Device Tracking

How to track and potentially recover a stolen device not protected by a security software

We decided to gather a few tips that may help locate a missing device without any anti-theft protection. There’s always hope!

January 25, 2013

We get lots of questions from people that find about Prey only after their devices go missing, and we hate to tell them we can't help them. So we decided to gather a few tips that may help locate a missing device without any anti-theft protection. There's always hope!

Call your device

This sounds like a no-brainer, but for the sake of completeness: if your device is a phone, start by calling yourself! If might just be lying under a couch in your friend's place.

Look for the device's unique ID

Every electronic device has a unique serial number and a UUID, and phones have an additional one: the IMEI or MEID. This will allow you to prove the device is yours if needed.

Normally, you can get those numbers by looking underneath the battery, or in the settings menu if your device is an iPhone or iPad. Now, if the device is gone, you can also check the device's original packaging, since they’re usually printed on the barcode or label of the box the device came in. In some cases, you can find them in the original invoice.

Now, if it's a SIM-enabled device you should contact your service provider. They can lock down the chip plus provide the device's IMEI since they should have this information. Very handy if you went with paperless billing!

If you managed to find one of these numbers, write it down since they can be useful when you report the theft/loss of your device to the police. If they ever confiscate goods in a raid, you can claim your property if you provided that information when reporting the theft. According to Livemint,

Every time a phone logs into a particular network to make or receive calls, its IMEI number is automatically emitted and tracked. This gets registered with the service provider. […] The police has a database of phones which are in white, grey and black lists, so a phone which is in the black list is known to be stolen. Once it’s reported stolen by you, the IMEI number is blacklisted across the country. If an IMEI device on the black list is used to make a call, the police will get to know about it immediately. There is a chance that they will track the phone if it comes up for resale or reset.

Remote access means remote installing

Did you have LogMeIn or other remote desktop solutionsinstalled on your system?If that's the case, you might be in luck! Even though watching what the thief is doing isn't enough for catching him/her, there's something better you can do: installingPrey! Wait for the right time when the thief clearly isn't using the device (like a long idle time), and use the remote access to download Prey from our download page, install it, and set it up. Using this you can gather all the important data you need to alter the police, get your stuff back, and put the bad guys in jail—like webcam pictures, map location, IP address, and screenshots. We know this works.

LogMeIn is not the only choice, of course. Google Chrome also has a Remote Desktop extension that works pretty neat, but only on computers.

The IP Address might get you the real one

Did you know some of your daily-use apps and websites register your IP? Dropbox is one of them, as well as Gmail and even Facebook.The IP address is a unique number assigned to internet accesses by Internet Service Providers (ISPs), and they do know the physical location of every IP address they assign.

Now, they don't give away this information freely -- you need a warrant to get it. So if Dropbox, Gmail or Facebook alerts you of access from a strange IP (read below for how to get it), write it down and give that number to the police. If you insist enough they might request the ISP that owns that IP address to reveal the information.

This information may not be as solid as the location or the picture of the thief, but you can always give it a shot.


Dropbox's background process usually starts when the system boots, so if the device is turned on it's very likely to work. Just go to the Security tab and hover on the (i) listed on recent activity to see the devices'last IP, like the picture below.

(Tip and image via readwrite)


Gmail also records accesses and active connections. You can check it by logging into Gmail, and then looking at the right side of the footer: Last account activity: X minutes ago. Click now on details... and boom! You can see the latest 10 IPs accessing your account, plus the country, type of browser, and time. This is also helpful to end sessions if you forgot to sign out on other computers.


Just as in Gmail, Facebook logs your active sessions. Go to Settings, Security, and there's the Active Sessions option. To see an IP address, hover on the session's location. You can also close any forgotten sessions this way.

4. WANTED: Offer a reward

If you really, really want your device back and don't care about throwing in some money, you could offer a reward for it. Yup, really. If it's a phone, simply text your missing device "Hey, if you found this phone I'm willing to pay $X to get it back. Please reply." or something like that. Keep it civilized, and don't threaten! You don't know if the person reading that is truly the thief and also you do want your stuff back, right?

The other option is posting WANTED signs all over the neighborhood. It could be quite unpleasant, but if your device (or what's in it) really matters to you, it could be your last chance. Tracking software needs devices to be turned on to work, and this old-school solution may workeven if they're not:

@lookout @preyproject At the end I recovered the phone by putting a paper Ad where I lost it (beach) #oldtech solution:

— Roman Valls (@braincode) January 23, 2013

On the same Issue

Prey & Microsoft Intune: A thorough comparison

Can Prey and Intune coexist? We developed a guide to weigh up our differences, so you can decide what's best for your organization.

September 27, 2022
keep reading
How To Track Location for Several Windows Devices in Your Company

Learn how to track all your company’s Windows devices and simplify device management to improve security.

September 2, 2022
keep reading
Enterprise Phone Tracking: How It Works and Why It Is Important

Learn why it may be beneficial to track your employees’ phones, what tools you should use, and how to keep it within the legal framework.

August 23, 2022
keep reading
The Complete Guide to Choosing a Computer Tracking Software

Learn about the benefits of an enterprise computer tracking software for your company as well as the best software solutions available.

August 23, 2022
keep reading