WebRTC Leak Test

WebRTC Leak Test checks if your real IP address is exposed, even when using a VPN or proxy. It displays WebRTC log details, including your public IP, local IP addresses, and other identifying information that could compromise your privacy.

Remote IPv4
Checking...
Remote IPv6
Checking...

WebRTC Leak Test Results

WebRTC Leak Test
Checking...
Local IPs
Checking...
Public IPs
Checking...

WebRTC Settings

ICE Servers
stun:stun.l.google.com:19302
RTCPeerConnection
Checking...
RTCDataChannel
Checking...

WebRTC Logs

SDP Log
Checking...
ICE Candidate Log
Checking...

What is WebRTC Leak

WebRTC (Web Real-Time Communication) is a technology that enables peer-to-peer communication in web browsers for voice, video, and data sharing. It establishes direct connections between users, allowing for real-time data exchange without relying on a central server.

WebRTC IP leak refers to a security vulnerability where a user's real IP address can be exposed through WebRTC, even if they are using a VPN or proxy. This vulnerability arises because WebRTC can bypass traditional network routes and directly expose a user's IP address to the websites they visit.

Why WebRTC leaks matter

WebRTC leaks expose a user's real IP address, even with VPNs or proxies in use, bypassing their privacy protections. This vulnerability allows websites and advertisers to track users, identify their location, and profile them, undermining efforts to maintain anonymity online.

How WebRTC expose my IP address

WebRTC uses Session Traversal Utilities for NAT (STUN) servers to establish peer-to-peer connections. In this process, WebRTC can send requests that reveal both your local IP address and your public IP address. While this information enables efficient connection setup, it can unintentionally expose your IP addresses to any website that uses WebRTC functions to detect them. This exposure can bypass VPNs or proxies by using direct network requests, leaving your true IP address vulnerable.

How to Prevent WebRTC Leaks

Disable WebRTC in Chrome

The easiest way to prevent WebRTC leaks is by using browser extension:

  • WebRTC Network Limiter - A simple extension made by Google that configures how WebRTC traffic is routed.
  • WebRTC Control - Disables WebRTC completely to prevent any leaks. You can quickly toggle WebRTC on/off via the extension icon.
  • uBlock Origin - Primarily an ad-blocker, but it includes an option to block WebRTC leaks in its settings.

Disable WebRTC in Firefox

Type "about:config" in the address bar. Click "Accept the Risk and Continue" button. Search for "media.peerconnection.enabled" and double click to set it to false.

Disable WebRTC in Opera

Type "about:config" in the address bar or go to "Settings". Search for "WebRTC" and select "Disable non-proxied UDP" option.

Disable WebRTC in Safari

Safari doesn't support WebRTC on macOS/iOS, so no risk of leaks.

Disable WebRTC in Internet Explorer

Internet Explorer does not have a specific setting for disabling WebRTC directly. Consider using an alternative browser or a WebRTC-blocking extension.