You have set up a proxy, checked the IP address — everything works. But after a few days, your Facebook Ads or Instagram accounts get banned. The reason often lies in a WebRTC leak — a technology that reveals your real IP address even when using a proxy. In this guide, we will discuss what WebRTC is, why it is dangerous for arbitrageurs and SMM specialists, and how to properly disable it in various browsers and anti-detect solutions.
What is WebRTC and Why Does It Reveal Your Real IP
WebRTC (Web Real-Time Communication) is a technology built into modern browsers to enable video and audio communication directly in the browser without the need for additional software. It is used by Zoom, Google Meet, Discord, and other services for calls. The problem is that WebRTC bypasses the proxy server and directly requests information about your network connection.
When you open a website that supports WebRTC, the browser automatically sends requests to STUN servers (Session Traversal Utilities for NAT), which return information about all your network interfaces: the real IP address from your provider, the local IP in your home network, and the IPv6 address. This information is accessible to any website through JavaScript — even if you are using a proxy or VPN.
Real Case: An arbitrageur set up 15 Facebook Ads accounts in Dolphin Anty, each with a separate residential proxy from the USA. After a week, all accounts were banned with the reason "suspicious activity." The cause was that WebRTC revealed his real Ukrainian IP, and Facebook saw that all "American" accounts were actually logging in from Kyiv.
What Information Does WebRTC Reveal
| Data Type | What the Site Sees | Risk for Multi-Accounting |
|---|---|---|
| Public IP | Your real IP address from the provider (e.g., 95.123.45.67) | Critical — Facebook and Instagram immediately see the spoof |
| Local IP | IP in your home network (192.168.x.x or 10.0.x.x) | Medium — can be used for fingerprinting |
| IPv6 Address | Unique IPv6 from your provider | Critical — often forgotten to disable IPv6 |
| Connection Type | Information about network interfaces (Wi-Fi, Ethernet) | Low — but adds uniqueness to the fingerprint |
For arbitrageurs working with Facebook Ads and TikTok Ads, a WebRTC leak is a direct path to a chain ban. Anti-fraud algorithms analyze discrepancies: if the ad account shows an IP from Los Angeles (via proxy), but WebRTC reveals a Moscow IP — this is an instant red flag. SMM specialists managing client accounts on Instagram risk losing all profiles due to one unclosed leak.
How to Check for WebRTC Leaks: 3 Testing Methods
Before setting up protection, you need to ensure that the problem actually exists. Even if you are sure that WebRTC is disabled — check. Anti-detect browsers sometimes reset settings after updates, and extensions can conflict with each other.
Method 1: Online Services for Checking
The simplest method is to use specialized websites that automatically test for WebRTC leaks:
- BrowserLeaks.com/webrtc — shows all IP addresses that the site sees through WebRTC. Open the page with the proxy enabled and check the "Public IP Address" section. If your real IP is listed there instead of the proxy server's IP — there is a leak.
- IPLeak.net — comprehensive check for all types of leaks: WebRTC, DNS, IPv6. Convenient as it shows results on one page. Pay attention to the "WebRTC Detection" section — your real IP should not be there.
- WhatIsMyIPAddress.com/webrtc-test — a simple test with an understandable interface. Shows which IP addresses are revealed through WebRTC and provides recommendations for fixing the leak.
Step-by-step guide for checking:
- Connect the proxy in the browser or anti-detect solution
- Open an IP checking site (e.g., 2ip.ru) and note the proxy server's IP
- Go to BrowserLeaks.com/webrtc
- Compare IP addresses: if a different IP (not the proxy) is listed in the "Public IP" section — WebRTC reveals your real address
- Also check the "Local IPs" section — your home IP of the form 192.168.x.x should not be there
Method 2: Browser Developer Console
For a more technical check, you can use the browser console. This method is suitable if online services are unavailable or if you want to automate the check:
// Open the console (F12 → Console) and paste the code:
var rtc = new RTCPeerConnection({iceServers:[]});
rtc.createDataChannel('');
rtc.createOffer().then(offer => rtc.setLocalDescription(offer));
rtc.onicecandidate = function(event) {
if (event.candidate) {
console.log('WebRTC IP:', event.candidate.candidate);
}
};
This JavaScript code creates a WebRTC connection and outputs all detected IP addresses to the console. If you see your real IP — it means WebRTC is not blocked. The result should show only the proxy server's IP or not return public addresses at all.
