WebRTC is used by video calls, but any website can silently ask your browser for ICE candidates β which may expose your real IP even when you're on a VPN. This test runs 100% in your browser.
We create an RTCPeerConnection in your browser and ask it to gather ICE candidates using public STUN servers
(Google and Cloudflare). Each candidate tells us a potential path for peer-to-peer connectivity β and potentially your real IP.
media.peerconnection.enabled to false in about:config (breaks video calls).Is the test sending data to your server?
No. The test runs entirely in your browser and only talks to public STUN servers (Google, Cloudflare). We don't receive any of the candidate data.
I see only .local addresses. Am I safe?
Mostly yes. Modern browsers mask local IPs behind mDNS hostnames by default. If no srflx (public) candidate appears,
your VPN or browser is successfully preventing WebRTC leaks.
What if nothing shows up at all?
WebRTC may be disabled in your browser or your network may block UDP to STUN servers (common on corporate Wi-Fi).