M
MegaV
M
MegaV
Download
WebRTC Leak Test

Is your browser leaking your real IP?

WebRTC can expose your real public and local IP addresses to every website you visit — even if you are connected to a VPN. Run this test to find out.

Is your browser leaking your real IP?
Detect WebRTC IP leaks in your browser

Browser-based check. Results depend on your browser, extensions, and WebRTC settings.

Understanding WebRTC leaks

What is a WebRTC leak?

WebRTC (Web Real-Time Communication) is a browser technology used for video calls, voice chat, and peer-to-peer data transfer. It can reveal your real IP address through STUN server requests, bypassing your VPN tunnel entirely.

Why it matters

Even with a VPN active, a WebRTC leak lets websites and trackers see your actual public IP address. This can reveal your real location, ISP, and identity — undermining the entire purpose of your VPN.

How to fix it

Use a VPN with built-in WebRTC leak protection (like MegaV), or disable WebRTC in your browser settings. Chrome users can install extensions; Firefox users can set media.peerconnection.enabled to false in about:config.

How to disable WebRTC in your browser

Step-by-step instructions for each browser.

Firefox
  1. 1Type about:config in the address bar and press Enter
  2. 2Click "Accept the Risk and Continue"
  3. 3Search for media.peerconnection.enabled
  4. 4Double-click the setting to change it to false
  5. 5WebRTC is now disabled — re-run the test to verify
Chrome
  1. 1Install a WebRTC blocking extension (e.g. WebRTC Leak Prevent)
  2. 2Or use MegaV VPN which blocks WebRTC leaks automatically
  3. 3Chrome does not have a built-in setting to disable WebRTC
  4. 4Re-run the test after installing the extension
Edge
  1. 1Type edge://flags in the address bar and press Enter
  2. 2Search for "WebRTC"
  3. 3Set "Anonymize local IPs exposed by WebRTC" to Enabled
  4. 4Restart the browser and re-run the test
Safari
  1. 1Open Safari Preferences (Cmd + ,)
  2. 2Go to the Advanced tab and enable "Show Develop menu"
  3. 3In the Develop menu, go to Experimental Features
  4. 4Disable "WebRTC mDNS ICE candidates"
  5. 5Re-run the test to verify
Brave
  1. 1Go to Settings > Shields > Fingerprinting protection
  2. 2Set to "Strict" to block WebRTC leaks
  3. 3Brave blocks most WebRTC leaks by default
  4. 4Re-run the test to verify

Frequently asked questions

WebRTC leaks — what, why, and how to fix them.

What is WebRTC?
WebRTC (Web Real-Time Communication) is a set of browser APIs that enable peer-to-peer audio, video, and data connections directly between browsers. It is used by services like Google Meet, Discord, and many others.
How does WebRTC leak my IP?
WebRTC uses STUN (Session Traversal Utilities for NAT) servers to discover your IP addresses for establishing peer connections. These STUN requests happen outside the VPN tunnel, revealing your real public and local IP addresses to any website running WebRTC JavaScript.
Does a VPN prevent WebRTC leaks?
Not all VPNs prevent WebRTC leaks. The VPN must specifically block or route WebRTC STUN requests through the tunnel. MegaV VPN includes built-in WebRTC leak protection on all platforms.
Will disabling WebRTC break websites?
Disabling WebRTC may affect video calling services (Google Meet, Zoom web client, Discord in-browser). If you rely on these, use a VPN with WebRTC leak protection instead of disabling WebRTC entirely.
Can WebRTC leak my IPv6 address?
Yes. WebRTC can expose both your IPv4 and IPv6 addresses. If your VPN does not handle IPv6, your real IPv6 address may be leaked even when the IPv4 address is properly tunneled.
Is this test accurate on mobile?
Yes, this test works on mobile browsers that support WebRTC (Chrome, Firefox, Safari on iOS). However, some mobile browsers have limited WebRTC support, which may result in fewer IPs being detected.
WebRTC protection built-in

Block WebRTC leaks automatically

MegaV VPN prevents WebRTC from exposing your real IP. No browser extensions, no manual config — just connect and stay protected.