How to use this webrtc leak test
Check whether your browser exposes your real IP through WebRTC, even when you're behind a VPN.
Read the result cardThe hero card tells you in plain English whether your setup looks consistent or whether something looks like a leak.
Check the candidatesThe candidate table is the raw evidence — every ICE candidate your browser produced, with its type and privacy classification.
Re-run with your VPN onTurn your VPN on and click Re-run test. Both numbers should change to the VPN exit IP. If only one changes, your VPN is leaking via WebRTC.
Frequently asked questions
These cover the most common questions about WebRTC leaks, what mDNS protection does, and what the result actually proves.
FAQ
What is a WebRTC leak?
WebRTC is the browser API that powers things like video calls and voice chat. To set up peer-to-peer connections, browsers ask STUN servers for the public IP your traffic appears from — and that request can slip around VPNs that only tunnel TCP, exposing your real IP. That's the textbook 'WebRTC leak.' It's been a documented issue since 2015 and is still present in many VPN setups.
FAQ
What does the test actually do?
The page opens a temporary RTCPeerConnection in your browser pointed at Cloudflare's free public STUN server (stun.cloudflare.com:3478) and listens for the ICE candidates the browser produces. It also makes one HTTPS request to ipapi.co to find out the IP your normal HTTP traffic comes from. It then compares the two and reports whether they match.
FAQ
I see something called mDNS in the candidates. Is that a leak?
No — that's the protective behavior. Modern browsers (Chrome 76+, Firefox 68+, Safari 12.1+) replace your raw LAN IP with an obfuscated hostname like abc-1234.local before exposing it via WebRTC. Seeing mDNS hostnames in your host candidates means your browser is doing the right thing. A raw 192.168.x.x or 10.x.x.x in the host candidates is the older, less private behavior.
FAQ
The result says 'No leak detected.' Am I fully safe?
It means your WebRTC public IP and your HTTP public IP are the same right now, against this STUN server, with this provider chain. It does not test for DNS leaks, IPv6 leaks via other paths, TLS fingerprinting, or any other side-channel. A clean WebRTC test is a good sign, not a security audit.
FAQ
The result says 'Possible VPN bypass.' What should I do?
Most major VPN clients (Mullvad, ProtonVPN, NordVPN, ExpressVPN) ship a 'block WebRTC IP discovery' or 'kill switch' option that catches WebRTC traffic and forces it through the tunnel. Enable that setting in your VPN, then re-run the test. If you can't enable it, a browser extension that disables WebRTC entirely (or a privacy-first browser like Brave) will also fix it.
FAQ
Is my IP stored or sent anywhere?
No. The page makes one UDP connection to Cloudflare's STUN server and one HTTPS request to ipapi.co (with ipify.org as a fallback). Both see your IP for those requests, but Everyday Tools Hub does not log, store, or transmit anything about your visit.
Related tools
Explore other utilities in the Everyday Tools Hub library.