WebRTC泄漏测试

检查WebRTC是否暴露了您的真实IP地址,即使在使用VPN或代理时。

正在探测WebRTC接口...

How This Test Works

WebRTC (Web Real-Time Communication) is a browser technology that enables video calls, voice chat, and peer-to-peer file sharing directly in your browser — no plugins needed.

To establish peer-to-peer connections, WebRTC needs to discover your IP addresses — both your public IP (assigned by your ISP) and local/private IPs (your device's address on your local network).

This test creates a WebRTC connection to Google's STUN server and captures all IP addresses that WebRTC reveals. If any of these IPs differ from your VPN's IP, you have a WebRTC leak.

Why WebRTC Leaks Are Dangerous

WebRTC leaks are particularly dangerous because they bypass VPN encryption entirely. Even with a perfectly configured VPN:

  • Any website can silently request your real IP via JavaScript
  • Your local network IP (e.g., 192.168.x.x) can reveal your router setup
  • The leak happens without any visible indication to the user
  • It works on all major browsers — Chrome, Firefox, Edge, Safari

Unlike DNS leaks which expose browsing history, WebRTC leaks directly expose your real IP address — the most sensitive piece of network identity.

How to Prevent WebRTC Leaks

Firefox: Type about:config in the address bar, search for media.peerconnection.enabled, and set it to false.

Chrome: Install a WebRTC blocking extension like "WebRTC Leak Prevent" or use a VPN with built-in WebRTC protection.

Brave: Go to Settings → Privacy and Security → WebRTC IP Handling Policy → choose "Disable non-proxied UDP".

Also check your DNS leak status and browser fingerprint for a complete privacy audit.

FAQ

什么是WebRTC泄漏?

WebRTC(Web实时通信)是浏览器的视频/音频通话功能。它可能绕过VPN保护,向网站暴露您的真实IP地址。

如何防止WebRTC泄漏?

使用带WebRTC泄漏保护的VPN,或在浏览器中禁用WebRTC。Firefox:在about:config中将media.peerconnection.enabled设为false。

我的VPN能防止WebRTC泄漏吗?

并非所有VPN都能防止WebRTC泄漏。一些VPN内置了保护功能,另一些则需要您手动禁用WebRTC。