How to Check If Someone Is Tracking Your Phone (2025)
- Cybrvault

- 10 hours ago
- 8 min read

Smartphones hold your life messages, photos, location, calendars. That’s why unwanted tracking (from a cheating partner to a malicious app or even a hidden Bluetooth tracker) is terrifying and, unfortunately, still common in 2025. This guide gives practical, step-by-step checks for iPhone and Android, how to detect Bluetooth trackers (AirTag and others), tools that help, what to do if you find tracking, and how to prevent it going forward!
Quick checklist: battery drain + unexplained data spikes + new apps or profiles + “Find My” alerts + unknown Bluetooth trackers + odd popups or reboots. If you see more than one sign, follow the removal + safety section below.
What “tracking” actually means
Tracking can be done in several ways:
Stalkerware / spyware apps installed on your phone that send location, messages, call logs, photos, or microphone recordings to someone else. The U.S. FTC defines stalkerware as apps that permit secret monitoring and lists the typical capabilities and warning signs. (Consumer Advice)
Built-in/location sharing features (Apple’s Find My, Google’s Location Sharing) that someone with your credentials or access can abuse. Apple and Google provide specific alerts and settings to detect unknown trackers. (Apple Support)
Bluetooth trackers (AirTags and many third-party trackers) placed on or near your possessions or vehicle. Devices like AirTag are designed to discourage unwanted tracking, but misuse is still reported and manufacturers provide detection alerts. (Apple Support)
Advanced commercial spyware (used by some governments or sophisticated attackers) — harder to detect and often requires professional help. Major security vendors and NGOs track these threats. (Electronic Frontier Foundation)
12 warning signs someone may be tracking your phone
Seeing one sign doesn’t prove tracking — but multiple signs strongly suggest a closer look.
Unexplained battery drain (device dies faster than normal). (Norton)
Spike in mobile data usage with no behavior change. (Norton)
New unfamiliar apps you didn’t install (often disguised). (Consumer Advice)
Device overheating when idle. (Norton)
Strange popups, redirects, or frequent crashes. (Federal Trade Commission)
Unusual account activity (emails about logins, password resets). (Federal Trade Commission)
“Unknown Accessory Detected” / “Unwanted Tracking” alerts on iPhone/Android (Find My / Unknown tracker). (Apple Support)
Microphone or camera activity when you’re not using them (lights, noise).
New mobile profiles or device management (MDM) installed — especially on iPhone (Profiles & Device Management). (Consumer Advice)
Calls drop or forward unexpectedly; texts you didn’t send. (Consumer Advice)
Your phone shows a different location in apps than you are (or you see location updates you didn’t share). (Consumer Advice)
You receive a physical tracker or your belongings move in ways you can’t explain. (e.g., finding an unknown AirTag in your car/bag). (WIRED)
Step-by-step checks: iPhone (iOS) — quick and deep
Quick checks (5 minutes)
Open Settings → Your Name → Find My. Ensure Find My iPhone settings are what you expect (if someone has your Apple ID/password, this can be abused). If you see a device you don’t recognize, investigate. (Apple Support)
Check Settings → Privacy & Security → Location Services: see which apps have access and whether “Always” access is granted unexpectedly. Revoke where needed. (Apple Support)
Tap notifications about “Unknown Accessory Detected” or “Unwanted tracking” and follow the onscreen steps to locate and play a sound. Apple documents how to locate and disable unknown trackers. (Apple Support)
Look at Settings → General → VPN & Device Management (or Profiles). Remove any management profiles you didn’t install. Some surveillance tools hide as profiles. (Consumer Advice)
Deeper checks (30–60 minutes)
Review installed apps (Settings → General → iPhone Storage). Look for apps with generic names or names you don’t recall installing. Some spy apps use innocuous names. (Consumer Advice)
Check battery usage for unusual app consumption (Settings → Battery → Battery Usage by App). An unknown app using lots of battery may be a red flag. (Norton)
Sign out & secure Apple ID: Go to iCloud.com, check for devices logged into your Apple ID. Remove unknown devices and change your Apple ID password with two-factor authentication (2FA) enabled. (Apple Support)
Scan with mobile security apps: reputable mobile security apps can flag known stalkerware; independent tests show some products perform better at detecting stalkerware. Use a tested app from a reputable vendor. (Malwarebytes)
Step-by-step checks: Android — quick and deep
Quick checks (5 minutes)
Open Settings → Google → Security → Find My Device / Location sharing to confirm no unexpected settings or devices. Google also provides Unknown tracker alerts for Bluetooth trackers. (Google Help)
Check Settings → Apps for unfamiliar apps or apps with Device & app permissions you didn’t grant. (Consumer Advice)
Look at Settings → Battery and Network & Internet → Data usage to spot unusual usage.
Deeper checks (30–60 minutes)
Safe Mode: Boot into Android Safe Mode (varies by device) to see which apps persist when third-party apps are disabled — persistent monitoring tools often still run as system apps or request elevated permissions. (Norton)
Check for device administrator apps: Settings → Security → Device admin apps. Remove admin rights for any suspicious app. (Consumer Advice)
Review installed profiles or MDM (corporate device management can be abused). If your device is personal, remove unknown MDM profiles. (Consumer Advice)
Scan with an anti-stalkerware tool: use a reputable app (Malwarebytes, Norton, etc.) — independent labs regularly test how well phones are protected against stalkerware. (Malwarebytes)

