How to Check Your iPhone for Spyware & Stalkerware

🔍 Check for Spyware

Detect Surveillance Apps

Complete guide to detecting spyware, stalkerware, and unauthorized monitoring on your iPhone. Check for tracking and surveillance from abusers, employers, or malicious actors.

⏱️ 30 minutes 🟡 Moderate 🔴 Critical Security

⚠️ Signs You May Be Monitored

Spyware and stalkerware are real threats. If someone has physical access to your iPhone, they can install monitoring software to track your location, read your messages, listen to calls, and access your photos. This guide will help you detect and remove surveillance software.

What is Spyware/Stalkerware?

Spyware (also called stalkerware or monitoring software) is software installed on your iPhone that allows someone else to:

  • 📍 Track your location in real-time
  • 📱 Read your messages - SMS, iMessage, WhatsApp, Signal
  • 📞 Listen to calls - Record or monitor phone conversations
  • 📸 Access photos and videos - View your camera roll
  • 🌐 Monitor browsing history - See what websites you visit
  • ⌨️ Log keystrokes - Capture passwords and messages as you type
  • 🎤 Activate microphone - Listen to conversations remotely

Red Flags: Signs of Spyware

  • 🔴 Battery drains faster than normal
  • 🔴 Phone gets hot when not in use
  • 🔴 Data usage is unusually high
  • 🔴 Strange apps you didn't install
  • 🔴 Phone restarts on its own
  • 🔴 Someone knows things they shouldn't (your location, who you talked to, etc.)
  • 🔴 Settings changed without your knowledge
  • 🔴 Notifications from unknown apps

Step-by-Step Spyware Check

1 Check Apple ID Devices

Path: Settings → [Your Name] → Devices

Look for devices you don't recognize. If someone added their device to your Apple ID, they can access your iCloud data.

What to do: Remove any unknown devices immediately.

📸 Screenshot: Apple ID devices list

2 Check Family Sharing

Path: Settings → [Your Name] → Family Sharing

Abusers often add themselves to Family Sharing to track location and monitor purchases.

What to do: Leave family sharing if you don't recognize members or feel unsafe.

📸 Screenshot: Family Sharing settings

3 Check Location Sharing

Path: Settings → [Your Name] → Find My → Share My Location

Check who can see your location. Remove anyone you don't want tracking you.

Also check: Find My app → People tab → See who you're sharing with

📸 Screenshot: Share My Location settings

4 Check for Configuration Profiles

Path: Settings → General → VPN & Device Management

Configuration profiles can give someone remote access to your device. If you see profiles you didn't install, this is a major red flag.

What to do: Delete any unknown profiles immediately.

📸 Screenshot: VPN & Device Management (should be empty)

5 Review Installed Apps

Path: Settings → General → iPhone Storage

Look for suspicious apps, especially:

  • Apps with generic names (System Update, Device Care, etc.)
  • Apps you don't remember installing
  • Apps that use a lot of storage or battery
  • Known stalkerware apps (mSpy, FlexiSPY, Spyzie, etc.)

What to do: Delete suspicious apps.

📸 Screenshot: iPhone Storage app list

6 Check App Privacy Report

Path: Settings → Privacy & Security → App Privacy Report

Enable App Privacy Report and wait 24 hours. Then review which apps are accessing your location, camera, microphone, and contacts.

Red flags: Apps accessing sensors when you're not using them.

📸 Screenshot: App Privacy Report

7 Check Screen Time Data

Path: Settings → Screen Time

Review app usage. If apps show usage when you weren't using your phone, they may be running in the background monitoring you.

📸 Screenshot: Screen Time app usage

8 Check Battery Usage

Path: Settings → Battery

Look for apps using excessive battery, especially when you're not using them. Spyware runs constantly in the background.

📸 Screenshot: Battery usage by app

9 Use Safety Check

Path: Settings → Privacy & Security → Safety Check

Apple's Safety Check feature helps you review and reset access to your data. Use Emergency Reset if you're in immediate danger.

