WebRTC can expose your real IP address even when you're connected to a VPN. Test if your browser is leaking your true location.
Click the button below to check for WebRTC leaks.
We'll probe your browser's WebRTC interfaces for exposed IP addresses.
WebRTC (Web Real-Time Communication) is a browser technology for peer-to-peer video calls, voice chat, and file sharing. It requires discovering your network interfaces to establish connections.
WebRTC uses STUN servers to discover your public IP. Even behind a VPN, browsers may expose your real IP through ICE candidate gathering, bypassing the VPN tunnel entirely.
AkcaVPN's WireGuard implementation prevents WebRTC from discovering your real IP. All network interfaces route through the encrypted tunnel, blocking IP leaks at the system level.
Navigate to about:config in your address bar, search for media.peerconnection.enabled and set it to false. This completely disables WebRTC.
Install a WebRTC blocking extension like "WebRTC Leak Prevent" or use AkcaVPN which handles this at the network level. Chrome does not allow disabling WebRTC natively.
Go to Safari Preferences, Advanced tab, enable "Show Develop menu." Then in the Develop menu, under "WebRTC," uncheck "Enable Legacy WebRTC API."
A properly configured VPN like AkcaVPN ensures all traffic, including WebRTC ICE candidates, routes through the encrypted tunnel. No browser configuration needed.