How To Know If Someone Connected To Your PLDT Wifi and How To Secure Your Network

Having a stable internet connection is essential to support your daily activities. Whether you are working from home, connecting with loved ones, or simply enjoying online entertainment. A secure internet connection is equally important to keep your personal data safe from various data leaks, fraud, and virus attacks. For many Filipinos, PLDT Home Wifi provides that vital link.

However, you may wonder if unauthorized devices are draining your valuable bandwidth, slowing down your connection, or potentially posing a security risk. This article discusses various methods to identify if someone is connected to your PLDT Wifi and offers steps to secure your network.

How To Know If Someone Connected To Your PLDT Wifi

How To Know If Someone Connected To Your PLDT Wifi

There are two primary approaches to check for unauthorized users on your PLDT Wifi:

  • Identifying Connected Devices Through Your Router: This method utilizes the built-in administration interface of your PLDT router.
  • Using Third-Party Applications: Several applications, available for computers and smartphones, can scan your network and display connected devices.

A. Identifying Connected Devices Through Your PLDT Router

This method leverages the built-in capabilities of your PLDT router. The specific steps may vary slightly depending on your router model, but the general process remains consistent. Here’s a breakdown:

1. Accessing Your Router’s Interface:

  • Connect a device (computer, laptop, or smartphone) to your PLDT Wifi network.
  • Open a web browser and type the default gateway address of your router in the address bar. This address is typically 192.168.1.1 or 192.168.0.1. You can find the exact address printed on the router itself or in its user manual.
  • A login page will appear. Enter the username and password for your router’s admin panel. These credentials are usually printed on a sticker on the router or in the user manual. Caution: If you haven’t changed the default credentials, it’s highly advisable to do so for security reasons (more on this later).

2. Locating the Connected Devices List:

Once logged in, navigate through the router’s menu options. The specific menu path might differ depending on the model. Common menu names you might encounter include “Attached Devices,” “DHCP Clients List,” or “Wireless Client List.”

3. Analyzing Connected Devices:

The interface will display a list of devices currently connected to your PLDT Wifi network. This list typically includes information like the device’s MAC address (a unique identifier for network devices) and sometimes the device name (if assigned).

Identifying Unauthorized Devices:

Carefully review the list of connected devices. You should be familiar with the devices you use on your network (phones, laptops, tablets, etc.). Any device name you don’t recognize or MAC address that appears unfamiliar could be unauthorized.

Video Example: How to see/know who’s using, how many devices connected on your PLDT WiFi

B. Using Third-Party Applications

Several third-party applications can help you identify devices connected to your PLDT Wifi network. These applications are often free to download and use. Here’s a look at two popular options:

A. Using a Computer Application (Windows): Wireless Network Watcher

  1. Download and install Wireless Network Watcher on your computer MajorGeeks.Com (or maybe other applications).
  2. Launch the application.
  3. The application will automatically scan your network and display a list of connected devices. This list will typically include information like the device’s MAC address, IP address, and sometimes the device name (if assigned).

B. Using a Mobile Application (Android/iOS): Fing

  1. Download and install the Fing app on your smartphone or tablet.
  2. Launch the Fing app.
  3. The app will automatically scan your network and display a list of connected devices. This list will typically include information like the device’s MAC address, IP address, manufacturer, and sometimes the device name (if assigned).

Identifying Unauthorized Devices:

As with the router method, review the list of devices displayed by the application. Look for unfamiliar device names or manufacturers that don’t correspond to your authorized devices.

Taking Action After Identifying Unauthorized Devices

Once you’ve identified a potential unauthorized device, here are some steps you can take:

  • Change Your PLDT Wifi Password: This is the most crucial step. A strong password with a combination of uppercase and lowercase letters, numbers, and symbols makes it significantly harder for unauthorized users to access your network. Most routers allow you to change the Wifi password through the admin panel (refer to your router’s user manual for specific instructions).
  • Enable MAC Address Filtering: This feature allows you to create a whitelist of authorized devices that can connect to your network. Any device not on the list will be denied access. Caution: While effective, MAC address filtering requires manually adding the MAC addresses of all your authorized devices, which can be a tedious process for a large number of devices.
  • Consider a Guest Network: If you frequently have guests who need internet access, setting up a guest network allows you to provide internet access to visitors without compromising the security of your primary network. Guest networks typically have a separate password and limited access to your network resources.

Additional Security Tips

  • Keep Your Router Firmware Updated: Outdated firmware can contain security vulnerabilities. Most routers allow you to update the firmware through the admin panel (consult your router’s user manual for specific instructions).
  • Disable WPS (Wi-Fi Protected Setup): WPS can be susceptible to security exploits. Disabling it if you don’t use it is recommended (refer to your router’s user manual for instructions).
  • Enable Encryption: Most modern routers support WPA2 encryption, which offers a robust level of security for your Wifi network. Ensure WPA2 encryption is enabled on your router (consult your user manual for specific steps).