How can I tell if someone has been logging into my gmail account?

jluppino

Is there a way to see log-in history for your gmail account? I suspect that someone I know has, and I've already changed the password, but I'm not sure and I don't want to mention it if they aren't guilty. 

Topic: Security
Answer this Question

Answers

2 total
blackdog
Vote Up (3)

When you log-in to your gmail, scroll down to the bottom of your email list. On the bottom right, in tiny letters, it says, "last account activity." This will show when anyone last logged in. If you click the word "details" just under that, it will show the date and time of the last 10 activity events, how your account was accessed, and the IP address. I don't know of a way to see further back in time than that, perhaps someone else does. You can also set it up to alert you to any unusual activity while you are poking around there, so that Google will let you know if your account suddenly starts getting logged into with an IP address from Bulgaria or Russia or wherever.  

jimlynch
Vote Up (2)

This should help:

http://support.google.com/mail/answer/45938?hl=en

"What is 'Last account activity'?

Last account activity shows you information about recent activity in your mail. Recent activity includes any time that your mail was accessed using a regular web browser, a POP client, a mobile device, a third-party application etc. We'll list the IP address that accessed your mail, the associated location, as well as the time and date.

To see your account activity, click the Details link next to the Last account activity line at the bottom of any Gmail page."

Ask a question

Join Now or Sign In to ask a question.
A vast debit card fraud scheme that allegedly netted US$45 million has been linked to the hacking of credit card processors in the U.S. and India.
Hackers who commandeered The Onion's Twitter account used simple but effective phishing attacks to obtain passwords, according to a writeup by the publisher's technology team.
New legislation introduced by a group of U.S. lawmakers would require mobile application developers to obtain consent from consumers before collecting their personal data and to secure the data they collect.
As cyberattacks increase, victims are fighting back. But retaliation has its own consequences--and may create more damage.
Adobe has warned users of its ColdFusion application server platform of a critical vulnerability that could give unauthorized users access to sensitive files stored on their servers.
Domain registrar Name.com forced its customers to reset their account passwords on Wednesday following a security breach on the company's servers that might have resulted in customer information being compromised.
Microsoft has released a temporary fix for a zero-day vulnerability in Internet Explorer 8, which was used by hackers in a prominent attack against the U.S. Department of Labor's website.
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation.
Testing company Ixia launches high-volume DDoS tests against F5 firewalls.
The U.S. military's reliance on foreign-made products, including telecommunications equipment and semiconductors, is putting the nation's security at risk by exposing agencies to faulty parts and to the possibility that producing nations will stop selling vital items, according to a new report from the Alliance for American Manufacturing.