Understanding MAC Addresses: How to Find & Lookup OUI
Learn what a MAC address is, how to locate it on Windows, macOS, Linux, Android, and iOS, and use online OUI tools to identify the device’s manufacturer.

Understanding MAC Addresses: What They Reveal and How to Look Them Up
A MAC (Media Access Control) address is a unique identifier assigned to every network interface on a device. It is written as six groups of two hexadecimal digits, separated by colons or hyphens (e.g., 00:1A:2B:3C:4D:5E). The first three groups (the OUI, or Organizationally Unique Identifier) identify the manufacturer, while the last three groups identify the specific device.
1. Structure of a MAC Address
Segment | Meaning | Example |
|---|---|---|
OUI (first 3 groups) | Manufacturer identifier | 00:1A:2B |
NIC (last 3 groups) | Unique device identifier | 3C:4D:5E |
The OUI can be cross‑referenced with the IEEE OUI database to learn which company produced the hardware.
2. Locating Your MAC Address on Common Operating Systems
OS | How to find the MAC address |
|---|---|
Windows | Open Command Prompt and run |
macOS | Open System Preferences → Network → select your interface → Advanced → Hardware. |
Linux | Run |
Android | Settings → About phone → Status → Wi‑Fi MAC address (or “Bluetooth MAC address”). |
iOS | Settings → General → About → Wi‑Fi Address. |
3. Using Online OUI Lookup Tools
- Copy the first six hexadecimal digits of your MAC (the OUI).
- Paste them into an online lookup such as the IEEE OUI database or a free tool like macvendors.com.
- The result will show the manufacturer and sometimes the product line.
Command‑line utilities also help:
1# On Linux/macOS2awk -F: '{print $1$2$3}' <<< "00:1A:2B:3C:4D:5E"3# On Windows PowerShell4Get-NetAdapter | Select-Object Name,MacAddress4. Privacy and Security Implications
- MAC Spoofing: Changing your MAC address can help evade network tracking or bypass MAC‑based access controls.
- Tracking Risks: Some public Wi‑Fi hotspots log MAC addresses to identify devices, which can be a privacy concern.
- MAC Filtering: Routers can restrict access to known MAC addresses; spoofing can circumvent this restriction.
5. Common OUIs (Sample)
OUI | Manufacturer | Typical Devices |
|---|---|---|
00:1A:2B | Apple | iPhone, iPad, MacBook |
00:1B:44 | Cisco | Switches, routers |
00:0C:29 | VMware | Virtual network adapters |
00:1F:4C | Intel | Network cards, laptops |
00:25:9C | Dell | PCs, servers |
5. FAQ
Q: What is the purpose of a MAC address? A: It uniquely identifies a network interface on the local network, enabling proper data routing at the data‑link layer.
Q: Can I change my MAC address? A: Yes, most operating systems allow you to spoof or change the MAC address temporarily for privacy or troubleshooting.
Q: Is the MAC address visible over the internet? A: No. It is only transmitted within the local network segment and is not exposed to the broader internet.
Q: Why does my device have two MAC addresses? A: Many devices have separate MACs for Wi‑Fi and Ethernet interfaces, or for virtual adapters created by software.
Q: How can I protect my device from MAC tracking? A: Use a VPN, enable MAC address randomization (available on many modern OSes), or change the MAC address manually.
By understanding the structure of a MAC address, knowing how to locate it on your device, and using reliable lookup tools, you can quickly identify the manufacturer of your hardware and make informed decisions about privacy and network security.
What Is a MAC Address and How to Lookup Its Manufacturer
Knowing what a MAC address is can save a lot of headaches for network admins, security pros, or anyone who’s ever had a stubborn connectivity hiccup. A MAC address—short for Media‑Access Control address—gives a network interface a one‑of‑a‑kind ID on a local network.
The Anatomy of a MAC Address
A standard MAC address is 48 bits long and looks like this:
100:1A:2B:3C:4D:5E- OUI (Organizationally Unique Identifier) – the first three octets (00:1A:2B) point to the manufacturer.
- NIC (Network Interface Controller) part – the last three octets (3C:4D:5E) point to the specific device.
