WebRTC Leak Test
Detect whether WebRTC reveals your real IP behind a VPN. Identify local and public IP leaks.
What this test checks
The test lists ICE candidates reported by your browser during WebRTC discovery.
These candidates can include local, public, and relay addresses that reveal network paths.
What WebRTC can expose
Host candidates may show private RFC1918 ranges and internal device interfaces.
Server-reflexive candidates can expose your ISP IP even when a VPN is active.
Why leaks happen
Some VPNs only tunnel web traffic and do not intercept WebRTC UDP paths.
Browser settings, extensions, and OS policies also influence which candidates appear.
How to reduce exposure
Use a VPN with explicit WebRTC protection or force relay-only mode.
Disable WebRTC or enable mDNS host candidates if real-time calls are not required.
How to read results
If a public ISP IP appears while you expect a VPN exit, you have a leak.
Compare with IP and DNS tools to confirm the expected country and provider.
Limitations
Results depend on browser support and can change after updates or policy resets.
Test on the exact browser and device you use for sensitive sessions.