Home / WhenIP Academy / How to use WhenIP WebRTC Check
WhenIP Academy

How to use WhenIP WebRTC Check

The WebRTC check runs in your browser and gathers ICE candidates. It is most useful when comparing direct, VPN, and browser privacy states.

Guide3 min readTry a WhenIP tool
What you'll learn
  • What the candidates mean.
  • How to compare results before and after a VPN.
  • When a result is interesting versus expected.

Run it in a clean browser first

Start without a VPN or privacy relay so you know the baseline behavior.

Compare with a VPN enabled

Run the tool again after enabling the VPN or relay.

Look for changes in public, local, or relay candidate exposure.

Interpret the result

A candidate list is not automatically a major leak.

The question is whether it reveals something you expected to stay hidden.

What to try next

Compare browsers and extensions.

Use the main IP page and header checks to understand what the site sees through normal requests.

Mini FAQ
Does this tool contact an outside STUN service?

The current implementation uses local ICE gathering with no external ICE server list.

Why do no candidates appear?

The browser, network policy, or current implementation may not expose any candidates.

Last updated: March 29, 2026