What is a MAC address, and what can it reveal about you? | Proton (2024)

Every device that connects to a network does so through a network interface controller(new window) (NIC). Devices that can connect to multiple networks will have a separate NIC for each connection they support. For example, a laptop that supports WiFi, Ethernet (wired), and Bluetooth connections would have three NICs (each with its own MAC address).

Every NIC is identified by a unique media access control (MAC) address, a 12-digit hexadecimal(new window) number assigned to it by the NIC’s manufacturer (for example, e0:6c:4f:8b:aa:d7).

  • What is a MAC address used for?
  • Do MAC addresses change?
  • What can a Mac address reveal about you?
  • Other vulnerabilities
  • How to find your MAC address
  • How to hide your MAC address
  • Does a VPN protect your MAC address?

What is a MAC address used for?

A MAC address identifies the hardware connected to a network. This is typically a local area network (LAN), such as those found in most modern homes and offices, where devices are connected via WiFi or Ethernet cables to a shared router. Devices that connect to each other using Bluetooth form another type of network that uses MAC addresses.

When a device connects to a network, it sends the NIC’s MAC address to the router or Bluetooth receiver, which then assigns it an IP address.

Learn more about IP addresses

Since each network interface on a network has a unique and unchanging MAC address, MAC addresses are very useful for identifying and diagnosing network issues. For example, they can provide a network administrator with a much more reliable way to identify where data packets are sent or received than dynamic IP addresses, which can change at any time.

Another common use of MAC addresses is for MAC address filtering. This is a security measure that restricts access to a network based on connecting devices’ MAC addresses. If a device without an authorized MAC address attempts to connect to a network, the connection will be refused.

A company, for example, might use MAC filtering to ensure that only employees’ verified laptops can join the office’s local area network (LAN).

MAC addresses can also be used to track down and identify stolen devices.

Do MAC addresses change?

No. Unlike IP addresses, which can routinely change, MAC addresses are hard coded(new window) into NICs by their manufacturer and never change.

However, it is possible to deliberately “spoof” a device’s MAC address(es), which hides its real MAC address and displays a different address to networks that the device attempts to connect to. We discuss MAC spoofing in greater depth below.

What can a MAC address reveal about you?

NIC manufacturers often identify their chips using a special number sequence called the organizationally unique identifier(new window) (OUI). This makes up the first six hexadecimal digits of the MAC address. You can see a list of OUIs from well-known NIC manufacturers here(new window).

Although not a major concern, knowing your device manufacturer could potentially provide hackers with clues to manufacturer vulnerabilities that they can exploit.

MAC addresses and tracking

A MAC address uniquely identifies your device to each new network it connects to. MAC addresses can therefore be used to track your location as you move between WiFi networks and Bluetooth receivers(new window).

Most MAC address tracking is performed by retailers(new window) to deliver effective targeted advertising, but it can also be used for government surveillance.

For example, documents released by NSA whistleblower Edward Snowden(new window) show that the Canadian spying agency CSEC(new window) illegally used MAC addresses collected from passengers who connected to the free internet service at a major Canadian airport to track the wireless devices of thousands of ordinary airline passengers(new window) for days after they left the terminal.

It should be stressed, however, that MAC addresses can only identify devices on a local network they are connected to, or within WiFi or Bluetooth detection range. They can’t be forwarded through the network gateway (for example a router), and so MAC addresses can’t be used to track you by someone on the internet.

Other vulnerabilities

MAC addresses are more of a privacy risk than a security risk. MAC flooding(new window) is an attack that targets network switches and can compromise the security of networks, but is a minimal threat to individual devices or their users.

Networks that rely solely on MAC filtering to provide security are also vulnerable to being compromised by an attacker who spoofs the MAC address of an authorized user. But again, this affects networks, not your device.

How to find your MAC address

On most computers, it’s easy to find the MAC address of all available network adapters (NICs). For this guide, we’ll concentrate on identifying the MAC address of the WiFi or LAN NICs, but it’s also easy to find the MAC addresses of Bluetooth adapters.

Windows

Open the Windows PowerShell or Command Prompt (cmd) app and enter ipconfig /all. Under your WiFi or Ethernet interface, look for the Physical Address.

What is a MAC address, and what can it reveal about you? | Proton (2)

macOS

To find the MAC address of your Mac’s WiFi, go to SettingsWi-FiAdvancedWi-Fi MAC address.

What is a MAC address, and what can it reveal about you? | Proton (3)

If your Mac has an Ethernet connection, you can find its MAC address by going to SettingsNetworkOther Services → your LAN connection → Details → Hardware → Mac address.

Linux

Open a terminal window and enter ifconfig. Under your WiFi or Ethernet interface, look for ether followed by your hexadecimal MAC address.

