Who Is Using My Wi-Fi? How to See and Remove Unauthorized Users (2026 Guide)

Bryant Veney

Bryant Veney - Copywriter, BroadbandSearch

Date Modified: April 27, 2026

Unexplained slowdowns, buffering that wasn't there last week, or hitting your data cap early are all signs that could mean someone is using your Wi-Fi without permission. This guide walks you through exactly how to find out who is on your network, identify unknown devices, and lock unauthorized users out for good. 

Find out fast: Open a browser and type your router's IP address (commonly 192.168.1.1 or 10.0.0.1) into the address bar. Log in and find the DHCP Client List, Connected Devices, or Attached Devices section. Any device listed there is currently using your network. If you spot something unfamiliar, change your password and upgrade to WPA3 to kick them off and keep them out. This can be done through the router’s companion app, if it’s available from the manufacturer. 

  How to Monitor Connected Devices 

Method 

How It Works 

Best For 

Router Admin Panel 

Access via browser using your router's IP 

Full device list and control 

Command Prompt (arp -a) 

Lists IP addresses on your network 

Quick check without logging in 

ISP Web Portal 

Log into your provider account online 

Monitoring while away from home 

Mobile App (Fing) 

Scans network and identifies devices 

Fast mobile audits and alerts 


Signs Someone May Be Using Your Wi-Fi 

Your home network can be sluggish for myriad reasons, and not every slowdown means a neighbor has your password. But there are patterns that are worth investigating. 

Unexplained speed drops. If your connection slows randomly throughout the day rather than being consistently slower in the evenings (which is very common due to more people being home and using the internet), an unauthorized user is more likely the culprit than ISP peak-hour congestionRun a wired speed test at different times to compare. If wired speeds are fine but Wi-Fi is slow, the issue could be your router or someone using your network. 

The router light test. Power off or disconnect every device in your home and wait about 60 seconds. Then watch the wireless activity light on your router. Slow, occasional blinking is normal background traffic. Rapid, sustained blinking when none of your devices are connected could indicate that there’s an unwanted user on your network. 

Early data cap warnings. If your ISP sends a data alert earlier than usual and your household habits haven't changed, check your connected device list before anything else. 

Unknown entries on your device list. This is the most direct indicator. The next section shows you exactly how to find and read that list. 

 

 How to See Who Is on Your Wi-Fi (Step-by-Step) 

You won’t need a third-party app to see every device connected to your network, whether it’s wired or wireless. Your router logs every device that connects. The challenging part is figuring out which device is yours, especially if you have many IoT (Internet of Things) or smart home devices. 

 Step 1: Find Your Router's IP Address 

On Windows: Open the Start menu, search for Command Prompt, type ipconfig, and press Enter. Look for Default Gateway. That number is your router's IP address. 

On Mac: Open System Preferences, click Network, select your Wi-Fi connection, click Advanced, and open the TCP/IP tab. The number next to Router is your IP address. 

Common router defaults: Most routers use 192.168.1.1 or 192.168.0.1, and sometimes 10.0.0.1. Try either one in your browser if the steps above are unavailable. 

Step 2: Log into the Admin Panel 

Type your router's IP address into a browser address bar. A login screen will appear. If you haven’t found its IP address yet, look at the bottom or back of your router. The IP address should be printed on a sticker, along with the default credentials. If you’ve never changed them, the username is often "admin," and the password is either "admin," "password," or there may be a unique code on the sticker. If you cannot log in, contact your ISP or check out the manual or website for your router. 

Step 3: Find the Connected Device List 

Once inside, look for a section labeled one of the following (exact names vary by manufacturer): 

  1. DHCP Client List 
  2. Connected Devices 
  3. Attached Devices 
  4. Wireless Clients 

This screen shows every device connected to your network, and may have a separate list for devices that have connected to it at some point. Each entry includes a device name, an IP address, and a MAC address (a unique hardware identifier assigned to every network device). 

Pay attention to whether the list distinguishes between active connections (currently online) and historical connections (previously connected but now offline). You are looking for active, unknown connections. 

