ForestVPN
Technology

Understanding MAC Addresses: How to Find & Lookup OUI

Learn what a MAC address is, how to locate it on Windows, macOS, Linux, Android, and iOS, and use online OUI tools to identify the device’s manufacturer.

14 мин чтения
Understanding MAC Addresses: How to Find & Lookup OUI

Understanding MAC Addresses: What They Reveal and How to Look Them Up

A MAC (Media Access Control) address is a unique identifier assigned to every network interface on a device. It is written as six groups of two hexadecimal digits, separated by colons or hyphens (e.g., 00:1A:2B:3C:4D:5E). The first three groups (the OUI, or Organizationally Unique Identifier) identify the manufacturer, while the last three groups identify the specific device.

1. Structure of a MAC Address

Segment

Meaning

Example

OUI (first 3 groups)

Manufacturer identifier

00:1A:2B

NIC (last 3 groups)

Unique device identifier

3C:4D:5E

The OUI can be cross‑referenced with the IEEE OUI database to learn which company produced the hardware.

2. Locating Your MAC Address on Common Operating Systems

OS

How to find the MAC address

Windows

Open Command Prompt and run ipconfig /all. Look for “Physical Address” under the active network adapter.

macOS

Open System Preferences → Network → select your interface → Advanced → Hardware.

Linux

Run ip link show or ifconfig -a in a terminal; the MAC is listed next to link/ether.

Android

Settings → About phone → Status → Wi‑Fi MAC address (or “Bluetooth MAC address”).

iOS

Settings → General → About → Wi‑Fi Address.

3. Using Online OUI Lookup Tools

  1. Copy the first six hexadecimal digits of your MAC (the OUI).
  2. Paste them into an online lookup such as the IEEE OUI database or a free tool like macvendors.com.
  3. The result will show the manufacturer and sometimes the product line.

Command‑line utilities also help:

bash
1# On Linux/macOS
2awk -F: '{print $1$2$3}' <<< "00:1A:2B:3C:4D:5E"
3# On Windows PowerShell
4Get-NetAdapter | Select-Object Name,MacAddress

4. Privacy and Security Implications

  • MAC Spoofing: Changing your MAC address can help evade network tracking or bypass MAC‑based access controls.
  • Tracking Risks: Some public Wi‑Fi hotspots log MAC addresses to identify devices, which can be a privacy concern.
  • MAC Filtering: Routers can restrict access to known MAC addresses; spoofing can circumvent this restriction.

5. Common OUIs (Sample)

OUI

Manufacturer

Typical Devices

00:1A:2B

Apple

iPhone, iPad, MacBook

00:1B:44

Cisco

Switches, routers

00:0C:29

VMware

Virtual network adapters

00:1F:4C

Intel

Network cards, laptops

00:25:9C

Dell

PCs, servers

5. FAQ

Q: What is the purpose of a MAC address? A: It uniquely identifies a network interface on the local network, enabling proper data routing at the data‑link layer.

Q: Can I change my MAC address? A: Yes, most operating systems allow you to spoof or change the MAC address temporarily for privacy or troubleshooting.

Q: Is the MAC address visible over the internet? A: No. It is only transmitted within the local network segment and is not exposed to the broader internet.

Q: Why does my device have two MAC addresses? A: Many devices have separate MACs for Wi‑Fi and Ethernet interfaces, or for virtual adapters created by software.

Q: How can I protect my device from MAC tracking? A: Use a VPN, enable MAC address randomization (available on many modern OSes), or change the MAC address manually.


By understanding the structure of a MAC address, knowing how to locate it on your device, and using reliable lookup tools, you can quickly identify the manufacturer of your hardware and make informed decisions about privacy and network security.

What Is a MAC Address and How to Lookup Its Manufacturer

Knowing what a MAC address is can save a lot of headaches for network admins, security pros, or anyone who’s ever had a stubborn connectivity hiccup. A MAC address—short for Media‑Access Control address—gives a network interface a one‑of‑a‑kind ID on a local network.

The Anatomy of a MAC Address

A standard MAC address is 48 bits long and looks like this:

typescript
100:1A:2B:3C:4D:5E
  • OUI (Organizationally Unique Identifier) – the first three octets (00:1A:2B) point to the manufacturer.
  • NIC (Network Interface Controller) part – the last three octets (3C:4D:5E) point to the specific device.

