WebRTC IP leak?
# crawlee-js
j
Hi, so for the last couple days I am on a quest to evade detection for a project that proved to be quite challanging. As I researched the issue, I noticed that my real IP leaks through WebRTC with a default Crawlee Playwright CLI project. I see a commit to the fingerprint-suite that I think should prevent that, but based on my tests it doesn't. Does it need special setup or anything?
h
message has been deleted
l
Hi @Jeno It was already discussed [here](https://github.com/apify/crawlee/discussions/2701) so you can read through it to find more details. In summary: our types in crawlee were not correct, that part will be fixed in the next release. But its just a typing issue, you can try using the
mockWebRTC
option. https://github.com/apify/crawlee/pull/2705
n
It seems, it should be something like this:
Copy code
browserPoolOptions: {
        useFingerprints: true,
         operationTimeoutSecs: 30,
        maxOpenPagesPerBrowser: 10,
        closeInactiveBrowserAfterSecs: 200,
        fingerprintOptions: {
            useFingerprintCache: false,
            fingerprintGeneratorOptions: {
                devices: [DeviceCategory.desktop],
                // @ts-ignore
                mockWebRTC: true,
After adding this - at least one of the bot detection sites stopped showing my real IP...