WebRTC Leak Test

WebRTC’nin ek IP adresleri gösterip göstermediğini kontrol edin

WebRTC, tarayıcı ayarlarına bağlı olarak ek yerel veya genel IP adreslerini açığa çıkarabilir. Bu test tarayıcınızın tüm ICE candidate’larını kontrol eder.

WebRTC can reveal your real public or local IP through STUN even when the site traffic itself goes through a proxy or VPN. This test shows whether your browser is leaking the network identity you were trying to hide.

Nasıl çalışır

  1. 1The page asks your browser for ICE candidates the same way a real site would during a WebRTC call.
  2. 2We inspect the candidates for public, relay, host, and local interface addresses.
  3. 3If the browser exposes an address outside the expected proxy path, the tool flags it as a leak.
  4. 4You can then disable WebRTC, force relay, or switch browser profiles before using the proxy in production.

Neyi kontrol eder

  • Public IPs returned by STUN negotiation
  • Local LAN addresses such as 192.168.x.x or 10.x.x.x
  • Proxy or TURN relay behaviour versus direct browser exposure
  • Mismatch between the IP in the page request and the IP seen via WebRTC

Sık sorulan sorular

Do all proxies protect against WebRTC leaks?
No. Most proxies only handle HTTP or SOCKS traffic. WebRTC is a browser-level feature and can bypass that path unless you harden the browser itself.
Is a local IP leak dangerous?
A local IP does not reveal your street address, but it adds entropy to your fingerprint and proves the browser is exposing more network data than many anti-fraud systems expect.
What should I do if I see a leak?
Disable WebRTC, use a browser that supports proxy-safe WebRTC settings, or route calls through TURN-only mode inside an anti-detect profile.