How to Find & Identify Unknown Devices on Your WiFi Network

📅 Jun 13, 2024⏱️ 9 min read✍️ SterJo Software📂 Network Security

You run a network scan and see a device you don't recognize. Is it a neighbor piggybacking your WiFi, a forgotten smart home device, or just your own phone under an unfamiliar name? Here's how to find out — and what to do if it's an actual intruder.

Most unknown devices turn out to be legitimate — a household member's phone, a smart TV, a WiFi printer — just listed under an unfamiliar hostname or MAC address. But some are genuine unauthorized connections. This guide walks through identifying every case and gives you the steps to remove any actual intruder.

Quick Answer: 3 Steps to Identify an Unknown Device

Step 1: Scan your network with SterJo Wireless Network Scanner to get the device's MAC address and hostname.

Step 2: Check the MAC vendor — it reveals the device manufacturer (Apple, Samsung, etc.).

Step 3: If you still can't identify it, look up the full MAC address on macvendors.com.

If you confirm it's unauthorized: change your WiFi password immediately.

Step 1: Scan Your Network to Find All Devices

Before you can identify an unknown device, you need a complete list of everything connected to your network. The most reliable method is SterJo Wireless Network Scanner — it uses ARP-based scanning which detects smartphones, IoT devices, and other hardware that may not respond to standard ping.

How to Scan:

  1. Download SterJo Wireless Network Scanner (free, portable, no installation)
  2. Connect your PC to the WiFi network you want to investigate
  3. Run the scanner and click Scan
  4. Review the full device list — note IP address, MAC address, hostname, and MAC vendor for each entry

Step 2: Identify the Unknown Device

Check the MAC Vendor

The MAC address prefix (first 6 characters) identifies the hardware manufacturer. SterJo Wireless Network Scanner shows this automatically in the vendor column. Common examples:

  • Apple — iPhone, iPad, MacBook, Apple Watch, AirPods
  • Samsung Electronics — Android phone, Galaxy tablet, Samsung TV
  • Amazon Technologies — Echo speaker, Fire TV, Kindle
  • Google — Chromecast, Google Nest, Pixel phone
  • Sony — PlayStation, Sony TV, Xperia phone
  • Nintendo — Switch, Wii U
  • Espressif Systems / Tuya — Generic smart home devices (smart plugs, bulbs, sensors)
  • TP-Link / Netgear / Asus — Routers, range extenders, network gear
  • Hewlett Packard / HP — Printer, laptop
  • Motorola / LG — Android phone, smart TV

Check the Hostname

Hostnames are often self-explanatory:

  • DESKTOP-AB12C, LAPTOP-XYZ — Windows PC
  • iPhone, iPad, MacBook-Pro — Apple device
  • android-a1b2c3d4 — Android phone (generic format)
  • AMAZON-AB12C — Amazon Echo or Fire device
  • Chromecast — Google Chromecast
  • (blank / no hostname) — Many IoT devices don't broadcast a hostname

Look Up the Full MAC Address

If the vendor and hostname don't help, copy the full MAC address and look it up on macvendors.com or ieee.org. This gives the registered organization name for that MAC address block, which usually narrows down the device type significantly.

Common "Unknown" Devices That Are Actually Yours

In most cases, an unknown device is one of your own that you simply didn't recognize by name. Here are the most common sources of confusion:

What You SeeWhat It Probably Is
android-a1b2c3d4e5f6Android phone (any brand) — generic hostname format
Espressif / esp32 / esp8266Smart plug, smart bulb, DIY IoT device
Tuya / SmartLifeGeneric smart home device (common white-label brand)
Amazon-XXXXEcho, Fire Stick, or other Amazon device
RokuRoku streaming stick or TV with built-in Roku
Device with no hostnameMany printers, smart TVs, IoT sensors, old phones
192.168.1.1 / .254Your own router — normal to appear in scan results
raspberry / raspberrypiRaspberry Pi board — home automation, media center, etc.

How to Tell If It's an Actual Intruder

After exhausting the identification steps above, if you still cannot account for a device, ask yourself:

  • Does anyone else know your WiFi password? (family members, past guests, neighbors you gave it to)
  • Is the MAC vendor something completely unexpected — a brand you own no devices from?
  • Does the device appear consistently or only at certain times? (Someone nearby connecting during specific hours is suspicious)
  • Has your internet felt slower than usual lately?

