls, your real IP can be exposed.

    Risks of a WebRTC Leak

    Your real location can be pinpointed even behind a VPN
    Advertisers can build accurate profiles for targeted ads
    Your online anonymity is compromised
    Organizations face data exposure and compliance risks

    How Our WebRTC Leak Test Works

    1

    Create Connection

    We initialize a WebRTC peer connection using standard STUN servers, simulating a real-world WebRTC scenario.

    2

    Gather Candidates

    The browser generates ICE candidates containing network information, including potential IP addresses.

    3

    Analyze Results

    We parse each candidate to extract IP addresses and classify them as local, public IPv4, or IPv6.

    4

    Report Findings

    Results are displayed instantly showing which IPs were discovered and whether a leak exists.

    How to Verify a WebRTC Leak

    1

    Disconnect from your VPN and note your real IP address

    2

    Connect to your VPN and verify you have a new IP

    3

    Run this WebRTC leak test while connected to VPN

    4

    If your original IP appears in results — you have a leak

    How to Fix a WebRTC Leak

    Disable WebRTC in Browser

    Firefox: Type about:config in the address bar and set media.peerconnection.enabled to false. This completely disables WebRTC.

    Chrome: Chrome does not allow fully disabling WebRTC through settings. Use a browser extension or a VPN.

    Use a Reliable VPN

    Choose a VPN with built-in WebRTC leak protection. Services like ProtonVPN offer this feature and actively block WebRTC from exposing your real IP.

    Try ProtonVPN →

    Install Browser Extensions

    If you prefer not to change browser settings manually, you can use ready-made extensions: WebRTC Control — it works in both Chrome and Firefox and lets you quickly toggle WebRTC on and off.

    Frequently Asked Questions