WebRTC泄漏测试
检查WebRTC是否暴露了您的真实IP地址,即使在使用VPN或代理时。
正在探测WebRTC接口...
How This Test Works
WebRTC (Web Real-Time Communication) is a browser technology that enables video calls, voice chat, and peer-to-peer file sharing directly in your browser — no plugins needed.
To establish peer-to-peer connections, WebRTC needs to discover your IP addresses — both your public IP (assigned by your ISP) and local/private IPs (your device's address on your local network).
This test creates a WebRTC connection to Google's STUN server and captures all IP addresses that WebRTC reveals. If any of these IPs differ from your VPN's IP, you have a WebRTC leak.
Why WebRTC Leaks Are Dangerous
WebRTC leaks are particularly dangerous because they bypass VPN encryption entirely. Even with a perfectly configured VPN:
- Any website can silently request your real IP via JavaScript
- Your local network IP (e.g., 192.168.x.x) can reveal your router setup
- The leak happens without any visible indication to the user
- It works on all major browsers — Chrome, Firefox, Edge, Safari
Unlike DNS leaks which expose browsing history, WebRTC leaks directly expose your real IP address — the most sensitive piece of network identity.
How to Prevent WebRTC Leaks
Firefox: Type about:config in the address bar, search for media.peerconnection.enabled, and set it to false.
Chrome: Install a WebRTC blocking extension like "WebRTC Leak Prevent" or use a VPN with built-in WebRTC protection.
Brave: Go to Settings → Privacy and Security → WebRTC IP Handling Policy → choose "Disable non-proxied UDP".
Also check your DNS leak status and browser fingerprint for a complete privacy audit.
FAQ
什么是WebRTC泄漏?
WebRTC(Web实时通信)是浏览器的视频/音频通话功能。它可能绕过VPN保护,向网站暴露您的真实IP地址。
如何防止WebRTC泄漏?
使用带WebRTC泄漏保护的VPN,或在浏览器中禁用WebRTC。Firefox:在about:config中将media.peerconnection.enabled设为false。
我的VPN能防止WebRTC泄漏吗?
并非所有VPN都能防止WebRTC泄漏。一些VPN内置了保护功能,另一些则需要您手动禁用WebRTC。