Updated April 2026 · 8 min read

How to Know If Someone Is Tracking Your Phone — Signs, Detection, and Prevention

That uneasy feeling that someone knows where you are, what you're reading, or who you're calling — it might not be paranoia. Stalkerware and covert tracking have grown into a serious problem, with the Coalition Against Stalkerware reporting a 37% increase in detected installations between 2023 and 2025. This guide explains the signs that someone is tracking your phone, how to detect and remove tracking software, and the difference between illegitimate spying and ethical, consent-based location sharing.

How phones get tracked without your knowledge

Before we cover the warning signs, it helps to understand the methods someone might use to track you. There are four main categories, ranked from most common to least common:

1. Stalkerware / spyware apps

These are commercial apps marketed as "parental monitoring" or "employee oversight" tools but frequently used by abusive partners, stalkers, and controlling family members. Names you may have heard include mSpy, FlexiSpy, Cocospy, and Spyic. They typically require a few minutes of physical access to your phone to install, and once running, they can:

  • Track your GPS location in real time.
  • Read your text messages, emails, and chat apps.
  • Record phone calls.
  • Access your camera and microphone.
  • Log keystrokes (including passwords).

These apps are designed to be invisible. They hide from the app drawer and often disguise themselves as system processes like "System Service" or "Phone Health."

2. Built-in tracking features misused

Someone with access to your Apple ID or Google Account can use Find My or Find My Device to track your location without installing anything. An ex-partner who knows your password, a parent who set up your phone, or a roommate who once logged into your device can all do this remotely.

3. Shared location via messaging apps

Apps like WhatsApp, Google Maps, iMessage, and Telegram have "share my location" features. If someone enabled continuous location sharing during your relationship and you forgot to turn it off, they can still see where you are — indefinitely, in some cases.

4. SS7 network vulnerabilities and cell-site simulators

These are sophisticated attacks used by intelligence agencies and, occasionally, criminal organizations. SS7 exploits abuse vulnerabilities in the telephone signaling system to intercept calls and track locations. Cell-site simulators (sometimes called "Stingrays") impersonate cell towers to capture phone data. These are extremely rare for ordinary individuals and essentially impossible to detect with consumer tools. If you're a journalist, activist, or political figure and suspect this level of surveillance, consult a professional security firm.

Tracking should always be transparent

Tracify works by sending an SMS that the recipient must actively approve before any location data is shared. No hidden apps, no covert access, no spying. That's how ethical tracking should work.

See How Tracify Works →

Warning signs that your phone is being tracked

No single sign is definitive proof of tracking, but if you notice several of these simultaneously, it warrants investigation.

Battery draining faster than usual

Tracking apps run continuously in the background, using GPS, cellular data, and CPU resources. If your phone's battery life has dropped noticeably — say from lasting all day to dying by 3 PM — without any change in your usage habits, it could indicate background software.

How to check:

  • iPhone: Settings > Battery. Look for unfamiliar apps consuming disproportionate power.
  • Android: Settings > Battery > Battery Usage. Sort by consumption and look for unknown services.

Unexplained data usage spikes

Stalkerware transmits collected data (location, messages, recordings) to a remote server. This requires mobile data. If your data usage has increased significantly without explanation, check which apps are responsible.

How to check:

  • iPhone: Settings > Cellular. Scroll down to see data usage per app.
  • Android: Settings > Network & Internet > Data Usage > App Data Usage.

Look for apps you don't recognize consuming hundreds of megabytes.

Phone gets hot when idle

If your phone feels warm to the touch while sitting on a table — no apps open, no charging — something is working in the background. GPS tracking is particularly processor-intensive and generates noticeable heat.

Unusual sounds during calls

While modern digital networks have eliminated most call quality issues, some tracking apps that intercept or record calls can introduce faint clicking, static, or echoing sounds. This is not a reliable indicator on its own (network issues cause the same symptoms), but combined with other signs, it's worth noting.

Phone takes longer to shut down

When you power off your phone, it needs to close all running processes. If stalkerware is running, the shutdown process may take noticeably longer than usual, especially if the app is trying to transmit a final batch of data before the phone goes offline.

