WebRTC Leak Explained

How WebRTC can reveal your real IP (even behind a VPN), how to test it, and the quickest fixes that actually work.

What Is WebRTC?

WebRTC (Web Real-Time Communication) is a browser technology that enables voice/video calls and peer-to-peer (P2P) data transfer without plugins. To connect peers, WebRTC uses techniques like STUN and ICE to discover your reachable addresses.

Why this matters: During this discovery, your browser can expose local and public IP addresses. Some websites can read these values—even when a VPN is connected—unless your setup prevents it.

What Is a WebRTC Leak?

A WebRTC leak happens when a site can obtain your real ISP-assigned public IP (or local IPs) via the browser's WebRTC APIs. If your VPN is active but WebRTC still reveals your real IP, trackers and sites can identify you and your location.

How to Test for a WebRTC Leak (2 minutes)

  1. Connect to your VPN.
  2. Open our VPN Leak Test in a new tab.
  3. Compare the WebRTC section with your known ISP IP (find it by disconnecting the VPN and visiting the same page briefly).
  4. If your real IP appears under WebRTC while VPN is on, you have a leak.
Pro tip: Re-run the test after each fix below until WebRTC shows only VPN or private addresses.

Quick Fixes by Browser

Chrome & Brave

  1. Visit chrome://flags → search "WebRTC" and set related flags to reduce local IP exposure (exact labels vary by version).
  2. Install a reputable extension that limits WebRTC (e.g., "WebRTC Network Limiter").
  3. Use a VPN app that blocks WebRTC leaks at the network layer.

Firefox

  1. Go to about:config.
  2. Set media.peerconnection.enabled to false to fully disable WebRTC (breaks web calls).
  3. Or set media.peerconnection.ice.default_address_only to true to restrict exposure.

Safari (macOS/iOS)

  1. Safari limits some exposure by default, but leaks can still occur via WebRTC in certain contexts.
  2. Keep macOS/iOS updated; test regularly.
  3. Use a VPN that forces private DNS and blocks WebRTC leaks.

Edge

  1. Similar to Chrome: check edge://flags for WebRTC options.
  2. Use an extension to limit WebRTC where needed.
  3. Confirm with a leak test after changes.
Heads up: Disabling WebRTC can break video calls and web-conferencing. Prefer limiting exposure or using a VPN that mitigates WebRTC leaks instead of fully disabling it—unless you don't need calls.

Best Long-Term Fixes

Our trusted picks for preventing WebRTC leaks:

or compare options on Best VPNs for Privacy.

Extra Notes (STUN/TURN & Corporate Networks)

Summary

WebRTC enables real-time communication but can reveal your real IP if misconfigured. Test with our leak tool, apply browser-specific limits, and use a VPN with robust leak protection. Re-test after each change.