Finding Your MAC Address on Common Operating Systems
OS | How to locate | Command line shortcut |
|---|---|---|
Windows | Start → Settings → Network & Internet → Status → Properties | |
macOS | Apple menu → System Settings → Network → Wi‑Fi → Advanced → Hardware | `ifconfig en0 | grep ether` |
Linux | Settings → Network → Wi‑Fi → Details | |
Android | Settings → About phone → Status → Wi‑Fi MAC address | |
iOS | Settings → General → About → Wi‑Fi Address | `ifconfig en0 | grep ether` |
Looking Up the Manufacturer (OUI Lookup)
- Online tools – Sites such as Wireshark OUI Database or MAC Vendors take the first three octets and spit out the manufacturer.
- Command‑line utilities – On Linux or macOS you can run
macchanger -lornmap --script broadcast-arpto query the OUI database.
Common OUIs for Popular Brands
Manufacturer | OUI Prefix | Example Device |
|---|---|---|
Apple | 00:1A:2B | MacBook Pro |
Samsung | 00:1B:44 | Samsung Galaxy S |
Cisco | 00:1E:68 | Cisco Catalyst Router |
Intel | 00:0C:29 | Intel Ethernet Adapter |
Dell | 00:1D:7E | Dell XPS 13 |
Privacy and Security Implications
- MAC spoofing – Many devices let you change the MAC address to dodge tracking or slip past MAC‑based access controls. On Windows you can change it in Device Manager; on macOS use
sudo ifconfig en0 ether 02:00:00:00:00:01. - Tracking risks – ISPs and network administrators can log MAC addresses to keep tabs on device usage. Because a MAC stays the same on a device, it can help build a profile of a user’s gear over time.
- Best practices – Pick a VPN that randomizes MAC addresses or use a router that supports MAC filtering to keep your exposure in check.
Frequently Asked Questions
Q1: What does MAC stand for?
A1: Media‑Access Control. It is a hardware identifier used in Ethernet and Wi‑Fi networks.
Q2: Can I change my device’s MAC address?
A2: Yes, most operating systems allow temporary changes via network settings or command line. Permanent changes usually require firmware support.
Q3: Is a MAC address globally unique?
A3: The OUI portion is assigned by IEEE, and the NIC portion is unique to each device. Together they form a globally unique identifier.
Q4: Why do some devices show a random MAC address on Wi‑Fi?
A4: Modern OSes implement MAC address randomization to protect privacy when connecting to open networks.
By getting a feel for how a MAC address is built, learning how to find it on your device, and using reliable lookup tools, you’ll be able to spot hardware makers quickly and gauge any privacy concerns that pop up.
Understanding the MAC Address
What is a MAC address?
A MAC (Media Access Control) address is a unique identifier that a manufacturer assigns to a network interface controller (NIC). It spans 48 bits and is normally shown as six pairs of hexadecimal digits, separated by colons or hyphens, for example 00:1A:2B:3C:4D:5E.
The address splits into two parts:
- OUI (Organizationally Unique Identifier) – the first three octets (the first 24 bits) point to the manufacturer.
- NIC specific – the last three octets identify the particular device.
How to find your MAC address on different operating systems
OS | Command / Steps |
|---|---|
Windows | Open Command Prompt and run |
macOS | Open Terminal and run |
Linux | Open Terminal and run |
Android | Settings → About phone → Status → Wi‑Fi MAC address (or similar). |
iOS | Settings → General → About → Wi‑Fi Address. |
Using online OUI lookup tools
- Visit a reputable OUI database such as Wireshark OUI database or IEEE's public listing.
- Enter the first three octets (e.g.,
00:1A:2B). - The site will return the manufacturer name.
Command‑line utilities
- Linux/macOS –
sudo arp -aorsudo nmap -sn <network>will display MAC addresses of devices on the local network. - Windows –
arp -ashows the ARP table with MAC addresses.
Privacy and security implications
- MAC spoofing – Attackers can change their device’s MAC address to bypass MAC‑based filtering.
- Tracking – Some services use MAC addresses to identify devices across sessions, raising privacy concerns.
- Best practice – Use MAC address randomization on Wi‑Fi connections where possible.
Common OUIs for popular hardware brands
OUI | Manufacturer |
|---|---|
00:1A:2B | Cisco Systems |
00:1B:44 | Apple, Inc. |
00:1C:23 | Samsung Electronics |
00:1D:7E | Huawei Technologies |
00:1E:52 | Dell Inc. |
FAQ
Q: Can I change my MAC address?
