📡 WiFi Analyzer
Detect suspicious nearby Wi‑Fi before you connect
Use WiFi Explorer to scan nearby networks and quickly spot risky conditions like open networks, confusingly similar network names, and inconsistent security settings. This is a defensive visibility tool for safer decisions on public Wi‑Fi.
đź’ˇ What This Guide Covers
We focus on practical visibility: scanning nearby networks, reviewing security types (Open vs WPA2/WPA3), and using WiFi Explorer views (signal strength, spectrum, advanced details) to spot anomalies before connecting.
How Scanning Works (High Level)
1 Scan prerequisites and data flow
Wi‑Fi must be enabled and macOS Location Services must be enabled (and granted to WiFi Explorer) for scanning.

⚠️ Important
This guide helps you make safer choices. It does not connect to networks, break encryption, or perform offensive actions. If something looks suspicious, the safest response is to not connect and use an alternate network.
Step 1: Enable Location Services for WiFi Explorer
1 Grant permission so WiFi Explorer can scan
If scanning is blocked, you’ll see a prompt asking to enable Location Services.

Enable Location Services and allow WiFi Explorer.

Step 2: Run a Scan and Review the Network List
2 Scan nearby networks and sort by risk
- Prefer WPA3 or WPA2 secured networks
- Treat Open networks as high-risk for sensitive activity
- Be cautious with confusingly similar network names

Step 3: Inspect Details for the Network You Plan to Use
3 Validate security and consistency
Look for security type, channel width, and whether multiple similar names appear. Use this to avoid surprises.

Step 4: Use Signal Strength and Spectrum Views
4 Compare signal behavior
Graphs help you spot unusual behavior and crowded channels. If anything feels off, don’t connect.

Step 5: Advanced Details (Optional)
5 Check advanced elements only if you need deeper clarity
This view is dense, but useful when you’re trying to understand what kind of network you’re seeing.

Two Key Concepts
6 Network names are not unique
Never trust a connection decision based only on the network name.

7 Risk triage before connecting
Use this decision flow to choose safer networks and avoid risky ones.

8 Threat model map (educational)
A simplified map of what you may see in a crowded area with many networks nearby.

âś… Verification
Before joining a public network, confirm it’s secured (WPA2/WPA3), avoid Open networks for sensitive work, and disable auto-join for networks you don’t fully trust.