Is your internet slowing down or do you suspect that someone unauthorized is connected to your Wi-Fi? We advise you on how to find out who is connected to your Wi-Fi, and what to do if you find an intruder.
Is your internet slowing down even when you're home alone? Videos take forever to load, websites lag, and the TV or mobile reports outages, even when everything should be running smoothly? If you suspect that someone unauthorized, like a neighbor, may have connected to your Wi-Fi network, it could be a legitimate concern.
Many people have no idea who is currently connected to their network. And even if they do find out, they often don't know how to disconnect someone from Wi-Fi when they shouldn't be there. Yet, it's not as complicated as it may seem. A few simple steps and you'll have clarity.
In this article, we will show you how to find out who is connected to your Wi-Fi, how to identify foreign devices, and what to do if you discover that someone is riding on your network without permission. We'll also advise you on how to block such accesses and secure the network to prevent similar situations from recurring.
The first signal that someone unauthorized might be connecting to your network could be slow internet when you're neither downloading anything nor on a video call. If you notice unusual fluctuations in speed or, for example, that your devices repeatedly and unsuccessfully attempt to connect, it may indicate overload and/or foreign activity.
Modern routers often allow you to view network usage summaries. If you find that a large amount of data is being transferred even at night or during your absence, it's probably time to determine who is connected to your Wi-Fi. It's not complicated, and it doesn't require any special technical knowledge.
The most reliable way to find out who is connected to your Wi-Fi is to check directly in your router's administration. Typically, you just need to enter the device's IP address in a browser (often 192.168.0.1 or 192.168.1.1) and log in using the access credentials. You can find these either on the router's label or in the provider's manual.
In the overview of connected devices, you should see a list of all phones, laptops, and other devices currently active in your network. Each device usually comes with a name and a so-called MAC address, which allows it to be uniquely identified. If you see something in the list that doesn't ring a bell, be alert.
If you don't want to delve into router settings, you can use one of the free apps that can map the network without complicated configuration. Popular ones include Fing or Network Analyzer. These apps will quickly show you all devices connected to the Wi-Fi, often including the name, device type, and other identifiers.
It's a convenient option for anyone who wants to quickly verify who is currently connected to the Wi-Fi network. Some of these tools also allow you to monitor the network continuously and alert you to each new connection, which can be useful for the future.
In the overview of connected devices, it might not always be clear which one is which. A name like “android-d2f891c3” probably doesn't tell you much. The simplest method to identify an unknown device is to turn off your own devices one by one and observe which one disappears from the list.
Another option is to restart the router and reconnect only the devices you actually own. If something extra appears in the list afterward, it's clear that someone else is accessing your network. If this is confirmed, it's time to move on to the next step and address how to disconnect someone from Wi-Fi, and most importantly, prevent it in the future.
The simplest way to disconnect someone from Wi-Fi is to change the network password. This will prevent all devices that don't know the new password from reconnecting. If a device is currently connected, it may remain active until you restart the router. Therefore, we recommend performing a router restart after changing the password, so all existing connections are interrupted and a new login is required.
However, there's a downside. Changing the password will make the network inaccessible to everyone, including your own devices. You'll need to re-enter the password on your phone, laptop, and throughout your smart home. If the new password leaks again, for example, if someone nearby finds out or it is discovered, the intruder can connect again. In such a case, it's advisable to change the network name as well as the password.
If you don't want to change the password, you can try blocking specific devices using their MAC addresses. Every device connected to a network has a unique identifier that the router can recognize. In the router's administration, you often find the option to create a list of devices with restricted access.
This solution is not foolproof. A technically savvy intruder can change their MAC address and access the network again. Nevertheless, blocking an address can serve as a quick temporary solution or be part of a broader protection strategy.
Another option to make it difficult for someone to access your Wi-Fi is to disable the WPS function. While it makes connecting new devices easier, it represents a security weakness. We recommend disabling WPS in the router's administration.
Additionally, ensure your network uses modern WPA3 encryption. If you have an older router, it might only support WPA2, which is still acceptable but less secure. Newer devices with WPA3 offer a higher level of protection against unauthorized access and make attempts to crack the password more challenging.
The name of your Wi-Fi network, known as the SSID, usually appears in the list of available networks on all nearby devices. If you hide it, regular users won't see the network and won't be able to connect without knowing the name. This option is found in the router's administration, where you can easily deactivate it. Connecting will then be possible only by manually entering the network name and password. Remember to note the name in a safe place so you can share it with family later or recall it yourself.
If visitors or neighbors occasionally connect to your Wi-Fi, it's ideal to set up a guest network. This separate Wi-Fi network has its own access credentials and is often entirely isolated from the main home network, enhancing security. Most modern routers allow you to activate such a network, potentially even with time restrictions. Once you don't need it, we recommend turning it off. This way, nobody can connect to your internet connection without your consent.
Many people still use the default login name and password for router administration, which are easily found online. If someone nearby knows them, they can simply log into the router interface and make changes to the settings without your consent. Therefore, we recommend changing the router's admin password as soon as possible. Do not confuse it with the Wi-Fi network password – these are two different things. A strong router password is another essential layer of protection against the unauthorized use of your internet connection.
Home Wi-Fi isn't a mystery for techies. When you know how to find out who is connected to your Wi-Fi, and how to disconnect someone from Wi-Fi, you take the security of your network into your own hands. Just a few right steps and you're at ease – no unauthorized user will easily slip into your connection again.
Artificial intelligence can write articles, analyze data, and generate videos. However, there are skills and professions that this technology cannot (yet) replace. In the article, we will look at where humans still have the upper hand, why AI needs human supervision, and which abilities will become increasingly valuable to develop in the digital world.
Does your video keep buffering or game lag, even though you pay for 'fast internet'? Perhaps you simply don't have the right one for what you do at home. What internet speed do you need for watching TV, streaming movies, working from home, or online gaming? Find a clear comparison in the article.
Phishing attacks often appear credible and convincing today. Thanks to artificial intelligence, they sound personal, mimic well-known companies, and can be hard to detect. In this article, you'll learn how modern phishing works, why you should watch out for it, and how you can effectively protect yourself from it.
Forgotten passwords, recycled combinations, and fear of data leaks. Traditional login methods have their weak points. A new way to verify identity, known as passkeys, aims to change that. Without the need to remember anything and with a focus on security. How do they work, who is already using them today, and why are they becoming the new standard?
Do you know edge computing? It is a method of data processing that shifts computing power closer to the data source. This significantly reduces latency and enables faster real-time decision-making. This technology is becoming key for IoT, autonomous vehicles, or smart cities and is gradually changing the internet as we know it. What does edge computing mean and how will it impact our future?
Digital identity is becoming an integral part of modern society. What does it reveal about us? How does it work today, and what might it look like in the future? From blockchain to virtual IDs – let's look at the technologies changing the way we verify ourselves and protect our privacy in the world.