Hotspot Log
Overview
The Hotspot Log records session data for users who connect through your WiFi hotspot zones. It provides a complete audit trail of who used each hotspot, when, from which device, and how much data they consumed.
What Is Recorded
Each entry in the Hotspot Log corresponds to a single hotspot session. The following columns are recorded:
| Column | Description |
|---|---|
| Username | The hotspot username used to authenticate the session. |
| IP Address | The IP address assigned to the user's device during the session. |
| MAC Address | The hardware (MAC) address of the user's device. |
| Start Time | The date and time the session began. |
| Stop Time | The date and time the session ended (blank if the session is still active). |
| Data Used | The total volume of data transferred during the session (upload + download). |
| NAS | The Network Access Server (access point or router) through which the session was served. |
Common Use Cases
- Auditing WiFi zone usage — Review who has been connecting to a particular hotspot and for how long. This is especially useful for hotspots in public venues or shared business spaces.
- Investigating data abuse — Find users consuming disproportionate data volumes by sorting or filtering on the Data Used column.
- Verifying session boundaries — Confirm that a user's session started and stopped at expected times, useful when resolving billing disputes for time-based hotspot plans.
- Identifying unknown devices — Use MAC addresses to investigate devices that may have connected without valid credentials.
Searching and Filtering
Use the search bar to find entries by username, IP address, or MAC address. Use the date range filter to limit results to a specific period. You can also filter by NAS to view sessions from a single hotspot location.
Exporting to CSV
Click Download CSV to export the currently filtered session records. The export is useful for compliance reporting or for sharing usage data with venue owners who host your hotspot equipment.
Adding Reviewer Notes
Click on any session entry to open it and add a Reviewer Note. Notes are ideal for flagging suspicious sessions, recording the outcome of an investigation, or providing context for a colleague reviewing the same log.