Blog | G5 Cyber Security

ISP Device Tracking: What They Can See

TL;DR

Your ISP can detect devices connected to their router, but the level of detail varies. They generally see basic information like MAC addresses and IP addresses assigned, but not necessarily what you’re doing with those devices. Logging practices differ between ISPs.

Understanding What Your ISP Sees

When you connect a device to your home network using an ISP-provided router, several pieces of information become visible to the ISP. Here’s a breakdown:

1. Basic Device Identification

These details allow them to track a device, but not necessarily identify you using it without further information.

2. What ISPs Generally *Can’t* See

3. How ISPs Log Device Information

  1. Router Logs: ISP-provided routers often keep logs of connected devices, their IP addresses, and connection times. These logs are stored on the router itself or sent back to the ISP’s servers.
  2. Deep Packet Inspection (DPI): Some ISPs use DPI technology to examine network traffic for specific patterns. While they can’t see content, they might identify certain applications or services being used. This is less common due to privacy implications.
  3. Network Monitoring: ISPs monitor overall network performance and may collect data about bandwidth usage per IP address.

4. Checking Your Router’s Logs (If Possible)

Accessing router logs depends on the router model. Here’s a general approach:

  1. Find your Router’s IP Address: Open Command Prompt (Windows) or Terminal (macOS/Linux) and type ipconfig (Windows) or ifconfig (macOS/Linux). Look for the “Default Gateway” address.
  2. Access the Router Interface: Type the Default Gateway IP address into a web browser. You’ll be prompted for a username and password (often found on a sticker on the router itself, or in your ISP’s documentation).
  3. Locate Logs: Once logged in, look for sections like “Logs,” “System Logs,” or “Connection Logs.” The exact location varies by manufacturer.

Important Note: Many ISPs lock down access to router logs on their provided equipment to prevent users from investigating.

5. Protecting Your Privacy

Exit mobile version