Detecting Bluetooth trackers (AirTag & third-party)
iPhone users: will get Unwanted tracking notifications and can use Precision Finding on supported devices to locate an AirTag or other item. Apple documents the steps to play a sound or locate the device. If you find one, remove the battery. (Apple Support)
Android users: can use built-in unknown tracker alerts (recent Android versions) or Apple’s Tracker Detect app to scan for nearby AirTags. Google’s help page explains unknown tracker alerts and what they mean. (Google Help)
If you find a tracker: don’t throw it out. Document the device (photos), remove the battery if safe to do so, and contact local law enforcement. Many jurisdictions treat physical tracking as a crime. (WIRED)
Best apps & tools (2025 guidance)
Anti-stalkerware / mobile security apps: choose vendors with independent lab recognition for stalkerware detection (look for AV-Comparatives, Malwarebytes reports) they can detect known stalkerware families and provide removal guidance. (Examples commonly recommended by labs: Malwarebytes, Norton; check latest lab results before choosing.) (Malwarebytes)
Apple Tracker Detect (Android) — to find AirTags. (WIRED)
Built-in OS alerts — don’t ignore Find My / Unknown Tracker notifications from iOS/Android. (Apple Support)
Note: Some commercial stalkerware is updated frequently. No app guarantees 100% detection, if you suspect government-grade spyware (Pegasus and similar), seek a digital forensics professional or a trusted security NGO.
The best all in one solution for protecting your identity online is Aura. Aura is a comprehensive digital security platform that helps individuals and families protect their online privacy, personal data, and devices from digital cyber threats. You can learn more and download here: https://aurainc.sjv.io/o416Xb
How to remove stalkerware / suspicious tracking (ordered, actionable)
Make a safety plan: If you suspect an abusive partner or stalker, consider your physical safety first. Contact local domestic violence resources or hotlines if needed. (WIRED)
Back up important data (preferably to an offline computer or secure cloud) — but do not back up apps if you suspect they’re compromised.
Change passwords and 2FA for Apple ID, Google account, and key services from a safe device (not the possibly-compromised phone). Use a different device to change passwords if possible. (Apple Support)
Use vetted anti-stalkerware app to scan and remove known stalkerware. Follow vendor instructions. (Malwarebytes)
Remove unknown profiles / admin rights (iPhone: Profiles & Device Management; Android: Device admin apps). (Consumer Advice)
Factory reset the phone if you still suspect compromise after scanning: Settings → General → Reset → Erase All Content and Settings (iPhone) or Settings → System → Reset options (Android). After reset, reinstall apps manually (don’t restore a full backup that might reintroduce spyware). (Federal Trade Commission)
Keep evidence (screenshots, logs) if you plan to involve law enforcement. Document physical trackers found. (WIRED)
If the spyware looks sophisticated or is government-grade
If you suspect highly sophisticated commercial spyware (e.g., remote exploits that survive resets or jailbreak/root), stop using the device for sensitive communications and contact a reputable digital forensics lab, privacy NGO, or lawyer. These tools are complex and often require specialists to confirm and remediate. (Electronic Frontier Foundation)
Legal & safety considerations
Stalking and non-consensual tracking are crimes in many jurisdictions. If you feel threatened or are in immediate danger, call emergency services. Document evidence for police. (WIRED)
If you remove evidence (like deleting apps) and later need to press charges, note what you removed and why. Keep backups/screenshots where possible.
Privacy first: involve trusted friends, hotlines or legal counsel before confronting a suspected abuser — that confrontation can escalate danger.
Prevention: lock it down for good
Use strong unique passwords and enable 2-factor authentication for Apple ID, Google account, email, and password managers. (Apple Support)
Keep iOS/Android updated — security patches close many exploit vectors. (Federal Trade Commission)
Limit app permissions: only give Location, Microphone, Camera access when needed, and prefer “While Using the App” for location. (Apple Support)
Enable Find My protections (Activation Lock on iPhone) to prevent someone else from misusing your Apple ID. (Apple Support)
Be cautious with lending your phone, and inspect any device someone else gives you before trusting it. Stalkerware often requires initial physical access. (Consumer Advice)
FAQ
Q: Can a factory reset always remove spyware?
A: In most consumer-grade stalkerware cases, yes — but not always for advanced, persistent threats. If you suspect state-level spyware, consult a specialist. (Electronic Frontier Foundation)
Q: I got a “Find My” alert — does it mean someone is tracking me?
A: It indicates a tracker was detected nearby. Follow the alert to play a sound/find the item. It’s often a misplaced item, but could be malicious. (Apple Support)
Q: Which anti-spyware app should I use?
A: Use reputable vendors with strong independent lab results for stalkerware detection (check the latest AV-Comparatives / Malwarebytes reports). No single app is perfect. (Malwarebytes)
Resources & hotlines
U.S. FTC: Stalkerware guidance and safety tips. (Consumer Advice)
Apple Support: Detecting unwanted trackers & AirTag guidance. (Apple Support)
Google Support: Find unknown trackers (Android). (Google Help)
Malwarebytes / independent security blogs: recent stalkerware investigations and removal tips. (Malwarebytes)
Final checklist (what to do right now)
From a safe device, change your Apple/Google account passwords and enable 2FA. (Apple Support)
On the suspected phone: check Location Services, installed apps, battery/data usage, and device management profiles. (Norton)
Scan with a reputable anti-stalkerware app. (Malwarebytes)
If you find a physical tracker, document it and contact local police. (WIRED)
If unsure or you see advanced signs, consult a digital forensics professional. (Electronic Frontier Foundation)
Have more questions or need Help Getting Secured? Contact Cybrvault Today!
Protect your business, your home, and your digital life with Cybrvault Cybersecurity, your trusted experts in:
• Security audits
• Business network protection
• Home cybersecurity
• Remote work security
• Incident response and forensics
🔒 Don’t wait for a breach, secure your life today!
Visit www.cybrvault.com to schedule your free consultation!
How to Check If Someone Is Tracking Your Phone
How to Check If Someone Is Tracking Your Phone
.png)



Comments