Solved

Searching by a MAC Address over the internet to find lost, stolen and missing hardware.

Posted on 2006-07-10
4
378 Views
Last Modified: 2008-03-10
I'm looking to find some lost and/or stolen equipment.  I have the mac addresses of the laptops and computer hardware that have come up missing from our office.  The local law enforcement doesn't seem interested in tracking them down, and I want to give them a little help.

Is there a way to scan the internet, looking for those mac addesses?  And then start to track them down by finding out IP addresses and working backwards to the ISP?

And if so, What would I need and can this be done?

Thanks,
0
Comment
Question by:rahowell2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 32

Assisted Solution

by:rsivanandan
rsivanandan earned 167 total points
ID: 17079067
No way, sorry.

Even if those laptops are connected to the Internet, only the adjacent router can see the mac address of the machine.

Remember the theory;

1. Source IP and Destination IP remains the same throughout the communication.

2. Mac addresses keep changing throughout the communication.

Cheers,
Rajesh
0
 
LVL 27

Assisted Solution

by:pseudocyber
pseudocyber earned 166 total points
ID: 17080392
agree with Rajesh.

That's how companies that develop "phone home" software make money - it's entirely client (on the computer in question) driven.
0
 
LVL 43

Accepted Solution

by:
Steve Knight earned 167 total points
ID: 17081279
Agreed.  If they are behind a home router then not even an ISP could help you as no-one would ever see the mac address, if they are connected straight to a cable modem by ethernet for instance then there is potential for the cable co. to know the mac address but that it very unikely to help at all.  If it gets used by USB ADSL modem or dialup still no chance.

Of course I'm sure they were all fully backed up, data encrypted and strong passwords on there like we all do of course....(not)

teve
0
 

Author Comment

by:rahowell2
ID: 17085869
Well thanks Guys, just feel like I been shot in the foot again.  I thought I just might have a chance.  Thanks again.
0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses
Course of the Month11 days, 7 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question