Apify and Crawlee Official Forum

Updated 2 months ago

WebRTC IP leak?

Hi, so for the last couple days I am on a quest to evade detection for a project that proved to be quite challanging. As I researched the issue, I noticed that my real IP leaks through WebRTC with a default Crawlee Playwright CLI project. I see a commit to the fingerprint-suite that I think should prevent that, but based on my tests it doesn't. Does it need special setup or anything?
L
n
2 comments
Hi @Jeno
It was already discussed here so you can read through it to find more details.
In summary: our types in crawlee were not correct, that part will be fixed in the next release. But its just a typing issue, you can try using the mockWebRTC option.
https://github.com/apify/crawlee/pull/2705
It seems, it should be something like this:

Plain Text
    browserPoolOptions: {
        useFingerprints: true,
         operationTimeoutSecs: 30,
        maxOpenPagesPerBrowser: 10,
        closeInactiveBrowserAfterSecs: 200,
        fingerprintOptions: {
            useFingerprintCache: false,
            fingerprintGeneratorOptions: {
                devices: [DeviceCategory.desktop],
                // @ts-ignore
                mockWebRTC: true,

After adding this - at least one of the bot detection sites stopped showing my real IP...
Add a reply
Sign up and join the conversation on Discord