WebRTC Leak Test

See what IP addresses your browser is exposing through WebRTC — even when your VPN is active.

Probing WebRTC…

What is a WebRTC leak?

WebRTC is a browser feature used for video calls and peer-to-peer connections. It works by gathering all of your IP addresses — including local and public ones — and sharing them via STUN servers. The catch: it bypasses your VPN's normal routing, so your real IP can leak even when the VPN is running.

How to interpret the results

  • Local IPs — these are private addresses inside your home network (192.168.x.x, 10.x.x.x). Seeing them is normal but they're harmless on their own.
  • Public IP — this is what websites see. If you're on a VPN, this should match your VPN's exit node, not your real ISP.
  • IPv6 address — if your VPN doesn't support IPv6, you may leak your real IPv6 address. Disable IPv6 or switch VPNs.

How to prevent leaks

  1. Use a VPN with built-in WebRTC leak protection (most reputable VPNs include this).
  2. Install a browser extension that disables WebRTC (e.g. uBlock Origin has an option).
  3. In Firefox: set media.peerconnection.enabled to false in about:config.