IPv4 (default) |
3.129.71.88 |
---|---|
IPv6 |
Checking...
|
|
|
Country |
United States (US) |
State / Region |
Ohio (OH) |
City |
Columbus |
Postal Code |
43215 |
Timezone |
America/New_York |
Latitude |
39.9625 |
Longitude |
-83.0061 |
Accuracy |
1000 km |
WebRTC Leak Test checks if your real IP is exposed. If any IP appears below, your IP has been leaked, even with a VPN or proxy.
WebRTC IP Leak |
Checking...
|
---|---|
RTCPeerConnection |
Checking...
|
RTCDataChannel |
Checking...
|
ICE Servers |
stun:stun.l.google.com:19302
stun:stun.services.mozilla.com
|
SDP Log |
Checking...
|
ICE Candidate Log |
Checking...
|
WebRTC (Web Real-Time Communication) is a technology that enables peer-to-peer communication in web browsers for voice, video, and data sharing. It establishes direct connections between users, allowing for real-time data exchange without relying on a central server.
WebRTC IP Leak refers to a security vulnerability where a user's real IP address can be exposed through WebRTC, even if they are using a VPN or proxy. This vulnerability arises because WebRTC can bypass traditional network routes and directly expose a user's IP address to the websites they visit.
The easiest way to prevent WebRTC leaks is by using browser extension:
Type "about:config" in the address bar. Click "Accept the Risk and Continue" button. Search for "media.peerconnection.enabled" and double click to set it to false.
Type "about:config" in the address bar or go to "Settings". Search for "WebRTC" and select "Disable non-proxied UDP" option.
Many VPN services have built-in protection against WebRTC leaks:
Some browsers may leak your IP via WebRTC, even when using a VPN. After connecting, check for leaks here; only the VPN server’s IP should be visible.