How to understand if somebody is swiping your wifi
Therefore, its internet acts fun, perhaps a bit slow, even after several reset of the router and disconnecting excess devices. Although there are many possible reasons for their internet to act, many people will naturally begin to wonder if one of the neighbors is moving their wifi.
Although it is unlikely, it is actually quite easy to enter the Wi -Fi network of another person who uses simple piracy software and a little patience, although it is also possible that their neighbor has heard his password or made a lucky assumption. Maybe you lent your wifi connection when they ended once and never stopped using it. Regardless of what they have arrived, you can verify which devices connected to your network and start all foreigners using your smartphone or PC, no additional software is required.
Step 1: See who uses your network
There are some ways to see that you currently use your wifi. Some routers and ISP offer network management applications for mobile and office devices that show a list of connected devices and allow you to modify authorizations, including the elimination of a network network and prohibit it of reconnection. For example, Comcast / Xfinity customers can monitor the activity of the national network through the XFinity application. Check if your Internet router or supplier offers a similar application.
The other method is to access its router interface on a computer by writing the local access IP address in an internet browser. You can find the local access IP address of its router using the following steps:
Under the windows
- Press the window + R window and then write CMD to open the system symbol.
- In the system symbol window, write [iPconfig] and then press Enter.
- The IP address must appear together with the “default gateway” or “IPV4 address” of the results.
In a Mac
- Access System Preferences> Advanced> TCP / ICP.
- Look for the IP oration recorded successive to “the IPV4 address”.
Write the IP address you found in the previous steps in the Internet browser of your choice. The configuration interface of its router must appear, then connect to your network password. Once it is, now you can consult the network activity.
Also Read: G Suite alternatives
Step 2: Prohibit unwanted devices
Whether you use a mobile application or connect directly to your router through an Internet browser, the next step is to see your Wi -Fi and block unwanted access. However, the research and management steps for the list of connected devices will depend on the application that you use and / or the brand and the model of its router. See the user manual for your router or look for the specific model steps.
When you find this information, confirm that only the devices that you or the members of your home are those who are connected. This should be easy to say only about the names of the connected devices, but as some devices only list their MAC address (also known as media access control, which is another unique identification number used to communicate with the router), It is possible that the MAC address of each device must be manually referenced.
If you really find a Mococh, you can prohibit them from the network. Again, the method differs between the router interfaces, but it is generally carried out from the device preferences menu.
Step 3: Improve your safety
Finally, you must modify the password of your network and make sure you use the strongest possible security protocol to prevent mockers from breaking into your network. Like the previous steps, the search for these options depends on the software of its router, but it should be easy to locate. Be sure to create a solid password and activate the highest possible network encryption for some devices, which can be WPA3, while others can only use WPA2-AES or WPA2-TKIP. If your router does not admit at least WPA2, we strongly recommend updating to a more recent model.