WebRTC Leak Test
WebRTC Leak Test checks if your real IP address is exposed, even when using a VPN or proxy. It displays WebRTC log details, including your public IP, local IP addresses, and other identifying information that could compromise your privacy.
Remote IPv4 |
Checking...
|
---|---|
Remote IPv6 |
Checking...
|
WebRTC Leak Test Results
WebRTC Leak Test |
Checking...
|
---|---|
Local IPs |
Checking...
|
Public IPs |
Checking...
|
WebRTC Settings
ICE Servers |
stun:stun.l.google.com:19302
|
---|---|
RTCPeerConnection |
Checking...
|
RTCDataChannel |
Checking...
|
WebRTC Logs
SDP Log |
Checking...
|
---|---|
ICE Candidate Log |
Checking...
|
What is WebRTC Leak
WebRTC (Web Real-Time Communication) is a technology that enables peer-to-peer communication in web browsers for voice, video, and data sharing. It establishes direct connections between users, allowing for real-time data exchange without relying on a central server.
WebRTC IP leak refers to a security vulnerability where a user's real IP address can be exposed through WebRTC, even if they are using a VPN or proxy. This vulnerability arises because WebRTC can bypass traditional network routes and directly expose a user's IP address to the websites they visit.
Why WebRTC leaks matter
WebRTC leaks expose a user's real IP address, even with VPNs or proxies in use, bypassing their privacy protections. This vulnerability allows websites and advertisers to track users, identify their location, and profile them, undermining efforts to maintain anonymity online.
How WebRTC expose my IP address
WebRTC uses Session Traversal Utilities for NAT (STUN) servers to establish peer-to-peer connections. In this process, WebRTC can send requests that reveal both your local IP address and your public IP address. While this information enables efficient connection setup, it can unintentionally expose your IP addresses to any website that uses WebRTC functions to detect them. This exposure can bypass VPNs or proxies by using direct network requests, leaving your true IP address vulnerable.
How to Prevent WebRTC Leaks
Disable WebRTC in Chrome
The easiest way to prevent WebRTC leaks is by using browser extension:
- WebRTC Network Limiter - A simple extension made by Google that configures how WebRTC traffic is routed.
- WebRTC Control - Disables WebRTC completely to prevent any leaks. You can quickly toggle WebRTC on/off via the extension icon.
- uBlock Origin - Primarily an ad-blocker, but it includes an option to block WebRTC leaks in its settings.
Disable WebRTC in Firefox
Type "about:config" in the address bar. Click "Accept the Risk and Continue" button. Search for "media.peerconnection.enabled" and double click to set it to false.
Disable WebRTC in Opera
Type "about:config" in the address bar or go to "Settings". Search for "WebRTC" and select "Disable non-proxied UDP" option.
Disable WebRTC in Safari
Safari doesn't support WebRTC on macOS/iOS, so no risk of leaks.
Disable WebRTC in Internet Explorer
Internet Explorer does not have a specific setting for disabling WebRTC directly. Consider using an alternative browser or a WebRTC-blocking extension.