How to Use the Smart-Home Data Auditor
Paste your IoT logs or network captures to identify suspicious outbound data connections from your smart devices.
Step 1: Export logs from your router, firewall, or network monitoring tool.
Step 2: Paste the log output into the text area.
Step 3: Click "Audit Connections" to scan for known data-siphoning patterns.
Is Your Smart Home Spying on You?
The average smart home in 2026 has 22 connected devices. Each one communicates with external servers — but not all of those communications are benign. Smart TVs report viewing habits, voice assistants upload audio snippets, and IoT sensors transmit usage patterns to manufacturers. The Smart-Home Data Auditor helps you understand what your devices are sending and to whom.
Common Data-Siphoning Patterns
The tool scans for connections to known analytics endpoints (Google Analytics, Facebook tracking pixels), cloud upload services (AWS, Azure), voice data transmission, location tracking, and biometric data collection. Each finding is classified by risk level: high (voice/biometric/location), medium (analytics/platform), and low (firmware updates).
Frequently Asked Questions
Most routers have a "Logs" or "Traffic" section in their admin panel. Tools like Pi-hole, Wireshark, or Glasswire can also capture network traffic. Export the relevant section and paste it here.
Not necessarily. Some connections (firmware updates, encrypted channels) are legitimate. Focus on high-risk categories like voice data, location tracking, and biometric transmission. Use your firewall to block specific endpoints.
No. The analysis runs entirely in your browser. Your log data is not transmitted or stored anywhere.