Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1231

WebRTC IP Leak

What is WebRTC IP Leak?

WebRTC IP LeakA browser-side leak in which WebRTC's STUN/ICE machinery exposes a user's real local and public IP addresses, even when a VPN or proxy is active.


WebRTC enables peer-to-peer audio, video, and data in the browser, and to set up direct connections it queries STUN servers and enumerates local network interfaces. A simple JavaScript snippet on any page can read the resulting ICE candidates and recover the user's real LAN address and public IP, bypassing VPN tunnels and HTTP proxies that hide TCP traffic. The leak was first widely reported in 2015 and remains a common deanonymization vector. Defences include disabling non-proxied UDP, using mDNS-anonymized ICE candidates (default in modern Chrome and Firefox), browser extensions that restrict WebRTC, or disabling WebRTC entirely for high-threat profiles.

Examples

  1. 01

    A site running RTCPeerConnection and reading ICE candidates to log the visitor's real public IP behind a VPN.

  2. 02

    An ad tag using WebRTC to enumerate internal LAN addresses for cross-device tracking.

Frequently asked questions

What is WebRTC IP Leak?

A browser-side leak in which WebRTC's STUN/ICE machinery exposes a user's real local and public IP addresses, even when a VPN or proxy is active. It belongs to the Privacy & Data Protection category of cybersecurity.

What does WebRTC IP Leak mean?

A browser-side leak in which WebRTC's STUN/ICE machinery exposes a user's real local and public IP addresses, even when a VPN or proxy is active.

How does WebRTC IP Leak work?

WebRTC enables peer-to-peer audio, video, and data in the browser, and to set up direct connections it queries STUN servers and enumerates local network interfaces. A simple JavaScript snippet on any page can read the resulting ICE candidates and recover the user's real LAN address and public IP, bypassing VPN tunnels and HTTP proxies that hide TCP traffic. The leak was first widely reported in 2015 and remains a common deanonymization vector. Defences include disabling non-proxied UDP, using mDNS-anonymized ICE candidates (default in modern Chrome and Firefox), browser extensions that restrict WebRTC, or disabling WebRTC entirely for high-threat profiles.

How do you defend against WebRTC IP Leak?

Defences for WebRTC IP Leak typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for WebRTC IP Leak?

Common alternative names include: WebRTC leak, STUN leak.

Related terms