Lock a stolen or lost phone it’s important to protect app credentials, bank account data, and other sensitive information. See, below, the step by step to block an Android or iPhone cell phone, using native tools of both operating systems, in addition to your Google account or Apple ID.
How to Lock a Stolen or Lost Android Phone
See, below, the alternatives of Google, Samsung and Xiaomi to lock a cell phone with Android operating system.
Via Find My Device (Google)
If you had a Google account associated with the Android phone you want to lock, chances are the Find My Device tracking be enabled. This procedure should work for any brand, including Motorola, Galaxy, Xiaomi and others. Here’s how to use the feature:
- Go to the Find My Device website (google.com/android/find) by the browser.
- Log in with your Google account linked to the stolen smartphone.
- Choose your cell phone from the device list.
- click in “Protect device”🇧🇷
- If you like, write a recovery message and/or a phone number so anyone can contact you.
- click in “Protect device” to complete the lock.
Cell phone blocking takes effect immediately when there is internet access. If the smartphone is offline, it will be necessary to wait for a connection for the command to be received.
It is worth mentioning that, after blocking the device by Find My Device, it will still be possible to know its location remotely.
Via Samsung Find My Mobile
Samsung has its own solution for track cell phones and other Galaxy products🇧🇷 With this alternative, users can create a password remotely to lock the device. See how to block a smartphone through Find My Mobile in the following step by step:
- Go to Find My Mobile (findmymobile.samsung.com) with the same Samsung account linked to the phone.
- Select the device you want to block.
- click in “Block”in the menu that appears on the right of the screen.
- press the option “Advance”🇧🇷
- Create a code to lock the screen remotely and, if you prefer, include an emergency contact.
- press on “Block” to finish.
When you lock a Galaxy smartphone through Samsung’s platform, you suspend credit and debit cards from Samsung Pay. In addition, the power off button will be disabled.
Another option is to remotely activate power saving mode to extend battery life. Get to know, in detail, all the functions of Samsung Find My Mobile.
By Xiaomi Cloud
Xiaomi also provides an alternative to Find My Device. With the tool, it is possible track devices by Mi Cloud🇧🇷 Like the aforementioned platforms, the Chinese manufacturer’s solution allows you to block unauthorized access to the lost smartphone. Learn how to use it:
- Login to Xiaomi Cloud (i.mi.com🇧🇷 and log into your account🇧🇷
Remember to log in to the same account linked to the stolen or lost device. - choose the option “Find device”🇧🇷
- Select the desired device.
- click in “Lost Mode”🇧🇷
- Confirm lock on “Switch to Lost Mode”🇧🇷
After the procedure, the cell phone will trigger the lock screen to prevent other people from accessing your personal data, banking applications and the like.
How to Lock a Lost or Stolen iPhone
Apple has its own solution for lock a lost or stolen iPhone🇧🇷 To do this, just activate the Lost Mode, which prevents access to the cell phone and even provides information on the lock screen to contact the owner, if the device is found.
Learn how to trigger the function in the following step-by-step:
- Access the Search fur icloud.com🇧🇷
- Choose the cell phone or lost item you want to find.
- In the floating window over the map, click on the option “Lost Mode”🇧🇷
- If you want, enter a phone or cell number that will be displayed on the lock screen.
- Click in “Following”🇧🇷
- If you want, write a message that will be displayed on the lock screen.
- press on “OK” to complete.
The Apple cell phone is immediately blocked if it has an internet connection, preventing access to the iOS home screen and other data.
The use of Apple Pay cards will also be prevented when enabling Lost Mode.
Can I lock a turned off cell phone?
If the stolen or lost cell phone is turned off, you can send the lock request remotely via Apple, Google, Samsung and Xiaomi tracking platforms. In this case, the smartphone will be locked as soon as it is turned on again. But for this to happen, the device must be connected to the internet.
My cell phone does not appear on Google or Apple platforms. And now?
The first step is to verify that you are using the same account registered on the device. For example, if you’ve used email on your iPhone but are trying to sign in with another iCloud profile, your phone won’t show up in Find My. The same goes for Android devices.
If you are using the same account, and the device is still unavailable, then you will need to resort to other methods. It’s possible lock your cell phonewhich prevents third parties from using your line, and file a police report🇧🇷 See a complete guide on what to do if your cell phone was stolen🇧🇷

Is it possible to unlock the cell phone later?
You can unlock Android smartphone or iPhone after finding it. To do this, with your cell phone in hand, just enter the access code and follow the instructions on the screen.
In the case of the iPhone, you will need to open the tracker, in the web version of iCloud or in the Search app, to turn off Lost Mode and stop receiving location reports in the email.
What if I block the IMEI of a stolen cell phone?
Many people confuse the two procedures, but, in practical terms, blocking the stolen cell phone is different from block IMEI code🇧🇷
By blocking the IMEI with the telephone operator, the device stops connecting to mobile networks. This helps prevent someone else from using the smartphone normally and aims to curb criminal practices.
However, blocking the IMEI can interfere with the search for the lost cell phone, as the device will no longer have access to the internet via 2G, 3G, 4G or 5G, whether it is a Claro, Vivo or TIM chip. To keep you online again, you’ll need to connect to a Wi-Fi network.

Cell phone lock, on the other hand, helps keep personal information safe — such as bank and social network passwords, which are usually stored on the device.
This procedure can prevent blows, including those involving Pix – a survey by cybersecurity company PSafe found that this type of threat grew by 350% between April and May 2022.
https://tecnoblog.net/responde/como-bloquear-celular-roubado-perdido/