WebRTC Leak Checker
Detect if WebRTC exposes your real IP address, even when using a VPN.
Ready to check
WebRTC leak check will begin automatically.
stun:stun.l.google.com:19302Public IPs (0)
—
Local IPs (0)
—
How to use
- 1
Open the tool
The WebRTC leak check runs automatically when you load the page. No action is needed to start.
- 2
Review discovered IPs
Examine the local and public IP addresses that WebRTC has exposed through ICE candidate gathering.
- 3
Check for leaks
If you are using a VPN, compare the displayed public IP to your VPN's expected IP. A mismatch indicates a leak.
- 4
Re-check if needed
Click the Re-check button to run the test again, for example after changing VPN settings or disabling WebRTC.
Frequently asked questions
What is a WebRTC leak?
Does this tool send my data anywhere?
How do I fix a WebRTC leak?
Why do I see a local/private IP address?
Check whether your browser's WebRTC implementation is leaking your
real IP address. WebRTC can bypass VPN tunnels by using STUN requests
to discover your local and public IP addresses. This tool creates an
RTCPeerConnection, collects ICE candidates, and reports every IP
address found — helping you identify potential privacy leaks. Everything
runs entirely in your browser; no data is sent to any server beyond
the standard STUN request.