User Rating 0.0
Total Usage 0 times
🛡
Ready to Scan
Click 'Start Diagnostic' to analyze network interfaces.
🌐 IP Visibility Analysis
Public IP (via HTTP) Waiting...
WebRTC IP (Stun) Waiting...
Local IP (LAN) Waiting...
🔍 Media Device Fingerprint

WebRTC exposes hardware IDs even without permission in some configurations.

  • Scan not started
Entropy/Uniqueness -
ICE Candidate Log
System ready. Awaiting user command...
Mitigation Guide
  1. Install the official WebRTC Network Limiter extension by Google or uBlock Origin.
  2. In uBlock Origin settings, enable "Prevent WebRTC from leaking local IP addresses".
  3. Brave Users: Go to Settings > Shields > Fingerprinting Blocking and set to "Strict".
  1. Type about:config in the address bar and accept the risk.
  2. Search for media.peerconnection.enabled.
  3. Double-click to toggle it to FALSE.
  4. Search for media.navigator.enabled and set to FALSE (disables device enumeration).
  1. Go to Preferences > Advanced.
  2. Check "Show Develop menu in menu bar".
  3. In the Develop menu, select WebRTC.
  4. Check "Disable ICE Candidate Restrictions" (to test) or ensure it handles proxies correctly. Safari is stricter by default but still vulnerable to internal IP leaks.
Is this tool helpful?

Your feedback helps us improve.

About

This tool utilizes the RTCPeerConnection API to audit your browser's network visibility. While WebRTC enables real-time audio/video communication, it bypasses standard proxy configurations by establishing direct UDP/TCP connections via STUN (Session Traversal Utilities for NAT) servers. This often reveals your Real_IP even when a VPN is active.

We analyze the ICE (Interactive Connectivity Establishment) candidates generated by your browser. If a candidate contains an IP address distinct from your public interface IP (detected via HTTP), a leak is present. Furthermore, this tool performs Media Device Fingerprinting, enumerating unique hardware IDs (deviceId, groupId) which advertisers use to track users across sessions, independent of cookies.

security privacy vpn-test ip-leak fingerprinting

Formulas

The logic for leak detection relies on set comparison between the HTTP-visible IP and the WebRTC-exposed IPs.

{
SAFE if Srtc (Svpn Slocal)LEAK if ip Srtc such that ip Svpn ip Slocal

Where Srtc is the set of gathered ICE candidates, Svpn is the public IP set routed through the tunnel, and Slocal contains private subnet ranges (e.g., 192.168.0.0/16).

Reference Data

Protocol ComponentFunctionPrivacy RiskTypical Port
STUNResolves Public IP behind NAT&highbar; High (Exposes Real IP)3478 (UDP)
TURNRelays traffic when P2P fails Medium (Server Logs)5349 (TLS)
Host CandidateDirect Local Network Interface_ Low (Local IP 192.168.x.x)Ephemeral
Srflx CandidateServer Reflexive (NAT mapped)! Critical (True Public IP)Ephemeral
Media EnumerationLists Hardware IDs Tracking VectorN/A

Frequently Asked Questions

A WebRTC leak occurs when your browser's real-time communication feature (WebRTC) inadvertently sends your actual IP address to a third party, bypassing your VPN tunnel. This happens because WebRTC uses STUN servers to discover the most efficient path for data, often ignoring the system's default gateway or proxy settings.
Seeing a local IP (LAN IP) is generally safe and expected. It simply means WebRTC is reporting your internal network address. However, unique local subnet patterns can sometimes be used for "soft" fingerprinting of your network topology.
The fix depends on your browser. In Firefox, you can set "media.peerconnection.enabled" to false in about:config. Chrome and Safari often require third-party extensions (like uBlock Origin or WebRTC Control) to strictly block UDP traffic or force proxy usage.
Even if your IP is hidden, websites can ask your browser for a list of available cameras and microphones. The unique combination of these device IDs (e.g., "Logitech C920", 'Built-in Mic') creates a unique hash that can identify you across different browsing sessions and Incognito windows.