WebRTC Leak Test

Check whether your browser reveals local IPs, public IPs, IPv6 addresses, or mDNS candidates through WebRTC ICE gathering.

Key Tools and References

Frequently Asked Questions

What is a WebRTC leak?

A WebRTC leak happens when your browser exposes network candidates that reveal local addresses, public addresses, or other interface details that are different from the IP a website sees over HTTP.

Does a WebRTC leak reveal my exact home address?

No. A WebRTC leak does not reveal your street address, but it can expose a private LAN address, a public IP address outside your VPN, or a separate IPv6 address that gives websites more network information than you expect.

Is an mDNS candidate a real IP leak?

Usually not. An mDNS candidate replaces a raw local IP with a temporary hostname ending in .local. That is safer than exposing the real LAN address, but it still shows that WebRTC host discovery is active.

Why can WebRTC show a different IP than the page sees over HTTP?

WebRTC gathers candidates from multiple network paths. If your browser, VPN, proxy, or IPv6 route behaves differently for peer connections than for normal web traffic, WebRTC can surface an address that does not match the HTTP exit IP.

Do I need camera or microphone permission for this test?

No. This test only creates a peer connection and gathers ICE candidates. It does not request camera or microphone access.