If you suspect your partner is having suspicious conversations and have no opportunity to discuss it with them, there are ways to find out who they are texting and calling before jumping to conclusions. The most obvious approach is to observe their behavior (but you should know what to pay attention to) and to inspect their device manually (but be cautious with that!).
To dig deeper, you can look at the monitoring apps or sync devices.
In this article, we’ll discuss other existing methods, such as phishing and fake login pages, keyloggers, and spyware, not to encourage you, but to warn you about their dangers.
Additionally, we’ll instruct you on requesting data from a carrier, using social engineering, or hiring a private investigator. All to ensure you stay within the legal boundaries and stay safe and connected with HeyLocate.
| Method | Description | Pros | Cons | Legality | Ethics |
|---|---|---|---|---|---|
| Behavioral Observation | Assessing changes in behavior and phone usage habits | Does not require access to the phone | Subjective, does not provide direct evidence | ✅ Legal | ✅ Ethical |
| Manual Device Inspection | Viewing messages, calls, and social media when access is available | Direct access to all information | Requires physical access; may be noticed | ⚠️ Legal with consent | ⚠️ Ethical with consent |
| Monitoring Apps (Parental Control) | Using apps for tracking calls, chats, geolocation, etc. | Maximum control and reporting | Paid tools; may be illegal without consent | ⚠️ Legal only for parental control or with consent | ❌ Mostly unethical |
| WhatsApp Web and Device Sync | Logging in from another device to view conversations | Relatively easy to set up | Can be detected; requires physical access | ⚠️ Depends on the jurisdiction, legal with consent | ❌ Can ruin trust |
| Phishing and Fake Login Pages | Creating fake login forms to steal data | High effectiveness | Illegal, ethically unacceptable | ❌ Illegal | ❌ Unethical |
| Using Keyloggers and Spyware Tools | Apps for covert monitoring of activity | Maximum data collection | Violation of privacy is risky | ❌ Illegal | ❌ Unethical |
| Requesting Call and SMS Logs from the Carrier | Obtaining call and SMS logs through the provider | Official source of information | Available only to the number owner or by court order | ✅ Legal | ⚠️ Ethical with a relevant request |
| Social Engineering | Manipulating a person to extract information | Does not require technical skills | Morally questionable, not consistently effective | ⚠️ Does not deal with the law | ⚠️ Morally questionable |
| Hiring a Private Investigator | Hiring a specialist to collect evidence | Comprehensive and legal approach | Expensive, time-consuming | ⚠️ Legal if practiced within lawful boundaries | ⚠️ Ethical if practiced within lawful boundaries |
This article is intended for informational and educational purposes only. We do not endorse or encourage any form of invasive monitoring, illegal surveillance, or privacy violations.
Methods such as phishing, spyware, or unauthorized access to personal data can be unethical and unlawful, potentially leading to criminal charges or legal consequences. Before taking any action, we strongly advise consulting a legal professional to ensure compliance with local laws and respect for personal boundaries.
Our goal is to raise awareness about the potential risks and consequences of such methods, not to promote them. Always prioritize open communication, consent, and ethical behavior in your relationships.
Method 1: Using Behavioral Observation
This option is often the safest and most ethical starting point if you’re facing doubts about your relationship. This approach enables you to address your concerns while respecting your partner’s privacy simultaneously.
According to the International Journal of Environmental Research and Public Health, here’s what you should pay attention to:
- sudden emotional withdrawal (e.g., your partner becomes less interested in spending time together, avoids conversations, shows less affection, etc.);
- changes in phone behavior (e.g., they start going to a different room to accept or have a call, keep their phone face down, anxiously prevent you from accessing the device, etc.);
- inconsistent stories or made-up explanations (e.g., the person avoids giving you exact answers about their location, plans, etc.);
- unexpected change in routine (e.g., they begin staying late at work, change plans at the last minute, take more shifts, etc.);
- unexpected irritation (simple questions make your partner overly defensive or make them accuse you of mistrust);
- overcompensation (e.g., some people who are hiding something can become unusually attentive or make generous gifts for no reason);
- switch in digital behavior (e.g., the person suddenly starts changing passwords, deleting browser history, or logging out of shared accounts).
Remember: None of these signs alone confirms dishonesty or infidelity. People may behave differently due to stress, depression, health issues, or personal insecurities. Assumptions can be harmful; observation should never replace open communication.
Additionally, you can consult a professional therapist for expert advice and guidance.
However, assessing your mindset is essential. Ensure that your insecurities or past experiences are not triggering you. Don’t follow the confirmation bias where you only notice or interpret the behaviors in such a way that it confirms your existing opinion. Be alarmed only if this pattern repeats itself over time, not in a one-time situation.
If you’re certain that something is wrong or concerning, we strongly encourage you to discuss it directly with your partner. A calm and non-accusatory conversation can go a long way in clarifying misunderstandings by creating a space for honesty without pressure or conflict.
Method 2: Using Manual Device Inspection
Another popular method people use when suspicion grows in a relationship is checking their partner’s phone, laptop, or tablet. It is relatively easy to imply. If you have access (via passwords, Touch ID, or Face ID), you can view who they are texting and calling, social media, images, and more. This can provide you with plenty of information and a comprehensive picture of the current situation, which will either confirm or dispel your disturbing ideas.

