mac address

Posted on 2014-08-26
Last Modified: 2014-08-28
I need to find out what this mac address and ip belongs to. I have Linksys EA6900 router and it list network device with this information
50:85:69:75:E9:82  mac address  ip address

I looked at all the devices connected and none of them has this info I need to know where did this come from, is there a free tool that I can use?

Thank you
Question by:Basem Khawaja
    LVL 50

    Expert Comment

    by:Don Johnston
    It's a Samsung device.

    Beyond that, you would need to identify which port it's connected to using either the MAC address table or the ARP cache.
    LVL 89

    Assisted Solution

    by:John Hurst
    It appears to me that you got this information from your computer and that the IP address (.116) belongs to your computer as does the MAC address (address of the Network Card you are using).

    You need to log into your EA6900 router and it will tell you the gateway (the log in address) of the router (likely and somewhere in the setup, it should tell you the MAC address.

    The MAC address of the router is likely on a sticker on the bottom of the router as well.
    LVL 95

    Accepted Solution

    The IP address is given out by your router.  The Mac address can be looked up on any number of web sites - it's LIKELY NOT GOING TO TELL YOU EXACTLY what it is.  The Mac is at best going to tell you the manufacturer of the network adapter - I could buy an Intel network adapter and install it in a Dell or HP computer and you'd never know without a network inventory tool.  (I looked up the address for you at and it appears to belong to Samsung - it could be a phone using your wifi or your samsung laptop).  I would suggest making a reservation in DHCP (you do run DHCP off Windows, right?) and then set the gateway for that reservation to something other than the correct address - that should disable it for use on the internet until whoever is connecting complains and you can confirm it's their device.

    You can also install SpiceWorks on your network and let it audit things - it may be able to identify the device.

    Author Closing Comment

    by:Basem Khawaja
    thanks guys
    LVL 89

    Expert Comment

    by:John Hurst
    @basemkhawaja64  - You are very welcome and I was happy to help.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    Suggested Solutions

    Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    This Micro Tutorial will teach you the basics of configuring your computer to improve its speed. It will also teach you how to disable programs that are running in the background simultaneously. This will be demonstrated using Windows 7 operating…
    This Micro Tutorial will teach you how to change your appearance and customize your Windows 7 interface to your unique preference. This will be demonstrated using Windows 7 operating system.

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now