WebRTC Leak Test
Check if WebRTC reveals local/public IP addresses through ICE candidates.
No scan yet
0
Public IPv4
0
Private / Local
0
mDNS Obfuscated
Run the test to collect WebRTC candidates.
About This Tool
WebRTC Leak Test inspects ICE candidate strings produced by your browser and highlights possible address exposure categories. It is useful when validating VPN, proxy, or privacy browser setup.
Frequently Asked Questions
Does a detected local IP always mean a leak?
Not always. Local candidates can appear in normal ICE gathering, but they can still matter in privacy threat models.
Why do I only see .local addresses?
Many browsers use mDNS hostnames to reduce direct local IP exposure in ICE candidates.
Is the scan remote?
No. Candidate parsing and reporting run locally in your browser. Only standard STUN signaling is used by WebRTC itself.
Related Tools
Workflow Links
Suggested step-by-step tools based on this page intent.
Before This Tool
Next Step Tools