Method 3: Browser Extensions
Some extensions not only block WebRTC but also show the protection status in real-time. For example, "WebRTC Leak Shield" for Chrome displays an icon in the toolbar: green — protection is active, red — a leak has been detected. This is convenient for a quick check before starting work with ad accounts.
Disabling WebRTC in Google Chrome and Chromium Browsers
Google Chrome does not provide a built-in setting to completely disable WebRTC — Google actively uses this technology in its services (Meet, Hangouts). However, there are several effective ways to block IP leaks through WebRTC in Chrome and browsers based on it (Opera, Brave, Edge).
Method 1: WebRTC Leak Prevent Extension
An official extension from Chrome developers, available in the Chrome Web Store. It does not completely disable WebRTC but blocks the disclosure of local and public IP addresses:
- Open the Chrome Web Store and search for "WebRTC Leak Prevent"
- Click "Add to Chrome" and confirm the installation
- After installation, right-click on the extension icon → "Options"
- Select the mode "Disable non-proxied UDP (force proxy)" — this will force WebRTC to work only through the proxy
- Restart the browser and check for leaks at BrowserLeaks.com/webrtc
Important point: the extension works only if the proxy is set up system-wide or through a proxy extension. If you are using residential proxies in an anti-detect browser, ensure that the profile settings correctly specify the proxy.
Method 2: uBlock Origin Extension with Filters
uBlock Origin is a powerful ad blocker that can also disable WebRTC:
- Install uBlock Origin from the Chrome Web Store
- Click on the extension icon → gear icon (settings)
- Go to the "Settings" tab
- Find the "Privacy" section and check "Prevent WebRTC from leaking local IP addresses"
- Save changes — WebRTC will be blocked
The advantage of this method is that uBlock Origin also blocks trackers and ads, further reducing the risk of fingerprinting. Many arbitrageurs use this extension as basic protection when working with Facebook Ads.
Method 3: Launching Chrome with a Command Line Flag
To completely disable WebRTC, you can launch Chrome with a special parameter. This method is suitable for advanced users:
// Windows (create a Chrome shortcut with the parameter):
"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-webrtc
// macOS (launch via terminal):
/Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --disable-webrtc
// Linux:
google-chrome --disable-webrtc
The downside of this method is that you will not be able to use video calls and other services that require WebRTC. Therefore, for everyday work, it is better to use extensions that can be quickly enabled/disabled.
Important: Some old instructions recommend using the flag --enforce-webrtc-ip-permission-check, but it is outdated and does not work in modern versions of Chrome (starting from version 48+). Use only current methods.
How to Hide WebRTC in Mozilla Firefox
Firefox provides built-in settings for controlling WebRTC — this is one reason why many security specialists prefer this browser. Disabling WebRTC in Firefox does not require installing extensions and is done through hidden configuration options.
Method 1: Through about:config (Complete Disable)
This is the most reliable method that completely blocks WebRTC at the browser level:
- Open a new tab and enter in the address bar:
about:config - Click "Accept the Risk and Continue" (don't worry, it's safe)
- In the search field, enter:
media.peerconnection.enabled - Find the parameter in the list and double-click on it — the value will change from
truetofalse - Restart Firefox to apply the changes
After this, WebRTC will be completely disabled. Check the result at BrowserLeaks.com/webrtc — you should see the message "WebRTC is not supported" or empty fields in the IP addresses section.
