What is My IP Logo

What is My IP?

Your guide to IP addresses, online privacy, and internet security

How to Check if Your IP Is Leaking via WebRTC

Updated: April 2026 Find Your IP

WebRTC is the technology that powers browser video calls (Google Meet, Discord, WhatsApp Web). It's useful — but by design it can reveal your real IP address to any website, bypassing your VPN. Here's how to test for a leak and shut it down.

Why WebRTC leaks your IP

To connect peers directly, WebRTC asks a STUN server "what's my IP from your perspective?" The answer comes back as a JavaScript variable the page can read. This happens before your VPN sees the traffic in some configurations, so even a connected VPN can fail to mask it.

How to test

Connect your VPN. Visit any WebRTC leak test site (browserleaks.com/webrtc is solid). Compare the IPs the page detects with your real IP from our IP checker (run without VPN first to know your real one). If the WebRTC page shows that real IP while VPN is connected, you're leaking.

Fix in Firefox

Visit about:config, search media.peerconnection.enabled, set it to false. This fully disables WebRTC. Video calls in Firefox will break — re-enable when you need them.

Fix in Chrome, Edge, Brave

These Chromium browsers don't have a direct toggle. Install WebRTC Network Limiter (Google's own extension) and set it to "Use my proxy server." Brave has a built-in setting: brave://settings/privacyWebRTC IP handling policyDisable non-proxied UDP.

Fix in Safari

Safari exposes fewer WebRTC leaks by default. For extra safety: Develop menuWebRTC → uncheck Enable Legacy WebRTC API. Enable the Develop menu first in Settings → Advanced.

Try it now

Curious what your IP is showing the world right now? Check your IP address & location instantly with our free tool — no signup, nothing stored. Or trace any other IP to see its geolocation, ISP, and network details.