Spycam Finder

Find all connected devices on your network including hidden cameras

Concerned about your privacy?

When you travel for business or leisure, you are excited about seeing new places and connecting with people. Privacy intrusions from hidden cameras in your vacation rental should be the least of your worries. It is sad but this is the world we live in.

At d.moat we are driven to create technology that solves today's problems and helps. We created our free spycam finder utility to help find any hidden devices including spy cameras on any WiFi or Ethernet LAN. To use this, simply download the appropriate application to your computer and run. This utility is completely free and we don't require any registration, neither do we collect any data. Once you are done with the scan, you can remove the utility or leave it installed for next time you intend to use it. The spycam finder utility is totally self-contained and doesn't communicate to any cloud servers.

In the news

Download free Spycam Finder

Installation instructions are available in the 'readme' file

Windows

d.moat's free Spycam Finder for windows.

Download for windows

macOS

d.moat's free Spycam Finder for macOS.

Download for macOS

Linux

Click here to learn how to identify your architecture type.

Download for i386/32-bit Download for X86_64/64bit

Using d.moat's spycam finder can lead to fame & fortune

Do you have an interesting story of how you used d.moat's spycam finder? Share your story to win an Amazon gift card and have your story featured in our campaign. Email your story to hello@dmoat.com.

FAQ's for Spycam Finder

How much does this cost? Is it really free?

The spycam finder tool is provided free of cost under an MIT license.

Why are you making this available to everyone?

At d.moat, we are concerned about everyone's safety and privacy. We developed this tool for our own use when traveling but realized that others would benefit from it.

Do you collect any data?

No. We went to great lengths to develop this tool as a stand alone software with no communication to any backend servers. You are in total control and you can remove it after using it.

Why should I trust you?

We built this tool to get rid of the nuisance of spycams in vacation rentals. If you feel adventurous, you can explore the source code. We are planning to release the code on GitHub soon. In the meantime, drop us a line at hello@dmoat.com and we will let you know when the code is available.

How do i share my usage story?

Just mail us your story at: hello@dmoat.com. We will pick a winner and if you win, you will get an Amazon gift card and a shot at stardom (if you wish to be featured in our campaign.)

The Spycam Finder software is provided under an MIT license.

Copyright 2019 - 2020 d.moat Inc.

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Privacy tips for connected homes

Internet connected devices make your home smart, but these gadgets could pose a security risk for the unaware. Understanding how smart home technology exposes you to risks can help you take action to ensure your home security. Watch this simple to follow cyber security primer to safeguard your privacy and protect all your connected devices against phishing, malware, cyber intrusions, and hacking.