WebRTC Leak Test
WebRTC can reveal your real IP address even when you're connected to a VPN. This test checks if your browser is leaking IP addresses through WebRTC that differ from your public IP.
Ready to test
What is a WebRTC Leak?
WebRTC (Web Real-Time Communication) is a browser technology used for voice calls, video chat, and peer-to-peer file sharing. To establish connections, WebRTC needs to discover your IP addresses — including your real one.
When you use a VPN, your web traffic is routed through the VPN server, hiding your real IP. However, WebRTC can bypass the VPN tunnel and reveal your actual IP address directly to websites, defeating the purpose of the VPN.
What the Results Mean
- Public IPs — These are visible to websites. If a public IP differs from your VPN IP, that's a leak.
- Private IPs — Local network addresses (192.168.x.x, 10.x.x.x). These are generally harmless but can reveal your network structure.
- mDNS — Obfuscated addresses (.local). Your browser is protecting your local IP — this is good.
How to Prevent WebRTC Leaks
- Use a VPN with WebRTC protection — Many VPN extensions include built-in WebRTC leak blocking.
- Firefox — Go to about:config and set media.peerconnection.enabled to false.
- Chrome/Edge — Install a WebRTC leak prevention extension, or use your VPN's browser extension.
- Brave — Go to Settings > Privacy > WebRTC IP handling policy and select "Disable non-proxied UDP".