Method 2: Partial Disable (Only IP Leaks)
If you need to keep WebRTC working for video calls but block IP address leaks, use softer settings:
- Open
about:config - Find the parameter:
media.peerconnection.ice.default_address_only - Change the value to
true(double-click) - Find:
media.peerconnection.ice.no_host - Change the value to
true
These parameters block the disclosure of local IP addresses but keep WebRTC functional. This is a compromise option if you occasionally use video communication but want to protect against leaks when working with proxies.
Method 3: Disable WebRTC Extension
For those who prefer a graphical interface, there is the "Disable WebRTC" extension in the Firefox add-ons store. It adds a button to the toolbar for quickly enabling/disabling WebRTC with one click. Convenient if you need to switch between modes — for example, using WebRTC for calls and then disabling it for working with multi-accounts on Instagram.
Configuring WebRTC in Anti-Detect Browsers: Dolphin Anty, AdsPower, Multilogin
Anti-detect browsers are specifically designed for multi-accounting and already have built-in mechanisms to protect against WebRTC leaks. However, the default settings are not always optimal, and it is important to configure them correctly for each profile. Let's look at configuring WebRTC in popular solutions used by arbitrageurs and SMM specialists.
Dolphin Anty: WebRTC Configuration for Profiles
Dolphin Anty is one of the most popular anti-detect browsers among arbitrageurs working with Facebook Ads and TikTok Ads. It offers three modes of WebRTC operation:
- Open Dolphin Anty and go to the profile settings (create a new one or edit an existing one)
- Find the "WebRTC" section in the fingerprint settings
- Choose one of the modes:
- Disabled — complete disabling of WebRTC. The safest option, but some sites may not work correctly
- Altered — spoofing the IP to the proxy server's address. Recommended for most tasks
- Real — shows the real IP. Use only if working without a proxy
- For working with mobile proxies, choose the "Altered" mode
- Make sure that the proxy server is specified in the profile settings — WebRTC will spoof the IP to the proxy address
Tip from a Practitioner: When creating profiles for Facebook Ads in Dolphin Anty, always use the "Altered" mode + quality residential proxies. The "Disabled" mode may raise suspicions in Facebook's anti-fraud systems, as the absence of WebRTC is an anomaly for a regular user. Spoofing the IP through "Altered" looks more natural.
AdsPower: Advanced WebRTC Settings
AdsPower offers more detailed control over WebRTC and allows configuring behavior for each profile separately:
- Create or open a profile in AdsPower
- Go to the "Quick Settings" → "WebRTC" section
- The following options are available:
- Proxy — WebRTC shows the proxy server's IP (recommended)
- Disabled — WebRTC is completely disabled
- Real — shows the real IP (do not use with proxies!)
- Custom — allows you to manually specify the IP that WebRTC will show
- For multi-accounting on Instagram, choose "Proxy" — this will ensure fingerprint consistency
- In the "Advanced Settings" section, you can configure additional parameters: blocking local IPs, disabling IPv6
The "Custom" option is useful in rare cases when you need to show a specific IP different from the proxy. For example, if you are using a proxy chain or working through a VPN + proxy. But for standard arbitrage and SMM tasks, the "Proxy" mode is sufficient.
Multilogin: Professional Setup for Teams
Multilogin is a premium solution used by large arbitrage teams and agencies. WebRTC configuration here is more flexible:
- Open a profile in Multilogin (Mimic or Stealthfox)
- In the "Network" section, find the WebRTC settings
- Multilogin offers modes:
- Block — complete blocking of WebRTC
- Substitute — spoofing to the proxy IP (recommended for most tasks)
- Off — WebRTC operates unchanged (only for work without a proxy)
- For working with ad accounts, choose "Substitute"
- Multilogin automatically synchronizes WebRTC settings with the type of proxy specified in the profile
An important feature of Multilogin is that it supports automatic leak checks when creating a profile. After configuring the proxy and WebRTC, the system automatically tests the profile for leaks and warns if problems are detected. This saves time and reduces the risk of errors when creating profiles in bulk.
