How To Check Who Using Your WiFi - Windows Basics

Latest

Monday, June 3, 2024

How To Check Who Using Your WiFi

Today, the role of wireless network connections such as Wifi cannot be denied. People and households use Wifi to access the internet. Users of laptops, tablets, smartphones, digital cameras, printers, gaming devices, smart watches and many other devices can connect to each other or to the Internet through Wifi connection. However, setting up Wifi safely and with a strong enough password is enough to give users a headache.

Of course, setting up your Wifi network like setting up WPA2 and a strong password is extremely important. But this does not mean that others cannot know what your Wifi password is. Even if you change your Wifi password regularly, the password can still be revealed when your friends, neighbors or family members share Wifi information with others and even people you don't know. can access your network connection and use it. This is one of the reasons why your network connection is getting slower and slower without you even knowing.

Although many routers have built-in security measures such as MAC address filtering by manufacturers, others, especially hackers, can also circumvent these configurations. Many modern routers provide you with a list of wired and wireless devices accessing the network connection, but others do not. That's why some people will not know who is accessing, connecting and using their Wifi "temple". In the article below, Network Administrator will guide you how to see who is using Wifi at the temple using Wifi management software and some tricks to detect if your Wifi network connection is being "poached" or not. and to find ways to stop that situation.

See Wifi users by checking the signal light on the router

Wifi routers often have signal lights to indicate when a device is using the wireless network. Therefore, one way to help you check if your Wifi is being "used" by someone else is to turn off all your wireless devices and see if the indicator light on the router continues to flash or not. . However, this method can also cause trouble if you have many devices connecting to Wifi, and checking this way does not give you too much information. Therefore, you may need the solutions below.

Use the Router's web interface to view Wifi temple users

Wifi transmitters all have tools to help users view the list of devices connecting to Wifi. What you need to do is access the router's web interface to find that list. First, enter the router's IP address into the browser's address bar. On Windows, you can find the router's IP address by accessing the command prompt (press Win+R and enter "cmd"), then enter ipconfig in the window that appears. You find the Default Gateway line and this is the router's IP address. On Mac, go to Network Preference and the Wifi router's IP address is the address next to "Router".

Once entered, you will be prompted to log in to your router account. This account usually comes with instructions when purchasing the transmitter, and usually has the username and password "admin". Note that if you have not changed the password of this account, you should change it immediately if you do not want to be taken advantage of by hackers.

After accessing the web interface, you find items related to the list of connected devices. Here we can only speak in general terms because the position of this list will depend on the router of each manufacturer. For example, Netgear's router will have the "Attached Devices" section, or some other routers will have the name "Device List". Here you will be provided with a list of IP addresses, Mac addresses, and device names (if the router recognizes them) connecting to the Wifi network. Compare this list with your devices to see if your Wifi is being used by strangers.

Note: Many people think that the DHCP list on the router also displays devices connecting to Wifi, but this is not true. DHCP - IP address automatic configuration protocol, only shows DHCP clients: Devices receive IP addresses automatically provided by the router. If you encounter a somewhat skilled hacker, he can access Wifi using a static IP to bypass the DHCP list.

Use Wifi Wireless Network Watcher management software

Nir Sofer's Wireless Network Watcher is one of the utilities that helps users detect who is connecting to their Wifi. The highlight of the utility is that it does not require setting up an IP address range and starts automatically scanning network connections for connected devices. If you want to scan another network or other IP address range, you can use the Advanced Options option by pressing the F9 key.

The process of scanning the IP address range takes place quite quickly and only takes a few minutes, after which you will receive information such as IP address, device name, MAC address, network card manufacturer, and operating status. movement and detection point.

Wireless Network Watcher is an open utility that scans in the background through IP address ranges to detect new and disconnected devices. You can set up a notification and alert sound when the utility detects new devices connecting or devices disconnecting from your Wifi network.

Download Wireless Network Watcher.

See users stealing Wifi with SoftPerfect WiFi Guard

WiFi Guard is a utility based on the SoftPerfect Network Scanner version - one of the utilities to detect unknown network connections or unauthorized connections. This tool will scan your network to find connected devices, then scan again and display a notification popup window if any unknown network connections are detected. .

If you use and activate more than one network card, the program will display a setup window so you can select the network you want to scan. Or else you will be "taken" to the main window, where you press the Scan Now option to scan all devices connected to your network connection.

For connections marked with a red check mark, they are allowed connections, double click on them and check the "I know this computer or device" option, the program will ignore that device and will Do not scan that device again.

Running or minimizing WiFi Guard will re-scan between 0 and 60 minutes (default is 30 minutes) and will display a notification popup window if new devices of unknown origin are detected.

And as mentioned above, Softperfect Network Scanner is one of the utilities with the most comprehensive scanning functions and Admin tools. This utility can also be used to scan and identify wireless network connections but it will not scan devices at all intervals and give you warnings about unknown connections. origin.

