WebRTC Leak Test
Check if your real IP address is leaking through WebRTC connections.
What is a WebRTC Leak?
A WebRTC leak occurs when your real IP address is exposed through WebRTC connections, even when you're using a VPN or other privacy tools. This happens because WebRTC can bypass your VPN tunnel and access your local network interfaces directly.
Why WebRTC Leaks Matter
- Your real location can be revealed
- Your VPN usage can be detected
- Your privacy can be compromised
- Your anonymity can be broken
How to Prevent WebRTC Leaks
Browser Settings:
- Firefox: Set
media.peerconnection.enabled
tofalse
- Chrome: Install the WebRTC Leak Prevent extension
- Safari: WebRTC is disabled by default
- Firefox: Set
VPN Settings:
- Enable "Block WebRTC" in your VPN client
- Use a VPN that supports WebRTC leak protection
Network Configuration:
- Configure your firewall to block WebRTC traffic
- Use a router that supports WebRTC blocking
Note
This test is performed entirely in your browser. No data is sent to our servers.
The test uses Google's public STUN server to gather ICE candidates.
How it Works
This tool uses the WebRTC API to detect potential IP address leaks. It creates a peer connection and checks for any local or public IP addresses that might be exposed through WebRTC's ICE (Interactive Connectivity Establishment) process.
The test works by:
1. Creating a WebRTC peer connection
2. Gathering ICE candidates
3. Analyzing the candidates for IP addresses
4. Comparing found IPs with your public IP
5. Detecting potential leaks
Technical Details
- Uses the WebRTC RTCPeerConnection API
- Implements ICE candidate gathering
- Analyzes STUN/TURN server responses
- Detects both IPv4 and IPv6 leaks
- Works in all modern browsers