MAC Address Lookup: Find Your Device's Hardware Address

Understand MAC addresses, look up device manufacturers, and learn how hardware addresses are used in networking and security.

A MAC (Media Access Control) address is a unique identifier assigned to every network interface — your laptop's Wi-Fi adapter, your phone's cellular modem, your smart TV's ethernet port, and even your smart home devices all have one. Unlike IP addresses, which change based on your network, MAC addresses are typically burned into the hardware and remain constant. This guide explains how MAC addresses work, how to find them, and how to use them for network management and security.

🔍 Look up any MAC address — use our free MAC Address Lookup tool to instantly identify the manufacturer, address type, and formatting for any MAC address.

What Is a MAC Address?

A MAC address is a 48-bit (6-byte) identifier assigned by the manufacturer to a network interface controller (NIC). It operates at Layer 2 (Data Link Layer) of the OSI model and is used for direct communication between devices on the same local network segment.

MAC addresses are expressed in hexadecimal notation, typically in one of these formats:

MAC Address Structure

A MAC address is divided into two parts, each serving a distinct purpose:

00:1A:2B:3C:4D:5E
OUI (Organizationally Unique Identifier) — identifies the manufacturer  |  NIC-Specific — unique per device

OUI (First 3 Bytes)

The first three bytes (24 bits) are the Organizationally Unique Identifier, assigned by the IEEE to hardware manufacturers. This allows you to identify the manufacturer of any network device from its MAC address. For example:

OUI PrefixManufacturer
00:1A:2BIntel Corporation
00:50:56VMware (virtual machines)
F8:FF:0AApple Inc.
A4:4C:C8Samsung Electronics
DC:A6:32Espressif Systems (ESP32)
B8:27:EBRaspberry Pi Foundation
00:0C:29VMware (another range)
E4:5F:01Google Inc.

NIC-Specific (Last 3 Bytes)

The last three bytes are assigned by the manufacturer to uniquely identify each device. With 24 bits available, each manufacturer can produce over 16.7 million unique MAC addresses within their OUI range.

Special Bits in the First Byte

The first byte of a MAC address contains two important flag bits:

How to Find Your MAC Address

Windows

# Command Prompt
ipconfig /all

# PowerShell (more detailed)
Get-NetAdapter | Select-Object Name, MacAddress

# Look for "Physical Address" or "MAC Address"

macOS

# Terminal
ifconfig en0 | grep ether

# Or
networksetup -getmacaddress Wi-Fi

Linux

# Show all interfaces
ip link show

# Or
cat /sys/class/net/*/address

Android

Go to Settings → About Phone → Wi-Fi MAC Address (location varies by Android version). On Android 10+, random MAC addresses are used by default for privacy. To see the real MAC: Settings → Wi-Fi → Tap your network → Advanced → MAC address type → Device MAC.

iOS

Go to Settings → General → About → Wi-Fi Address. Like Android, iOS uses private (random) Wi-Fi addresses by default since iOS 14. You can switch between private and fixed addresses in Wi-Fi settings.

MAC Addresses vs IP Addresses

While both identify devices on a network, they operate at different layers and serve different purposes:

The ARP (Address Resolution Protocol) bridges the gap — it translates IP addresses to MAC addresses on local networks. When your computer needs to send data to another device on the same network, it uses ARP to find the destination's MAC address.

OUI Vendor Database

The IEEE maintains the OUI database, which maps MAC address prefixes to manufacturers. This database is public and used by network tools for device identification. When you use a MAC Address Lookup tool, it queries this database (or a local copy) to return the manufacturer information.

Large manufacturers may have multiple OUI assignments, and some OUI ranges are sub-leased to other companies (called IAB — Individual Address Blocks, or MA-S/MA-M/MA-L in the modern IEEE system). The database is updated regularly as new manufacturers enter the market.

MAC Addresses and Network Security

MAC addresses play several important roles in network security:

MAC Filtering

Many routers and switches support MAC filtering, which allows or denies network access based on MAC addresses. While this provides a basic layer of security, it's easily bypassed by MAC spoofing and should not be relied upon as the sole security measure.

