Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • Home
  • SEARCH
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 84105
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 10, 20262026-05-10T21:52:43+00:00 2026-05-10T21:52:43+00:00

How can I detect if another host is using the same MAC address as

  • 0

How can I detect if another host is using the same MAC address as the current host, e.g. because the other host is spoofing?

I’m working in an embedded environment, so looking for answers on a protocol level, rather than “use such and such a tool”.

Edit: RARP does not solve this problem. For RARP to get any reply at all, there has to be at least one host on the segment which supports RARP. Since RARP is obsolete, modern operating systems don’t support it. Furthermore, all RARP can do is tell you your own IP address – the response won’t be any different if there’s another host on the segment with the same MAC, unless that host has itself used a different IP address.

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. 2026-05-10T21:52:43+00:00Added an answer on May 10, 2026 at 9:52 pm

    This question is too interesting to put down! After several false starts I started thinking about the essential components of the problem and scoured the RFCs for advice. I haven’t found a definitive answer, but here’s my thought process, in the hope that it helps:

    • The original question asks how to detect another device with your MAC address. Assuming you’re on an IP network, what’s required to accomplish this?

    • The passive method would be simply to listen to traffic and look for any packets that you didn’t transmit but have your MAC address. This may or may not occur, so although it can tell you definitively if a duplicate exists, it cannot tell you definitively that it doesn’t.

    • Any active method requires you to transmit a packet that forces an impostor to respond. This immediately eliminates any methods that depend on optional protocols.

    • If another device is spoofing you, it must (by definition) respond to packets with your MAC address as the destination. Otherwise it’s snooping but not spoofing.

    • The solution should be independent of IP address and involve only the MAC address.

    • So the answer, it seems, would be to transmit either a broadcast (ethernet) packet or a packet with your MAC address as its destination, that requires a response. The monkeywrench is that an IP address is usually involved, and you don’t know it.

    What sort of protocol fits this description?

    Easy Answer:

    • If your network supports BOOTP or DHCP, you’re done, because this authoritatively binds a MAC address to an IP address. Send a BOOTP request, get an IP address, and try to talk to it. You may need to be creative to force the packet onto the wire and prevent yourself from responding (I’m thinking judicious use of iptables and NAT).

    Not-so-easy Answers:

    • A protocol that’s independent of IP: either one that doesn’t use the IP layer, or one that allows broadcasts. None comes to mind.

    • Send any packet that would normally generate a response from you, prevent yourself from responding, and look for a response from another device. It would seem sensible to use your IP address as the destination, but I’m not convinced of that. Unfortunately, the details (and, therefore the answer) are left as an exercise for the OP … but I hope the discussion was helpful.

    I suspect the final solution will involve a combination of techniques, as no single approach seems to guarantee a dependable determination.

    Some information is available at http://en.wikipedia.org/wiki/ARP_spoofing#Defenses

    If all else fails, you may enjoy this: http://www.rfc-editor.org/rfc/rfc2321.txt

    Please post a follow-up with your solution, as I’m sure it will be helpful to others. Good luck!

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 80k
  • Answers 80k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • Editorial Team
    Editorial Team added an answer I don't know if more cache will help. It can't… May 11, 2026 at 4:20 pm
  • Editorial Team
    Editorial Team added an answer I recently came across this problem myself. Changing the database… May 11, 2026 at 4:20 pm
  • Editorial Team
    Editorial Team added an answer You should simply remove the line: DataContext = new ChildViewModel();… May 11, 2026 at 4:20 pm

Related Questions

I have a process with an open filehandle to a file. I need to
Suppose I have an open file. How can I detect when the file is
If my program is printing to the console, I perform word-wrapping in a certain
The .NET Console class and its default TextWriter implementation (available as Console.Out and implicitly

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Top Members

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.