WebRTC Leak Test

Check if your real IP address is leaking through WebRTC connections.

What is a WebRTC Leak?

A WebRTC leak occurs when your real IP address is exposed through WebRTC connections, even when you're using a VPN or other privacy tools. This happens because WebRTC can bypass your VPN tunnel and access your local network interfaces directly.

Why WebRTC Leaks Matter



  • Your real location can be revealed

  • Your VPN usage can be detected

  • Your privacy can be compromised

  • Your anonymity can be broken

How to Prevent WebRTC Leaks




  1. Browser Settings:

    • Firefox: Set media.peerconnection.enabled to false

    • Chrome: Install the WebRTC Leak Prevent extension

    • Safari: WebRTC is disabled by default




  2. VPN Settings:

    • Enable "Block WebRTC" in your VPN client

    • Use a VPN that supports WebRTC leak protection




  3. Network Configuration:

    • Configure your firewall to block WebRTC traffic

    • Use a router that supports WebRTC blocking




Note



This test is performed entirely in your browser. No data is sent to our servers.
The test uses Google's public STUN server to gather ICE candidates.


How it Works

This tool uses the WebRTC API to detect potential IP address leaks. It creates a peer connection and checks for any local or public IP addresses that might be exposed through WebRTC's ICE (Interactive Connectivity Establishment) process. The test works by: 1. Creating a WebRTC peer connection 2. Gathering ICE candidates 3. Analyzing the candidates for IP addresses 4. Comparing found IPs with your public IP 5. Detecting potential leaks

Technical Details

- Uses the WebRTC RTCPeerConnection API - Implements ICE candidate gathering - Analyzes STUN/TURN server responses - Detects both IPv4 and IPv6 leaks - Works in all modern browsers

Related Tools