Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Ability to Search Internet for MAC Address of Stolen Laptop

Posted on 2004-10-06
4
Medium Priority
?
1,910 Views
Last Modified: 2008-01-09
My corporate laptop was stolen a few months ago.  Recently, someone suggested it might be possible to search the internet to look for the stolen MAC address.  

Is this possible?  If so, what is necessary to do this?
0
Comment
Question by:jseverson
  • 2
4 Comments
 
LVL 6

Expert Comment

by:icemanwol
ID: 12241782
Due to the nature of MAC addresses, i do not belive this would be possible unless you knew what ISP the user is using or the users IP address.  If you did know the ISP or the IP address of the user with the stolen laptop, you could place a call to that persons ISP asking about a certin MAC address and when it was logged on and explaining the situation to them.  There is no general "MAC address" search on the web where mac addresses just collect so you are out of luck.  If any other expert has something to add, please add it
0
 
LVL 18

Accepted Solution

by:
luv2smile earned 2000 total points
ID: 12241852
In short, the answer is no.

Most stolen computers end up being sold on the black market. There is no "list" of the location of stolen computers listed by mac address. There's also no way to search to see if that mac address is using the internet.

 What you could do is report your the MAC address of your stolen laptop to the manufacturer and if anyone ever tries to send the laptop back to the manufacturer for a repair then they would have a record that it had been reported stolen. But honestly the chances of recovering a stolen laptop are very slim.
0
 
LVL 18

Expert Comment

by:luv2smile
ID: 12241877
Like icemanwol said, if you knew the specific network the computer was being used on: ie: a particular isp or corporate network, then the administrator of that network could trace the computer by mac address. But without knowing anything, sorry, you're pretty much out of luck.
0
 

Author Comment

by:jseverson
ID: 12245072
Thanks

The person I spoke to was thinking of the software that scans the internet looking for networks that are not protected.  The theory was that the scanning software might be able to scan for a MAC address on certain networks.
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question