determine mac address from ip, mac address lookup, ping a mac address, find remote mac address, mac address network search, ping a mac address
Writing this up in the OP may have saved you a lot of grief.
If you can telnet to something on the same subnet, you can
$ arping 127.34.24.12
Unicast reply from 127.34.24.12 [00:50:AA:10:00:FD] 1.611ms
it if the OS running on the gear supports it. You could also ping it:
$ ping 127.34.24.12
or try different IP
root@:~# arping 126.96.36.199
ARPING 188.8.131.52 from 184.108.40.206 eth0
Unicast reply from 220.127.116.11 [00:D0:88:04:9E:72] 9.605ms
from something you do have access to, then run arp
to print out the arp cache
|Address|| HWtype|| HWaddress|| Flags Mask|| Iface|
|127.34.24.1|| ether|| 00:2A:A1:94:AD:41|| C || eth0|
|127.34.24.12|| ether|| 00:50:AA:10:00:FD|| C || eth0|
|127.34.24.13|| ether|| 00:50:AA:10:00:FE|| C || eth0|
See the mac address is how wire level network addressing happens. The IP address is easier and more logical for humans to route, deal with and organize in a much more orderly fashion than could be done with MAC (considering how ethernet works and the intended use of the MAC).
TCP IP was created to allow routing between broadcast domains
, as opposed to enlarging them (a la bridging)
Much like a sort of wire level DNS, ARP stores a IP to MAC mapping in the arp cache in the network gear and stations. Any time you connect to a device over the network, within your broadcast domain, (often your subnet) you add that remote device's MAC
to your ARP cache
(aka table). Once you've communicated you need only to look up the MAC in your local ARP cache to address non routed packets.
Unfortunately ARP is only maintained and available within the broadcast domain. Outside of that it's been routed and this is done with a TCP/IP (and rarely IPX) address encoded in the packet headers. The network gear at the other end sorts out the ARP and routes the packet appropriately once it reaches the destination broadcast domain. The client doesn't need to know or care about the destination MAC unless it's communicating directly with it and there are no routers involved.
This is why you can't get the remote ARP
unless you communicate with a program (such as an snmpd) running on the PC(or device) that will give it to you, or with a device on the same subnet where you can get a shell
An interesting misconception about MACs is that you can use them for security to ID a NIC. Unfortunately a lot of gear can change the MAC on the fly, so that's kind of useless as a security identifier. The fact that it's "hard" set and burned into the NIC is a little misleading.