IRL Scan

IRL Scan looks at your real-world surroundings and tells you which devices, networks, and signals are around you. It scans Wi-Fi networks, Bluetooth devices, BLE beacons, NFC tags, and (on supported hardware) AirTag-style trackers, then flags anything suspicious.

Opening IRL Scan

Open from the Stealth tools menu. The screen opens with five tabs: Wi-Fi, Bluetooth, BLE, NFC, and Trackers. Hit Scan to refresh any tab.

What It Scans

Wi-Fi. Every Wi-Fi network in range with SSID, BSSID, channel, security mode, and signal strength. Rogue or hidden networks are flagged.

Bluetooth Classic. Paired and discoverable Bluetooth devices, plus device class (audio, computer, peripheral, etc).

BLE. Bluetooth Low Energy advertisers including fitness sensors, smart-home devices, and beacons.

NFC. Tap an NFC tag or card to read its contents (NDEF records, ID, type) without writing or modifying it.

Trackers. Detects AirTag, SmartTag, Tile, and generic Find My / Find My Device beacons. Persistent trackers that follow your location across scans are flagged for follow-up.

Suspicious Device Detection

  • Rogue Wi-Fi. SSIDs that mimic well-known networks (evil twin), captive portals, and open networks pretending to be enterprise
  • Persistent trackers. Unknown BLE trackers that appear in multiple consecutive scans, especially while you are moving
  • Stealth peripherals. Bluetooth keyboards, mice, or audio devices you did not pair
  • Beacon spoofing. Devices broadcasting Apple or Google beacon UUIDs from non-Apple, non-Google hardware

Scan Modes

Quick scan. Single pass that takes a few seconds. Good for a snapshot.

Continuous scan. Background scan that updates every few seconds and tracks devices over time. Useful when traveling or in a new location.

Deep scan. Slower scan that probes for hidden Wi-Fi networks, low-power BLE advertisers, and trackers in long-interval mode.

Settings

Notify on trackerPush a notification when a persistent unknown tracker is detected
Auto-scan on travelTrigger a quick scan when location changes significantly
Scan historyKeep a log of past scans to compare device lists across locations
Trusted devicesMark your own devices as trusted so they stop showing up as unknown
NFC write protectionRead-only mode for NFC scanning (default on)

Permissions Needed

  • Nearby devices for Bluetooth and BLE scanning
  • Location for Wi-Fi scan results (Android requirement)
  • NFC for tag reading

Stealth never uploads scan results. Everything runs on-device.

Why Use IRL Scan

Travel safety. Spot rogue Wi-Fi networks in airports, hotels, and cafes before you connect.

Tracker detection. Find AirTags or other trackers that may have followed you home or into your car.

Smart-home audit. See every BLE device broadcasting in your house with one tap.