BLE Proximity Scanner

Last updated:

Browser-based Bluetooth Low Energy device scanner. Identify nearby BLE devices, detect tracking tags, analyze MAC randomization patterns, assess wireless security threats, and generate physical security reports. Runs entirely in your browser — no data leaves your device.

Ready — choose Quick Scan or Live Walk Mode
📶

Quick Scan — scans for a set duration, then shows all results sorted by distance

Live Walk Mode — continuous scanning while you move around. Hit stop when done to see the full map.

Devices positioned by signal strength. Center = closest. Populated after scan completes.

Scan events will appear here
No saved sessions.

BLE Proximity Scanner — Bluetooth Device Intelligence for OSINT

Max Intel's BLE Proximity Scanner leverages the Web Bluetooth API to passively discover Bluetooth Low Energy devices broadcasting in your vicinity. Originally designed for physical security assessments and OSINT investigations, it transforms your browser into a wireless reconnaissance tool that identifies device types, detects tracking tags, analyzes MAC address randomization patterns, and cross-references discovered devices against known vulnerability databases.

Device Fingerprinting

Every BLE device broadcasts service UUIDs and manufacturer-specific data in a unique combination. An Apple AirTag has a different fingerprint than a Samsung SmartTag or Tile tracker. This tool maintains a fingerprint database that maps UUID combinations to specific product identifications, turning anonymous BLE advertisements into actionable intelligence. When a device is discovered, it's automatically categorized by type: tracker, wearable, smart home, medical device, audio, input device, or unknown.

Tracker Detection

Bluetooth tracking devices — AirTags, Tiles, SmartTags, Chipolo — represent a growing stalking threat. The scanner identifies known tracker signatures and monitors for persistent proximity. A tracker that maintains consistent signal strength over time (following you) is flagged differently from one you briefly pass. While Apple provides AirTag detection on iOS, this tool works across all tracker brands on any Chrome-compatible platform.

MAC Randomization Analysis

Modern devices randomize their BLE MAC addresses for privacy. However, randomization implementations vary in quality. Some vendors rotate on predictable schedules, others only change the last octets, and manufacturer data often persists across rotations. The scanner tracks these patterns and attempts to correlate multiple MAC addresses to the same physical device through timing analysis and persistent metadata.

Physical Security Assessment

The scanner categorizes every discovered device by security risk. BLE-enabled smart locks, wireless keyboards without encryption, medical devices with known vulnerabilities, and unprotected IoT devices all represent potential attack surfaces. The tool cross-references device types against known BLE vulnerability classes including KNOB, BLESA, BLURtooth, and SweynTooth to flag devices running potentially vulnerable firmware.

Web Bluetooth API
A W3C specification allowing web applications to communicate with Bluetooth Low Energy devices. Supported in Chrome 56+ and Edge 79+.
BLE (Bluetooth Low Energy)
A wireless protocol designed for short-range communication with minimal power consumption. Used by trackers, wearables, smart home devices, and medical equipment.
GATT (Generic Attribute Profile)
The framework BLE devices use to expose their services and characteristics. Service UUIDs identify device capabilities.
RSSI (Received Signal Strength Indicator)
A measurement of signal power in dBm. Typically ranges from -30 dBm (very close) to -100 dBm (far away or weak signal).
MAC Randomization
A privacy technique where devices periodically change their broadcast address to prevent tracking. Quality of implementation varies by vendor.

📶 BLE Proximity Scanner — Frequently Asked Questions

Which browsers support the BLE scanner?

The Web Bluetooth API is supported in Chrome 56+, Edge 79+, and Opera 43+ on Windows, macOS, Linux, ChromeOS, and Android. Safari and Firefox do not currently support Web Bluetooth. For passive background scanning (requestLEScan), you may need to enable the Experimental Web Platform Features flag in chrome://flags.

Can this tool detect AirTags and other trackers?

Yes. The scanner identifies Apple AirTags, Samsung SmartTags, Tile trackers, Chipolo, and other BLE-based tracking devices through their service UUID signatures and manufacturer data patterns. It also monitors signal persistence to flag trackers that may be following you — a key differentiator from Apple's built-in detection which only covers AirTags on iOS devices.

Is Bluetooth scanning legal?

Passively receiving Bluetooth advertisements that devices broadcast publicly is generally legal in most jurisdictions, similar to observing Wi-Fi SSIDs. These signals are intentionally broadcast. However, actively connecting to devices without authorization may violate computer fraud laws. This tool only performs passive observation of broadcast data. Always check local laws before conducting security assessments.

Does this tool send any data to external servers?

No. All scanning, device identification, fingerprinting, and analysis happens entirely in your browser using client-side JavaScript. No device data, MAC addresses, or scan results are transmitted anywhere. Session data is stored only in your browser's localStorage. This is a zero-data-retention tool by design.

How accurate is the distance estimation?

RSSI-based distance estimation is inherently approximate. Signal strength is affected by walls, body absorption, device orientation, antenna design, and environmental interference. The radar view provides relative positioning (closer vs farther) rather than precise measurements. For rough estimates: -30 to -50 dBm suggests within 1-2 meters, -50 to -70 dBm suggests 2-10 meters, and below -70 dBm suggests 10+ meters or obstructed.