 Step 4: Cross-Reference Your Own Devices 

Go through the list and match every entry to a device you own. Check phones, laptops, tablets, smart TVs, game consoles, smart speakers, and any smart home hardware. It can be challenging to identify and recognize every device. If you are unsure which device is which, turn off Wi-Fi on your devices one at a time and watch which entry disappears from the list. 

Smart home and IoT devices often show up with unfamiliar names. Here are some of the more common names associated with these kinds of devices: 

Router Display Name 

What It Usually Is 

Should You Worry? 

Espressif 

Smart bulbs, plugs, or DIY IoT sensors 

No, very common 

Hon Hai / Foxconn 

Nintendo Switch, PlayStation, or Samsung TV 

No, major manufacturer 

Murata / AzureWave 

Laptop or phone Wi-Fi chip 

No, common wireless chipset 

Unknown / Linux Device 

Smart fridge, older printer, or Raspberry Pi 

Investigate 

DESKTOP-XXXXXX 

A Windows PC 

Check your own computers first 

Android-XXXXXX 

An Android phone or tablet 

Confirm it matches a device you own 

Also keep in mind that modern iPhones and Android phones use randomized private Wi-Fi addresses by default to protect user privacy. A familiar phone may appear as an unrecognized entry because of this feature. You can disable private addressing in your phone's Wi-Fi settings to make it easier to identify. 

Although it may take some time, we recommend giving every device a name whenever possible. It makes it easier to find unknown devices on a list that includes “Family Room TV,” “Mom’s work laptop,” or “Emma’s tablet.” 

How to Identify Unknown Devices 

If you still cannot place a device after cross-referencing, use a free MAC address lookup tool. Copy the first six characters of the MAC address and paste them into macvendors.com. This identifies the device's manufacturer, which often narrows down what type of device you are dealing with. A result showing Apple means a phone, tablet, or Mac. Be wary of anything with an unfamiliar name or brand. 

For ongoing monitoring, Fing (iOS and Android, free) scans your network in seconds, identifies device types and manufacturers, and can alert you when a new device connects. GlassWire (Windows, free tier available) monitors traffic in real time and visualizes which devices are using the most bandwidth

 How to Remove and Block Unauthorized Users 

If you’ve found an unknown device on your network, here’s how to remove it, improve network security, and prevent unauthorized access. 

Step 1: Change Your Wi-Fi Password 

This immediately disconnects every device on your network. After changing it, reconnect your own devices one by one. Any device that reconnects without you entering the new password is either one you forgot about or one that should not be there. 

Choose a password of at least 12 characters using a mix of uppercase letters, lowercase letters, numbers, and symbols. Avoid dictionary words or predictable patterns. An automated dictionary attack can crack simple passwords in minutes. Password generators like Bitwarden can create and store strong credentials for free. 

Keep in mind that this is only for wireless connections to your network. Wired devices will still have connectivity. 

Step 2: Upgrade to WPA3 or WPA3/WPA2 Mixed Mode 

In your router's admin panel, navigate to Wireless Settings and look for the security option. WPA3 is the latest, more secure version of the technology that protects your Wi-Fi password. WPA2 has a known weakness that lets attackers capture your network's signal and crack the password offline using automated software. WPA3 fixed that flaw. 

Unfortunately, not all devices are compatible with WPA3, but if all your devices are, set it to WPA3-only. If older devices like smart home hardware or pre-2019 laptops stop connecting, switch to WPA3/WPA2 Mixed Mode. This gives newer devices stronger encryption while keeping older hardware connected. Avoid WPA, WEP, or open modes. 

Step 3: Enable MAC Address Filtering 

MAC address filtering creates a list of approved devices. Only hardware with a MAC address on your approved list can connect, even if someone has your password. 

In your router's admin panel, look for MAC Filtering, Access Control, or Wireless MAC Filter. Add the MAC addresses of every device you own, then set up the filter to allow only listed devices. Any unlisted device will be blocked. 

One important caveat: MAC addresses can be spoofed by a technically savvy intruder. MAC filtering is a strong deterrent against casual intruders but works best in combination with WPA3, not as a standalone defense. 

Step 4: Disable WPS 

Wi-Fi Protected Setup (WPS) was designed to make connecting devices easier, but it can be compromised. The Cybersecurity and Infrastructure Security Agency (CISA) has identified the WPS vulnerability in 2012. We recommend that you disable it in your router's Wireless or Advanced Settings to avoid any intrusions. 

