How to Check Who Accessed Your Google Account

If you suspect someone has been in your Google account — an ex-partner, a family member, or an unknown actor — you can check silently without alerting them. Here's how.

Step 1: Use Google's Built-In Security Checkup

Go to myaccount.google.com/security. Under "Your devices," review every device currently signed in. Remove anything you don't recognize. Under "Recent security activity," look for logins from unfamiliar locations or times. This gives you a real-time snapshot but limited historical depth.

Step 2: Download Your Google Takeout Data

Go to takeout.google.com and request an export of your account activity data. This creates a downloadable archive of your full login history, device records, location data, and third-party app access. The download is completely silent — no notification is sent to any other device or active session.

Step 3: Analyze With ForensAI

Upload your Google Takeout export to ForensAI. The analysis runs entirely in your browser — your data never leaves your device. ForensAI identifies unauthorized logins, suspicious IP addresses, unknown devices, unusual access patterns, and generates a court-ready PDF report of its findings.

Start Free Google Account Scan

What Signals Indicate High-Risk Login Activity?

When reviewing your Google account data, these are the signals that indicate someone else may have accessed your account:

How to Check Without Alerting Them

Google Takeout is a read-only data export. Requesting it sends no push notifications, no emails to other devices, and triggers no security alerts on any other session. The person who accessed your account will not know you downloaded or analyzed this data. This makes it the safest way to gather evidence before taking action.

Frequently Asked Questions

Can I check who accessed my Google account without them knowing?

Yes. Download your Google Takeout data and analyze it with ForensAI — no alerts are sent to any other devices or sessions.

What does ForensAI look for in Google data?

Logins from unknown devices, suspicious IP addresses, unusual location patterns, off-hours access, and unauthorized third-party app connections.

Start a Free Risk Scan