Internet, Networking, & Security Home Networking 213 213 people found this article helpful How to Stop People From Using Your Wi-Fi Unauthorized access can slow network speeds and open major security risks by Andy O'Donnell Writer Andy O'Donnell, MA, is a former freelance contributor to Lifewire and a senior security engineer who is active in internet and network security. our editorial process Andy O'Donnell Updated on September 29, 2020 reviewed by Michael Barton Heine Jr Lifewire Tech Review Board Member Michael Heine is a CompTIA-certified writer, editor, and Network Engineer with 25+ years' experience working in the television, defense, ISP, telecommunications, and education industries. our review board Article reviewed on Mar 27, 2020 Michael Barton Heine Jr Home Networking Wi-Fi & Wireless The Wireless Connection Routers & Firewalls Network Hubs ISP Broadband Ethernet Installing & Upgrading Tweet Share Email What to Know Misuse of your network can slow your overall traffic speed because of too many devices connected to the router, or introduce malware.You can see who's on your Wi-Fi by logging into your router and checking DHCP settings for connected devices that aren't yours.Strong passwords, network encryption, disabled WPS, and nonbroadcast SSIDs should be baseline security for your home router. This article explains how to see who is on your Wi-Fi network and how to lock down your Wi-Fi quickly to stop them. Remember to routinely monitor your router's access logs to minimize your risks from unauthorized home-network intrusion. How to See Who's on Your Wi-Fi Log in to your router. Find the DHCP settings, "attached devices" area, or a similarly named section. Look through the list of connected devices and isolate the ones that aren't yours. While these steps may appear vague, the reason is that the specifics are different for every brand of router. On most routers, you'll find a connected-devices table that shows every device to which DHCP leased an IP address, meaning that the list shows the devices that are currently using an IP address assigned by your router. Every device on that list is either connected to your network through a wire or is accessing your network over Wi-Fi. You might not be able to tell which are connected over Wi-Fi and which aren't, but you should be able to use this information to see which devices, specifically, are accessing your Wi-Fi. For example, assume you have a phone, Chromecast, laptop, PlayStation, and printer all connected to Wi-Fi. That's five devices, but the list you see in the router shows seven devices. The best thing to do at this point is to shut off Wi-Fi on all of your gadgets, unplug them, or shut them off to see which ones remain in the list. Anything you see in the list after shutting off your network devices is a device that's inappropriately accessing your Wi-Fi network. Some routers will show the name the connected devices use, so the list might say "Living Room Chromecast," "Jack's Android," and "Mary's iPod." If you have no idea who Jack is, chances are he's a neighbor stealing your Wi-Fi. Emilie Dunphy / Lifewire How to Lock Down Your Wi-Fi Blocking someone from your Wi-Fi can be as easy as changing your Wi-Fi password to something much more secure, then encrypting network traffic with WPA or WPA2 encryption. The moment the router requires a new password that the connected devices don't know, all the freeloaders will disconnect from your network, unable to use your internet connection. As an added precaution to help protect yourself from Wi-Fi hackers, avoid weak passwords and change the network name (usually abbreviated as SSID), then disable SSID broadcast. Changing the password and SSID and suppressing SSID broadcast make it appear, to most external users, as if the entire network went offline. More Advanced Router Security Think of network security as a race to outrun a bear, You don't need to be the fastest; you just need to be faster than the slowest person trying to escape. There's no way to make a home network perfectly impervious to a dedicated hacker who has the tools and skills to break into your network. But if you layer enough security practices, the hacker will pluck the low-hanging fruit first, reducing your relative risk of intrusion. Although it's not specifically related to your router's setup, it's a good idea to disable File and Printer Sharing in Windows. If a hacker gains access to your network and all your files and devices are easily discovered from within your home network, your risk of a data breach increases substantially. A "defense-in-depth" approach means you employ several different levels of security access instead of relying on just one strategy. Start by implementing MAC address filtering on your router so that only the MAC addresses you specify (the ones that belong to your devices) are allowed to connect. This approach isn't foolproof — it's easy to spoof a MAC address — but this level of filtering adds one extra step to hack through and dissuades low-skill, opportunistic Wi-Fi leeches. Similarly, limit DHCP addresses to the exact number of devices you regularly use so that no new devices are allowed an IP address even if they manage to get past your Wi-Fi password. Most importantly: disable Wi-Fi Protected Setup. WPS allows one-touch pairing of a device to your router. The problem, though, is that WPS is notoriously insecure. WPS-enabled routers usually get hacked within a matter of minutes, by following online tutorials that rely on easily available freeware. Remain Vigilant If you live in a rural area, you're likely fine with just baseline precautions. To infiltrate your Wi-Fi network, a hacker must remain within Wi-Fi range, which, at best, is 300 feet or so from the router. If your house is 500 feet from the road and your nearest neighbor is a quarter-mile away, an attacker would need to be on your property to hack your Wi-Fi: a low-risk scenario. But if you live in a dense urban area, or in close proximity to others (e.g., in a dorm), the risk increases. Advanced technology to brute-force attack Wi-Fi routers has long been available as freely downloadable, open-source tools. Software like Reaver will slice through even strong defenses without much difficulty, so you must periodically check your router's DCHP allocation tables to verify inappropriate access. Set a task on your calendar to-do list to periodically check your router's control panel. Look for unauthorized devices. If you use strong security practices but your network is intruded upon repeatedly, reach out to your internet service provider for assistance. Persistent, successful intrusion against a well-protected home network is a sign of trouble that's worth referring to your ISP.