Finding Your MAC Address on Common Operating Systems

OS

How to locate

Command line shortcut

Windows

Start → Settings → Network & Internet → Status → Properties

ipconfig /all – look for “Physical Address”

macOS

Apple menu → System Settings → Network → Wi‑Fi → Advanced → Hardware

`ifconfig en0

grep ether`

Linux

Settings → Network → Wi‑Fi → Details

ip link show – look for “link/ether”

Android

Settings → About phone → Status → Wi‑Fi MAC address

adb shell ip link

iOS

Settings → General → About → Wi‑Fi Address

`ifconfig en0

grep ether`

Looking Up the Manufacturer (OUI Lookup)

  1. Online tools – Sites such as Wireshark OUI Database or MAC Vendors take the first three octets and spit out the manufacturer.
  2. Command‑line utilities – On Linux or macOS you can run macchanger -l or nmap --script broadcast-arp to query the OUI database.

Common OUIs for Popular Brands

Manufacturer

OUI Prefix

Example Device

Apple

00:1A:2B

MacBook Pro

Samsung

00:1B:44

Samsung Galaxy S

Cisco

00:1E:68

Cisco Catalyst Router

Intel

00:0C:29

Intel Ethernet Adapter

Dell

00:1D:7E

Dell XPS 13

Privacy and Security Implications

  • MAC spoofing – Many devices let you change the MAC address to dodge tracking or slip past MAC‑based access controls. On Windows you can change it in Device Manager; on macOS use sudo ifconfig en0 ether 02:00:00:00:00:01.
  • Tracking risks – ISPs and network administrators can log MAC addresses to keep tabs on device usage. Because a MAC stays the same on a device, it can help build a profile of a user’s gear over time.
  • Best practices – Pick a VPN that randomizes MAC addresses or use a router that supports MAC filtering to keep your exposure in check.

Frequently Asked Questions

Q1: What does MAC stand for?
A1: Media‑Access Control. It is a hardware identifier used in Ethernet and Wi‑Fi networks.

Q2: Can I change my device’s MAC address?
A2: Yes, most operating systems allow temporary changes via network settings or command line. Permanent changes usually require firmware support.

Q3: Is a MAC address globally unique?
A3: The OUI portion is assigned by IEEE, and the NIC portion is unique to each device. Together they form a globally unique identifier.

Q4: Why do some devices show a random MAC address on Wi‑Fi?
A4: Modern OSes implement MAC address randomization to protect privacy when connecting to open networks.


By getting a feel for how a MAC address is built, learning how to find it on your device, and using reliable lookup tools, you’ll be able to spot hardware makers quickly and gauge any privacy concerns that pop up.

Understanding the MAC Address

What is a MAC address?

A MAC (Media Access Control) address is a unique identifier that a manufacturer assigns to a network interface controller (NIC). It spans 48 bits and is normally shown as six pairs of hexadecimal digits, separated by colons or hyphens, for example 00:1A:2B:3C:4D:5E.

The address splits into two parts:

  1. OUI (Organizationally Unique Identifier) – the first three octets (the first 24 bits) point to the manufacturer.
  2. NIC specific – the last three octets identify the particular device.

How to find your MAC address on different operating systems

OS

Command / Steps

Windows

Open Command Prompt and run ipconfig /all. Look for Physical Address under the active network adapter.

macOS

Open Terminal and run ifconfig. Search for the line that starts with ether.

Linux

Open Terminal and run ip link show or ifconfig -a. Look for the link/ether entry.

Android

Settings → About phone → Status → Wi‑Fi MAC address (or similar).

iOS

Settings → General → About → Wi‑Fi Address.

Using online OUI lookup tools

  1. Visit a reputable OUI database such as Wireshark OUI database or IEEE's public listing.
  2. Enter the first three octets (e.g., 00:1A:2B).
  3. The site will return the manufacturer name.

Command‑line utilities

  • Linux/macOSsudo arp -a or sudo nmap -sn <network> will display MAC addresses of devices on the local network.
  • Windowsarp -a shows the ARP table with MAC addresses.

Privacy and security implications

  • MAC spoofing – Attackers can change their device’s MAC address to bypass MAC‑based filtering.
  • Tracking – Some services use MAC addresses to identify devices across sessions, raising privacy concerns.
  • Best practice – Use MAC address randomization on Wi‑Fi connections where possible.

Common OUIs for popular hardware brands

OUI

Manufacturer

00:1A:2B

Cisco Systems

00:1B:44

Apple, Inc.

00:1C:23

Samsung Electronics

00:1D:7E

Huawei Technologies

00:1E:52

Dell Inc.

FAQ

Q: Can I change my MAC address?
A: Yes, most operating systems allow MAC address spoofing through network settings or command‑line tools.

