Active Incident? 24/7 Response →
Witness

For Individuals & Families

AirTag Stalking: How to Detect One and What to Do

AirTags ping your phone after a few hours of separation from their owner — but only if your phone trusts them. Here is what does and does not trigger an alert, and how to find one that did not.

All articles·6 min read·April 25, 2026

If you're in immediate danger, do this first

If you suspect a current or former partner is tracking you with an AirTag and you have not yet found it, the safest move is to drive to a public location with witnesses (a police station, a family member's home) before searching. Removing the tag while still in your usual environment alerts the person tracking you.

How AirTag stalking actually works

An AirTag does not have GPS. It has a small Bluetooth radio that broadcasts a rolling identifier. Any nearby Apple device — billions of them — relays its location back to the tag's owner via Apple's Find My network. The owner sees their tag on a map without ever being near you.

Range is global. Update frequency is roughly every 1-15 minutes whenever an Apple device passes near the tag. The owner does not have to be close. They do not even have to know you are there.

What triggers the "Item Found Moving With You" alert

Apple added safety alerts after AirTag launched. Your iPhone running iOS 14.5+ will alert you if:

After ~8-24 hours away from the owner, the AirTag will also start beeping audibly when it moves. The owner can reset this clock by getting near the tag, which is what happens indomestic-surveillance scenarios — the abuser checks on the tag during the day, resetting the audible-beep timer indefinitely.

Why you might never see an alert

How to actively scan for an AirTag

  1. iPhone: Open Find My → Items → "Items Detected With You." Anything listed that you do not own is the tag.
  2. Android: Install Apple's free Tracker Detect app (Play Store). It only scans on demand — it does not run in the background. Run it weekly if you have concerns.
  3. Both: Bluetooth scanner apps (LightBlue, BLE Scanner) will surface every Bluetooth device within ~30 feet, including ones the system apps don't recognize. Look for unfamiliar UUIDs that follow you between locations.

Where AirTags get hidden on a vehicle

If you find one

  1. Do not just throw it away. Photograph it in place with timestamps. Photograph the location it was hidden.
  2. Hold it up to your phone (NFC). The AirTag's serial number and partial owner phone number will display. Screenshot this.
  3. Preserve the device. An AirTag in evidence is a felony stalking exhibit in most US jurisdictions. Disabling or destroying it removes the evidence.
  4. File a police report. The serial number lets law enforcement subpoena Apple for the registered owner's full identity.
  5. Get a forensic phone scan. Most AirTag stalking comes alongside other tracking methods — stalkerware on a phone, iCloud account compromise, vehicle GPS trackers. See stalkerware detection.

For protective-order filings

Courts respond well to documented digital tracking evidence. We work these cases underattorney-client privilege when there is a protective order, custody, or divorce matter pending — see domestic violence digital forensics.


Related services

Meet Your Practitioner

Quinnlan Varcoe

Founder & CEO

With operational experience across Fortune 50 security programs and the defense industrial base, Quinnlan founded Witness in 2022 to provide clients with the caliber of expertise typically reserved for the largest enterprises. Her work in threat intelligence and digital forensics has earned the trust of 26,000+ cybersecurity professionals who follow her analysis.

“26,000 professionals follow my work because I say what others won't — and I can back it up technically.”

Fortune 50 BackgroundDefense IndustryThreat IntelligenceDigital PrivacyIncident Response
Quinnlan Varcoe, Founder & CEO

AirTag detection: frequent questions

Certified Expertise

GIAC · AWS · Splunk · CompTIA

Trusted by partners across the practice

DAS Health
Exhibit A Cyber
Ally Security
KIRO Group
Black Mirage
Kalles Group
Gridware
CQR
Archstone Security
Cyvergence
Sentinel Cyber
Cloud Underground
Seron Security
Hexen
Koru Risk Management
DAS Health
Exhibit A Cyber
Ally Security
KIRO Group
Black Mirage
Kalles Group
Gridware
CQR
Archstone Security
Cyvergence
Sentinel Cyber
Cloud Underground
Seron Security
Hexen
Koru Risk Management