WebRTC (Web Real-Time Communication) is a browser API that enables video calls, voice chats, and peer-to-peer file sharing directly in the browser without plugins. To establish peer-to-peer connections, WebRTC needs to discover your IP addresses - and it does so in a way that can bypass your VPN, exposing your real IP.

How WebRTC Leaks Your IP

WebRTC uses a protocol called ICE (Interactive Connectivity Establishment) to find the best path between two peers. As part of this process, it collects all available IP addresses from your device, including your real public IP, even if traffic is routed through a VPN. Websites can query this data using JavaScript.

Which Browsers Are Affected

BrowserWebRTC Enabled by DefaultCan Be Disabled
ChromeYesVia extension
FirefoxYesVia about:config
EdgeYesVia extension
SafariYes (limited)Rarely leaks due to Apple's implementation
BraveYes (fingerprint-resistant)Has built-in WebRTC protection

How to Fix a WebRTC Leak

  • Firefox - Type about:config in the address bar, find media.peerconnection.enabled, and set it to false.
  • Chrome / Edge - Install a WebRTC blocking extension such as "WebRTC Leak Prevent" or "uBlock Origin" (which can also block WebRTC).
  • Brave - Go to Settings > Privacy > WebRTC IP handling policy > Select "Disable non-proxied UDP".
  • Use a VPN with built-in WebRTC protection - Some VPN clients patch the browser or OS to prevent WebRTC from exposing the real IP.

People Also Ask

What exactly is a WebRTC leak?
It is when your browser exposes your real IP address through the WebRTC API while you are connected to a VPN, because WebRTC bypasses the VPN tunnel for peer-to-peer communication.
How to fix WebRTC IP leakage?
Disable WebRTC in your browser settings (Firefox) or install a blocking extension (Chrome/Edge). Test the fix with our VPN Leak Test.

Related: DNS leaks | VPN leaks | Test your VPN