Wifi Theft Detection (and Boot Them Off)

by -
Photo: KsanderDN (Shutterstock)

techno.rentetan.com – The home network is no place for a scrooge. After many router resets and unplugging superfluous devices, your internet still acts strangely. It’s natural to question if your neighbor is using your internet.

Although improbable, it is conceivable for your neighbor to have overheard your password or made a fortunate guess using simple hacking tools. Someone borrowed your wifi login and hasn’t returned it. It doesn’t matter how they got in, you can use your smartphone or PC to see who’s on your network and kick them out.

Step 1: Check your network’s use

Your wifi may be monitored in a few ways. These applications enable you see a list of connected devices, alter permissions, and even remove them from the network. For example, the Xfinity app allows Comcast/Xfinity users to monitor their home network. A comparable app may be available through your router or ISP.

Alternatively, you may access your router’s web interface through a computer by entering the local-access IP address into a web browser. The instructions below will help you discover your router’s local IP address.

Using Windows

  1. Open the Command Prompt by pressing the Windows key + R and then typing cmd into the text box that appears.
  2. Press Enter on the Command Prompt window to type [ipconfig].
  3. Default Gateway or IPv4 Address should have the IP address in the results.

When using a Mac

  1. Go to Preferences > Network > Advanced > TCP/ICP on the Apple menu bar.
  2. Next to “IPv4 Address,” look for the IP address.

Using the IP address that you discovered in the preceding stages, type it into your preferred web browser. Using your network password, log in to the router’s setup interface. Once you’ve logged in, you can now see what’s going on in the network.

Ban gadgets you don’t wish to use

The next step is to identify who’s using your wifi and block them, whether you’re doing it using a mobile app or a web browser connection to your router. Apps and router models will have different methods for locating and managing the list of connected devices. Take a look at your router’s user guide or search online for instructions for your model.

Verify that only devices owned by you or members of your family are linked after you locate this information. In most cases, you can identify the connected devices by looking at their names alone, but since certain devices only show their MAC address (also known as Media Access Control, or MAC), you may have to manually cross-reference each MAC address.

It’s possible to ban someone from the network if you detect a moocher. Once again, the procedure varies between router interfaces, but is normally conducted through the device’s settings menu.

Improve your security as a third step

Finally, to keep moochers from regaining access to your network, you should update the network password and upgrade the security protocol to the strongest feasible. Finding these choices depends on your router’s software, but they should be straightforward to discover. Enable the strongest network encryption available, such as WPA3, if your device is capable of it; if not, use WPA2-AES or WPA2-TKIP. Our recommendation is to upgrade to a newer model if your current router does not support WPA2.