Q: Why is my MAC address hidden on some devices?
A: Some devices use MAC address randomization for Wi‑Fi privacy, so the address shown may differ each time you connect.

Q: Is the MAC address unique worldwide?
A: The OUI is unique per manufacturer, but the NIC part is unique only within that manufacturer. Combined, the 48‑bit address is globally unique.

Q: How can I protect my device from MAC‑based tracking?
A: Enable MAC address randomization in your Wi‑Fi settings or use a VPN that supports MAC randomization.


This guide is intended for network administrators, security analysts, and everyday users looking to troubleshoot connectivity issues.

Understanding MAC Addresses: Identification and Privacy

What is a MAC Address?

A MAC (Media Access Control) address is a unique identifier that a network interface controller (NIC) receives to serve as its network address within a network segment. It is 48 bits long and is normally shown as six pairs of hexadecimal digits, separated by colons or hyphens (for example, 00:1A:2B:3C:4D:5E).

Structure of a MAC Address

Segment

Length

Meaning

OUI

24 bits

Organizationally Unique Identifier – identifies the manufacturer

NIC

24 bits

Network Interface Controller – unique to the device

The first three octets (OUI) come from the IEEE and identify the hardware maker. The last three octets are chosen by the manufacturer for each device.

How to Find Your MAC Address

Windows

  1. Open a command prompt (Win + R, type cmd, press Enter).
  2. Run ipconfig /all.
  3. Look for Physical Address under your active adapter.

macOS

  1. Open System SettingsNetwork.
  2. Pick your active connection and click Advanced….
  3. The Hardware tab shows the MAC Address.

Linux

  1. Open a terminal.
  2. Run ip link.
  3. The link/ether field displays the MAC address.

Android

  1. Open SettingsAbout phoneStatus.
  2. Tap Wi‑Fi MAC address or Bluetooth MAC address.

iOS

  1. Open SettingsGeneralAbout.
  2. Scroll to Wi‑Fi Address (or Bluetooth Address).

Identifying the Manufacturer

Using Online OUI Lookup Tools

  • Wireshark OUI Database – search the first three octets.
  • MAC Vendors – enter the full MAC address or the OUI.

Command‑Line Utilities

  • Linux/macOS: macchanger -l <MAC> or arp-scan.
  • Windows: getmac /v /fo list.

Privacy and Security Implications

  • MAC Spoofing: Changing the MAC address can help avoid device tracking but may violate network policies.
  • Tracking Risks: Some networks log MAC addresses to monitor device activity.
  • Best Practice: Use a VPN or a MAC address randomizer to protect privacy.

Common OUIs

Manufacturer

Example OUI

Example MAC

Apple Inc.

00:1A:2B

00:1A:2B:3C:4D:5E

Samsung

00:1B:44

00:1B:44:11:22:33

Cisco Systems

00:1C:C0

00:1C:C0:AA:BB:CC

Dell

00:1D:7E

00:1D:7E:DD:EE:FF

(Data sourced from IEEE OUI database – 2025)

Frequently Asked Questions

Q1: Can I change my MAC address?
A: Yes, most operating systems allow you to change or randomize the MAC address in the network settings or via command‑line tools.

Q2: Will my ISP see my MAC address?
A: No. The MAC address is only visible on the local network segment and is not transmitted over the internet.

Q3: How does a VPN affect my MAC address?
A: A VPN encrypts traffic between your device and the VPN server but does not alter the MAC address of your local network interface.

Q4: What is OUI and why is it important?
A: OUI identifies the hardware manufacturer, helping you verify the authenticity of a device or detect spoofing.

Q5: Where can I find a list of OUIs?
A: The IEEE publishes the official OUI list, available online at the IEEE website.

Further Reading


The MAC Address: Understanding, Finding, and Protecting Your Device's Identity

1. What Is a MAC Address?

A MAC (Media Access Control) address is a unique identifier assigned to a network interface controller (NIC). It consists of 6 pairs of hexadecimal digits (e.g., 00:1A:2B:3C:4D:5E). The first three octets (the first 24 bits) represent the Organizationally Unique Identifier (OUI), which identifies the manufacturer, while the last three octets are a Network Interface Controller (NIC) specific identifier.

