~/tools/webrtc-detector
READY
Test whether WebRTC is exposing your real IP address. If you use a VPN, this tool reveals if WebRTC is leaking your actual local and public IPs through STUN/TURN requests.
┤ OUTPUT ├
[INIT] webrtc-detector v1.0.0 loaded
[INFO] All processing runs in your browser
[INFO] No data is transmitted to any server
┤ VERDICT ├
┤ WEBRTC SUPPORT ├
┤ IP ADDRESSES DETECTED ├
┤ RAW ICE CANDIDATES ├
Technical details — what trackers see
What is a WebRTC leak?
WebRTC (Web Real-Time Communication) enables browsers to make peer-to-peer connections for video calls, file sharing, etc. To establish these connections, your browser sends STUN requests that can reveal your real IP address — even when you're using a VPN.
Why does this matter?
If you use a VPN for privacy, a WebRTC leak undermines its protection by exposing your actual local network IP and sometimes your real public IP. Websites can silently extract these IPs without your permission using simple JavaScript.