Who Is On My Wifi – Blocking Feature

If you’d like to learn more about software based blocking, please watch this video below.

Blocking Demonstration Video


Remember that Who’s On My Wifi and the blocking feature are powerful technology. They should only be used on your Home or Office Wireless. Usage at public locations such as at a library or coffee shop is not only against the End User License Agreement for the software, they may even be illegal depending on where you are.

Blocking is also traceable back to the person running Who’s On My Wifi if the need arises. So, be sure to use it responsibly. If you have any questions, please contact us at our support address.


Blocking in the Windows Software works as a network jammer to disrupt the network connection of devices that have been detected. Please note that this is different than a device not being on your network at all. Once a device has been detected by the software and is on the network, then it can be “blocked” which means we will send bad network data to the device to disrupt their network connection.

Although blocking is useful for short term disruption of intruders, a more secure measure, like changing the Wireless Encryption Key or physically removing any intruders from the wired LAN is recommended.

This is one of the reasons why we limit blocking in the Windows software to 3 devices at a time. Anything more than that, and you should probably change your wireless encryption key on your router and on all of the devices that connect to it.

Also, because we are sending network data to the device, it is possible that certain routers or switches will not forward this data and block effectively. It is usually best to test the blocking function on your network after purchasing. If it doesn’t work on your network, you may consider one of our router editions instead.

Router Editions

Blocking in our router editions is more secure than in our Windows edition because blocking in the router edition is able to filter any network traffic specifically targeted to go to the device being blocked at the hardware level. In this case, the intruder is still on the wireless, but unable to receive any packets. This is very similar to the technology used in a router MAC Filter.