Imei detective database of stolen, lost and found gsm. Gsma imei blacklisting help combat global device crime. Simply enter its imei number in the search box below and press search. The gsm association maintains a unique system known as the imei database imei db. As the body responsible for issuing imei for mobile devices globally, the gsma is the source of authoritative and complete imei data.
The gsma maintains a unique system known as the international mobile equipment identity database imei db, which is a global central database containing basic information on the serial number imei ranges of millions of mobile devices e. Select the description below that best identifies your company. Contains at least 1 lowercase character a through z contains at least 1 uppercase character a through z. We provide organizations with a range of products and services that harness the unrivalled accuracy of our data to provide the highestquality device intelligence. Introduction to the imei database previously known as the central equipment identity register description of how the imei database ceir operates, including data transfer procedures. Download friday 14 sep 2018 tac allocation this document provides information which will help manufacturers with the completion and submission of the different application forms used within the gsma imei database is defined and described in detail. High level principles governing the use of the shared database. Check if phone is stolen or lost before buying a second hand phone you should check if phone is submited as stolen or lost. Instructions on how to connect to the imei database ceir. As the body responsible for issuing imei numbers for mobile devices globally, the gsma is the source of authoritative and complete imei data. The imei db is a global central database containing basic information on serial number imei ranges of millions of gsm and 3g devices e.
Local government, law enforcement, businesses and even consumers in some markets, access this data to help identify and avoid use of illegitimate devices. Gsma run an important imei blacklisting service whereby its operator members share their own local black lists to identify and block stolen devices across multiple networks. Stolen phone database alive, carriers can now block. Stolen phone database alive, carriers can now block pilfered handsets. This brochure gives an overview of the imei and number portability services the gsma can offer. The imei db is available to qualified third parties. As the body authorized by 3gpp to allocate tac type allocation code for all gsm mobile device identities globally, the gsma is the source of authoritative and complete imei data. Demand for tac codes will increase with the proliferation of embedded mobile.
729 78 1491 1051 526 392 1433 237 1359 1328 380 402 381 1342 738 852 741 81 1490 882 1157 647 52 234 1293 1206 996 75 910 698 1224 1164 423 421 171 1493 1244 942 980 1074 1481 398 900