Donate
BETA

WebRTC Leak Test

Check whether browser WebRTC behavior can expose your real IP while using a VPN

What can reveal

WebRTC may expose local or network IP information through requests, depending on browser behavior and VPN setup. This can happen even when your main public IP appears changed.

How to run a WebRTC leak test

  1. Capture baseline IP/ISP details on the homepage checker.
  2. Connect your VPN, then repeat the same checks.
  3. Compare browser-level behavior with Proxy Check and DNS Leak Test.
  4. If browser-originated IP signals still differ, apply WebRTC fixes below and retest.

How to fix WebRTC leaks (Chrome and Firefox)

  • Chrome / Edge: Prefer a trusted extension or browser policy that limits non-proxied UDP/WebRTC local IP exposure, then retest.
  • Firefox: Review WebRTC settings in about:config (for example media.peerconnection.enabled) and validate again.
  • VPN settings: Keep kill switch and leak protection enabled, and avoid conflicting browser proxy rules.

Browser behavior changes over time, so periodic re-testing is recommended after browser or extension updates.

What to do next after a WebRTC leak test

Use DNS, proxy, and IP checks to confirm your VPN setup is consistent across leak vectors.

Frequently asked questions

What is a WebRTC leak?
A WebRTC leak is when browser WebRTC/STUN behavior exposes IP-related information outside your expected VPN route.
Can WebRTC leak even if my VPN is connected?
Yes. Browser-level behavior can still expose network details if WebRTC settings are not constrained.
How do I prevent WebRTC leaks in Chrome?
Use trusted privacy controls/extensions and limit non-proxied WebRTC UDP behavior where supported, then retest.
How do I prevent WebRTC leaks in Firefox?
Review and harden WebRTC configuration in about:config, then validate with repeated checks.
Should I run DNS and WebRTC leak tests together?
Yes. DNS and WebRTC are different leak vectors, so both should be tested for reliable VPN verification.