Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <!DOCTYPE html>
- <html>
- <head>
- <title>WebRTC IP Leak VPN / Tor IP Test</title>
- <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
- <link rel="stylesheet" type="text/css" href="style.css">
- <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no, user-scalable=0">
- <meta name="apple-mobile-web-app-capable" content="yes">
- <meta name="keyword" content="Webrtc Leak, IP Leaking, webrtc, ip, leak, webrtc leaking ip, ip leak">
- <meta name="Author" content="Spade | Spade Pirates">
- <meta name="Copyright" content="Spade Pirates">
- <meta name="Description" content="Test Your Browser">
- <meta property="og:title" content="WebRTC IP Leak VPN / Tor IP Test">
- <meta property="og:image" content="http://img02.deviantart.net/01a0/i/2016/234/6/2/nsa_wallpaper_by_quadrixel-daeuxzx.jpg">
- <link rel="shortcut icon" type="icon" href="http://i.imgur.com/CesSFnl.gif">
- <style type="text/css">
- * {
- margin: 0;
- padding: 0;
- }
- .main{
- margin: 30px 0 0 30px;
- width: 600px;
- }
- .error{
- width: 100%;
- text-align: center;
- background: red;
- padding: 10px;
- }
- .success{
- width: 100%;
- text-align: center;
- background: lime;
- padding: 10px;
- }
- body{
- line-height: 30px;
- font-family: "Helvetica Neue", Helvetica,Arial,sans-serif;
- font-size: 14px;
- }
- a{
- text-decoration: none;
- }
- </style>
- </head>
- <body>
- <?
- /*
- This will Check Your if your IP is Leaking onLine :v
- Script Made by ME :D
- -/Spade Was Here-/
- */
- if(isset($_SERVER['HTTP_USER_AGENT'])){
- $agent = $_SERVER['HTTP_USER_AGENT'];
- }
- //Check if Firefox or Not :D
- // Spade Was Here :p
- if(strlen(strstr($agent, 'Firefox'))){
- echo "<div class='success'><p1>If you're IP is Leaking from below. You can follow this <a href='http://xbox.nu/webrtc.txt'>Steps</a> to Prevent WebRTC Leak.</p1></div>";
- }else{
- echo "<div class='error'><p1>Google Chrome Tolerate WebRTC Leak. Please Use Firefox Instead.</p1></div>";
- }
- ?>
- <div class="main">
- <h2>WebRTC IP Leak VPN / Tor IP Test</h2>
- <p>WebRTC is a communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN. While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe. This page will test if your internet browser is affected by the <b>WebRTC Leak</b>.</p>
- <br>
- <p>This demo secretly makes requests to STUN servers that can log your request. These requests do not show up in developer consoles and cannot be blocked by browser plugins like AdBlock, Ghostery, etc. </p>
- <h4>Your Local IP Addresses:</h4>
- <ul></ul>
- <h4>Your Public IP Addresses:</h4>
- <ul></ul>
- <h4>Your IPv6 Addresses:</h4>
- <ul></ul>
- <iframe id="iframe" sandbox="allow-same-origin" style="display: none;"></iframe>
- <script>
- //get IP addresses associated with an account :D
- function getIPs(callback){
- var ip_dups = {};
- //Compatibility for Firefox and Chrome
- var RTCPeerConnection = window.RTCPeerConnection || window.mozRTCPeerConnection || window.webkitRTCPeerConnection;
- //and for the Bypass of Naive WebRTC Blocking Using iFrame
- if(!RTCPeerConnection){
- /*
- Note: you need to have an iframe in the page right above the script tag :v
- <iframe id="iframe" sandbox="allow-same-origin" style="display: none;"></iframe>
- <script>.. getIPs called in here...
- */
- var win = iframe.contentWindow;
- RTCPeerConnection = win.RTCPeerConnection || win.mozRTCPeerConnection || win.webkitRTCPeerConnection;
- useWebKit = !!win.webkitRTCPeerConnection;
- }
- //minimal requirements for data connection
- var mediaConstraints = {
- optional: [{RtpDataChannels: true}]
- };
- var servers = {iseServers: [{urls: "stun:stun.services.mozilla.com"}]};
- //construct a new RTCPeerConnection
- var pc = new RTCPeerConnection(servers, mediaConstraints);
- function handleCandidate(candidate){
- //Match the IP address
- var ip_regex = /([0-9]{1,3}(\.[0-9]{1,3}){3}|[a-f0-9]{1,4}(:[a-f0-9]{1,4}){7})/
- var ip_addr = ip_regex.exec(candidate)[1];
- //remove duplicates
- if(ip_dups[ip_addr] === undefined)
- callback(ip_addr);
- ip_dups[ip_addr] = true;
- }//function handleCandidate() ends here
- //listen for candidate events
- pc.onicecandidate = function(ice){
- //skip non-candidate events
- if(ice.candidate)
- handleCandidate(ice.candidate.candidate);
- };
- //create a bogus data channel
- pc.createDataChannel("");
- //create an offer sdp
- pc.createOffer(function(result){
- //trigger the stun server request
- pc.setLocalDescription(result, function(){}, function(){});
- }, function(){});
- //wait for a while to let everything done
- setTimeout(function(){
- //read candidate info from local description
- var lines = pc.localDescription.sdp.split('\n');
- lines.forEach(function(line){
- if(line.indexOf('a=candidate:') === 0)
- handleCandidate(line);
- });
- }, 1000);
- }//function getIPs() ends here
- //inserting IP addresses into the Page :D
- getIPs(function(ip){
- var li = document.createElement("li");
- li.textContent = ip;
- //Local IPs
- if(ip.match(/^(192\.168\.|169\.254\.|10\.|172\.(1[6-9]|2\d|3[01]))/))
- document.getElementsByTagName("ul")[0].appendChild(li);
- //IPv6 addresses
- else if(ip.match(/^[a-f0-9]{1,4}(:[a-f0-9]{1,4}){7}$/))
- document.getElementsByTagName("ul")[2].appendChild(li);
- //assume the rest are Public IPs
- else
- document.getElementsByTagName("ul")[1].appendChild(li);
- });
- </script>
- </div>
- <noscript><meta http-equiv="refresh" content="0; URL=http://goo.gl/HE5XVS"></noscript>
- </body>
- </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement