It'd be great if you could look up that MAC address and cross-reference it with a master list of names and addresses of people with MAC addresses, but this, too, isn't possible.
As you've probably gathered from the introduction, computer makers and people who buy computers, do not have to register their MAC address with any sort of central administration. Because of this, there isn't a way to find a stolen computer from the MAC address, or to find the identity behind one of these addresses. On the other hand, they're unlike IP addresses in that they can't be researched to find the owner. Although MAC addresses are not filed away somewhere with identifiable information attached to them, there are ways to search for a MAC address to find more information about it.
What you find might help you further investigate and troubleshoot. That is much easier to understand, thank you. So for instance, if I visited a website over a public network connection using my WiFi Laptop, my MAC address would not reveal my name or address or other information used when I registered or bought the computer?
Thank you so much again! That is correct: The website can't find out the MAC address.
However, the public network router does know it and may even log all your Internet requests, unless you also use a VPN or proxy. As an aside, to get the MAC address from the last 64 bits of an IPv6 address: strip the ff-fe part from the middle, and complement the second low-order bit of the first byte if the bit is a 1, make it 0, and if it is a 0, make it 1. For example, for ff:fef9d8, the first byte 0x00 becomes 0x02 But nobody can link a MAC address to you. Ian Boyd Ian Boyd Good luck finding him.
Stephen Jennings Stephen Jennings Thank you so much for all the great and easy to comprehend advice. I believe I may have been the victim of attempted identity theft via PayPal. The police has told me that he can obtain records about exactly who by name what type of computer and where exact address of the person who did it It seems this would only be possible if the person I think did this handed over their computer, which is unlikely. If I'm wrong, please let me know. In this case the police may be able to find out from PayPal the public ip-address the request came from.
All this may require several court-orders as well Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password.
Post as a guest Name. Email Required, but never shown. Featured on Meta. Feedback post: Moderator review and reinstatement processes. Regular IP or cookie bans, which most other chats use, have proven to be inefficient. The site uses the camamba. Leo — Thanks for the insightful piece.
As you have noted in many other posts, the recipient of an email sent from Google, Yahoo, etc can often glean the IP address from which it was sent. Thanks, J Levin. Hi Leo, Very well explained and similied. Thank you. Thanks a lot. Very simply and effectively u clarified my doubts Thanx Leo…. I was very much confused initially but now very much relaxed. Post office example was awesome.
Well stated Leo. Could you further expand on the difference with a mobile device MAC address vs a standard desktop or laptop? I logged into my wireless network and someone hacked into my network. Can that be traced to the exact location if I provide the Mac Address? Mac You could only determine who hacked into your account if you know who happens to own the machine with that MAC address.
There is no registry where MAC address are stored. I have a doubt. In data link layer we use mac address.
Why can not we use ip address instead of mac address in data link layer. Using your analogy, if the color of my mailbox has changed then my mail carrier should still be able to deliver the mail, correct?
Recently one incident happened in our office. Someone sent emails from rediff to one girl and the IP address shown was of our office. The police found our office IP and they found some port no. I am confused how the ISP gave port no. My friend is genuine and he hasnt done aytign wrong. They only typically go as far as the first router.
Using the metaphor, if all incoming mail is addressed only to the mail room how does the mail clerk know who to send it to? Packets coming into the router can only be responses to packets sent by a computer within your network. Think of the packets you send out as having a complete return address so responses know where to go. Packets which are not responses — i. Thanks Ray. I will reword my question.
There are probably many internal computers, how does the router choose between them? In simpler term, the router knows it was your computer sending the outgoing packets, so it knows where to send the incoming packets which come in response to the request.
MAC addresses were originally meant to be pre-allocated and unchangeable but some devices [often home Internet routers] allow MAC addresses to be changed. IP addresses are also allocated to network devices [that are enabled and connected]. If you connect a laptop wirelessly and with an Ethernet cable to your Router, you will have two IP addresses, one for the network cable with the cable pugged in and one for the wireless adapter.
I wish I had thought of it when I was teaching this subject. Hey Leo, Just wanted to point out that your posts are great! You make it very easy to understand for guys like me who are new to the IT world. Please keep them coming. Spoofing or masking your IP Address can be traced only so far depending on how many changes that address makes. Great article! Hello, I got a pc from my friend, it was his old pc but with a new hard drive. My question is do i have his MAC address now or do i have the same one i had with my old pc?
Also if i have his MAC address can i see which websites he visited and how can i delete it? PC was formated and cleaned with new hard drive. What matters is: this technique wifi mac sniffing plus big data analysis can make a very accurate portrait of you so they can send you very accurate ads; they can conduct very accurate location tracking using this technique as well.