Unauthorized access to wireless networks is very common; learn how to get safe with these applications


If you find that the speed of your Internet connection is suffering from sudden outages or slower than normal, the cause of the inconvenience is likely to be related to the presence of an intruder on your Wi-Fi network.

To get it out of the way, it is no use to rely on passwords, as they do not constitute an impassable access barrier. Simply a quick Google search with the Wi-Fi hack terms to understand the dimension of the subject.

Instead it is best to opt for some tool that blocks any intrusion. These apps, such as Fing and Pixel NetCut, among others, perform a verification of the local network to know which devices are connected. If they find a suspect, they will remove the access.

The best

Fing – Network Scanner is one of the applications best known for data on unauthorized connections to the network. It is very simple to use, its interface is intuitive and makes the experience very comfortable. This tool, available for iOS and Android, provides the name of the intruder, its IP address, its manufacturer, model and more. Thanks to a historical file, the user can know all the devices that have been connected in the past. In the event that foreign devices are found, the user can limit the access in the router to prevent them from entering your wifi network. Its use is free but has a premium service to monitor up to 10 networks remotely.

Another option is Pixel NetCut, a free app for Android that meets the same objective: to block access to internet to intruders. Unlike Fing – Network Scanner, Pixel NetCut requires super user or root permissions. Then it works similarly: it performs a scan, finds the unauthorized connections and gives the possibility to disable them.

Users of the Apple operating system can use iNet – Network Scanner. In addition to network monitoring, this app serves to find out what services a particular device is running.

In the application stores you will find other tools like Network Scanner, Who is On My Wifi, ezNetScan or Scanner and WIFI Detector, all free and offering similar functions.


Apart from the loss of internet speed, theft of the wifi entails more serious problems related to privacy and security. Through the network the intruder could commit crimes such as downloading photographs of child pornography or even manipulate the computer to, for example, activate the camera and record people.

Most intrusions occur on computers whose keys were never modified by the user. Therefore, it is advisable to change the password to access the router and not to trust the keys that comes from the factory. The following must be made clear: a robust security system will cease to exist if the password is trivial or easily identifiable. It is recommended that the access key to the Wi-Fi network be at least 12 characters in capital letters, Lowercase letters, numbers and symbols.

The second security measure is to have a network with the highest level of encryption possible. Keep in mind: the WPA2 protocol is the most secure (some routers were configured with a system known as WEP, which eventually became weak and insecure).

To know which protocol your home router uses, the first thing you need to do is access the settings. If you do not know how to do it, you can consult the manual, look for information about the model on the internet, or call your provider for assistance.

Another good thing is to do a frequent scan of the connected devices to avoid any unwanted access. You also have to turn off the router if you are away from home for several days.


Bandwidth reduction: Depending on the number of devices intruders and their use of the network can get to prevent the connection of the home.

Theft of transmitted information: An improper configuration of the wireless network may allow an attacker to steal information.

Direct connection to user devices:
 An intruder with sufficient knowledge, aided by a security problem or an installation without the appropriate controls, could access the equipment connected to the network.

Liability for illegal actions: The connection to the internet with a service provider is associated with the user.


One of the symptoms to know if you are stealing internet is to monitor the speed of descent in the navigation. To check the theft of the wifi you have to look at the activity lights of the router with all the connected devices turned off. If the activity lights blink quickly and continuously, it means that another device is sending information to the network with its wifi.


Please enter your comment!
Please enter your name here