contador web Skip to content

Instagram: How to find out if anyone is using your account and take down the attacker | Social networks

Instagram offers a security feature that lets you detect and counteract account invasions. Initially available in the iPhone (iOS) app, the function shows on the phone screen a complete list of the latest hits, location information, and which device Instagram is connected to. With this data, users can check if the login was made by someone else and "overthrow" access using the button to log the suspect.

Instagram Launches Functions to Avoid Offensive Comments and Bullying

In case of an attack, the photo network suggests that users change their password and enable 2-step verification. In addition, using the "Login Activity" feature is a quick and effective way to identify malicious access.

Check out the following tutorial on how to identify and prevent intrusions to your Instagram account from your mobile phone.

How to unsubscribe from an Instagram message

How to unsubscribe from an Instagram message

Want to buy a cell phone, TV and other discounted products? Meet the Compare TechTudo

Step 1. Open Instagram, access your profile and tap the three bar icon at the top of the screen;

By accessing Instagram app options Photo: Playback / Marvin CostaBy accessing Instagram app options Photo: Playback / Marvin Costa

By accessing Instagram app options Photo: Playback / Marvin Costa

Step 2. Go to "Settings" and tap the "Security" option;

By accessing Instagram's security options Photo: Playback / Marvin CostaBy accessing Instagram's security options Photo: Playback / Marvin Costa

By accessing Instagram's security options Photo: Playback / Marvin Costa

Step 3. Go to "Login Activity" to see all recent access to your account. If you find any suspicious login, click on the three point icon next to the description of that access;

By checking access information recorded in the Instagram application Photo: Playback / Marvin CostaBy checking access information recorded in the Instagram application Photo: Playback / Marvin Costa

By checking access information recorded in the Instagram application Photo: Playback / Marvin Costa

Step 4. To bring down this access, click the "Exit" button. A when you log out of your account on the suspicious device. As an extra security alternative, social networking suggests that you change your password after this procedure.

By overthrowing a suspicious access to your Instagram account Photo: Reproduo / Marvin CostaBy overthrowing a suspicious access to your Instagram account Photo: Reproduo / Marvin Costa

By overthrowing a suspicious access to your Instagram account Photo: Reproduo / Marvin Costa

Use the feature whenever you suspect someone is accessing your Instagram account.