If multiple red flags apply, treat the device as unauthorized and proceed with the blocking steps below.

⚠️ Note: Randomly generated or "locally administered" MAC addresses (second digit is 2, 6, A, or E — e.g. 02:xx, x6:xx) are used by modern iPhones and Android phones for privacy. This is a normal feature, not a sign of intrusion. Your own devices may show with unfamiliar-looking MAC addresses because of this.

How to Block an Unauthorized Device From Your WiFi

Option 1: Change Your WiFi Password (Most Effective)

Changing your WiFi password immediately disconnects all devices — both yours and any intruders. They cannot reconnect without the new password. Use SterJo Wireless Key Generator to create a strong, random new password.

  1. Log into your router admin panel (usually 192.168.1.1)
  2. Find WiFi Settings → Security
  3. Change the WiFi password to a new strong one
  4. Reconnect all your legitimate devices with the new password

Option 2: MAC Address Filtering

Most routers allow you to block specific devices by their MAC address. This blocks the device even if they know your password.

  1. Log into your router admin panel
  2. Find MAC Filtering or Access Control
  3. Add the unknown device's MAC address to the block list

Prevent Future Unauthorized Access

  • Use WPA3 or WPA2 encryption — Never use WEP or open (no password) networks
  • Use a strong, unique WiFi password — At least 12 characters, mixed letters/numbers/symbols. SterJo Wireless Key Generator creates these instantly
  • Don't share your WiFi password broadly — Use a guest network for visitors instead
  • Enable guest network — Most routers support a separate guest network that isolates visitors from your main devices
  • Scan periodically — A monthly scan with SterJo Wireless Network Scanner keeps you informed
  • Keep router firmware updated — Security patches close vulnerabilities that could be exploited

Frequently Asked Questions

1. Can my neighbor be using my WiFi without me knowing?

Yes, if they know your password or your network uses weak encryption. Signs include slower-than-expected internet speeds and unfamiliar devices in your network scan. A network scan with SterJo Wireless Network Scanner will reveal any connected devices immediately.

2. My phone shows a random MAC address — is this normal?

Yes. Modern iPhones (iOS 14+) and Android phones (Android 10+) use randomized MAC addresses by default for privacy reasons. Your own phone may appear with an unfamiliar MAC address that doesn't match any manufacturer. You can check your phone's WiFi settings to see its actual MAC address for your current network and compare it to the scan results.

3. I see "MSFT" or "Microsoft" as a vendor — what is it?

This is typically a virtual network adapter used by Windows Hyper-V or Windows 11's virtual machine features. It's your own PC — not an intruder. You may also see it from an Xbox console.

4. Will changing my WiFi password disconnect my smart home devices?

Yes. After changing your WiFi password you'll need to reconnect each smart home device to the new network. This varies by device but usually involves holding a reset button and re-running the device's setup app. It's worth the effort to secure your network.

5. Can I see what an unknown device is doing on my network?

You can monitor outbound network connections from your own PC using SterJo NetStalker. For full network-level traffic monitoring of other devices, you'd need router-level tools which vary by router model.

6. Is MAC address filtering enough to secure my WiFi?

It's a useful additional layer, but not sufficient on its own. MAC addresses can be spoofed by a determined attacker. The strongest protection is a long, unique WPA2/WPA3 password. Use MAC filtering as a complement to a strong password, not a replacement.

📚 Related Guides

Network

Scan Your Home Network for All Devices

Full guide to seeing everything connected to your WiFi.

Network

See Who Is Connected to Your WiFi

Real-time view of active connections on your network.

Wi-Fi

Generate a Strong WiFi Password

Create a secure, random WiFi password to lock out intruders.

Security

Monitor Network Activity in Windows

Track which programs are using your internet connection.

✅ Scan Your Network in Seconds

SterJo Wireless Network Scanner shows every connected device with its IP, MAC address, and manufacturer — free and no installation required.

Download SterJo Wireless Network Scanner (Free) →

💡 Quick Tip

Check your phone's WiFi settings to find its MAC address for your current network. Compare it to the scan results to identify your own devices with randomized addresses.

📊 Did You Know?

Most "unknown" devices discovered in home network scans turn out to be legitimate household devices under unfamiliar names — smart plugs, old phones, or IoT hardware bought years ago.