Is My Ex Reading My Emails? How to Check for Unauthorized Access

By ForensAI Team · 2026-01-25 · 10 min

If you suspect an ex-partner or someone else has unauthorized access to your email, you need to investigate carefully. Unauthorized access by someone you know is common: a significant share of stalking and digital abuse involves former partners, and email access is often the gateway to other accounts. Here's how to check without alerting them.

Why Email Access Matters

Email accounts often contain sensitive information and serve as recovery mechanisms for other accounts. Unauthorized access can lead to:

  • Privacy violations
  • Identity theft
  • Access to other accounts via password resets
  • Monitoring of your communications

Method 1: Check Account Activity Logs

Most email providers log account activity:

  • Gmail: Settings → Security → Recent security activity
  • Outlook: Security settings → Recent activity
  • Yahoo: Account security → Recent activity

Method 2: Download Account Data

For a comprehensive analysis, download your email account data:

  • Gmail: Use Google Takeout to export email data
  • Outlook: Export via Microsoft account settings
  • Upload the export to ForensAI for analysis

Signs of Unauthorized Access

  • Emails marked as read that you didn't open
  • Emails moved to folders you didn't move them to
  • Emails deleted that you didn't delete
  • Login activity from unknown locations
  • Password reset emails you didn't request
  • Forwarding rules you didn't create

How ForensAI Helps

ForensAI is an instant, easy-to-use way to get answers. It analyzes your email (and other) account exports to identify login patterns from suspicious locations, access during unusual times, forwarding or filter changes, device access, and more—and gives you a risk score and findings in minutes. Start with a free risk scan on the web; no account required.

  • Login patterns from suspicious locations
  • Access during unusual times
  • Account modifications (forwarding, filters, etc.)
  • Device access patterns
  • Correlation with other account activity

What to Do If You Find Access

  1. Change your password immediately
  2. Review and remove forwarding rules
  3. Check for filters that might hide emails
  4. Review recovery email and phone settings
  5. Enable two-factor authentication
  6. Consider legal action if appropriate

Prevention

To prevent future unauthorized access:

  • Use strong, unique passwords
  • Enable two-factor authentication
  • Review account activity regularly
  • Be cautious about shared devices
  • Don't save passwords on shared computers

Think someone has been in your accounts?

ForensAI analyzes your data exports and tells you exactly what happened. Results in seconds.

Get Started →