WebRTC Leak Test

Check whether your browser leaks your real IP address through WebRTC. Free WebRTC leak test tool.

WEBRTC LEAK TEST

This test uses your browser's WebRTC API to connect to STUN servers and collect ICE candidates. The test runs entirely in your browser — no data is sent to any server.

The WebRTC leak test runs entirely client-side. No IP addresses are transmitted to Secunnix servers.

What Is WebRTC and Why Does It Matter?

WebRTC (Web Real-Time Communication) enables video calls, voice calls, and file sharing between browsers without plugins.

What Is WebRTC?

Services like Google Meet, Zoom, Discord and Facebook Messenger use WebRTC. To establish connections, it sends direct requests to STUN servers to discover your device's real IP addresses.

Leak Risk

WebRTC STUN requests can bypass the VPN tunnel and expose your real IP to websites. This can happen even while using a VPN.

ICE, STUN & TURN

ICE finds the optimal connection path, STUN discovers your real IP (source of leaks), TURN acts as a relay when direct connection fails.

Protection Methods

Enable VPN WebRTC protection, disable in Firefox via about:config, use extensions in Chrome, or switch to Brave browser.

What Is WebRTC and Why Does It Matter?

WebRTC (Web Real-Time Communication) enables video calls, voice calls, and file sharing between browsers without any plugins. Popular services like Google Meet, Zoom, Discord, and Facebook Messenger use WebRTC.

However, WebRTC's mechanism harbors a security vulnerability: To establish connections, it sends direct requests to STUN servers to discover your device's real IP addresses. This process can bypass the VPN tunnel and expose your real IP to websites.

How Do WebRTC Leaks Happen?

Leak TypeDescriptionRisk Level
STUN IP LeakSTUN server request bypasses VPN to expose your real public IP addressHigh
Local IP ExposureYour local network IP address (192.168.x.x) is exposed through ICE candidatesMedium
mDNS BypassmDNS hiding mechanism is bypassed in some browsers to detect local addressMedium
IPv6 WebRTC LeakIPv6 address leaks through WebRTC while VPN only tunnels IPv4High
TURN Server LeakReal IP information may be exposed in TURN relay connection metadataMedium

WebRTC Protection by Browser

BrowserCan Fully DisableExtension RequiredmDNS Protection
FirefoxYes — about:configNot neededYes
ChromeNoYes — WebRTC Leak PreventYes (v80+)
EdgeNoYes — Chrome extensions compatibleYes
SafariYes — Settings > AdvancedNot neededRestricted by default
BraveYes — Settings > PrivacyNot neededYes — default protection
OperaNoYes — WebRTC Leak PreventYes

VPN WebRTC Leak Protection

VPNWebRTC ProtectionBrowser ExtensionHighlights
NordVPNAutomaticYes — WebRTC blockerOne-click protection via extension
ExpressVPNAutomaticYes — WebRTC blockerProtection on all platforms
SurfsharkAutomaticYes — WebRTC blockerUnlimited device support
MullvadAutomaticYesStrong privacy-focused design
ProtonVPNAutomaticNoApp-level protection
Free VPNsUsually noneRarelyWebRTC protection mostly missing

5 Ways to Prevent WebRTC Leaks

  1. Use a VPN with WebRTC protection: NordVPN, ExpressVPN, and Surfshark automatically route WebRTC requests through the VPN tunnel.
  2. Disable WebRTC in Firefox: Type about:config in the address bar, find media.peerconnection.enabled and set it to false.
  3. Use an extension in Chrome: Install 'WebRTC Leak Prevent' or 'uBlock Origin' from Chrome Web Store.
  4. Use Brave browser: Brave offers WebRTC leak protection by default. Increase control from Settings > Privacy > WebRTC IP policy.
  5. Test regularly: Always test after browser updates, extension changes, or VPN server switches.

WebRTC Technical Infrastructure: ICE, STUN & TURN

WebRTC uses three core components to establish connections:

  • ICE: ICE (Interactive Connectivity Establishment): A framework that finds the optimal connection path between two parties. It collects local IP, STUN, and TURN candidate addresses.
  • STUN: STUN (Session Traversal Utilities for NAT): Queries external servers to discover your device's real public IP behind NAT. This is the main source of leaks.
  • TURN: TURN (Traversal Using Relays around NAT): Acts as a relay server when direct connection fails. Safer than STUN as traffic passes through the relay.

Resources & References

Frequently Asked Questions

What is a WebRTC leak?

It's when your browser exposes your real IP address through the WebRTC API. Even with a VPN, STUN server connections can reveal your IP.

How is a WebRTC leak detected?

Our test tool uses the browser's WebRTC API to connect to STUN servers and collect ICE candidates. Detected IP addresses are then analyzed.

What's the difference between WebRTC and DNS leaks?

DNS leaks expose your DNS queries outside the VPN. WebRTC leaks expose your real IP directly to websites. They work through different mechanisms.

I use a VPN but have a WebRTC leak, what should I do?

Enable WebRTC protection in your VPN. In Firefox: about:config > media.peerconnection.enabled = false. In Chrome: use the WebRTC Leak Prevent extension.

Is it safe to disable WebRTC?

It's safe but affects video/voice call services like Google Meet, Zoom, and Discord. If you use these services, prefer VPN protection instead.

Which browsers are vulnerable to WebRTC leaks?

All major browsers including Chrome, Firefox, Edge, and Opera support WebRTC by default. Firefox can fully disable it. Chrome requires an extension. Brave offers default protection.

Is local IP address leakage dangerous?

Local IP (192.168.x.x) alone isn't directly dangerous as it's only valid on your local network. However, it can reveal network topology. Public IP leakage is far more serious.

How often should I run a WebRTC leak test?

Test every time you connect to VPN, update your browser, or install new extensions.

Our Customers