Both WiFi Guard and Network Scanner come in Portable versions (no installation required) and versions with an installer.

Download Softperfect WiFi Guard.

Use Advanced IP Scanner network management software

This is a Network Administration tool that can perform additional tasks to scan your network connections. In addition, the tool also has a remote option to turn LAN on and off, connect via HTTP/FTP as well as remote control with Remote Desktop and Radmin. Of course, these features are not necessary if you simply want to scan your wireless network connections.

By default Advanced IP Scanner will set the IP address range for all connections on the computer, only the Wifi connection range needs to be scanned, such as 192.168.0.1 - 192.168.0.254.

If there is only one active connection, you do not need to “touch” the IP address range. Once the scan is complete, all connections will be displayed along with the wireless device manufacturers' names, MAC addresses and the name of the Advanced IP Scanner program.

Advanced IP Scanner has a Portable version, so you don't need to install the program, just run the executable files and you're done.

Download Advanced IP Scanner.

Check wifi users with Angry IP Scanner

Angry IP Scanner is a cross-platform tool that works on Mac and Linux quite well because it is Java-based. This means your computer must have Java Runtime Environment installed. The tool simply pings each IP address in the selected range and then displays the results along with the information you requested in the Fetchers window.

To select the address range to scan, you can enter these addresses manually or click the IP button and select the correct network card. Then click on the dropdown menu to select the range, such as /26 will scan up to 63 (/26 will scan up to 63), /24 will scan up to 255 (/24 will scan up to 255).

You can also select your IP address file list if you want a more complicated setup.

The scanning process takes place quite quickly because the scanning program uses many threads. To see the results of all scanned addresses, go to Tools => Preferences => Display and select "All scanned hosts", this will show you other devices that can connect to your network connection. you without responding to the ping command.

Angry IP Scanner is available in both Portable and installation versions.

Download Angry IP Scanner.

See who is using Wifi with Who Is On My WiFi

This tool is a bit different from the above tools because the main task of this tool is to identify computers connecting to your network connection and will warn you if it detects any strange devices. .

However, the most useful feature of the Who Is On My WiFi tool is to block connections of unknown origin or "fake" connections that are only available if you sign up for a paid subscription, and each month you will have to Pay the fee of $9.95. However, the free versions still allow users to find and scan devices connected to your network connection.

To use the tool, you must first configure the address range to scan. By default, click the Set button and enter the address range you want to scan on your network, such as 192.168.0.1-254 . If you are unsure, you can access the Diagnostic tab on the Settings window and then click Detect IP Ranges to see what network connection you are using.

Then perform a scan and the devices connected to your network will be "discovered". Select all the connections you know and set the status to KNOWN from the drop down menu, then select each description one by one.

If you set Who Is On My WiFi to run in the background, the tool will display a popup window with a notification sound when it detects any strange devices.

By default the tool will scan every 5 minutes although you can change this to between 2 and 10 minutes in the settings window. To make sure Who Is On My WiFi is turned off, you can open the system tray and check.

Download Who Is On My WiFi.

View Wifi users on Android with ezNetScan

This is a free application that can scan all devices using your Wi-Fi network, then list it in a complete list of detailed information. The list will display the names and icons of those devices, so you can easily identify a strange phone or laptop using your Wi-Fi network. Besides, the application also provides full IP addresses, time and usage capacity of those devices.

Simple trick to detect someone stealing your Wi-Fi

View Wifi users on iPhone using IP Network Scanner

This is also a free application, allowing you to detect strange devices using your Wi-Fi network. Although the features are not as diverse and the display list is not as complete as the ezNetScan application, this is still a useful application that works quite effectively and accurately.

Simple trick to detect someone stealing your Wi-Fi

What to do when Wifi is used?

1. Change password

In case you discover someone is using the Wifi temple, you need to immediately change the router's password, and be sure to apply the high-level security standard WPA2-AES. At this point, the Wifi thief will be "kicked" out of the network and unless he gets a new password (or has a way to hack Wifi), penetrating the Wifi network will be impossible.

2. Find the culprit

Many people believe that finding the culprit in this case will be very difficult. IP address and Mac address are not enough to help you do this. However, with the help of the MoocherHunter application, this is completely possible. This is a very useful tool and is used by law enforcement organizations in Asia to track down Wifi thieves. According to the description, this software can identify the location of the perpetrator through the traffic they send over the network. The difference and error in position is only... 2m.

The software requires you to burn it to a CD, then you will use it to boot the computer. This way, you can put the disc in your laptop, take advantage of the Wifi card's directional antennas to go around and determine the culprit's location. However, if you "act" alone, you should not rely on the results the software provides to conclude the culprit, this can lead to unnecessary conflicts. It's just a way to help you determine who he is.

No comments:

Post a Comment