Have you noticed slow Netflix speeds during certain hours of the day? Maybe you have a problem with your broadband signal. Did you manage to download stuff slower than usual, and it feels like something is interfering? You may have an intruder stealing from your internet connection.

That is why in addition to setting a strong password and changing the keys that come by default on the router, we must take additional measures. In this guide, we will discuss How to Blacklist an Intruder from your Wi-Fi network.

Why not create an access whitelist?

However, the creation of whitelists requires that we have to identify one by one all our trusted devices, something that can take us a long time if we have several gadgets at home, including computers, tablets, smartphones, and other wireless fauna (without taking into account the devices of occasional guests). In addition, we will also have to remember to add to the whitelist any new device that enters the house if we want it to have access to the Internet.

On the contrary, if we have already identified the IP and MAC of the intruder, the simplest thing is to create a WiFi access blacklist in the administration panel of the router. In this way, we will block your access permanently, avoiding further headaches in the future.

Still don’t know what the INTRUDER’s IP and MAC address are?

Before starting to salsear with the router’s management panel, we must be clear about the IP address and, above all, the MAC address of the intruder in question. One of the fastest ways to get this information and get out of doubt is to install the app.

DOWNLOAD NETWORK SCANNER

How to Blacklist an Intruder from your Wi-Fi network (forever)

With this free tool for Android, we can identify all the devices connected to the network quite comfortably and keep a controlled record. Once we have installed it, we only have to turn off all the devices connected to the WiFi.

At this point, we will turn on the first device, connect it to the network, and when it detects it, we will assign it a name (Lounge Laptop, My Sister’s Mobile, PS4etc.). Then, we will repeat this same process until we have all the devices at home turned on and connected to the Internet.

Thus, any other device that appears connected in and does not have a label or name given by us during this process will undoubtedly be an unauthorized intruder: write down your IP address and your MAC.

It should be noted that it can detect the type of device and sometimes even the make or model. Therefore, it is often possible to identify intruders without even turning off and on the wifi devices at home.

Note: Remember that it will also show the router’s IP and any desktop computer connected by Ethernet cable. Please don’t confuse them with the thief.

How to create a WiFi access blacklist?

Now that we have the device’s MAC that we want to block, we just have to open the browser and load the router’s administration page. It is usually in the URL http://192.168.0.1 or http://192.168.1.1.

Once inside, we look for the configuration menu dedicated to MAC filtering. Depending on the router we have, we can find it in one place or another, although it is usually in the “Security” section or the advanced settings of the “Wireless Network” or “WiFi.”

To illustrate this example, we have used a TP-Link router: in this case, we would go to “Security -> Access Control.” Here, we activate the “Access Control” tab and select “Default Access Mode: Blacklist.

How to Blacklist an Intruder from your Wi-Fi network (forever)

To finish, in the list of devices on the blacklist, click on Add and attach the MAC of the intruder that we have identified with the app.

Once the changes are applied, the wifi thief will not use that device again to connect to our network since the MAC is data provided by the manufacturer. Unlike the IP address, it cannot be modified (we can mask the original MAC by creating a virtual MAC, but the physical address will remain the same).

How to Blacklist an Intruder from your Wi-Fi network (forever)
Author

Ruby has been a writer and author for a while, and her content appears all across the tech world, from within ReadWrite, BusinessMagazine, ThriveGlobal, etc.

Write A Comment