However, accessing someone else’s private device without their permission may be illegal, depending on your country or state. Even within a committed relationship, phones and computers are considered private property. Unauthorized access can be classified as a breach of privacy or even a criminal offense.
Ethical Reminder: Trust, once broken, is difficult to rebuild. If you’re considering going through a partner’s device, ask yourself what that says about the state of your relationship and whether there’s a healthier path forward.
Note that there are situations where checking a partner’s device may be acceptable, for example:
- you have their consent;
- you share open digital access as a part of a mutual agreement;
- they’ve previously invited you to read messages or manage accounts together.
But even in such cases, respect boundaries. If you feel that the situation is becoming overwhelming or is getting out of hand, it is better to consider attending couples therapy.
Method 3: Using Monitoring Apps (Parental Control)
Moving on, this kind of app allows you to track all activities on the target device. Initially designed to manage kids’ or families’ devices, they can also be used for in-relationship checks. Here’s a general instruction for using such apps:
Note: The following is provided for awareness only. Installing tracking software on someone else’s device without informed, voluntary consent can lead to criminal prosecution. Always use these tools responsibly and within the law.
- Choose your service (uMobix, Parentaler, mSpy, etc.). Visit their website.
- Select your plan. Purchase the subscription and get the guide for installing the app on the target device.
- Now you can view logs: texts, calls, GPS location, browser history, app usage, etc.

Note: In countries like the U.S., U.K., Canada, Australia, and across the EU, covert surveillance of adults is illegal, even if you’re married. Check local laws before using such apps to monitor a partner.
Method 4: Using WhatsApp Web and Device Sync
This method involves mirroring all chats, media, and activity from a mobile phone onto a web browser or computer. Here’s how you should go about it:
Note: Accessing someone else’s WhatsApp account or syncing it to your own computer without their explicit and ongoing consent is a serious breach of privacy. It is illegal in many jurisdictions and may result in criminal charges under cybercrime or wiretap laws. Additionally, it can cause emotional or psychological harm to both partners.
- Open WhatsApp Web on your computer, or open the WhatsApp Desktop app.
- Open WhatsApp on the target phone. Tap the three dots (menu) on Android or Settings (gear icon) on iPhone. Tap Linked Devices. Tap Link a Device. The phone camera will open to scan a QR code.
Note: on iPhones, you will be asked to confirm your identity by Face ID. - Scan it. Shortly after, a copy of WhatsApp messages from the phone will be presented on your laptop.
Method 5: Using Phishing and Fake Login Pages
Phishing, simply put, is getting a person’s login credentials by pretending to be a legitimate website or app (usually done via email, text, or a fake login page). Cybercriminals and hackers commonly employ this tactic, but it can also be misused by individuals in personal relationships who attempt to access their partner’s private data.
Note: Phishing is illegal under most cybersecurity and data protection laws worldwide. It is considered fraud, identity theft, or unauthorized access to digital systems and can result in criminal charges, even if done out of suspicion or emotional distress. This method is explained only to educate people on what phishing looks like, how to recognize it, and how to protect themselves, not to teach anyone how to do it.
How it’s typically done:
- A fake login page is created. Then, the attacker sends the link to the page via a believable message.
- After the person clicks the link, they see a familiar page and enter their credentials.
- The attacker gets this information and can now use it to their advantage.
Informed users should protect themselves from becoming victims by always checking the URLs they receive and enabling two-factor authentication.
Method 6: Using Keyloggers and Spyware Tools
These are tools created to discreetly monitor another person’s digital activity, most likely without their knowledge and consent. Such programs can track everything typed on a keyboard (including passwords), take screenshots, monitor apps, record calls, track GPS locations, and even activate microphones or cameras.