What is a MAC address, and what can it reveal about you? | Proton (4)

Android

This guide uses a Samsung One UI device: details may vary depending on your Android version.

Go to SettingsAbout phoneStatus information. Here, you can see your real WiFi MAC address, Bluetooth MAC address, and Ethernet MAC address (if available).

What is a MAC address, and what can it reveal about you? | Proton (5)

Note that the MAC address used on your WiFi network differs from your device’s real WiFi MAC address. We’ll discuss this below.

iOS and iPadOS

Go to SettingsGeneralAboutWi-Fi Address (you can also see your iPhone or iPad’s Bluetooth MAC address here).

What is a MAC address, and what can it reveal about you? | Proton (6)

Chromebook

Go to SettingsNetworkWi-Fi → your WiFi network → MAC address.

What is a MAC address, and what can it reveal about you? | Proton (7)

How to hide your MAC address

As discussed above, retailers and governments can use your MAC address to track your movements. To defend against this, you can “spoof” your MAC address. Note that spoofing your MAC address doesn’t remove the “real” MAC address hard coded into your NIC but hides it and broadcasts an alternative MAC address instead.

Most major operating systems can now help protect your privacy by broadcasting randomized MAC addresses when searching for new WiFi connections. To help avoid networking issues and avoid problems on networks that use MAC address filtering, most desktop platforms will use your real MAC address when you actually make a connection.

Although Apple supports MAC address randomization on all modern iPhones, iPads, and iWatches, this feature is not available on macOS.

Windows

MAC address randomization on Windows 10 and 11 is turned off by default and may not work on all WiFi adapters (especially older ones). To enable it on Windows 11, go to SettingsNetwork & InternetWiFi → toggle the Random hardware addresses switch on.

What is a MAC address, and what can it reveal about you? | Proton (8)

To enable MAC address randomization on Windows 10, go to SettingsNetwork & InternetWi-FiAdvanced options → toggle the Random hardware addresses switch on.

Linux

Support for MAC address randomization on Linux varies primarily by the desktop environment (DE) you use (rather than the distribution). However, it is supported by many DEs. For example:

On GNOME (the default desktop environment for Ubuntu, Fedora, and many other popular distros), go to SettingsNetwork, click the gear icon next to your connection → IdentityCloned Address → and select Random from the dropdown menu.

What is a MAC address, and what can it reveal about you? | Proton (9)

On KDE Plasma o KDE Neon, go to System SettingsNetworkConnections → select your connection → Wi-FiCloned MAC address and click the Random button,

What is a MAC address, and what can it reveal about you? | Proton (10)

Android

Android has supported MAC address randomization since Android 8, but with Android 10, it turbocharged the concept. Instead of just using MAC address randomization when scanning for new networks, Android 10+ devices issue a new random MAC address for each WiFi network that you connect to.

This feature is enabled by default. To change it:

1. Go to SettingsAbout phoneStatus information → WiFi MAC address → select your Current network or any Saved networks View more. Here you can see the MAC address used for just this network.

What is a MAC address, and what can it reveal about you? | Proton (11)

2. Tap MAC address type and choose between Randomised MAC and Phone MAC.

What is a MAC address, and what can it reveal about you? | Proton (12)

iOS and iPadOS

Apple only introduced MAC address randomization with iOS 14 and iPadOS 14, but Apple products apply it not just when scanning networks, but also for each new network that you join (similar to Android).

MAC address randomization is enabled by default on iOS and iPadOS 14+ devices. To disable (or enable) the feature, go to SettingsWi-Fi → your WiFi network → and toggle the Private WiFi Address switch off (or on).

What is a MAC address, and what can it reveal about you? | Proton (13)

Chromebook

Chrome OS automatically uses MAC address randomization, which can’t be disabled. However, it’s only used for network detection, so your real MAC address is used when you actually connect to a network.

Does a VPN protect your MAC address?

No. A VPN protects your real IP address, but does nothing to hide your MAC address. By hiding your IP address with a VPN (such as Proton VPN), you prevent your internet service provider (and by extension, your government) from seeing what you do online and websites from uniquely identifying you by your IP address.

Learn more about how a VPN protects your privacy

Final thoughts

MAC addresses play an essential role in connecting your device to any network (including the internet). Knowing your MAC address offers limited help to a malicious hacker who wants to access your device, but it can occasionally cause headaches for network administrators.

MAC addresses can present a potentially serious privacy risk, as third parties can use them to track you as you move between (local) networks. However, most modern operating systems have introduced some form of MAC address randomization designed to counter this threat.

What is a MAC address, and what can it reveal about you? | Proton (2024)

FAQs

What is a MAC address, and what can it reveal about you? | Proton? ›

A MAC address uniquely identifies your device to each new network it connects to. MAC addresses can therefore be used to track your location as you move between WiFi networks and Bluetooth receivers .

