WebRTC Leak Test
See what IP addresses your browser is exposing through WebRTC — even when your VPN is active.
Probing WebRTC…
What is a WebRTC leak?
WebRTC is a browser feature used for video calls and peer-to-peer connections. It works by gathering all of your IP addresses — including local and public ones — and sharing them via STUN servers. The catch: it bypasses your VPN's normal routing, so your real IP can leak even when the VPN is running.
How to interpret the results
- Local IPs — these are private addresses inside your home network (192.168.x.x, 10.x.x.x). Seeing them is normal but they're harmless on their own.
- Public IP — this is what websites see. If you're on a VPN, this should match your VPN's exit node, not your real ISP.
- IPv6 address — if your VPN doesn't support IPv6, you may leak your real IPv6 address. Disable IPv6 or switch VPNs.
How to prevent leaks
- Use a VPN with built-in WebRTC leak protection (most reputable VPNs include this).
- Install a browser extension that disables WebRTC (e.g. uBlock Origin has an option).
- In Firefox: set
media.peerconnection.enabledtofalseinabout:config.