WiGLE.et
WiGLE.net (Wireless Geographic Logging Engine) is a large, community-driven database and mapping platform for collecting, visualizing, and analyzing wireless network information worldwide.
What WiGLE.net is
WiGLE (pronounced “wiggle”) is both:
- A website (wigle.net)
- A crowdsourced database
It allows users to search for and map wireless networks, including:
- Wi-Fi (WLAN)
- Bluetooth
- Cellular towers
How WiGLE Works
1. Data Collection
WiGLE relies on crowdsourced wardriving:
- Users run the WiGLE app (Android) or other tools
- Devices collect:
- SSID (network name)
- BSSID (MAC address of access point)
- Signal strength
- Encryption type (WEP, WPA2, open)
- GPS coordinates
Important:
- WiGLE does NOT collect passwords or network traffic
- It only collects broadcast metadata
2. Data Upload & Aggregation
- Collected data is uploaded to WiGLE’s servers
- Over time, this builds a massive global wireless map
- The database contains billions of network observations
3. Mapping & Search
Users can:
- Search by:
- SSID
- BSSID
- Location (coordinates, city, etc.)
- View:
- Network location history
- Signal heatmaps
- Distribution maps
Key Features
1. Wireless Network Mapping
- Shows where networks have been detected
- Helps visualize coverage areas
2. Historical Tracking
- Tracks where networks have moved over time
- Useful for:
- Device tracking
- Identifying mobile hotspots
3. Filtering & Analysis
Users can filter by:
- Encryption type (open vs secured)
- Network type
- Signal strength
- Time seen
4. API Access
- Provides APIs for:
- Research
- Security analysis
- Integration with other tools
Use Cases in Cybersecurity & Pen Testing
1. Reconnaissance
- Identify wireless networks near a target
- Discover:
- Hidden or poorly secured networks
- Rogue access points
2. Geolocation Intelligence
WiGLE can:
- Map a BSSID → physical location
- Help locate:
- Offices
- Devices
- Infrastructure
3. OSINT (Open-Source Intelligence)
- Helps correlate:
- Devices ↔ locations
- User habits via SSIDs (e.g., “Johns_iPhone”)
4. Wireless Security Assessment
- Identify:
- Open (unencrypted) networks
- Weak encryption (WEP)
- Useful for planning wireless attacks (in authorized tests)
5. Social Engineering Context
- Knowing nearby networks can help:
- Craft believable phishing scenarios
- Impersonate legitimate SSIDs
Privacy & Ethical Concerns
What WiGLE does NOT collect:
- No internet traffic
- No passwords
- No personal browsing data
But risks still exist:
- SSIDs can contain personal identifiers
- Location + network names can reveal:
- Home addresses
- Business locations
- Historical tracking can show movement patterns
Example Scenario
A penetration tester:
1. Searches WiGLE for networks near a client office
2. Finds:
- Multiple SSIDs like:
- CorpWiFi
- Corp-Guest
- Corp-Backup
3. Notices:
- One uses weaker security
4. Uses this intel to:
- Target the weaker network
- Or create a rogue AP with the same SSID
Common Tools Used with WiGLE
- Kismet – wireless detection
- Aircrack-ng – Wi-Fi auditing
- WiGLE Android app – data collection
- GPS-enabled devices for wardriving
Key Takeaways
- WiGLE is a massive public database of wireless networks
- Built from crowdsourced wardriving data
- Used for:
- Reconnaissance
- OSINT
- Wireless security testing
- It collects metadata only, not sensitive traffic
- Powerful but must be used ethically and legally

