Python App #10

MAC Lookup

MAC Lookup identifies the manufacturer and vendor associated with any MAC address by looking up the OUI (Organizationally Unique Identifier). Supports common MAC address formats — colons (AA:BB:CC:DD:EE:FF), dashes (AA-BB-CC-DD-EE-FF), or no separators. The tool queries the IEEE OUI database and additional vendor lookup APIs to provide accurate manufacturer identification. Useful for network forensics, device identification, and asset management investigations.

ouimanufacturerieeenetwork

Last updated:

Features

  • IEEE OUI database lookup
  • Multiple MAC format support
  • Manufacturer identification
  • Vendor name resolution
  • Format normalization
  • Multiple API source queries
  • Copy-friendly results
  • HTML session export
  • Fast lookup performance
  • No API key required

Quick Start

# 1. Extract the zip and enter the folder
cd 10-MAC-Lookup

# 2. Install dependencies
python install_requirements.py

# 3. Launch the tool
python mac_lookup.py

Download

Tool: MAC Lookup
File: 10-MAC-Lookup.zip
Python: 3.8+
OS: Windows, macOS, Linux
Dependencies: customtkinter, requests

Downloads are free — clicking the link below opens a short ad that helps support Max Intel. Thank you! Wait 15 seconds after clicking to unlock.

Click here for an ad
15
seconds remaining…
✓ Unlocked — thank you!
← All Python OSINT Apps

How Are MAC Addresses Used in Network Forensics?

MAC addresses are 48-bit hardware identifiers standardized by IEEE 802. The first 24 bits form the OUI, registered with the IEEE Registration Authority (over 47,000 manufacturer registrations). This tool performs OUI lookups against the IEEE database to identify any network device's hardware manufacturer.

Network Security Applications

MAC address analysis is standard in digital forensics per the SANS DFIR methodology. According to NIST SP 800-94 (Guide to Intrusion Detection and Prevention Systems), MAC address monitoring is recommended for detecting unauthorized network access. Network administrators use OUI lookups to identify unknown devices, security professionals detect rogue access points, and forensic investigators trace device activity.

MAC Randomization Challenges

Modern OSes use randomized MACs for Wi-Fi scanning — Apple, Google, and Microsoft implemented this since 2014-2020. According to a 2023 IEEE study, randomized MACs account for over 70% of probe requests on public networks. This tool helps distinguish randomized addresses (locally administered bit set) from genuine manufacturer-assigned addresses.

🔧 MAC Lookup — Frequently Asked Questions

What is a MAC address OUI?

The OUI (Organizationally Unique Identifier) is the first 24 bits of a MAC address, assigned by IEEE to hardware manufacturers. Looking up the OUI reveals the device vendor, which helps identify device types on a network.

Does the MAC address lookup tool require installation?

No. The tool runs entirely in your browser using client-side Python via Pyodide. No installation, API keys, or server-side processing required. Your queries are executed locally for maximum privacy.

What can I do with the MAC address lookup tool?

You can identify device manufacturers, detect randomized MACs, and parse OUI databases. The tool provides a clean interface with exportable results and cross-links to related Max Intel tools for deeper investigation.