WebRTC Leak Test: Check Public and Local IP Candidates
Click WebRTC leak test Check whether your browser exposes public, local, or obfuscated WebRTC candidates and compare them with your current public IP.
Browser privacy
WebRTC Leak Test
Check whether your browser exposes local or public network candidates through WebRTC.
This browser-based test gathers ICE candidates with a public STUN server. Results depend on browser, VPN, extensions, and network policy.
Leak test results
Run the test to inspect WebRTC candidates.
Run the test to inspect what WebRTC exposes in this browser.
Detected WebRTC candidates will appear here after the scan.
Why run a WebRTC leak test online
A WebRTC leak test helps you see what network information the browser exposes while gathering ICE candidates for calls, meetings, screen sharing, and peer-to-peer apps. It is especially useful when you rely on a VPN, browser privacy settings, hardened extensions, or network policies and want to confirm whether WebRTC is still revealing a public-facing path, a local address, or only obfuscated candidates.
How the test runs
The tool creates a temporary WebRTC connection in the browser, gathers ICE candidates with public STUN servers, and lists the addresses the browser exposes during that process. It also reads your current public IP through a standard web request so you can compare what WebRTC exposes with what a normal website sees. The test is browser-based and does not require a call, camera, microphone, or account login.
How to interpret results
If a public candidate appears, the browser exposed a public-facing network path during WebRTC gathering. If that public candidate differs from the current public IP shown by the page, that can indicate another exposed path, alternate routing, or a VPN leak scenario worth reviewing. If only local or obfuscated candidates appear, exposure is narrower but still relevant for privacy-sensitive setups, and if no candidates appear, the browser, VPN, extension, or network policy may be limiting WebRTC candidate gathering.
- Public candidates mean WebRTC exposed an internet-facing address or route.
- Local candidates show private interface details that may still matter in privacy-sensitive workflows.
- Obfuscated candidates usually mean the browser replaced local IPs with mDNS hostnames.
- A public candidate different from the current public IP can indicate another exposed network path.
- No visible candidates suggests stronger masking, but it does not guarantee anonymity.
This test reports what the browser exposes during ICE gathering at that moment. It does not inspect TURN infrastructure, decrypt traffic, bypass VPN protections, or prove that every privacy risk is eliminated when no candidate appears.