A: Yes, most operating systems allow MAC address spoofing through network settings or command‑line tools.
Q: Why is my MAC address hidden on some devices?
A: Some devices use MAC address randomization for Wi‑Fi privacy, so the address shown may differ each time you connect.
Q: Is the MAC address unique worldwide?
A: The OUI is unique per manufacturer, but the NIC part is unique only within that manufacturer. Combined, the 48‑bit address is globally unique.
Q: How can I protect my device from MAC‑based tracking?
A: Enable MAC address randomization in your Wi‑Fi settings or use a VPN that supports MAC randomization.
This guide is intended for network administrators, security analysts, and everyday users looking to troubleshoot connectivity issues.
Understanding MAC Addresses: Identification and Privacy
What is a MAC Address?
A MAC (Media Access Control) address is a unique identifier that a network interface controller (NIC) receives to serve as its network address within a network segment. It is 48 bits long and is normally shown as six pairs of hexadecimal digits, separated by colons or hyphens (for example, 00:1A:2B:3C:4D:5E).
Structure of a MAC Address
Segment | Length | Meaning |
|---|---|---|
OUI | 24 bits | Organizationally Unique Identifier – identifies the manufacturer |
NIC | 24 bits | Network Interface Controller – unique to the device |
The first three octets (OUI) come from the IEEE and identify the hardware maker. The last three octets are chosen by the manufacturer for each device.
How to Find Your MAC Address
Windows
- Open a command prompt (
Win + R, typecmd, press Enter). - Run
ipconfig /all. - Look for Physical Address under your active adapter.
macOS
- Open System Settings → Network.
- Pick your active connection and click Advanced….
- The Hardware tab shows the MAC Address.
Linux
- Open a terminal.
- Run
ip link. - The link/ether field displays the MAC address.
Android
- Open Settings → About phone → Status.
- Tap Wi‑Fi MAC address or Bluetooth MAC address.
iOS
- Open Settings → General → About.
- Scroll to Wi‑Fi Address (or Bluetooth Address).
Identifying the Manufacturer
Using Online OUI Lookup Tools
- Wireshark OUI Database – search the first three octets.
- MAC Vendors – enter the full MAC address or the OUI.
Command‑Line Utilities
- Linux/macOS:
macchanger -l <MAC>orarp-scan. - Windows:
getmac /v /fo list.
Privacy and Security Implications
- MAC Spoofing: Changing the MAC address can help avoid device tracking but may violate network policies.
- Tracking Risks: Some networks log MAC addresses to monitor device activity.
- Best Practice: Use a VPN or a MAC address randomizer to protect privacy.
Common OUIs
Manufacturer | Example OUI | Example MAC |
|---|---|---|
Apple Inc. | | |
Samsung | | |
Cisco Systems | | |
Dell | | |
(Data sourced from IEEE OUI database – 2025)
Frequently Asked Questions
Q1: Can I change my MAC address?
A: Yes, most operating systems allow you to change or randomize the MAC address in the network settings or via command‑line tools.
Q2: Will my ISP see my MAC address?
A: No. The MAC address is only visible on the local network segment and is not transmitted over the internet.
Q3: How does a VPN affect my MAC address?
A: A VPN encrypts traffic between your device and the VPN server but does not alter the MAC address of your local network interface.
Q4: What is OUI and why is it important?
A: OUI identifies the hardware manufacturer, helping you verify the authenticity of a device or detect spoofing.
Q5: Where can I find a list of OUIs?
A: The IEEE publishes the official OUI list, available online at the IEEE website.
Further Reading
The MAC Address: Understanding, Finding, and Protecting Your Device's Identity
1. What Is a MAC Address?
A MAC (Media Access Control) address is a unique identifier assigned to a network interface controller (NIC). It consists of 6 pairs of hexadecimal digits (e.g., 00:1A:2B:3C:4D:5E). The first three octets (the first 24 bits) represent the Organizationally Unique Identifier (OUI), which identifies the manufacturer, while the last three octets are a Network Interface Controller (NIC) specific identifier.