Note: Installing spyware or keyloggers on someone else’s device without their informed, written consent is considered illegal surveillance or cyberstalking in most countries. This is a felony-level offense in many jurisdictions, even if done by a partner or spouse. This method is described for defensive awareness only, to help you recognize the risks and protect yourself.
So, how can these tools be installed?
iPhone:
Most likely, the iPhone will have to be jailbroken. The spyware is installed via Cydia or similar tools. Then, monitoring settings are configured. After that, the person on the other end gets complete access to your activity.
Android:
First, they enable the setting Install from Unknown Sources. Developer options (to disable Google Play Protect or alerts). Then, the APK (installer) from the spyware vendor’s website is downloaded. The app is installed, and the necessary permissions have been granted. Finally, the app is hidden, and the attacker gains access to all the activity information.
Such services go far beyond checking a message; they are about total digital control.
If someone is using them against you, it’s abusive. If you’re considering using them yourself, stop and think:
- Would I be okay if someone did this to me?
- Could this permanently destroy trust, or land me in court?
Always stay within the legal boundaries and choose healthy human relationships and talks for peace of mind.
Method 7: Requesting Call and SMS Logs from the Carrier
You can get metadata (call and message history) about your phone usage from your mobile operators. This method is only legal when used on your own account, a shared family plan, or when formally requested with legal authority (e.g., court order). To try it, follow this procedure:
- Go to your mobile carrier’s website (e.g. Verizon, Vodafone, T-Mobile). Log in to your account. Navigate to > Billing & Usage > Call Details, Usage Summary, or Detailed Bill.
- There, you can typically:
- view/download records by date range;
- filter by line if you manage multiple users;
- export as PDF or CSV.
You can also visit a local carrier store with a valid ID and request billing records or usage data for your number or account. A formal written request may be required for older records (more than 3–6 months).
Method 8: Using Social Engineering
Social engineering is quite similar to Method 7 since it manipulates people into revealing confidential information. Alternatively, it can aim at getting access to restricted areas of the person. We strongly discourage you from using this tool; however, to keep our audience informed, we’ll go a little bit further on the topic.
Note: Social engineering becomes illegal the moment it involves deception, impersonation, or unauthorized data access. Even if your intent is emotional (not financial), you can face criminal charges for fraud, identity theft, or unlawful surveillance.
| Tactic | Real-Life Example |
|---|---|
| Pretexting | Pretending to be the other person to reset a password over the phone (mocking the gestures, mimics, facial expressions, etc.). |
| Impersonation | Calling a phone carrier and saying, “I’m calling about my account…” while the account is not yours. |
| Emotional Manipulation | “If you trust me, just give me your password.” |
| Urgency/Pressure | “I need your phone quick; it’s an emergency.” |
| Baiting | Leaving a fake message or notification to get the other person to open something. |
| Shoulder Surfing | Watching someone type their password when they think you’re not looking. |
Method 9: Hiring a Private Investigator
If none of the methods mentioned above appeal to you, the final option is to hire a private investigator. Although we view it as an extreme solution, it can still work out, and most importantly, professional investigators operate within legal frameworks and use legally admissible methods to gather evidence.

If it sounds too old-fashioned to you, don’t worry, we’re not talking about Hercule Poirot here. Private investigators are more than in demand today, in various ways, even on social media!
These specialists will most likely not provide you with mobile information; however, they will present you with real-life evidence and present the facts about the current state of things.
Note: This method should not be used just to “check up” on a partner without a serious reason or out of anger, revenge, or emotional reactivity. Ensure that you’re prepared for the potential serious emotional and financial consequences and are working with a trustworthy, confirmed professional.
Conclusion
To conclude, if you suspect something is going on in your relationships or relationships of your partner with someone else, straightforward communication is the wisest solution, since trust and respect are key to healthy and happy relationships.
Still, if they tell you nothing and you need to calm your worries (or to prove them), there are some tools to find out who he is texting and calling that we described in this article.
⚠️ Beware of unreliable and unethical monitoring tools and potentially illegal methods, such as phishing and spyware, since they can get you not only in personal but also legal trouble.
We hope that any sorrows that you might have will be resolved as quickly as possible, and you will stay safe and connected with HeyLocate.

Leave a Comment