WebRTC Leak Test

Check if WebRTC is exposing your real IP address behind VPN.

Learn more

Privacy-safe: we don’t store your inputs. Press Enter to submit.

Best VPNs for Privacy & Streaming

Fast, audited, reliable. Pick one that fits your needs and fix leaks for good.

ZenGuard VPN ★★★★★

Editor’s pick
Top choice
No-logs • independent audits
RAM-only servers • modern ciphers
Great for streaming & everyday privacy
Locations110+
Devices10
$9.99 /mo Save 72%

SwiftShield VPN ★★★★☆

Fastest
Speed
WireGuard by default • multi-hop
4K streaming & gaming friendly
Clean apps • strong Kill Switch
Locations95+
DevicesUnlimited
$8.99 /mo Save 66%

BudgetBee VPN ★★★★☆

Best value
Deal
Strong speeds at a great price
Streaming + P2P friendly
Apps for every major platform
Locations85+
Devices7
$6.99 /mo Save 68%

*Affiliate disclosure: we may earn a commission when you buy via our links—at no extra cost to you. We only recommend VPNs that pass our security checks.

About the WebRTC Leak Test

WebRTC lets browsers talk directly for real-time audio/video. The downside: it can reveal your real IP address via STUN candidates even when you’re on a VPN. This test checks if your browser exposes private/local or public IPs in a way that websites could use to identify you.

Quick tips

  • Keep your VPN connected while testing so candidates are gathered through the tunnel.
  • Look for “No private IP exposed (mDNS active)” — that’s the best outcome.
  • Disable “Smart-DNS” features in your router/TV boxes that may bypass the VPN.
  • Use modern browsers; Chrome/Edge/Brave support mDNS ICE which hides local IPs.
  • If your public IP shows, confirm it matches the VPN’s exit IP (not your ISP).

WebRTC Leak – FAQ

1) What is a WebRTC leak?

When WebRTC gathers connection “candidates” it can reveal your real IP (public or private). A leak means websites could learn that IP even if you’re on a VPN.

2) What does “No private IP exposed (mDNS active)” mean?

Your browser used mDNS for local candidates, so private LAN addresses weren’t exposed. It’s the preferred privacy behavior on modern Chromium and Firefox.

3) Why do I still see my public IP?

Seeing a public IP is normal—just make sure it’s your VPN’s exit IP, not your ISP. If it’s your ISP IP, your browser or network is bypassing the tunnel.

4) Do I need to enter anything to run the test?

No input required—just click Run Test. We create a temporary peer connection and read the candidates your browser exposes.

5) How can I prevent WebRTC leaks?

Keep your VPN on, use browsers with mDNS (Chrome/Edge/Brave/Firefox), and avoid extensions that disable WebRTC entirely—many sites depend on it. If needed, set your browser to hide local IPs behind a proxy/VPN.