WebRTC is the technology that powers in-browser video calls. To negotiate the call, your browser gathers every IP it can reach the peer from — including, sometimes, your real public IP behind a VPN. The test below runs entirely in your browser. Nothing is sent to IPFerret servers.
Live probe
Press the button to ask your browser which "ICE candidates" it would advertise on a peer connection. If you see an address that's different from your VPN exit, something is leaking.
How to stop WebRTC from leaking
- Use a browser extension like uBlock Origin's WebRTC IP leak prevention.
- In Brave, set "WebRTC IP handling policy" to "Disable non-proxied UDP".
- In Firefox, set
media.peerconnection.enabledto false inabout:configif you don't need video calls. - Use a VPN client that explicitly handles WebRTC (most consumer VPNs now do).
Curious about DNS leaks too? See the DNS leak test.
