PB
Available
arrow_back Back to Blog

How to Fix WebRTC IP Leak When Using a VPN in Chrome

PB

Patrick Bushe

March 26, 2026 · 5 min read

You paid for a VPN to hide your real IP address. You connected to a server in another country. You checked an IP lookup site and confirmed your IP is masked. Everything looks good, right?

Not necessarily. There's a browser feature called WebRTC that can leak your real IP address to any website you visit, completely bypassing your VPN. And most VPN users have no idea it's happening.

What Is WebRTC and Why Does It Leak Your IP

WebRTC stands for Web Real-Time Communication. It's a browser technology that enables peer-to-peer connections for video calls, voice calls, and file sharing directly in the browser. Google Meet, Zoom's web client, Discord, and many other services rely on WebRTC.

The problem is how WebRTC establishes connections. To create a direct peer-to-peer link, WebRTC needs to discover all of your network interfaces — including your real local IP address and your public IP address. It does this through a protocol called STUN, which queries a server to determine your public IP.

This STUN request bypasses your VPN tunnel. The result: any website running a simple JavaScript snippet can discover your real IP address even when your VPN is active.

How to Test If You're Leaking

Go to BrowserLeaks.com/webrtc while connected to your VPN. If you see your real IP address listed under "Public IP Address" or "Local IP Address," you have a WebRTC leak. The page will show multiple IP addresses — your VPN's IP and potentially your real one.

You can also check ipleak.net, which shows WebRTC detection results alongside your visible IP address. If the WebRTC section shows a different IP than your VPN IP, you're leaking.

The Nuclear Option — Disabling WebRTC Entirely

You can completely disable WebRTC in Chrome by going to chrome://flags and searching for WebRTC. But this breaks every video calling service that uses WebRTC in the browser — Google Meet, Zoom web client, Discord web, and many others. For most people, this isn't a viable solution.

Firefox users can set media.peerconnection.enabled to false in about:config, but Chrome doesn't offer an equivalent simple toggle.

The Better Fix — WebRTC Privacy Shield

WebRTC Privacy Shield takes a smarter approach. Instead of disabling WebRTC entirely, it controls how WebRTC discovers your IP addresses. It prevents WebRTC from accessing your real network interfaces while still allowing WebRTC connections to function through your VPN tunnel.

This means your video calls still work — they just route through your VPN like everything else. Websites can no longer use WebRTC STUN requests to discover your real IP behind the VPN.

After installing, go back to BrowserLeaks.com/webrtc and test again. You should see only your VPN's IP address, with no real IP leaking through WebRTC.

Who Needs This

Anyone using a VPN for privacy needs WebRTC leak protection. This is especially important for journalists protecting sources, activists in restrictive countries, remote workers accessing geo-restricted resources, and anyone who considers IP privacy important enough to pay for a VPN in the first place. If your VPN is worth using, it's worth plugging the WebRTC hole.

More Tools by Patrick Bushe

Free Chrome extensions to boost your productivity and privacy