Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

MAC Address Device

Posted on 2016-10-28
5
Medium Priority
?
36 Views
Last Modified: 2016-11-19
Hi
I am trying to identify an unknown device in my wifi that has a MAC address 70:DE:E2:67:03:5E. Anyway to know if it's an iPhone or iPad
0
Comment
Question by:Sue Jones
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 

Accepted Solution

by:
L4d1k earned 500 total points (awarded by participants)
ID: 41864695
If you are asking to verify if it is made by apple then you can look it up here: https://macvendors.com/
Unfortunately to determine the difference between iPhone and iPad is not reliable based on just MAC address.
0
 
LVL 98

Assisted Solution

by:John Hurst
John Hurst earned 500 total points (awarded by participants)
ID: 41864708
You can only tell the vendor normally with the MAC address (Intel, Apple and so on). It never tells you what device it is on.

In a number of cases you can replace the network card, so getting the actual device is hopeless.
0
 

Assisted Solution

by:Mike Parks
Mike Parks earned 500 total points (awarded by participants)
ID: 41864755
Look up MAC addresses here: http://aruljohn.com/mac.pl

That MAC address is an Apple... as others pointed out, you can't determine an iPad or Mac, just a vendor.
0
 
LVL 19

Assisted Solution

by:Mal Osborne
Mal Osborne earned 500 total points (awarded by participants)
ID: 41866348
Apple should know, and the MAY help you. (or not).

Might be worth asking I suppose.
0
 
LVL 98

Expert Comment

by:John Hurst
ID: 41894062
Question was fully answered
0

Featured Post

Building an interactive eFuture classroom

Watch and learn how ATEN provided a total control system solution including seamless switching matrix switch, HDBaseT extenders, PDU, lighting control to build an interactive eFuture classroom.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last Mile Wireless The term last mile wireless is a bit deceptive as it can be much more than a mile. It is also called WiMax and 802.16. It generally refers to relatively short distance point-to-point / point-to-multipoint secure wireless connecti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question