Wednesday, December 6, 2023
HomeTechnologyHow to know if someone is stealing your WiFi: symptoms to detect...

How to know if someone is stealing your WiFi: symptoms to detect intruders

A drop abrupt or the sudden interruption of the service of internet may not always be related to the quality of the ISP (Internet Service Provider or service provider). In many cases, the cause of this inconvenience can be linked to the presence of an intruder in wifi wireless connection network.

Specialists usually claim that “It is useless to rely on the installation and the passwords used”, since both do not constitute an insurmountable access barrier for a third party to gain access to the private network. That is why it is necessary to get involved in the configuration of the router to rule out, in principle, the responsibility of the provider on duty.

Then we leave you a series of steps so no one else steals wifi from you again.

How to know who steals your WiFi

Wi-Fi routers usually have a very vulnerable password by default. Photo: Clarin

There are many free tools with which you can monitor the devices that have access to our network. For Windows, the recommended programs are Wireless Network Watcher and Microsoft Network Monitor, while Mac OS X Hints is ideal for those who have a Mac.

You can also perform the check from any mobile device with Android or from an iPhone using the Fing, Wi-Fi Inspector or IP Tools applications, among others.

Keep in mind that all these tools help you check who is stealing the Internet from you, but only if you are connected at the time the scan is made.

Once the verification is done, we will have available a list of all connected devices In the net. If we find something suspicious or that clearly indicates an unregistered computer, tablet or cell phone model, we will have finally found the usurper.

Notably unauthorized access to our Wi-Fi network it has potentially more consequences than we initially believe. Not only does it affect the access speed, but this intruder can use our information for criminal activities.

WiFi: how to kick out intruders

The access page to a wifi router.  Photo: capture.

The access page to a wifi router. Photo: capture.

Once we detect the usurper, the first thing to do is expel it, something that is easier than you think. To get it you have to enter the control panel of the routerin case we do not have the manufacturer’s instructions (most use the address

Even if can also find out with the following steps: go to Start in Windows, write “cmd.exe” in the search engine (the text box with the magnifying glass). In the window that opens, place “ipconfig” and copy the data that appears in the “Default gateway” section into the Internet browser.

When typing “” in the address bar and pressing the “Enter” button, the router access site. There we must enter the username and password, to continue with the checks. If you don’t have the manual, you can easily find it with an internet search.

Once in the main menu, in the “device information” section, where a list will appear with the devices and equipment that are recently connected to the router. In case you see one that is not familiar, there will be an intruder.

To free yourself from future Wi-Fi thieves, you will have to perform certain steps in the configuration of the router. In principle, disabling public sampling of the SSDI (Service Set Identifier)which is popularly known as a network name according to the 2.4 GHz and 5 GHz band. For those of you who don’t know how to do it, the option is available in the “WLAN” section.

How to protect your WiFi network from intruders

most attacks they occur on computers that arrive with factory settings and whose keys have never been modified by the user. For this reason, it is advisable to also change the access password to the router itself and not trust the administrator, the password that comes from the factory.

The second measure will be to ensure that the wireless network has the highest level of encryption possible. Please note: the WPA2 protocol is the most secure.

Another good measure is to perform a scan from time to time of the connected devices to clear any unwanted access despite all measures.

In this sense, some brands specializing in network security, such as the case of McAfee, Kaspersky, ESET or Pandaoffer the user secure platforms through which, and through an app on the cell phone, they have a absolute control of everything that happens on a network without complex settings.



Recent posts