Help Center
My IP is being leaked by WebRTC. How do I disable it?
WebRTC (Web Real-Time Communication) is an API drafted by the W3C that supports browser-to-browser applications for voice calling, video chat, and P2P file sharing (without the need of either internal or external plugins). WebRTC implements STUN (Session Traversal Utilities for Nat), a protocol that allows the discovery of your externally assigned IP address (to facilitate the applications above).
Due to the way in which Windows selects the adapter when sending traffic (source IP address selection), the request to the STUN server may leak outside of the VPN and expose your ISP issued IP address. However, if you are using a VPN firewall, such as the IVPN Firewall available in our apps, then these leaks will be blocked.
However, it is still possible for the site to identify your internally assigned IP addresses as these are detected by the browser locally using JavaScript. Please follow the instructions below to disable WebRTC.
To test whether you are vulnerable please visit this demo page.
Mozilla Firefox
-
Type
about:config
in the address bar. -
Scroll down to
media.peerconnection.enabled
, double click to set it tofalse
.
Internet Explorer
No action is necessary.
Google Chrome (Android only)
-
In your Chrome address bar type
chrome://flags/#disable-webrtc
and hit Enter -
WebRTC Stun origin
header should be set to Enabled -
Restart your Chrome browser for changes to take effect.
Related Articles
- AntiTracker Plus Lists Explained
- Do you allow P2P / BitTorrent / torrents downloading?
- How much does IVPN cost?
- Do you offer dedicated or static IP addresses?
- Split Tunnel FAQ
Still have questions?
Get in touch and we'll get back to you in a few hours.
Contact supportInterested in privacy?
Read our latest privacy news and keep up-to-date on IVPN services.
Visit IVPN Blog