
/wireless-1861612_1920-c8da62f98a2b45a7a1942362c0e668fd.jpg)
If a compnay that created their own game used mac address filtering would it portect players from hackers? Hacker using Google Translate IP address, canary token triggered Question Gmail, getting mails to wrong address But, I still stand with a basic fact: YES, you CAN TRACE A MAC ADDRESS. Now, if you mean using it to find the exact location of a person, that's a jumbled bag of yes/no answers. So it’s important to double-check your router for signs of tampering.

Also, there's really no sense in hiding every user's MAC address when they actually have a use for it (ie: law breaking customers). If your router has been hijacked, hackers can route your traffic to spoofed versions of websites. The way the network is written, the MAC address is publicly broadcast over the network (aka your connection to your ISP, which then connects you to the internet), mostly because it makes life so much easier for the IT guys. You can perform man in the middle attacks for unencrypted data or the encryption negotiation data for like IPSec, using simple tools l. Don't believe me? Talk to COX themselves. But that would be passive hacking and you have to be on the same LAN segment of the victims (as the MAC is a layer 2 identity). For example, if you're a COX customer, and you set up your router right, you can watch all the MAC address traffic on the entire COX network. Update: One example of how a MAC address can be traced is by sniffing traffic on a major network. I ran this by a buddy who actually has done a lot of IT work, and he corrected me on that bit. And yes, this can be done by some basement hacker with a little know-how. Re: 'My Netgear router logs have been showing an unknown mac address connecting' How do you know it is a WI-FI address (Thread title says its Wi-Fi) Hey, how about quoting the exact message. That is, if someone is inclined to do so. MAC addresses are broadcast through the network (aka the network that all computers connected to the ISP are on), therefore someone could, theoretically, trace your computer. If someone is using the same ISP as you, they actually can trace you.
