Is WebRTC Leaking Your Real IP Address?

A free WebRTC leak detection tool that checks whether your browser exposes your real IP address through RTCPeerConnection and ICE candidates. Tests multiple STUN servers, detects local and public IPs, identifies mDNS obfuscation, and provides real-time monitoring with browser-specific instructions to disable WebRTC.

Scan your browser for WebRTC IP leaks and protect your privacy

Scans RTCPeerConnection, STUN servers, and ICE candidates
🔍
Scanning…
IP Addresses
Type IP Address Source Status
WebRTC API Status
Real-Time Monitor
Start Monitoring
How to Disable WebRTC
All tests run locally in your browser — no data is sent to any server

Features

Multi-server scan: tests 3 STUN servers simultaneously to catch leaks that single-server tools miss IP classification: distinguishes local (host), public (srflx), relay (turn), and mDNS (.local) candidates WebRTC API audit: checks RTCPeerConnection, DataChannel, MediaStream, getUserMedia, and device enumeration Real-time monitor: continuous 10-second checks for up to 5 minutes to detect intermittent leaks Disable guides: step-by-step instructions for Chrome, Firefox, Safari, Edge, and Brave browsers

How to Use WebRTC Leak Test

  1. Start the scan. Click "Check for WebRTC Leaks" to scan your browser using multiple STUN servers and analyze ICE candidates.
  2. Review the results. See all discovered IP addresses classified by type. Green means safe, red means your IP is exposed.
  3. Enable real-time monitoring. Toggle the monitor to check for leaks every 10 seconds — useful when testing VPN configurations.
  4. Disable WebRTC if needed. Follow the browser-specific instructions to prevent WebRTC from exposing your IP address.

FAQ

What is a WebRTC leak?

WebRTC (Web Real-Time Communication) is a browser API used for video calls, voice chat, and file sharing. It can reveal your real IP address to websites, even when you're using a VPN, because STUN server requests bypass the VPN tunnel.

What are mDNS (.local) addresses?

Modern browsers replace your real local IP with a random .local address (mDNS obfuscation). This is a privacy feature — if you only see .local addresses, your local IP is not exposed.

Can a VPN prevent WebRTC leaks?

Some VPNs block WebRTC leaks, but many don't. The safest approach is to disable WebRTC in your browser settings. Use this tool to verify after configuring your VPN.

Why does the test show my local IP?

If you see a private IP like 192.168.x.x or 10.x.x.x, your browser is leaking your local network address. While this alone doesn't reveal your internet IP, it can be combined with other data for fingerprinting.

Is this test safe to use?

Yes. Everything runs in your browser. The test creates temporary RTCPeerConnection objects that are immediately closed. No data is sent to our servers or any third party.

What's the difference between local and public IP leaks?

A local IP leak exposes your private network address (e.g. 192.168.1.5). A public IP leak exposes your real internet address, which can reveal your physical location and identity.

💡 Want us to improve this tool just for you?

We can — and it's free! Just send us a quick message with your idea. If you'd like to discuss it in detail, leave your email and we'll get back to you. You can stay anonymous.

How do you rate this tool?

Thank you for your rating!
Want to share more? Leave a comment!
Thank you! Your comment will appear after moderation.
Published