Solved

Ability to Search Internet for MAC Address of Stolen Laptop

Posted on 2004-10-06
4
1,824 Views
Last Modified: 2008-01-09
My corporate laptop was stolen a few months ago.  Recently, someone suggested it might be possible to search the internet to look for the stolen MAC address.  

Is this possible?  If so, what is necessary to do this?
0
Comment
Question by:jseverson
  • 2
4 Comments
 
LVL 6

Expert Comment

by:icemanwol
ID: 12241782
Due to the nature of MAC addresses, i do not belive this would be possible unless you knew what ISP the user is using or the users IP address.  If you did know the ISP or the IP address of the user with the stolen laptop, you could place a call to that persons ISP asking about a certin MAC address and when it was logged on and explaining the situation to them.  There is no general "MAC address" search on the web where mac addresses just collect so you are out of luck.  If any other expert has something to add, please add it
0
 
LVL 18

Accepted Solution

by:
luv2smile earned 500 total points
ID: 12241852
In short, the answer is no.

Most stolen computers end up being sold on the black market. There is no "list" of the location of stolen computers listed by mac address. There's also no way to search to see if that mac address is using the internet.

 What you could do is report your the MAC address of your stolen laptop to the manufacturer and if anyone ever tries to send the laptop back to the manufacturer for a repair then they would have a record that it had been reported stolen. But honestly the chances of recovering a stolen laptop are very slim.
0
 
LVL 18

Expert Comment

by:luv2smile
ID: 12241877
Like icemanwol said, if you knew the specific network the computer was being used on: ie: a particular isp or corporate network, then the administrator of that network could trace the computer by mac address. But without knowing anything, sorry, you're pretty much out of luck.
0
 

Author Comment

by:jseverson
ID: 12245072
Thanks

The person I spoke to was thinking of the software that scans the internet looking for networks that are not protected.  The theory was that the scanning software might be able to scan for a MAC address on certain networks.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now