How to use WhenIP WebRTC Check
The WebRTC check runs in your browser and gathers ICE candidates. It is most useful when comparing direct, VPN, and browser privacy states.
- What the candidates mean.
- How to compare results before and after a VPN.
- When a result is interesting versus expected.
Run it in a clean browser first
Start without a VPN or privacy relay so you know the baseline behavior.
Compare with a VPN enabled
Run the tool again after enabling the VPN or relay.
Look for changes in public, local, or relay candidate exposure.
Interpret the result
A candidate list is not automatically a major leak.
The question is whether it reveals something you expected to stay hidden.
What to try next
Compare browsers and extensions.
Use the main IP page and header checks to understand what the site sees through normal requests.
Does this tool contact an outside STUN service?
The current implementation uses local ICE gathering with no external ICE server list.
Why do no candidates appear?
The browser, network policy, or current implementation may not expose any candidates.
Last updated: March 29, 2026