Why Disconnecting People from Your Wi-Fi Is a Good Idea
Having unwanted people sharing your Wi-Fi connection has the potential to whip up some serious problems. Someone with the wrong intent and skillset could steal your personal information if they gain access to your private network. It also opens up the potential risk of compromising your webcam and microphone, which can put your privacy at risk. Also, having more people connected to your network can cause bandwidth congestion, which can slow down your Internet speed. Additionally, if you are on a limited data plan, you might suffer unwanted charges for the data they have consumed.
Find Your Router’s IP Address
Before doing anything, you need to know the address to access your Wi-Fi router’s admin panel. In most cases, it’s one of the following:
192.168.1.1192.168.0.1192.168.2.1192.168.1.254192.168.10.1192.168.11.1192.168.123.254192.168.3.110.0.0.1192.168.8.1
However, to find out which one’s yours:
3 Ways to Remove Unwanted Connections from Your Wi-Fi Network
Now that you know your IP address, you can remove unwanted connections from your network with one of the three methods below:
1. Use MAC Filtering
Every device that connects to the Internet has a 48-bit address associated with it, which is known as a MAC address. Use this MAC address to identify and block certain devices to connect to your Wi-Fi network. To do that, you need to access your Wi-Fi’s admin panel and navigate to the tab where all the connected devices are listed. You can see all the connections, along with their details. In some cases, these details also include the MAC address of the connected devices.
Find Your MAC Address
All routers do not use the same software, so you may only be given the device’s IP address. Luckily, we can easily find the MAC address of a device using its IP address and a few commands. Follow the steps below:
Use the MAC Address to Block Unwanted Connections
Now that you have the MAC address of the device you want to block from your Wi-Fi network, head back to the router’s admin panel and follow the steps below to blacklist it.
2. Only Enable Whitelisted Devices
While blacklisting a device completely bans it from connecting to your network, hackers can always join back in using another device. To prevent such a situation, a much more secure approach would be to whitelist the MAC addresses of select devices. Basically, you can tell your router to only allow certain devices and automatically block any other connection requests. Here’s how to whitelist your trusted devices.
3. Change Wi-Fi Password or SSID
If you don’t want to go through the hassle of blacklisting or whitelisting a device, you can simply change your Wi-Fi’s name or password. All the devices connected to your network will be automatically logged out. Reconnect your trusted devices by entering the new password.
1. What is the best security encryption for my Wi-Fi?
WPA3 is the latest and most secure Wi-Fi encryption protocol available in 2022. Do note that many Wi-Fi routers don’t yet support it.
2. How can I identify if someone is using my Wi-Fi without going through the router admin panel?
There are many ways to tell if someone has unauthorized access to your Wi-Fi network:
If you are experiencing poor speed, it could mean that your broadband is being stretched over multiple devices. If the speed doesn’t increase even after you disconnect all the devices from your end, it could very well mean that someone else is using your Wi-Fi network.High latency while playing online multiplayer games or connecting over a video call.If your Wi-Fi is rebooting multiple times by itself, it could mean that someone else is trying to brute-force their way into hacking your network.If your Wi-Fi network does not display WPA protection anymore, it could mean that it has been compromised and that someone is already inside your network.
3. Is there software that I can use to monitor the devices connected to my network?
There are many software you can use to kick an unknown device off your Wi-Fi networks, such as JamWiFi or Netcut. But these apps are only temporary solutions and the same as executing a simple Wi-Fi de-authentication attack, which does not permanently ban someone. However, it can log them off temporarily. Image credits: Unsplash