GoLogin and Octo Browser: Quick Setup
GoLogin and Octo Browser also have built-in protection against WebRTC leaks. The setup is similar to Dolphin Anty:
- In the profile settings, find the "WebRTC" section
- Choose the "Altered" or "Substitute" mode (names may vary)
- Ensure that the proxy is set up correctly — WebRTC will show its IP
- After creating the profile, check for leaks at BrowserLeaks before starting work
| Browser | Recommended WebRTC Mode | Note |
|---|---|---|
| Dolphin Anty | Altered | Optimal for Facebook Ads and TikTok |
| AdsPower | Proxy | Good for Instagram and e-commerce |
| Multilogin | Substitute | Automatic leak check |
| GoLogin | Altered | Simple setup for beginners |
| Octo Browser | Substitute | Flexible settings for teams |
Protecting Against WebRTC Leaks on Mobile Devices
Mobile devices are also susceptible to WebRTC leaks, especially when working through mobile proxies. SMM specialists managing Instagram accounts from phones and arbitrageurs testing creatives for TikTok Ads on real devices must protect WebRTC on mobile platforms.
Android: Browser Configuration
On Android, built-in protection against WebRTC leaks is absent in most browsers. Here are working solutions:
- Firefox for Android: Supports the same about:config settings as the desktop version. Open Firefox → enter about:config in the address bar → find media.peerconnection.enabled → change to false. This will completely disable WebRTC.
- Brave Browser: Has built-in protection against WebRTC leaks. Open settings → Privacy and security → WebRTC IP handling policy → select "Disable non-proxied UDP". Brave automatically blocks the disclosure of local IP.
- Chrome for Android: Does not support extensions, so protection against WebRTC is only possible through VPN applications with WebRTC blocking features or by using alternative browsers.
iOS and Safari: Limited Options
iOS and Safari have stricter limitations, and completely disabling WebRTC without jailbreaking is nearly impossible. However, there are workarounds:
- Using VPN with WebRTC Blocking: Some VPN applications for iOS (e.g., NordVPN, ExpressVPN) have a "Block WebRTC leaks" feature. This does not completely disable WebRTC but prevents the disclosure of the real IP.
- Alternative Browsers: Firefox Focus for iOS blocks many trackers but does not completely disable WebRTC. Brave for iOS has better protection — use it for working with proxies on iPhone.
- Limiting Access to Camera and Microphone: In iOS settings → Safari → Camera and Microphone select "Deny". This does not completely block WebRTC but limits its capabilities.
Important for iOS: Safari in iOS 14.3+ has built-in protection against some types of fingerprinting, including partial protection against WebRTC leaks. However, it should not be relied upon alone — always check for leaks before working with important accounts.
Mobile Anti-Detect Solutions
For professional work with mobile Instagram and TikTok accounts, use specialized solutions:
- Farm Phones with Custom Firmware: Some arbitrageurs use Android devices with modified firmware where WebRTC is disabled at the system level. This requires technical skills but provides maximum protection.
- Cloud Android Emulators: Services like Genymotion Cloud allow running Android in the cloud with full control over settings, including WebRTC. Convenient for mass account management.
Advanced Settings: Spoofing Local IP via WebRTC
For experienced users who want maximum control over fingerprinting, there are methods not just to disable WebRTC but to spoof local IP addresses. This creates a more realistic fingerprint, as the complete absence of local IPs may look suspicious to anti-fraud systems.
Generating Fake Local IPs
Some anti-detect browsers (e.g., Multilogin and Incogniton) allow you to not completely disable WebRTC but to generate random local IP addresses for each profile. It works as follows:
- WebRTC remains active, which looks natural for websites
- The public IP is spoofed to the proxy server's address
- The local IP is randomly generated (e.g., 192.168.45.123) and remains constant for this profile
- Each profile has a unique local IP, which reduces the risk of account linking
This method is especially effective when working with Facebook Ads, as Meta's algorithms analyze not only public IPs but also patterns of local addresses. If all your accounts show the same local IP (e.g., the standard 192.168.1.1), this can signal anti-fraud systems.
