Browser Compatibility
If your browser suppresses WebRTC or masks local addresses with mDNS hostnames, this page will show that directly.
This page targets webrtc leak test, webrtc leaktest, and related local IP exposure queries. It gathers ICE candidates in your browser and shows whether direct local IPs, mDNS hostnames, relay paths, or public candidates are visible.
The earlier mirrored page relied on a large external lookup setup. This rewritten version focuses on the direct browser evidence instead, which is lighter, more transparent, and easier to maintain across browsers.
If your browser suppresses WebRTC or masks local addresses with mDNS hostnames, this page will show that directly.
192.168.x.x, 10.x.x.x, or 172.16-31.x.x..local, which often means the browser is masking direct local IPs.| Address | Protocol | Type | Foundation |
|---|---|---|---|
| No ICE candidates yet. | |||
Waiting for test.
That usually means the browser is masking direct local IP exposure with mDNS hostnames. It is generally a better privacy outcome than showing the private IP directly.
It means the browser exposed local network details directly in ICE candidates. That is the classic WebRTC local IP leak behavior many users are trying to test for.
The legacy mirror depended on a very large lookup dataset. The rewrite focuses on the direct ICE evidence the browser already gives you, which is enough for the core leak-test question and is much more practical to ship.