Is your browser leaking your real IP?
WebRTC is a browser feature used by video calls and screen-shares. It also reveals network addresses that can bypass a VPN if your browser doesn't have leak protection turned on. This page checks what your browser exposes.
How this test works: we create an RTCPeerConnection in your browser and ask it to gather ICE candidates — the network endpoints a video-call peer would use to reach you. The browser dumps these candidates into the page. We parse them and compare any public IPv4/IPv6 addresses against the public IP your server sees. If they don't match, your browser is exposing a route that bypasses whatever's in front of you.
If you see a leak: a VPN alone doesn't fix WebRTC leaks. You need either a privacy-focused browser (Brave and Tor handle this), a browser extension that blocks WebRTC peer connections (uBlock Origin → Settings → "Prevent WebRTC from leaking local IP addresses"), or both. See our recommended privacy browsers.
Modern browsers often mask local IPs with mDNS hashes (those long .local strings). That's normal and means your browser has a privacy guard turned on for the local network. Public-IP leakage is the actual concern.