Unfamiliar apps or profiles

This is the most concrete indicator. Stalkerware has to exist on your phone as an installed app or configuration profile, even if it's hidden from the normal app drawer.

How to check on iPhone:

  • Go to Settings > General > VPN & Device Management. If you see any profiles you didn't install (especially "MDM" or "Mobile Device Management" profiles), someone may have gained control of your device.
  • Check Settings > General > iPhone Storage. Scroll through every app. If you see anything you don't recognize, research it.

How to check on Android:

  • Go to Settings > Apps > Show System Apps (varies by manufacturer). Look for apps with generic names like "System Service," "Phone Health," "Update Service," or anything you don't recognize.
  • Check Settings > Security > Device Admin Apps. If any app you didn't authorize has device administrator privileges, that's a red flag.
  • Check Settings > Accessibility > Installed Services. Stalkerware often requests accessibility permissions to read screen content.

Someone knows things they shouldn't

This is the most unsettling sign and often the one that prompts people to investigate. If someone consistently knows where you've been, who you've talked to, or what you've said in private messages — without you telling them — your phone may be compromised.

How to detect tracking apps

Beyond checking for the signs above, you can use dedicated tools to scan for stalkerware.

Use a reputable antivirus/anti-stalkerware app

  • Malwarebytes (iOS and Android) — free scan that detects most known stalkerware.
  • Lookout (iOS and Android) — specifically designed to detect stalkerware and notify you.
  • Kaspersky (Android) — their TinyCheck tool was specifically developed to detect stalkerware and is recommended by the Coalition Against Stalkerware.
  • Certo (iOS and Android) — focused entirely on spyware detection. The iOS version can detect configuration profile-based spyware that other scanners miss.

Check location sharing settings

Review every app that has access to your location:

  • iPhone: Settings > Privacy & Security > Location Services. Review every app. Set unknown or suspicious apps to "Never."
  • Android: Settings > Location > App Location Permissions. Review all apps with "Allowed all the time" access. Very few apps legitimately need continuous location access.

Check for shared Apple ID or Google Account access

  • Apple: Settings > [Your Name] > scroll to bottom to see all devices signed into your Apple ID. Remove any device you don't recognize.
  • Google: myaccount.google.com > Security > Your Devices. Remove unrecognized devices. Also check "Third-party apps with account access" and revoke anything suspicious.

How to remove tracking from your phone

If you've confirmed or strongly suspect tracking, here's how to stop it.

Option 1: Remove the specific app or profile

If you've identified the stalkerware app, uninstall it. On Android, you may need to revoke its device administrator privileges first (Settings > Security > Device Admin Apps > deselect the app). On iPhone, remove any unknown configuration profiles (Settings > General > VPN & Device Management > tap the profile > Remove).

Option 2: Factory reset

The nuclear option. A factory reset removes all apps and data, including any stalkerware. Before doing this:

  1. Back up your photos, contacts, and important data to a computer (not to the cloud account that may be compromised).
  2. Perform the reset: iPhone (Settings > General > Transfer or Reset iPhone > Erase All Content and Settings) or Android (Settings > System > Reset > Factory Data Reset).
  3. Set up the phone as new — do NOT restore from a backup, as the stalkerware may be included in the backup.
  4. Change all passwords (email, Apple ID / Google Account, social media, banking) from the freshly reset phone.
  5. Enable two-factor authentication on all accounts.

Option 3: Get a new phone number

If the tracking is tied to your phone number (via SIM-based attacks or SMS interception), a new number may be necessary. Contact your carrier to get a new SIM with a new number. Keep the old number active briefly to transfer important accounts, then deactivate it.

Important: If you're in danger

If the person tracking you is an abusive partner or stalker, removing the tracking app may alert them (many stalkerware apps notify the installer when they're removed). If you're in a domestic violence situation, contact the National Domestic Violence Hotline (1-800-799-7233 in the US) before making changes to your phone. They have tech safety specialists who can help you plan a safe exit. In the UK, contact Refuge (0808 2000 247).

