Why is my WiFi showing a weird “Skeleton” network name

My home WiFi list suddenly started showing a strange network called “Skeleton” that I never set up and no one in my house recognizes. I’m worried it might be something malicious, like a rogue access point, WiFi hacking attempt, or a neighbor’s misconfigured device. How can I safely figure out what this “Skeleton” WiFi is, check if my own router is compromised, and make sure my network and devices stay secure

Happens a lot more often than people think. A weird SSID like “Skeleton” in your WiFi list usually comes from one of these:

  1. Neighbor’s router
    Someone near you renamed their WiFi to “Skeleton”.
    If the signal strength jumps around when you move your phone or laptop to different rooms, it is almost always a nearby apartment or house.

What to do:
• Check signal strength next to your router. If “Skeleton” is stronger far from your router, it is not yours.
• Ask neighbors if you share walls. People love weird SSID names.

  1. Guest network on your own router
    Many routers ship with a second SSID enabled for guests. It might have a random or themed name.
    Log in to your router admin page and check:
    • Wireless or WiFi settings
    • Look for “Guest network” or “Secondary SSID”
    If “Skeleton” is in there, disable that guest network or set a password.

  2. Phone hotspot or smart device
    Check everyone’s phones, tablets, laptops.
    On iPhone and Android, look under Personal Hotspot / Mobile Hotspot.
    Some apps or portable travel routers use odd default SSIDs.
    Smart devices like projectors, cameras, or smart plugs sometimes broadcast their own setup network until you configure them.

  3. Rogue access point or “evil twin”
    If someone tried to attack, they would often copy your SSID name to trick you. Using “Skeleton” is less useful than cloning your actual network name.
    Still, if you feel uneasy:
    • Make sure your WiFi is WPA2 or WPA3, with a strong password.
    • Turn off WPS in the router.
    • Update router firmware.
    • Check the router’s “Attached devices” or “Client list” for unknown devices.

  4. WiFi scanning to be safe
    Use a WiFi analyzer on a laptop or phone to see where the “Skeleton” SSID sits and what hardware broadcasts it.
    A good option is NetSpot WiFi analyzer and planner.
    You see:
    • BSSID (MAC address)
    • Channel
    • Signal strength over distance
    Walk around your place with it. If the signal peaks near a wall, it is likely the neighbor. If it spikes near some gadget in your house, you found the source.

Basic checklist for you:
• Log into router, change admin password if still default.
• Change your WiFi SSID and password to something new.
• Make sure you use WPA2 or WPA3, not WEP and not “open”.
• Disable WPS.
• Scan with NetSpot or any analyzer to map all nearby networks.

If “Skeleton” does not match your router’s MAC/BSSID and does not show in your router settings, it is almost certainly external and not under your control. Just ignore it and focus on locking down your own network.

WiFi suddenly showing a “Skeleton” network name you never set up? You’re not the only one. Here’s what’s probably going on and what’s actually worth worrying about.

First off, despite how creepy it sounds, a random SSID like “Skeleton” is usually boring and harmless: someone nearby thought they were funny, or some gadget is broadcasting its own setup WiFi. A real attacker would more likely copy your WiFi name exactly instead of picking something weird that just scares people.

@sterrenkijker already covered the obvious stuff (neighbors, guest networks, hotspots, smart devices, evil twin, etc.), so I won’t rehash the same checklist point by point. I do slightly disagree with one bit, though: a strange SSID can still be used by an attacker, especially for generic phishing like “FreeWiFi” or “XfinityWifi” clones in dense areas. “Skeleton” is less useful, but I wouldn’t 100% rule out malice just because the name is odd.

Here’s what I’d add on top of their answer:

1. Check behavior more than the name
Instead of fixating on the “Skeleton” label, pay attention to what happens if you connect to it (you probably shouldn’t, but if someone in the house already did):

  • Do they get a login page that looks like a fake router or fake Google/Microsoft login?
  • Does it redirect to weird domains or certificate warnings?
    If you’re not sure, assume it’s untrusted and never type passwords on it.

2. Correlate channels and MAC addresses
Where @sterrenkijker suggested scanning, I’d push it a bit further:

  • Use a WiFi analyzer like NetSpot to see:
    • The BSSID / MAC address of “Skeleton”
    • The vendor (often derived from the MAC prefix)
    • The channel and band (2.4 vs 5 GHz)
  • If “Skeleton” and one of your known networks share the same first half of the MAC, it might actually be another radio on the same router or mesh system.
  • If the vendor shows as some phone maker (Apple, Samsung, etc.), that’s almost certainly someone’s hotspot.

3. Look for mesh or extender gear
If you or anyone in the house ever bought:

  • A WiFi range extender
  • A mesh kit (eero, Deco, Orbi, etc.)
  • ISP‑provided booster pods

Those sometimes spin up temporary or hidden SSIDs, and occasionally they show up with odd default names. People forget they even own this junk after a year in a wall socket.

Unplug each “mystery” networking box for a minute and rescan:

  • If “Skeleton” disappears when a certain device is unplugged, there’s your culprit.
  • If it never disappears, that strongly points to a neighbor or outside source.

4. Treat all unknown networks as hostile by default
Even if “Skeleton” is just your neighbor:

  • Never auto-join unknown networks.
  • On phones and laptops, go into WiFi settings and:
    • Forget “Skeleton” if it ever connected.
    • Turn off “Auto-join” or similar for anything you don’t absolutely trust.
  • On Windows, run netsh wlan show profiles and delete any you don’t recognize. This keeps you from latching on to random APs in the future.

