Skip to content
Step by Step Internet 🌐 Guides for learning to surf the Net

How to know who is connected to my Wi-Fi network and how to disconnect them from the mobile and PC? Step by step guide

How to know who is connected to my Wi-Fi network and how to disconnect them from the mobile and PC? Step by step guide

Surely you have begun to notice something strange in your Internet connection , maybe it starts to be a little slower, or new devices connected to it start to appear and you don’t know who they are. Note that it is very possible that there are other people stealing your WiFi network .

There are currently many WiFi thefts , either through applications or hacker, which has made all these wireless connections much more susceptible. One of the ways to detect if there are intruders in your internet network it is if your connection becomes intermittent or starts to lose speed constantly. Other reasons to find out if your Internet is being stolen is if your connection begins to be fast early in the day and during the course of the day the signal decreases, until sometimes it does not exist.

In this way, here we will show you how to detect possible intruders in your WiFi network and how to disconnect them from the mobile phone or computer, thus preventing steal your WiFi signal and slow down your connection.

Steps to detect and check who has connected to your Wi-Fi network -Fi

Being able to know if your connection is being stolen is possible today . This has become a great tool because it allows us to have greater security against the possible intruders or cybercriminals . In this way, here we show you some of the ways to verify that people have entered your wireless network without your permission, to do this, follow the following methods.

On your Windows computer

It is important to mention that this type of topic encompasses great content, which is why we will try to be as specific as possible here so that they can get good results and prevent them from continuing stealing your connection.

To do this, if you have a Windows computer, perform the following steps:

  • To start with all this it will be necessary to enter the configuration of our network adapter, this in order to check the gateway. For this, we go to “Control Panel” and then “Networks and Internet”.

En tu ordenador Windows

  • Now four options will appear on the screen, there we click on “Network and Sharing Center”.

En tu ordenador Windows

  • In the new window that appears on screen we select the network that offers us the connection, in this case, it is a cable connection.

En tu ordenador Windows

  • When we select the option of the network, a new window opens, there we select representedDetails.
  • Here will appear the gateway that we will have to use to access the “Router configuration “.
  • Now with the command that appears in the option of “Gateway” We use it to continue the process. Possibly different paths may exist, which is why we must choose the IP address more similar to ours.

En tu ordenador Windows

  • Once we have the IP address you only have to enter the browser of your choice and in the web address bar we copy the IP and press “Enter”. Guide to enter the router here.
  • This will send us to the configuration menu of your router. Keep in Note that this will vary depending on the equipment we use.
  • Here you will access the configuration menu of your device.
  • Once inside the “Settings” of the equipment we go to the wireless section, “Wireless or Wi-Fi” this will depend basically on the equipment we use. Different options will appear here, in this case “Station info” is used, can also appear as “Client List” or names similar to these two.

En tu ordenador Windows

  • Now a new window will appear with a box, there you will see who or who is accessing without your consent and is stealing the WiFi.

En tu ordenador Windows

Keep in mind that once all this has been done, and having verified that there are other users stealing your wireless connection, it will be necessary to find a solution to stop this. In this case, what you can do is change your password or in this case create one if you don’t have it . This way you can prevent other people from continuing to benefit from your services for free and lowering your connection benefits.

For MacOS

In the case of MacOS you can also detect that intruders are using your WiFi network and therefore it has started to work more slowly or the connection drops every so often , thus causing poor service and inconvenience when using the connection.

It is important that as long as you have a wireless connection , the greatest possible security is taken into account, since anyone with a little computer skills could violate the access to your network and start stealing it. To do this, here we explain how you can detect possible intruders on your Internet.

To do this it is possible to use different programs that we find in the market, one of the most recommended is Wireless Network Watcher, to use it follow these steps:

Download Wireless Network Watcher

  • Start by downloading this program to your computer and then install . Note that you can download it in a ZIP file with all the program information.
  • The following will be unzip that ZIP file and then we execute the program exe.
  • Once executed and after a few seconds the program will automatically start to throw you a list with all the devices that are currently connected in your WiFi network.

Para MacOS

  • If you do not recognize the devices that appear in that list, you can select each one by right clicking on the device. There you will see the specifications of each one, as well as the MAC address of it. This way you can realize that devices are connected to your wireless Internet without your authorization.
  • In this case, it is recommended to change the WiFi password , that way all devices will be ejected from the connection and you will only reconnect the devices that are authorized by you.

From your Android phone or iPhone

In case you are using the WiFi network of your mobile device, be it Android or iPhone and have doubts that there are other people stealing your Internet, you can start using some mobile applications that will help you discover this kind of thing .

In this case we will use the “Fing Network Scanner” app. This tool can be made available for both Android devices and iOS strong>. It’s completely free and you’ll get it on Google Play or the App Store . In addition, it is very light and easy to use.

  • The first thing you will have to do is download the application to your terminal.
  • Once installed you will have to start “FIng Network Scanner”. li >
  • When the application starts the first thing it will do is show on screen how many and which devices are connected to your WiFi.

Desde tu móvil Android o iPhone

  • Among the main advantages of this program is its speed to detect computers linked to the WiFi network. So much so, that even the router where the wireless connection starts on the screen.
  • Now you have to identify each of the devices that appear on that list, there you can see which computers use your network. In the case that only those that you know or authorize appear, it means that you have no intruder. However, this action is recommended to be done every so often or, because these intruders can enter at different times than the ones you review. Therefore, you must be lucky to realize who else is using your wireless connection.
  • In the case of a device that you don’t recognize, you can click on it. This way you will access its specifications, such as the brand, the model, the Mac address, among other features that will help you know whether or not you delete the device from your network .

