Back to Blog
securitytroubleshootinghow-towifi

How to Check Who Is Connected to Your WiFi Network

Worried someone is freeloading on your WiFi? Here’s how to see every device connected to your network — using your router, a Windows PC, a Mac, or a free phone app — and how to kick off anyone who shouldn’t be there.

7 min read

Slow WiFi, unexpected data overages, or a blinking router light when all your devices are off — these are classic signs someone may be using your network without permission. Fortunately, checking who is connected to your WiFi takes less than two minutes. Here are four ways to do it, from the quickest to the most thorough.

Method 1: Check Your Router’s Admin Panel (Most Complete)

Your router keeps a live list of every device it has assigned an IP address to. Accessing this list is the most reliable way to see everything on your network, including devices that don’t respond to network scans.

  1. Open any browser and type your router’s IP address into the address bar. The most common addresses are 192.168.1.1 and 192.168.0.1. If neither works, check the label on the bottom of your router.
  2. Log in with your router’s admin credentials. If you’ve never changed them, the username and password are often printed on the router label (common defaults: admin/admin, admin/password).
  3. Look for a page called Connected Devices, Device List, DHCP Clients, LAN Status, or Attached Devices. The exact name varies by brand: Netgear calls it “Attached Devices,” TP-Link calls it “DHCP Client List,” and ASUS uses “Client List.”

You’ll see each device’s hostname, IP address, and MAC address. The hostname is usually a recognizable name like “Johns-iPhone” or “DESKTOP-AB1234”. Unknown or suspicious hostnames like “android-8f3a2b” are worth investigating.

Method 2: Use the Windows Command Prompt

Windows has a built-in command that lists every device your PC has recently communicated with on the local network. It’s fast and requires no downloads.

  1. Press Win + R, type cmd, and press Enter.
  2. In the Command Prompt window, type arp -a and press Enter.

You’ll see a table of IP addresses and their corresponding MAC addresses. The results include all devices the ARP cache has recorded — usually everything active on the network in the past few minutes. This method can miss recently connected devices that haven’t exchanged traffic with your PC yet, so it’s less complete than the router panel but useful for a quick check.

Method 3: Use Terminal on Mac

Mac users can use the same arp -a command in Terminal to get a similar device list.

  1. Open Terminal (Applications → Utilities → Terminal, or search with Spotlight).
  2. Type arp -a and press Return.

For a more thorough scan, you can first broadcast a ping to wake up all devices, then run arp again:

  1. Find your subnet by running ifconfig en0 and noting the “inet” address (e.g., 192.168.1.5).
  2. Run ping -c 1 192.168.1.255 (replace with your broadcast address) to announce yourself to all devices.
  3. Run arp -a again — the list will now be more complete.

Method 4: Use the Fing App (Easiest on Mobile)

Fing is a free network scanner for iOS and Android that is widely regarded as the most user-friendly tool for this job. It performs a full scan of your local network and shows every connected device with its:

  • Device name and type (phone, laptop, smart TV, etc.)
  • Manufacturer (identified from the MAC address prefix)
  • IP and MAC address
  • Connection status (online/offline)

Fing can also send you alerts when new devices join your network, making it a lightweight intrusion-detection tool. The core scan is completely free; advanced features like internet performance monitoring are part of a paid subscription.

Other solid alternatives include Network Analyzer (iOS) and WiFi Analyzer (Android).

How to Identify Devices You Don’t Recognize

Not every unfamiliar hostname is a neighbor stealing your WiFi. Smart home devices often show up with cryptic names. Here’s how to figure out what a mystery device is:

  • Check the MAC address manufacturer prefix. The first six characters of a MAC address identify the manufacturer. Websites like macvendors.com let you paste a MAC address to see who made the hardware.
  • Cross-reference IP and hostname against your known devices. Temporarily disconnect everything in your home one by one and refresh the list to see what disappears.
  • Look at the device type. Apps like Fing can often identify whether a MAC address belongs to a phone, a smart TV chip, or a router.

How to Block Unauthorized Devices

Found a device that definitely shouldn’t be there? You have two good options:

Option A: Change Your WiFi Password

This is the nuclear option and the most effective. Log into your router admin panel, go to Wireless Settings, and change the WiFi password. Every device — authorized or not — will be disconnected and will need the new password to reconnect. This is especially useful if you’ve shared your old password widely.

Option B: Block by MAC Address

Most routers allow you to blacklist specific devices by their MAC address under Access Control or MAC Filtering settings. Copy the suspicious device’s MAC address from the device list, add it to the block list, and save. The device will be denied access even if it knows your WiFi password.

Note: Sophisticated users can spoof MAC addresses to bypass this filter, so it’s a supplement to a strong password, not a replacement for one.

Warning Signs Someone Is on Your Network

  • Slower-than-usual speeds — especially during hours you wouldn’t normally see congestion
  • Router activity lights blinking when all your devices are turned off
  • Unexpected data overages on your ISP bill
  • Devices listed in your router that you don’t own

If you frequently share your password with guests, consider setting up a separate guest WiFi network. Guest networks are isolated from your main network, so guests can’t access your smart home devices, NAS, or computers — and you can disable the guest network at any time without touching your main password. For a broader guide to locking down your network, see our complete WiFi security guide.

Related Articles