Understand MAC addresses, look up device manufacturers, and learn how hardware addresses are used in networking and security.
A MAC (Media Access Control) address is a unique identifier assigned to every network interface — your laptop's Wi-Fi adapter, your phone's cellular modem, your smart TV's ethernet port, and even your smart home devices all have one. Unlike IP addresses, which change based on your network, MAC addresses are typically burned into the hardware and remain constant. This guide explains how MAC addresses work, how to find them, and how to use them for network management and security.
A MAC address is a 48-bit (6-byte) identifier assigned by the manufacturer to a network interface controller (NIC). It operates at Layer 2 (Data Link Layer) of the OSI model and is used for direct communication between devices on the same local network segment.
MAC addresses are expressed in hexadecimal notation, typically in one of these formats:
00:1A:2B:3C:4D:5E (colon-separated — Linux/macOS)00-1A-2B-3C-4D-5E (hyphen-separated — Windows)001A.2B3C.4D5E (dot-separated — Cisco)001A2B3C4D5E (no separators — raw hex)A MAC address is divided into two parts, each serving a distinct purpose:
The first three bytes (24 bits) are the Organizationally Unique Identifier, assigned by the IEEE to hardware manufacturers. This allows you to identify the manufacturer of any network device from its MAC address. For example:
| OUI Prefix | Manufacturer |
|---|---|
00:1A:2B | Intel Corporation |
00:50:56 | VMware (virtual machines) |
F8:FF:0A | Apple Inc. |
A4:4C:C8 | Samsung Electronics |
DC:A6:32 | Espressif Systems (ESP32) |
B8:27:EB | Raspberry Pi Foundation |
00:0C:29 | VMware (another range) |
E4:5F:01 | Google Inc. |
The last three bytes are assigned by the manufacturer to uniquely identify each device. With 24 bits available, each manufacturer can produce over 16.7 million unique MAC addresses within their OUI range.
The first byte of a MAC address contains two important flag bits:
# Command Prompt
ipconfig /all
# PowerShell (more detailed)
Get-NetAdapter | Select-Object Name, MacAddress
# Look for "Physical Address" or "MAC Address"
# Terminal
ifconfig en0 | grep ether
# Or
networksetup -getmacaddress Wi-Fi
# Show all interfaces
ip link show
# Or
cat /sys/class/net/*/address
Go to Settings → About Phone → Wi-Fi MAC Address (location varies by Android version). On Android 10+, random MAC addresses are used by default for privacy. To see the real MAC: Settings → Wi-Fi → Tap your network → Advanced → MAC address type → Device MAC.
Go to Settings → General → About → Wi-Fi Address. Like Android, iOS uses private (random) Wi-Fi addresses by default since iOS 14. You can switch between private and fixed addresses in Wi-Fi settings.
While both identify devices on a network, they operate at different layers and serve different purposes:
The ARP (Address Resolution Protocol) bridges the gap — it translates IP addresses to MAC addresses on local networks. When your computer needs to send data to another device on the same network, it uses ARP to find the destination's MAC address.
The IEEE maintains the OUI database, which maps MAC address prefixes to manufacturers. This database is public and used by network tools for device identification. When you use a MAC Address Lookup tool, it queries this database (or a local copy) to return the manufacturer information.
Large manufacturers may have multiple OUI assignments, and some OUI ranges are sub-leased to other companies (called IAB — Individual Address Blocks, or MA-S/MA-M/MA-L in the modern IEEE system). The database is updated regularly as new manufacturers enter the market.
MAC addresses play several important roles in network security:
Many routers and switches support MAC filtering, which allows or denies network access based on MAC addresses. While this provides a basic layer of security, it's easily bypassed by MAC spoofing and should not be relied upon as the sole security measure.
DAI is a network security feature that validates ARP packets on a network. It uses a trusted MAC-to-IP binding database to prevent ARP spoofing attacks, where an attacker sends falsified ARP messages to associate their MAC address with the IP address of a legitimate device.
Switches can be configured with port security to limit the number of MAC addresses that can be learned on a port. This prevents MAC flooding attacks, where an attacker overwhelms the switch's MAC table to force it into hub mode (broadcasting all traffic).
Enterprise networks often use 802.1X for port-based network access control. While it doesn't directly use MAC addresses for authentication, the MAC address is used to identify the supplicant (client) during the EAP exchange.
MAC spoofing is the practice of changing a device's MAC address to a different value. This has both legitimate and malicious applications:
# Linux (temporary)
sudo ip link set dev eth0 down
sudo ip link set dev eth0 address 00:11:22:33:44:55
sudo ip link set dev eth0 up
# macOS (temporary)
sudo ifconfig en0 ether 00:11:22:33:44:55
# Windows (via Registry — more complex, requires reboot)
# Or use third-party tools like Technitium MAC Address Changer
The explosion of IoT devices has made MAC address management more important than ever. A typical smart home may have 20-50+ devices, each with a unique MAC address. Challenges include:
Popular smart home platforms like Home Assistant and OpenHAB use MAC addresses for device tracking and automation rules.
The traditional 48-bit MAC address is being supplemented by 64-bit MAC addresses in some contexts (like Bluetooth and IEEE 802.15.4 for IoT). Additionally, privacy features like MAC randomization (now default on most modern operating systems) are changing how MAC addresses are used. The trend is toward ephemeral, randomized MAC addresses for client devices, while infrastructure devices (routers, switches, access points) continue to use fixed MAC addresses.
MAC addresses are a fundamental building block of network communication. Whether you're a network administrator identifying devices, a security professional investigating suspicious activity, or a developer working with IoT, understanding MAC addresses is essential. Use our MAC Address Lookup tool to quickly identify any device's manufacturer from its MAC address — it's free and works instantly.