Configuring STUN/TURN Servers
WebRTC uses STUN servers to determine the public IP. Advanced users can set up their own STUN servers or use alternatives:
// Example of configuring custom STUN servers via JavaScript:
var configuration = {
iceServers: [
{urls: 'stun:your-custom-stun-server.com:3478'},
{urls: 'turn:your-turn-server.com:3478', username: 'user', credential: 'pass'}
]
};
var pc = new RTCPeerConnection(configuration);
This method requires technical knowledge and your own infrastructure but gives complete control over what information websites see through WebRTC. Large arbitrage teams sometimes deploy their own STUN/TURN servers for additional security.
Scripts for Automatic WebRTC Leak Checking
If you manage dozens of profiles, manually checking each for WebRTC leaks takes a lot of time. Use automation:
// Python script for checking WebRTC leak via Selenium:
from selenium import webdriver
from selenium.webdriver.chrome.options import Options
options = Options()
options.add_argument('--proxy-server=your-proxy-here')
driver = webdriver.Chrome(options=options)
driver.get('https://browserleaks.com/webrtc')
# Parsing results and checking for leaks
# If a real IP is detected — send a notification
Such scripts can be integrated into the profile creation process — automatically checking each new profile for leaks before launching advertising campaigns.
Common Mistakes When Disabling WebRTC and How to Avoid Them
Even with proper WebRTC protection settings, mistakes can occur that lead to the leak of your real IP. Here are the most common issues faced by arbitrageurs and SMM specialists:
Mistake 1: Forgot to Disable IPv6
WebRTC can reveal the IPv6 address even if the IPv4 is protected by a proxy. Many providers issue unique IPv6 addresses that directly identify your connection. Solution:
- Windows: Control Panel → Network and Internet → Network and Sharing Center → Change adapter settings → Connection properties → uncheck "Internet Protocol Version 6 (TCP/IPv6)"
- macOS: System Preferences → Network → Advanced → TCP/IP → Configure IPv6: Off
- In anti-detect browsers: Check that IPv6 is disabled or spoofed in the profile settings
Mistake 2: Extensions Conflict with Each Other
If you are using multiple extensions to block WebRTC (e.g., WebRTC Leak Prevent + uBlock Origin), they may conflict and create vulnerabilities. Solution: use only one extension to control WebRTC. Check the list of installed extensions and disable duplicates.
Mistake 3: Did Not Check Settings After Browser Update
Anti-detect browsers are regularly updated, and sometimes updates reset WebRTC settings to default values. After each update of Dolphin Anty, AdsPower, or other solutions, check the WebRTC settings in the profiles. Create a checklist:
- Update the anti-detect browser
- Open a test profile
- Check the WebRTC settings (should be Altered/Proxy mode)
- Test at BrowserLeaks.com/webrtc
- If everything is OK — continue working, if not — fix the settings in all profiles
Mistake 4: Using Poor Quality Proxies
Even with properly configured WebRTC, a leak can occur if the proxy server does not support UDP traffic (which WebRTC uses) or has routing issues. When choosing proxies for multi-accounting, pay attention to:
- Support for SOCKS5 protocols (better supports WebRTC than HTTP)
- Availability of UDP support in the proxy plan
- Quality of IP addresses (residential or mobile are preferable for social networks)
For working with Facebook Ads and Instagram, we recommend using residential proxies with SOCKS5 support — they ensure correct WebRTC operation and minimal risk of bans.
Mistake 5: Completely Disabling WebRTC Everywhere
Paradoxically, completely disabling WebRTC can be a mistake. Modern anti-fraud systems analyze the fingerprint as a whole, and the absence of WebRTC (which 99% of regular users have) can signal suspicious activity. Recommendation: use the spoofing mode (Altered/Substitute) instead of complete disabling.