metrika
  • Tiếng Việt
  • Русский
  • English

WebRTC Leak Test

Check if your browser is leaking your real IP through WebRTC

Running WebRTC leak test...
Your Remote IP
IPv4 Address
Country
ISP
WebRTC IP Addresses
Local IP
Public IP (STUN)
Leak Status
WebRTC Support
RTCPeerConnection
RTCDataChannel
Media Devices API
Media Devices
Audio Input
Video Input
Audio Output
Loading...

What Is WebRTC and Why Should You Care

WebRTC (Web Real-Time Communication) is built into every modern browser. It powers video calls, voice chats, and direct file transfers between users. Google Meet, Discord, and browser-based Zoom all rely on this technology.

What is WebRTC and why it's a privacy risk

The problem is that WebRTC needs to know your real IP address to establish a direct connection. Your browser sends a request to a STUN server, which returns your public IP. This all happens at the browser level, completely bypassing your proxy or VPN. So even if you’re connected through a proxy or VPN, WebRTC can still hand your real address over to any website.

That’s why running a WebRTC leak test is a must whenever you set up a proxy, VPN, or antidetect browser. The tool above sends a request to Google’s STUN server, grabs the IP from the ICE candidates, and compares it to your external address. If they don’t match, your browser is giving away your real IP and your anonymity is compromised.

How to Read the Test Results

  • No leak detected (green status). The public IP obtained via STUN matches your external IP address. If you’re connected through a proxy or VPN, it means WebRTC is also routed through the tunnel and your real address stays hidden.
  • Leak detected (red status). The STUN server returned an IP that’s different from your external address. WebRTC is bypassing your protection, and any website can grab your real IP. You need to disable or spoof WebRTC.
  • WebRTC blocked (blue status). The browser couldn’t create an RTCPeerConnection, and the STUN request never went through. This is typical for antidetect browsers like Dolphin{anty}, AdsPower, and GoLogin — they block or spoof WebRTC at the profile level. No leak is possible.

How to Disable WebRTC in Your Browser

Google Chrome

Chrome doesn’t let you disable WebRTC through its built-in settings. There are two workarounds. First: install the WebRTC Control extension or WebRTC Network Limiter (the official one from Google). Second: install uBlock Origin, open its settings, and enable “Prevent WebRTC from leaking local IP addresses.” After installing, refresh the page and run the test again. The status should change to “No leak” or “WebRTC blocked.”

Mozilla Firefox

Firefox lets you disable WebRTC in about 30 seconds with no extensions needed. Type about:config in the address bar, accept the warning, find the media.peerconnection.enabled parameter, and toggle it to false. This completely kills WebRTC. Browser-based video calls will stop working too, but if you’re testing proxies or managing multiple accounts, that’s a fair trade-off.

Opera

Go to Settings, then Advanced > Privacy & security, scroll down to the WebRTC section, and select “Disable non-proxied UDP”. This stops the browser from sending STUN requests that bypass your proxy.

Antidetect Browsers

In Dolphin{anty}, AdsPower, GoLogin, and Multilogin, WebRTC is controlled at the profile level. In your profile settings, find the WebRTC section and pick a mode: Disabled (completely off), Altered (spoofed to match proxy IP), or Real (no protection). For working with proxies, Altered is the best choice — it feeds the proxy IP into the WebRTC response, so the website sees the same address across all checks.

WebRTC and Proxies: What You Need to Know

HTTP and SOCKS5 proxies do not protect you from WebRTC leaks. Proxies operate at the HTTP connection level, but WebRTC uses UDP and contacts the STUN server directly, skipping the proxy entirely. So even with a proxy active, your browser can still expose your real IP through WebRTC. If you’re just getting started with proxies and aren’t sure where to find your address and port, we have a step-by-step guide for that.

VPNs offer better protection because they capture all system-level traffic, including UDP. But there are exceptions — some cheap VPNs let WebRTC requests slip through. If you want a VPN-like tunnel with zero leaks, check out our guide on setting up VLESS Reality: it encrypts all your traffic and doesn’t get flagged as a VPN.

For managing multiple accounts through proxies, the best setup is an antidetect browser with WebRTC Altered mode plus a quality residential or mobile proxy. This combo plugs the leak at the browser level and gives you a clean fingerprint. You can find trusted providers in our residential proxy ranking. And if you need to route all traffic on your home network through a proxy, here’s a guide on setting up a proxy on your router.

Frequently Asked Questions

What is a WebRTC leak?

How do I check for a WebRTC leak?

My VPN is on but the test shows a leak. What do I do?

Does a proxy protect against WebRTC leaks?

What does the ‘WebRTC blocked’ status mean?

How is a WebRTC leak test different from a DNS leak test?

Which browsers are vulnerable to WebRTC leaks?

How does the WebRTC Altered mode work in antidetect browsers?

Will disabling WebRTC break any websites?

Should I test for WebRTC leaks on my phone?

  • vi
  • ru
  • en
  • © Copyright 2026

    Welcome

    Sign in to leave reviews and track their status

    or continue with
    or continue with