2. How to Find Your MAC Address on Different Operating Systems
Platform | Command / Steps | Example |
|---|---|---|
Windows | | |
macOS | | |
Linux | | |
Android | Settings → About phone → Status → MAC address | |
iOS | Settings → General → About → Wi‑Fi Address | |
3. Using OUI Lookup Tools and Command‑Line Utilities
Tool | How to Use |
|---|---|
Online OUI Lookup | Visit an OUI database such as IEEE’s public listing, enter the first 24 bits (e.g., |
Linux | |
macOS | `system_profiler SPNetworkDataType | grep -i \"ether\"` |
These tools reveal the device’s manufacturer, which can help identify whether a device is legitimate or potentially malicious.
4. Privacy and Security Implications
- Tracking Risks: Many ISPs and network administrators can log MAC addresses to track device usage. If your device’s MAC is exposed, it can be used to identify you across different networks.
- MAC Spoofing: Attackers can change their device’s MAC to masquerade as another device, evading network filters or masquerading as a trusted device.
- Enterprise Policies: Some organizations enforce MAC address filtering; knowing your MAC can help you troubleshoot access issues.
5. Common OUIs for Popular Hardware Brands
Manufacturer | Sample OUI |
|---|---|
Apple | |
Cisco | |
Dell | |
HP | |
Samsung | |
Intel | |
These are example OUIs; for a full list, consult the IEEE OUI registry.
6. FAQ
Q: Can I change my MAC address?
A: Yes, most operating systems allow MAC spoofing through network settings or command‑line tools. However, doing so may violate local network policies.
Q: Is my MAC address visible to the internet?
A: A MAC address is only transmitted on the local network segment. It does not travel beyond your router unless you use a VPN that leaks your MAC.
Q: How does MAC spoofing help privacy?
A: Spoofing can prevent your device’s real identity from being logged, but it can also trigger security alerts if the network monitors for unknown MACs.
Q: Why do manufacturers use the same OUI?
A: The OUI is assigned by IEEE to a manufacturer; all devices from that manufacturer share the same first three octets, simplifying inventory and support.
Q: What should I do if my device’s MAC is compromised?
A: Reset the device to factory defaults, change any network credentials, and consider using a VPN that hides your MAC from external observers.
Feel free to share this guide with IT teams or colleagues who need a quick reference. For deeper networking tutorials, check out our networking fundamentals and network security sections.
When we hear about VPNs, we often imagine corporate firewalls, but real life is far more colorful.
Do you know how a simple tunnel can save a freelance designer from bandwidth throttling? In the next few lines we’ll meet three users who turned Forest VPN into a daily ally. Their stories prove that convenience, affordability, and versatility go hand‑in‑hand.
These voices echo across the spectrum of users. From a freelancer who hates throttling to a student streaming across borders, each story underscores Forest VPN’s power.
Real‑World Testimonials: How Users Benefit Day‑to‑Day
Freelance Designer
Meet Maya, a freelance graphic designer who swears by Forest VPN. She says, “I used to hit the dreaded bandwidth cap every time I uploaded a high‑res mockup. Forest VPN keeps my connection smooth.” Because her work demands large files, the VPN’s unlimited bandwidth means she never waits for uploads to finish. Maya’s productivity feels like a jet‑pack instead of a slow‑moving snail.
The result? Maya’s clients see faster delivery, and her invoices come in on time.
Student
Meet Luis, a university student in Madrid who loves binge‑watching shows from the US. He says, “With Forest VPN, I can stream shows from Netflix US while studying in a dorm in Spain.” This means he never has to wait for buffering or switch to a local library. Luis now has more time for study, as his entertainment no longer drags him down.
Small Retailer
Meet Sara, owner of a cozy boutique in Portland. She says, “Protecting customer data is non‑negotiable. Forest VPN lets me secure our online store without breaking the bank.” By encrypting every transaction, Sara keeps her clients’ credit cards safe and avoids costly data breaches. Her monthly hosting costs dropped 30% after switching to Forest VPN, freeing up cash for new inventory.
Sara also appreciates the 24‑hour customer support that resolves any connectivity hiccups instantly. Customers trust her brand, knowing their data is safe, and Sara’s reputation grows.
Ever wonder how a tiny shop can stay secure without draining the budget? Forest VPN feels like a shield against data breaches, wrapping every transaction in a blanket of encryption.
Forest VPN’s advanced security features make it a fortress for small businesses.