IPRoyal

WebRTC Leak Test

Your Remote IP

IP Address

n/a

Country

n/a

WebRTC Support Detection

RTCPeerConnection

RTCDataChannel

Your WebRTC IP

WebRTC Leak Test

Local IP Address

Public IP Address

SDP Log

Media Devices

Audio input

Video input

Audio output

What Is a WebRTC Leak?

Countless web apps use WebRTC (web real-time communication) for video conferencing, streaming, and sharing data between internet browsers. The reason for its popularity is simple - it doesn't require any additional software or plugins to work. It's extremely convenient, so most modern browsers have it turned on by default. Unfortunately, it can also compromise your online privacy.

Simply put, a WebRTC leak leaves your public IP address exposed to the websites you visit. This can happen even though you're using a VPN server or a proxy to hide it. To help you better understand what happens, we’ll briefly cover the protocols WebRTC relies on to work correctly:

ICE (interactive connectivity establishment)

This protocol facilitates traffic across network address translators (NATs) and firewalls by gathering multiple candidate IP addresses. Additionally, it tests them to determine the most effective route for communication.

TURN (traversal using relays around NAT)

TURN provides a relay server for media traffic between peers in cases where direct P2P communication isn't possible. It's used as a fallback mechanism whenever STUN cannot establish a connection due to conflicts with a NAT or firewall.

STUN (session traversal utilities for NAT)

Devices use STUN to discover their public IP address and the kind of NAT they're behind. It determines the correct network address for communication and enables devices to establish peer-to-peer connections even when they're behind a NAT.

As WebRTC establishes a direct connection between peers, any of these protocols can reveal IP addresses to websites looking to gather them for whatever reason.

Fortunately, our browser-based WebRTC leak test can show you if the IP addresses of the devices on your network are compromised.

Common WebRTC Leaks

WebRTC can reveal your public IP address, completely bypassing any protection from a VPN or proxy. Here are the most common ones:

  • STUN requests

    WebRTC can use the STUN protocol to discover public IP addresses and network configurations. Once your browser makes a STUN request, it can reveal your real IP address in the request headers. These headers are accessible through JavaScript running on the webpage.

  • Direct P2P connections

    To establish direct connections between peers, WebRTC has to exchange their IP addresses. If a website you visit runs a malicious script, it can extract your real IP address.

  • Bad VPN and proxy configuration

    Even if you're using VPNs or proxies, your device is not immune to WebRTC leaks. Always make sure these tools are configured properly. Also, while your traffic is encrypted when you're using a VPN, it doesn't help. Make sure you're using a solution with WebRTC leak protection built in.

How to Prevent WebRTC Leaks?

There are several strategies and web practices to mitigate all risks involved with WebRTC leaks.

How to Disable WebRTC

How to Disable WebRTC in Chrome on desktop?

There is no way to eliminate WebRTC in Chrome at the moment. Still, you can use extensions to turn WebRTC on and off as needed. WebRTC Control can toggle WebRTC with a single click on your Chrome toolbar.

How to Disable WebRTC in Chrome on Android?

1. Type chrome://flags/#disable-webrtc in the Chrome address bar.

2. Find WebRTC STUN origin header and disable it.

3. Note that this option isn't available on devices running Android 13 and above.

How to Disable WebRTC in Firefox?

1. Type about:config in the address bar and press Enter.

2. You’ll see a warning message, click the Accept the Risk and Continue button below.

3. Type media.peerconnection.enabled in the search bar.

4. Double-click on the result and change its value to false.

How to Disable WebRTC in Microsoft Edge?

1. Type about:flags in the Edge address bar and press Enter.

2. Type webrtc in the search bar.

3. Change Anonymize local IPs exposed by WebRTC value to enabled.

How to Disable WebRTC in Opera?

Opera does not offer any WebRTC control options. You can use extensions like WebRTC Control to toggle WebRTC on or off.

How to Disable WebRTC in Safari?

1. Click on Safari in the drop-down menu and choose Preferences.

2. Select the Advanced tab and tick the Show Develop menu in menu bar option.

3. Click on Develop in the drop-down menu, go to Experimental Features, and click on Remove Legacy WebRTC API.

Explore More Online Tools

FAQ

Is WebRTC a security risk?

Since it can expose your public IP address and leave your device vulnerable to MITM (man-in-the-middle) attacks, WebRTC is certainly a security risk. The best way to mitigate it is to turn off WebRTC connections on your device.

Can WebRTC be hacked?

Although it’s designed with security in mind, WebRTC’s vulnerability is fairly easy to abuse. Outdated libraries, incorrect configuration, and poor implementation can leave your device vulnerable to hacker attacks.

Is WebRTC always encrypted?

All WebRTC traffic is encrypted by default. Media streams use SRTP (secure real-time protocol), and data channels use DTLS (datagram transport layer security).