OVER8.5 MILLION Protected devices
Know our recovery storiesDifferent operating systems and different devices? Not a problem! Prey works on all major operating systems and let's you track them from a single place.
Only when you request, Prey will gather and deliver detailed evidence back to you, including pictures of who's using your stolen device, its current location, the wifi networks surrounding it, public and private IP addresses, and much more.
When your data is at stake, bad things can happen. Prey allows you to remotely wipe the most relevant information, lock the device down, and even retrieve your most important files.
Tracking devices is easy, we take gathering evidence to another level. When you lose a device, this is what Prey will do for you:
Find your laptop or mobile devices wherever it is, anywhere in the world from anywhere in the world. The more, the better. It will show you how accurate the location is.
They will signal where your device is hiding anywhere in the world. See your device's specs and the main user's registered name.
Thieves won't stand a chance. For mobiles, it includes front and back camera. For Laptops and Desktops it includes a screenshot. all of them taken silently.
The report is solid piece of evidence, present it to the police and let them do their job.
Sensitive data is gathered only when you request it, and it is for your eyes only ‐ nothing is sent without your permission. Our proof of transparency is our code.
Source Code
Recovery cases all over the world