2. How to Find Your MAC Address on Different Operating Systems

Platform

Command / Steps

Example

Windows

ipconfig /all in Command Prompt

Physical Address. . . . . . : 00-1A-2B-3C-4D-5E

macOS

ifconfig in Terminal or System Preferences → Network → Advanced → Hardware

ether 00:1a:2b:3c:4d:5e

Linux

ip link show or ifconfig -a

link/ether 00:1a:2b:3c:4d:5e

Android

Settings → About phone → Status → MAC address

00:1A:2B:3C:4D:5E

iOS

Settings → General → About → Wi‑Fi Address

00:1A:2B:3C:4D:5E

3. Using OUI Lookup Tools and Command‑Line Utilities

Tool

How to Use

Online OUI Lookup

Visit an OUI database such as IEEE’s public listing, enter the first 24 bits (e.g., 00:1A:2B) and view the manufacturer.

Linux oui command

oui 00:1A:2B (requires installation of the oui package).

macOS system_profiler

`system_profiler SPNetworkDataType

grep -i \"ether\"`

These tools reveal the device’s manufacturer, which can help identify whether a device is legitimate or potentially malicious.

4. Privacy and Security Implications

  • Tracking Risks: Many ISPs and network administrators can log MAC addresses to track device usage. If your device’s MAC is exposed, it can be used to identify you across different networks.
  • MAC Spoofing: Attackers can change their device’s MAC to masquerade as another device, evading network filters or masquerading as a trusted device.
  • Enterprise Policies: Some organizations enforce MAC address filtering; knowing your MAC can help you troubleshoot access issues.

5. Common OUIs for Popular Hardware Brands

Manufacturer

Sample OUI

Apple

00:1A:2B

Cisco

00:1B:44

Dell

00:0C:29

HP

00:1F:5B

Samsung

00:1D:5E

Intel

00:16:CB

These are example OUIs; for a full list, consult the IEEE OUI registry.

6. FAQ

Q: Can I change my MAC address?
A: Yes, most operating systems allow MAC spoofing through network settings or command‑line tools. However, doing so may violate local network policies.

Q: Is my MAC address visible to the internet?
A: A MAC address is only transmitted on the local network segment. It does not travel beyond your router unless you use a VPN that leaks your MAC.

Q: How does MAC spoofing help privacy?
A: Spoofing can prevent your device’s real identity from being logged, but it can also trigger security alerts if the network monitors for unknown MACs.

Q: Why do manufacturers use the same OUI?
A: The OUI is assigned by IEEE to a manufacturer; all devices from that manufacturer share the same first three octets, simplifying inventory and support.

Q: What should I do if my device’s MAC is compromised?
A: Reset the device to factory defaults, change any network credentials, and consider using a VPN that hides your MAC from external observers.


Feel free to share this guide with IT teams or colleagues who need a quick reference. For deeper networking tutorials, check out our networking fundamentals and network security sections.

When we hear about VPNs, we often imagine corporate firewalls, but real life is far more colorful.

Do you know how a simple tunnel can save a freelance designer from bandwidth throttling? In the next few lines we’ll meet three users who turned Forest VPN into a daily ally. Their stories prove that convenience, affordability, and versatility go hand‑in‑hand.

These voices echo across the spectrum of users. From a freelancer who hates throttling to a student streaming across borders, each story underscores Forest VPN’s power.

Real‑World Testimonials: How Users Benefit Day‑to‑Day

Freelance Designer

Meet Maya, a freelance graphic designer who swears by Forest VPN. She says, “I used to hit the dreaded bandwidth cap every time I uploaded a high‑res mockup. Forest VPN keeps my connection smooth.” Because her work demands large files, the VPN’s unlimited bandwidth means she never waits for uploads to finish. Maya’s productivity feels like a jet‑pack instead of a slow‑moving snail.

The result? Maya’s clients see faster delivery, and her invoices come in on time.

Student

Meet Luis, a university student in Madrid who loves binge‑watching shows from the US. He says, “With Forest VPN, I can stream shows from Netflix US while studying in a dorm in Spain.” This means he never has to wait for buffering or switch to a local library. Luis now has more time for study, as his entertainment no longer drags him down.

Small Retailer

Meet Sara, owner of a cozy boutique in Portland. She says, “Protecting customer data is non‑negotiable. Forest VPN lets me secure our online store without breaking the bank.” By encrypting every transaction, Sara keeps her clients’ credit cards safe and avoids costly data breaches. Her monthly hosting costs dropped 30% after switching to Forest VPN, freeing up cash for new inventory.

Sara also appreciates the 24‑hour customer support that resolves any connectivity hiccups instantly. Customers trust her brand, knowing their data is safe, and Sara’s reputation grows.

Ever wonder how a tiny shop can stay secure without draining the budget? Forest VPN feels like a shield against data breaches, wrapping every transaction in a blanket of encryption.

Forest VPN’s advanced security features make it a fortress for small businesses.

TechnologyNetworkingNetwork Hardware