What does a MAC address reveal? ›

MAC addresses identify all devices connected to a network — including devices that have no business being there. By tracking MAC addresses, network administrators can detect unauthorized devices, defeat cyberattacks in progress, and kick out intruders.

What is the MAC address short answer? ›

A MAC address (short for medium access control address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.

What is a MAC address explained? ›

A Media Access Control address (MAC address) is a hardware identifier that uniquely identifies each device on a network. Primarily, the manufacturer assigns it.

Can my MAC address identify me? ›

A MAC address can be used to track and log your location, disrupt your connection, and even impersonate you on the network.

What can be traced with MAC address? ›

A MAC address uniquely identifies your device to each new network it connects to. MAC addresses can therefore be used to track your location as you move between WiFi networks and Bluetooth receivers .

What is the MAC address represented as? ›

Each device's MAC is represented in a hexadecimal format on each device, like this: 00:0a:45:2e:52:28. It's a 12-digit number and is 48 bits long, also called a 6-byte hexadecimal number. It's split into six octets, and each octet has eight bits.

What is our MAC address? ›

Click on the Windows logo (the Start Menu) in the bottom left corner. In the search box, type cmd and press enter. In the command prompt, type getmac and press enter/return. The Physical Address will be your MAC address.

What is the main part of the MAC address? ›

Each digit, in turn, can have values from zero (0) to nine (9) and from A (10) to F (15). Furthermore, there exist two major parts in MAC addresses: the manufacturer identification (first three bytes) and a unique number defined by the manufacturer that identifies a particular device in a network (last three bytes).

How to identify a device by MAC address? ›

Use the MAC Lookup tool to recognize a device's brand, type and model from just its MAC address. To do this: Click Tools on the left sidebar. Scroll down and click the MAC Lookup widget under the heading Troubleshoot your network.

Why would someone need a MAC address? ›

In the current internet era, most devices are connected physically with Ethernet cables or wirelessly with Wi-Fi. Both methods use MAC addresses to identify a device on the network. A MAC address is responsible for local identification and an IP address for global identification.

What is MAC and how does it work? ›

Message Authentication Code (MAC) Defined

MACs use authentication cryptography to verify the legitimacy of data sent through a network or transferred from one person to another.

Does it matter what your MAC address is? ›

MAC addresses are useful for network diagnosis because they never change, as opposed to a dynamic IP address, which can change from time to time. For a network administrator, that makes a MAC address a more reliable way to identify senders and receivers of data on the network.

Is a MAC address personal information? ›

MAC addresses are intended to be unique to the device (although they can be modified or spoofed using software). If an individual can be identified from that MAC address, or other information in the possession of the network operator (the business, in this example), then the data is personal data.

Can you access a MAC address? ›

Enter ipconfig /all into the Command Prompt window and press Enter on your keyboard. The wireless MAC address will be listed under Wireless LAN adapter Wi-Fi next to Physical Address. The wired MAC address will be listed under Ethernet adapter Ethernet next to Physical Address.

What does an IP address tell you? ›

What does an IP address tell you? For the most part, an IP address tells you the city, ZIP code, or area code of your ISP, as well as your ISP's name. What can an IP address tell you? To some degree, your physical location and also the name of your ISP.

What is the significance of a MAC address? ›

MAC addresses are used at the data link layer (Layer 2) of the networking architecture. They provide a unique identity to devices within a local area network (LAN) and are used for addressing and identifying data packets at the data link layer.

Does a MAC address identify the manufacturer? ›

Some well-known manufacturers of network adapters or NICs are Dell, Belkin, Nortel, and Cisco. These manufacturers all place a special number sequence (called the Organizationally Unique Identifier or OUI) in the MAC address that identifies them as the manufacturer.

What is a MAC address vs IP address? ›

On a computer network, a media access control (MAC) address is your computer's unique identification number used by the network to identify your device, and your IP address is the online network address for your computer.

Can a MAC address be spoofed? ›

A MAC spoofing attack is when a hacker mimics your MAC address to redirect data sent to your device to another device. It allows the attacker to gain unauthorized access to a network to launch a man-in-the-middle attack. MAC spoofing lets an attacker bypass security measures that you have set up, such as MAC filtering.

Top Articles
Latest Posts
Article information

Author: Terence Hammes MD

Last Updated:

Views: 6200

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Terence Hammes MD

Birthday: 1992-04-11

Address: Suite 408 9446 Mercy Mews, West Roxie, CT 04904

Phone: +50312511349175

Job: Product Consulting Liaison

Hobby: Jogging, Motor sports, Nordic skating, Jigsaw puzzles, Bird watching, Nordic skating, Sculpting

Introduction: My name is Terence Hammes MD, I am a inexpensive, energetic, jolly, faithful, cheerful, proud, rich person who loves writing and wants to share my knowledge and understanding with you.