8000 webRTC IP leak · Issue #3849 · seleniumbase/SeleniumBase · GitHub
[go: up one dir, main page]

Skip to content
webRTC IP leak #3849
Closed
Closed
@will-ia-m

Description

@will-ia-m

Hello,

In release 4.20.8 you added a solution to mitigate webRTC IP leak. ( #2218 )

But using current SeleniumBase version (4.38.2) , if I check on browserscan.net it detects the proxy and find my real IP address.

Is there a way to avoid that ?

Thanks,

William

Ps : here is a snippet I use
`from seleniumbase import SB
from loguru import logger

PROXY = "id:password@address:port"
COOKIE_FILE = "cookies.json"
TARGET_URL = "https://browserscan.net"

def main():
logger.info(f"Starting CDP session with proxy: {PROXY}")

with SB(uc=True, test=True, headless=False, proxy=PROXY) as sb:
    try:
        # Activate CDP mode
        sb.activate_cdp_mode("about:blank")
        
        # Navigate to target URL
        sb.cdp.open(TARGET_URL)
        sb.sleep(2)
        
        # Debug stop point - you can interact with the browser here
        print('stop here')
        input("Press Enter to continue and save cookies...")`

Metadata

Metadata

Assignees

No one assigned

    Labels

    UC Mode / CDP ModeUndetected Chromedriver Mode / CDP Modecan't reproduceWe tried to see what you saw, but didn't

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions

      0