Emergency Reset will:

  • Stop location sharing with all people and apps
  • Reset privacy permissions for all apps
  • Sign out of iCloud on other devices
  • Change your Apple ID password
📸 Screenshot: Safety Check → Emergency Reset

Security Scanning Apps

🛡️ Recommended Security Apps for Spyware Detection

While iOS is generally secure, these apps can help detect anomalies and provide additional protection:

🥇 Norton Mobile Security

$19.99/year

Best overall security app. Comprehensive protection with web scanning, WiFi security, and dark web monitoring.

  • ✅ Web protection against phishing
  • ✅ WiFi security scanner
  • ✅ Dark web monitoring
  • ✅ Device security report
Download Norton

🥈 Bitdefender Mobile Security

$15/year

Lightweight and affordable. Enterprise-grade protection at consumer price.

  • ✅ Web protection
  • ✅ Scam alert
  • ✅ Account privacy check
  • ✅ Minimal battery impact
Download Bitdefender

🥉 Avast Mobile Security

FREE (Premium available)

Free option with basic protection. Good for budget-conscious users.

  • ✅ Web Guard (phishing protection)
  • ✅ Photo Vault
  • ✅ Identity protection
  • ⚠️ Free tier limited - Premium recommended
Download Avast

If You Find Spyware: What to Do

⚠️ Safety First

If you're in an abusive relationship, be careful. Removing spyware may alert your abuser that you know you're being monitored. Consider:

  • 🤝 Contact a domestic violence hotline - National DV Hotline: 1-800-799-7233
  • 📱 Use a safe device - Borrow a friend's phone to research and plan
  • 🏃 Have an escape plan - Before removing spyware
  • 👮 Document evidence - Take screenshots before removing

Steps to Remove Spyware:

  1. Document everything - Take screenshots of suspicious apps, profiles, and settings
  2. Change all passwords - Apple ID, email, banking, social media (from a safe device)
  3. Remove suspicious apps - Delete any apps you don't recognize
  4. Delete configuration profiles - Settings → General → VPN & Device Management
  5. Remove unknown devices - Settings → [Your Name] → Devices
  6. Stop location sharing - Settings → [Your Name] → Find My
  7. Use Safety Check Emergency Reset - Settings → Privacy & Security → Safety Check
  8. Factory reset (if needed) - See Guide #12 for complete instructions

Prevention: Stop Spyware Before It Starts

  • 🔐 Use a strong alphanumeric passcode - Not a simple PIN
  • 👁️ Never share your passcode - Even with partners or family
  • 📱 Keep your phone with you - Don't leave it unattended
  • 🔒 Enable Face ID - Harder to bypass than passcode
  • ⏱️ 30-second auto-lock - Lock quickly when not in use
  • 🚫 Don't jailbreak - Makes spyware installation easier
  • Keep iOS updated - Security patches fix vulnerabilities

Resources for Domestic Violence Survivors

  • 📞 National Domestic Violence Hotline: 1-800-799-7233
  • 💬 Text "START" to 88788 for text support
  • 🌐 TheHotline.org - Online chat available
  • 🛡️ NNEDV Safety Net: Tech safety resources for survivors
  • 📱 Coalition Against Stalkerware: Detection and removal help

Troubleshooting

Q: Can spyware survive a factory reset?

A: No. A factory reset removes all apps and data, including spyware. However, if you restore from a backup that contains spyware, it will return.

Q: Is it illegal to install spyware on someone's phone?

A: Yes, in most cases. Installing monitoring software without consent is illegal in most jurisdictions. Exceptions exist for parents monitoring minor children.

Q: Can Apple detect spyware?

A: iOS has built-in protections, but Apple doesn't actively scan for spyware. You need to check manually or use security apps.

Q: My partner says they need to "check my phone for safety." Is this normal?

A: No. This is a red flag for controlling behavior. Healthy relationships respect privacy.

Affiliate Disclosure: Some links are affiliate links. We may earn a commission at no cost to you.

Last Updated: January 24, 2026

Part of the AIMF Security iPhone Defense Guides

If you're in immediate danger, call 911 or your local emergency number.

Sign Up for Our Newsletter

Enter your email for more cybersecurity defense strategies.

You have Successfully Subscribed!