Security Tool

WebRTC Leak
Test

Check if your browser is leaking your real IP address through WebRTC. This vulnerability can expose your identity even when using a VPN.

wifi_tethering

Scanning WebRTC...

Checking for IP address leaks through WebRTC...

What Is WebRTC?

WebRTC stands for Web Real-Time Communication. It is a technology built into modern web browsers that enables peer-to-peer communication for video calls, voice calls, and file sharing directly in the browser without plugins.

While WebRTC is useful for applications like Google Meet, Zoom, and Discord, it has a significant privacy flaw: it can expose your real IP address to websites, even when you are using a VPN. This happens because WebRTC uses STUN servers to discover your network addresses, and these requests can bypass the VPN tunnel.

How WebRTC Leaks Happen

WebRTC leaks are a browser-level vulnerability that can defeat VPN protection.

call

STUN Server Requests

WebRTC uses STUN servers to find your public IP for peer-to-peer connections. These requests can bypass VPN tunnels, revealing your real IP address to any website that requests it.

home

Local IP Exposure

WebRTC can also reveal your local network IP addresses, exposing information about your internal network configuration that should remain private.

javascript

Silent JavaScript Access

Any website can use JavaScript to access WebRTC without your knowledge or permission. No special permissions are needed, making this a particularly dangerous vulnerability.

How to Disable WebRTC

You can prevent WebRTC leaks by disabling it in your browser or using a VPN that blocks WebRTC requests.

1

Firefox: Disable in Settings

Type about:config in the address bar, search for media.peerconnection.enabled, and set it to false. This completely disables WebRTC in Firefox.

2

Chrome: Use an Extension

Chrome does not allow fully disabling WebRTC through settings. Install a WebRTC leak prevention extension like WebRTC Leak Prevent or uBlock Origin to block WebRTC requests.

3

Safari: Disable in Developer Menu

Go to Safari Preferences, Advanced tab, enable Show Develop menu. Then in the Develop menu, go to Experimental Features and uncheck WebRTC mDNS ICE candidates.

4

Use VPNWG with Built-in Protection

VPNWG's WireGuard implementation ensures all traffic, including WebRTC STUN requests, is routed through the encrypted tunnel, preventing any IP leaks.

Frequently Asked Questions

What is a WebRTC leak? expand_more
A WebRTC leak occurs when your browser reveals your real IP address through the WebRTC API, even while connected to a VPN. Websites can use JavaScript to make STUN server requests that bypass the VPN tunnel and discover your true public and local IP addresses.
Does disabling WebRTC break websites? expand_more
Disabling WebRTC may affect video and voice calling features in your browser. Services like Google Meet, Discord, and Zoom web client rely on WebRTC. If you use these services, consider using a VPN that prevents WebRTC leaks instead of disabling WebRTC entirely.
Can a VPN prevent WebRTC leaks? expand_more
Yes. A properly configured VPN can prevent WebRTC leaks by ensuring all STUN requests are routed through the VPN tunnel. VPNWG uses WireGuard's kernel-level routing to capture all network traffic, including WebRTC requests, preventing your real IP from being exposed.

Stop WebRTC Leaks with VPNWG

Get complete IP leak protection with WireGuard-powered tunneling. All traffic routed, all leaks blocked.