Legitimate vs. illegitimate tracking

Not all tracking is malicious. Understanding the difference matters.

Legitimate tracking (with consent)

  • Family location sharing — parents and children voluntarily sharing locations via Apple Family Sharing, Google Family Link, or Life360. Everyone knows about it and agrees to participate.
  • Consent-based services — services like Tracify that send an explicit SMS request. The recipient must actively tap a link and approve sharing. If they ignore the message, nothing is shared. No software is installed on their phone. For a deeper look at the legal framework, see our article on whether tracking a phone number is legal.
  • Employee tracking with disclosure — companies that track company-owned devices with a clear, signed policy. The employee knows and has agreed as a condition of using the company device.
  • Find My / Find My Device — tracking your own devices or devices within your family group with everyone's knowledge.

Illegitimate tracking (without consent)

  • Stalkerware installed on a partner's phone — illegal in most jurisdictions, even between spouses.
  • Covert employee monitoring on personal devices — an employer tracking an employee's personal phone without disclosure violates privacy laws.
  • Ex-partner using retained account access — continuing to track someone via a shared Apple ID or Google Account after a relationship ends is unauthorized access.
  • AirTag / SmartTag stalking — placing a Bluetooth tracker in someone's bag or car without their knowledge. Both Apple and Google now have anti-stalking alerts that notify you when an unknown tracker is traveling with you.

The critical dividing line is informed, ongoing consent. If the person being tracked doesn't know about it and hasn't agreed to it, it's almost certainly illegal and always unethical.

How to protect yourself going forward

Once you've removed any trackers, take these preventive steps:

  1. Use a strong, unique passcode — stalkerware requires physical access to install. A 6-digit PIN or alphanumeric passcode prevents casual access. Never share your passcode with anyone.
  2. Enable biometric authentication — Face ID or fingerprint unlock means no one can access your phone while you're asleep or not looking.
  3. Review app permissions monthly — set a calendar reminder to check which apps have location, microphone, and camera access.
  4. Keep your OS updated — software updates patch security vulnerabilities that stalkerware exploits.
  5. Don't leave your phone unattended — especially around people you don't fully trust. It takes less than three minutes to install stalkerware.
  6. Use a password manager — unique passwords for every account mean that compromising one doesn't compromise everything.
  7. Review shared accounts — after a breakup or falling out, change shared passwords and remove the other person's access from Apple Family Sharing, Google Family Group, and any shared location apps.
  8. Check for AirTags regularly — if you're concerned about physical trackers, use Apple's "Find My" app (even on Android via the "Tracker Detect" app) to scan for unknown Bluetooth trackers near you.

Frequently asked questions

Can someone track my phone through a text message?

Not through a standard text message. However, if a text contains a link that installs malware when tapped, that malware could enable tracking. Never tap links in messages from unknown senders. Legitimate services like Tracify send SMS requests that only share your location if you explicitly approve — they can't access your phone just by sending a text. Visit our FAQ page for more on how consent-based tracking works.

Can my phone be tracked if location services are off?

With location services off, GPS-based tracking stops. However, some stalkerware can re-enable location services silently. Your phone can also be approximately located via cell tower triangulation (by your carrier) and Wi-Fi positioning, neither of which requires location services to be "on" in your settings. Turning off location services reduces but doesn't eliminate all tracking vectors.

Does a VPN prevent phone tracking?

A VPN encrypts your internet traffic and masks your IP address, which prevents tracking via IP geolocation. However, it does not affect GPS tracking, cell tower tracking, or stalkerware that's already installed on your phone. A VPN is one layer of privacy, not a complete solution. For a broader look at tracking methods, see our guide on how to track a phone number.

Is it possible to track a phone without installing software?

Yes. Someone with access to your Apple ID or Google Account can track your phone via Find My or Find My Device without installing anything. Shared location features in WhatsApp, Google Maps, and iMessage also work without additional software. This is why changing passwords and reviewing shared access is critical after any security concern.

Ready to try Tracify?

Start tracking any phone number in 60 seconds. No app install needed.

Try Tracify for $0.50 →