5. Hardening your own setup (short version)
You don’t control what SSIDs show up in the air. You do control how safe your stuff is:

  • Use WPA2‑AES or WPA3, never “open” or WEP.
  • Long, unique WiFi password. Not a dictionary word, not reused anywhere else.
  • Change router admin login and disable remote management from the internet.
  • Turn off WPS entirely.
  • Update router firmware from the official site.

Even if “Skeleton” turned out to be someone trying to be clever, those steps make you a very un-fun target.

6. Actually mapping where “Skeleton” lives
If you’re really paranoid and want to find the physical origin:

  • Install a WiFi analyzer like NetSpot on a laptop or phone.
  • Walk around your home, watch the signal graph for “Skeleton”:
    • Strongest near an outside wall, weaker in the middle: probably neighbor behind that wall.
    • Strongest near a particular device, cabinet, or shelf: check for a forgotten extender, old router, projector, or IoT thing.
  • Note the channel: if your router is on channel 1 and Skeleton is on 11 and has a totally different vendor, that’s a separate device, not your kit misbehaving.

If you want more structured troubleshooting or are shopping for a decent WiFi analyzer, tools like advanced WiFi mapping and analysis software can help visualize all SSIDs, channels, and signal strengths around your home so you can see exactly where odd networks are coming from and how they overlap with your own.

7. When to actually worry
Take it more seriously if:

  • You suddenly see a second network with your exact SSID plus something like “_EXT” or just duplicate entries.
  • Your own devices randomly disconnect and reconnect to “your” SSID with slightly different BSSID values in suspicious places (like right outside your house or at the edge of your property).
  • You notice logins to accounts from unknown locations or devices soon after connecting to a suspicious WiFi.

“Skeleton” by itself, as a one-off weird name, is almost certainly either:

  • Neighbor’s sense of humor
  • Some forgotten or new gadget in your house broadcasting its setup network

Tighten your own security, map it once with a tool like NetSpot if you’re curious, then ignore it in your list and move on.

1 Like

If “Skeleton” just popped up once in your list, I’d treat it as “suspicious curiosity,” not “active attack.”

Where I partly disagree with @byteguru and @sterrenkijker is in how much effort this deserves. You can chase it with analyzers and walk‑around surveys, but unless you see concrete symptoms (weird redirects, duplicates of your SSID, random disconnects), it is usually overkill.

Here is how I would frame it, focusing on what actually matters rather than redoing their step lists.


1. Separate “creepy” from “dangerous”

Name alone is useless as a signal of risk. “Skeleton” looks spooky, but:

  • A jokey neighbor SSID and
  • A default SSID from some cheap IoT gadget

look exactly like a malicious AP at the name level. You need context:

Red flags that mean “take this seriously”:

  • A second SSID that exactly matches your own network name, or your ISP’s router name.
  • Devices at home suddenly preferring a “new” version of your SSID.
  • HTTPS warnings or fake login pages when you browse.

If none of that is happening and “Skeleton” is just sitting there, I would not burn hours hunting it.


2. What I’d actually do differently from the other answers

They already covered:

  • Guest networks
  • Hotspots
  • Smart devices
  • Scanning with tools like NetSpot
  • Locking down WPA2 / WPA3, WPS etc.

So instead of repeating:

A. Focus on your device behavior
Look at your own devices, not the air:

  • Check WiFi settings on phones / laptops
    • Make sure “auto join” is off for anything unknown.
    • If anyone ever tapped on “Skeleton” accidentally, hit “Forget” so it can never silently reconnect.
  • Check browser history for odd portal pages or login pages that appeared when someone thought they were on your normal WiFi.

If nobody ever joined “Skeleton,” it cannot have captured your traffic.

B. Watch stability of your existing network

A sloppy attacker nearby is more likely to:

  • Clone your SSID
  • Blast a stronger signal on the same channel
  • Try to get your devices to roam to their AP

Symptoms:

  • You see your SSID appear twice with slightly different signal strengths and BSSIDs you do not recognize.
  • Devices keep dropping and reconnecting when you are in one particular part of the house.

No such behavior = very unlikely to be a targeted “evil twin” setup.


3. When scanning actually makes sense

If you are the kind of person who will keep thinking about Skeleton until you map it, then yes, a WiFi analyzer is worth it.

NetSpot is fine for this job. Pros and cons in this context:

Pros:

  • Visualizes all SSIDs with channel and signal strength, very handy to see if “Skeleton” tracks a neighbor’s wall or some device in your house.
  • Lets you see the BSSID and vendor, which helps you guess if it is a phone hotspot, router, or IoT widget.
  • Good if you also want to tune your own WiFi channels after you are done worrying.

Cons:

  • Overkill if you only care about one strange SSID and are not adjusting your network.
  • Learning curve if you only want a quick answer, compared to very simple analyzer apps.
  • Desktop‑centric features are more than most home users really need.

If you try NetSpot, use it once to answer two questions:

  1. Does “Skeleton” share a vendor MAC prefix with your router or mesh / extenders?
  2. Where is the signal strongest when you walk around?

After that, you can uninstall it if you do not care about ongoing optimization.


4. Mental model that keeps this from driving you nuts

WiFi around you is like hearing random conversations in a crowded café. You cannot stop them, and 99.9% of them are irrelevant. Your job is not to silence them, it is to:

  • Keep your own WiFi secure
  • Make sure your devices never latch on to conversations you do not control

So in order of priority:

  1. Harden your own setup (which you already got from @byteguru and @sterrenkijker).
  2. Purge and lock down saved networks on your devices.
  3. Optionally, use something like NetSpot once to satisfy curiosity about where “Skeleton” lives.
  4. Ignore it unless it starts imitating your real SSID or affecting your connectivity.

If you do those, “Skeleton” can sit there in the list forever without being more than a mildly annoying neighbor or gadget name.