It is important to mention, that it is recommended to perform this process when your Internet goes from a good operation to a malfunction, that is, to be working in a fast and even way, lower your speed and fail the connection of it simultaneously . This usually happens when you start stealing your WiFi.

Without using programs

One of the best ways to avoid intruders in your WiFi network is to use MAC filters . This consists of creating either a blacklist or a whitelist, the latter being the easiest to use. This is about creating a list of devices that cannot access your network or simply make a list with the MAC of the computers that can access the network .

That is, only those devices that appear on that list can enjoy your WiFi. To do this just follow the instructions below.

  • The first thing will be to enter your IP address in the address bar of your favorite browser. Note that you must have both the username and password of your router.
  • Once you have entered the menu, you will have to look for the “Administration Panel”.
  • Then you look for the “Filters by MAC.” In case you have already detected the intruder and have your MAC address you can copy it and enter it in the blacklist to block your access to the network. >
  • Another way to avoid these intruders is by filtering only the MAC addresses you want to connect to your WiFi network. To do this you just have to create a white list with the MAC address of the devices that will allow you to use your wireless connection . This is considered the best option to control this, since only you decide who uses and who your Internet.

so how to block you out and so how to avoid steal the Wi-Fi signal? List of security measures

That they steal your WiFi daily and at any moment it can be something that ends up getting you very angry, since a stranger is benefiting from your services without any cost and permission and, in addition, you can be damaging your signal . So, you want to take quick and effective solutions to block the Wi-Fi signal and expel the intruders that steal your signal.

Best of all, there is a way to be able to definitively expel these intruders, so it will be necessary to perform the steps explained below:

  • The first thing will be to use the router’s IP address, which we will copy in the browser search bar . In order to enter the device configuration you must know both the user and the password .
  • Once you have entered the menu, you can find an option called “Access of control ”,“ MAC Filtering ”,“ MAC Filter ”or other similar names, keep in mind that this will depend on the brand of router you are using.
  • In this section you will have to add the MAC address that you do not want to reconnect in your wireless network .
  • Here you will only have to select the option of “Block Mode” and copy the complete MAC address of the device that is stealing your Internet. Once included and save this person will not be able to access the network anymore.

¿Cómo bloquear y expulsar a los intrusos y así evitar que te roben la señal Wi-Fi? Lista de medidas de seguridad

Another way to avoid possible intruders in your wireless network is by taking a series of security measures that will help you have a better backup on your connection. p>

Between it we can apply the following:

  • Constantly change your router password , this is a measure that we must apply every week or every fifteen days at least. This will help eliminate all those people who for some reason have taken your password or discovered it.
  • If you have noticed a new device connected to your WiFi network, You can change both the name and password of it immediately.
  • Choose a password with WPA2 encryption for added security. All routers offer different security options for wireless connection. The best practice is to avoid WEP passwords and use WPA2 encryption, as they offer greater security.

Better programs and applications to know who is connected to your network -fi and it’s stealing bandwidth

Today there are a lot of programs and applications that allow you to discover who is connected to your WiFi network . This way, you can tell if there is any intruder that is stealing your connection .

Especially if you have doubts about this or your Internet has started to slow down or even have connection losses simultaneously.

In this way, here are some programs that you can get for free and that will help you discover that mobile devices or computers are connected to your network.

Microsoft Message Analyzer

Microsoft Message Analyzer

We begin the list with this program from Microsoft, a very current tool that is able to capture and analyze all the system traffic . In addition, it has a tracking system that will allow you to analyze each of the log files.

This program has been improved and updated with the objective of becoming the successor of Microsoft Network Monitor , and that will help you to detect which people are violating your security and thus stealing your Internet connection . To do this, it displays data from trace, log and other system message data. It also uses an online viewer and graphics to obtain all possible system statistics.

SoftPerfect WiFi Guard

SoftPerfect WiFi Guard

If you are one of the users who have small wireless networks and you want to keep it protected against any possible intruder you can use SoftPerfect, which becomes one of your best options.

It should be noted that today wireless networks have been improving their security system, where they have gone from WEP passwords to WPA2 encryption thus offering a better security system. However, we are in a world where everything progresses and weaknesses become increasingly noticeable. This is how these networks today are not saved from being attacked and their security is constantly being violated.

Wireless Network Watcher

Wireless Network Watcher

This program can be made available for Windows computers and is responsible for teaching through an analysis all the mobile devices and devices connected to your WiFi network . This way you can have a record of who accesses your connection , as well as discover those intruders and then block them.

Each of the devices shown in the list provided by Wireless Network carry the following data, IP address, MAC address, company and device name.

Angry IP Scanner

Angry IP Scanner

One of the lightest applications on the market, in addition, does not need any installation, which allows you to use anywhere. Its main function is to find IP addresses in any range. Thus offering a record of all those devices that are connected to your WiFI network.

Among its main features is that they offer the name of the equipment, its MAC address, scan ports, among others. A very useful tool to be informed of any possible intruder in the network.

WireShark

Wireshark

This analyzer program is currently the most used worldwide , and among its main features we can find that it allows you to see which devices connect at any moment in your wireless network >. Wireshark is used by many large-scale businesses and businesses and best of all, you can acquire it completely free which gives it a touch of greater credibility.

>