VPN Leak Test

A VPN leak test is a tool that checks whether your real IP address is being exposed through WebRTC or other channels despite an active VPN connection.

The test works by triggering WebRTC STUN requests in your browser and comparing the discovered IP addresses against your publicly visible IP. If the two differ, your VPN is leaking. WebRTC is a browser API designed for peer-to-peer communication that can bypass VPN tunnels and reveal your true IP address to any website.

Frequently Asked Questions

What is a VPN leak?

A VPN leak occurs when your real IP address is exposed to websites despite an active VPN connection. The most common cause is WebRTC, a browser feature that can reveal your local and public IP even when all traffic is routed through a VPN tunnel.

What is a WebRTC leak?

WebRTC is a browser technology for real-time communication like video calls. It uses STUN servers to discover your network addresses, which can expose your real IP even when a VPN is active. Most browsers enable WebRTC by default.

How do I fix a VPN leak?

To fix a VPN leak: disable WebRTC in your browser settings or use an extension like uBlock Origin, switch to a VPN that has built-in WebRTC leak protection, or use a browser like Firefox where WebRTC can be fully disabled.

Does every VPN protect against WebRTC leaks?

No. Many VPNs do not block WebRTC by default. Premium VPNs like Mullvad and ProtonVPN include WebRTC leak protection, but most budget VPNs do not. Always test after connecting.

All tools

VPN Leak Test

Is your VPN actually working?

Your VPN might be connected and still leaking your real IP through WebRTC — a sneaky browser feature that bypasses tunnels. This test catches it in seconds.

Poking around your browser…

Hitting STUN servers, sit tight

So what's WebRTC? It's the browser tech behind video calls and file sharing — handy stuff. The problem: it talks directly to STUN servers to find your real IP, and it does this even when your VPN is running. Fix it by disabling WebRTC in your browser, or switch to a VPN that blocks it natively.