Skip to content
Kordu Tools

WebRTC Leak Checker

Detect if WebRTC exposes your real IP address, even when using a VPN.

Ready to check

WebRTC leak check will begin automatically.

STUN Serverstun:stun.l.google.com:19302
ICE Candidates
Gather Time

Public IPs (0)

Local IPs (0)

How to use

  1. 1

    Open the tool

    The WebRTC leak check runs automatically when you load the page. No action is needed to start.

  2. 2

    Review discovered IPs

    Examine the local and public IP addresses that WebRTC has exposed through ICE candidate gathering.

  3. 3

    Check for leaks

    If you are using a VPN, compare the displayed public IP to your VPN's expected IP. A mismatch indicates a leak.

  4. 4

    Re-check if needed

    Click the Re-check button to run the test again, for example after changing VPN settings or disabling WebRTC.

Frequently asked questions

What is a WebRTC leak?
WebRTC uses STUN servers to discover your IP addresses for peer-to-peer connections. This can reveal your real public IP even when you are connected to a VPN, because STUN requests may bypass the VPN tunnel.
Does this tool send my data anywhere?
The only external request is a standard STUN binding request to Google's public STUN server. No personal data is transmitted. All IP parsing and display happens locally in your browser.
How do I fix a WebRTC leak?
Most browsers allow you to disable WebRTC or restrict it to the VPN interface. In Firefox, set media.peerconnection.enabled to false in about:config. In Chrome, use a browser extension that blocks WebRTC.
Why do I see a local/private IP address?
Local IPs (such as 192.168.x.x or 10.x.x.x) are your device's addresses on your local network. Exposing them is a minor privacy concern but is generally less serious than leaking your public IP.

Check whether your browser's WebRTC implementation is leaking your

real IP address. WebRTC can bypass VPN tunnels by using STUN requests

to discover your local and public IP addresses. This tool creates an

RTCPeerConnection, collects ICE candidates, and reports every IP

address found — helping you identify potential privacy leaks. Everything

runs entirely in your browser; no data is sent to any server beyond

the standard STUN request.

Related tools