Step 5: Set Up a Guest Network 

If you regularly share your Wi-Fi with visitors, a guest network keeps them isolated from your primary network to which your devices are connected. Devices on the guest network will have internet access, but cannot see or communicate with your devices, shared drives, smart home hardware, or connected cameras on the main network. 

Most modern routers include a guest network option under Wireless Settings in the admin panel. Give it a separate name and a strong, unique password. If you have shared it with many people, you can change the password, delete historical devices, or delete the network to prevent future access. 

Keeping Your Network Secure Long-Term 

Once you’ve made these changes and updated the settings on your router, make it a point to check in on your home network periodically for new connections and to keep it up to date. Here are a few suggestions to maintain network security. 

Update your firmware. Router manufacturers release firmware updates to patch security vulnerabilities. Turn on auto-updates if the option is available. If not, check for updates every few months under Administration or System in your admin panel. 

Run periodic audits. Log in to your admin panel every month or so to look at the connected device list. Run through the removal steps above if you find unknown connections. 

Consider upgrading your hardware. If your router is more than five years old, it may not have the latest security. WPA3 is standard in Wi-Fi 6 or Wi-Fi 7 routers. 

Check your speeds. If your network is secured but your internet speed is still slow, there may be an issue with your ISP's network rather than your hardware. Run an internet speed test from a device that is connected to the router via Ethernet cable and compare the results to your internet plan’s speeds. If the test results are consistently lower, you may want to contact your provider. 

FAQ

How do I see who is on my Wi-Fi without a third-party app?

Log in to your router's admin panel by typing its IP address (usually 192.168.1.1 or 192.168.0.1) into a browser. Find the DHCP Client List or Connected Devices section. Every active device on your network is listed there with its name, IP address, and MAC address. 

What should I do first if I find an unknown device?

Note the device's MAC address, then run it through macvendors.com to identify the manufacturer. If you’re not able to identify it after checking all your devices, change your Wi-Fi password, then work through the five security steps above. 

Does changing my Wi-Fi password kick off everyone currently connected?

Yes, every device that is connected wirelessly will lose connectivity and must re-enter the new password. This is useful because it forces a clean audit of what reconnects. Any device that reconnects without you entering the new password is worth investigating. This will not disconnect wired connections. 

Is using someone else's Wi-Fi without permission illegal?

Yes. In the United States, unauthorized network access is a federal offense under the Computer Fraud and Abuse Act (CFAA). Most states have parallel statutes. Similar laws exist in the UK (Computer Misuse Act), Canada (Criminal Code Section 342.1), and across the EU. 

Why is my internet slow even though no unknown devices are connected?

The most common causes are peak-hour ISP congestion (typically 7 to 11 PM), hitting a data cap, outdated router hardware, or Wi-Fi interference from neighboring networks. Run a wired speed test. If wired speeds match your plan but Wi-Fi does not, the issue is your router or placement. If wired speeds are also low, contact your ISP. 

Is MAC address filtering enough to permanently block an intruder?

No. MAC addresses can be spoofed by a knowledgeable attacker. MAC filtering is effective against casual intruders but should be used alongside WPA3 and a strong password rather than as a standalone solution.

What is the safest Wi-Fi security protocol in 2026?

WPA3 is the current standard and the most secure option available for home networks. For households with older devices that do not support WPA3, WPA3/WPA2 Mixed Mode is the recommended setting. WPA2-only is acceptable if WPA3 is unavailable. WPA and WEP are obsolete and should never be used.

Keep Unknown and Unauthorized Connections Off of Your Wi-Fi

Finding and removing an unauthorized user on your Wi-Fi is a straightforward process when you know where to look. Check your router's connected device list, identify anything unfamiliar using a MAC lookup tool, then work through the five-step lockdown: change your password, upgrade to WPA3, enable MAC filtering, disable WPS, and set up a guest network. Each layer reinforces the others, and the full setup takes less than an hour.


If speeds are still lagging after securing your network, the issue may not be an intruder at all. Run an internet speed test to see what your connection is delivering. If the sluggishness continues, you may have to troubleshoot your Wi-Fi or contact your ISP.