Dynamic ARP Inspection (DAI)

DAI is a network security feature that validates ARP packets on a network. It uses a trusted MAC-to-IP binding database to prevent ARP spoofing attacks, where an attacker sends falsified ARP messages to associate their MAC address with the IP address of a legitimate device.

Port Security

Switches can be configured with port security to limit the number of MAC addresses that can be learned on a port. This prevents MAC flooding attacks, where an attacker overwhelms the switch's MAC table to force it into hub mode (broadcasting all traffic).

802.1X Authentication

Enterprise networks often use 802.1X for port-based network access control. While it doesn't directly use MAC addresses for authentication, the MAC address is used to identify the supplicant (client) during the EAP exchange.

⚠️ Privacy Note: MAC addresses are visible to anyone on the same local network. On public Wi-Fi, this means the network operator and other users (on unencrypted networks) can potentially see your device's MAC address. Modern operating systems use random MAC addresses on public networks to protect privacy.

MAC Spoofing

MAC spoofing is the practice of changing a device's MAC address to a different value. This has both legitimate and malicious applications:

Legitimate Uses

Malicious Uses

How to Change Your MAC Address

# Linux (temporary)
sudo ip link set dev eth0 down
sudo ip link set dev eth0 address 00:11:22:33:44:55
sudo ip link set dev eth0 up

# macOS (temporary)
sudo ifconfig en0 ether 00:11:22:33:44:55

# Windows (via Registry — more complex, requires reboot)
# Or use third-party tools like Technitium MAC Address Changer

MAC Addresses in IoT and Smart Devices

The explosion of IoT devices has made MAC address management more important than ever. A typical smart home may have 20-50+ devices, each with a unique MAC address. Challenges include:

Popular smart home platforms like Home Assistant and OpenHAB use MAC addresses for device tracking and automation rules.

Future of MAC Addresses

The traditional 48-bit MAC address is being supplemented by 64-bit MAC addresses in some contexts (like Bluetooth and IEEE 802.15.4 for IoT). Additionally, privacy features like MAC randomization (now default on most modern operating systems) are changing how MAC addresses are used. The trend is toward ephemeral, randomized MAC addresses for client devices, while infrastructure devices (routers, switches, access points) continue to use fixed MAC addresses.

🔎 Identify any device by its MAC — our MAC Address Lookup tool lets you enter any MAC address and instantly see the manufacturer, address type (unicast/multicast, universal/local), and formatted variants.

Frequently Asked Questions

What is a MAC address?
A MAC (Media Access Control) address is a unique 48-bit identifier assigned to a network interface card (NIC) by the manufacturer. It's used for communication at the data link layer (Layer 2) of the OSI model and operates on local network segments only.
Can I look up a manufacturer from a MAC address?
Yes. The first 3 bytes (6 hex characters) of a MAC address form the OUI (Organizationally Unique Identifier), which identifies the manufacturer. For example, a MAC starting with 00:1A:2B belongs to Intel. Use a MAC lookup tool to search the IEEE OUI database.
Can MAC addresses be traced?
MAC addresses are only visible on the local network segment. They don't travel across routers, so they cannot be used to track devices across the internet. However, on public Wi-Fi networks, the local network operator can see your MAC address.
What is MAC spoofing?
MAC spoofing is changing a device's MAC address to impersonate another device. It's used for legitimate purposes (privacy on public Wi-Fi, testing) and malicious purposes (bypassing MAC filters, network impersonation). Most operating systems allow MAC address changes.
Do MAC addresses change?
The physical MAC address (burned into hardware) is permanent. However, most modern operating systems use random MAC addresses on public Wi-Fi networks for privacy. These random addresses change periodically or per network connection.

Conclusion

MAC addresses are a fundamental building block of network communication. Whether you're a network administrator identifying devices, a security professional investigating suspicious activity, or a developer working with IoT, understanding MAC addresses is essential. Use our MAC Address Lookup tool to quickly identify any device's manufacturer from its MAC address — it's free and works instantly.