At first glance, your IP address might look like a bunch of random numbers. However, there is a hidden logic behind this combination, and you don’t need to be a tech expert to crack it. It’s called a subnet mask, and if you’re wondering what a subnet mask is and how to find it, you’re in the right place.
Contents
A subnet (also known as a subnetwork) is a small network within a large one. Large networks are generally difficult to maintain. Furthermore, traffic must travel a longer distance and pass through unnecessary routers to reach its destination. Subnetting –– or dividing the network into smaller pieces –– is used to make the network easier to maintain. While it has many benefits, subnetting requires additional hardware (e.g., routers), potentially costing extra to implement.
Benefits of subnetting:
Here are the ways in which subnetting can improve your networking experience:
However, subnetting often requires additional hardware such as routers, so it also comes with a cost.
Just like every address is defined by a street name and a house number, an IP address consists of a network component and a host component. Let’s take 192.168.123.132 as an example. The first three octets (192.168.123.) represent the network and the last octet identifies a machine on your network.
IP addresses consist of 32 binary bits (4 x 8), but since they are long and complex, we use a dot decimal system.
192.168.123.132 = 11000000.10101000.01111011.10000100
The subnet mask reflects the network portion in an IP address. It might look look something this:
255.255.255.0 = 11111111.11111111.11111111.00000000
When you combine them, you get:
11000000.10101000.01111011.00000000 (network address: 192.168.123.0) 00000000.00000000.00000000.10000100 (host address: 000.000.000.132)
192.168.123.0 is your subnet, while 192.168.123.132 is a destination address (a device in your subnet). However, if you’re using a VPN, your IP will change depending on the server you’re connected to.
IP addresses are divided into three classes: A, B, and C. Classes D and E also exist, but they are not used by end users. Each class has a different default subnet mask, and you identify the class by looking at the first octet of an IP address. However, there are also different types of IP addresses: static, dynamic, public, and private.
Class A networks use a subnet mask of 255.0.0.0 and have 0-127 as their first octet. It allows 126 networks and almost 17 million hosts per network.
Class B uses a subnet mask of 255.255.0.0 and has 128-191 as its first octet. It is used by medium and large networks. Class B allows around 16,000 networks and 65,000 hosts per network.
Class C is used for local area networks (LAN) and allows 2 million networks with 254 hosts each. Class C uses a subnet mask of 255.255.255.0 and has 192-223 as its first octet.
Class D is reserved for multicasting (transmitting streaming media and other data for multiple users). It ranges from 224 to 239 and doesn’t have a subnet mask as multicasting is not destined for a particular host.
Class E ranges from 240 to 255 and also doesn’t have a subnet mask. It is used for experimental and study purposes.
It’s worth noting, however, that the classful IP addressing is outdated. Classless Inter-Domain Routing, or CIDR, is a much more efficient way of allocating IP addresses.
A subnet mask helps keep traffic within its designated subnets. Subnet masks mean data packets don’t need to travel as far, thus improving network performance.
Classless Inter-Domain Routing, or CIDR, was introduced in 1993 as a way to get rid of the classful network structure and significantly improve the method of allocating different IP addresses. It also aimed to reduce the stress across routing tables.
A routing table is a table of rules and designations that tell a data packet which route it needs to take in a network to reach the desired location. As IPv4 addresses spiraled out of control, routing tables needed to grow with them.
While originally planned as a temporary fix to stop the rapid exhaustion of IPv4 addresses, CIDR is still being used over 20 years later.
CIDR is based on variable-length subnet masking, or VLSM. Rather than using a mask to denote which IP address a network belongs to, a specific suffix can be combined with the IP address. This suffix contains the variable number of bits. This shortening of the display allows CIDR to create even more precise and numerous network divisions.
For example, here is a CIDR IP address:
192.168.123.132/12
The prefix is a standard IP address. The suffix (12) tells us how many bits the address has altogether.
The most important feature of CIDR is the ability to create supernets. This is done by combining CIDR blocks, groups of IP addresses with the same bits and network prefixes. By creating a supernet, an organization can reduce the stress on routing devices, while simultaneously saving address space.
CIDR slowed the usage of IPv4 addresses down until the advent of IPv6 addresses, which would take a much longer time to deplete, if at all.
Subnet calculators give users a range of information: a subnet mask, network addresses, an IP class, and usable host ranges. Different websites and apps are designed to manage your network and allocate IP addresses accordingly.
Want to read more like this?
Get the latest news and tips from NordVPN.
CIDR | Subnet mask | Number of IP addresses | Wildcard mask |
---|---|---|---|
/32 | 255.255.255.255 | 1 | 0.0.0.0 |
/31 | 255.255.255.254 | 2 | 0.0.0.1 |
/30 | 255.255.255.252 | 4 | 0.0.0.3 |
/29 | 255.255.255.248 | 8 | 0.0.0.7 |
/28 | 255.255.255.240 | 16 | 0.0.0.15 |
/27 | 255.255.255.224 | 32 | 0.0.0.31 |
/26 | 255.255.255.192 | 64 | 0.0.0.63 |
/29 | 255.255.255.248 | 8 | 0.0.0.7 |
/28 | 255.255.255.240 | 16 | 0.0.0.15 |
/27 | 255.255.255.224 | 32 | 0.0.0.31 |
/26 | 255.255.255.192 | 64 | 0.0.0.63 |
/25 | 255.255.255.128 | 128 | 0.0.0.127 |
/24 | 255.255.255.0 | 256 | 0.0.0.255 |
/23 | 255.255.254.0 | 512 | 0.0.1.255 |
/22 | 255.255.252.0 | 1024 | 0.0.3.255 |
/21 | 255.255.248.0 | 2048 | 0.0.7.255 |
/20 | 255.255.240.0 | 4096 | 0.0.15.255 |
/19 | 255.255.224.0 | 8192 | 0.0.31.255 |
/18 | 255.255.192.0 | 16384 | 0.0.63.255 |
/17 | 255.255.128.0 | 32768 | 0.0.127.255 |
/16 | 255.255.0.0 | 65536 | 0.0.255.255 |
/15 | 255.254.0.0 | 131072 | 0.1.255.255 |
/14 | 255.252.0.0 | 262144 | 0.3.255.255 |
/13 | 255.248.0.0 | 524288 | 0.7.255.255 |
/12 | 255.240.0.0 | 1048576 | 0.15.255.255 |
/11 | 255.224.0.0 | 2097152 | 0.31.255.255 |
/10 | 255.192.0.0 | 4194304 | 0.63.255.255 |
/9 | 255.128.0.0 | 8388608 | 0.127.255.255 |
/8 | 255.0.0.0 | 16777216 | 0.255.255.255 |
/7 | 254.0.0.0 | 33554432 | 1.255.255.255 |
/6 | 252.0.0.0 | 67108864 | 3.255.255.255 |
/5 | 248.0.0.0 | 134217728 | 7.255.255.255 |
/4 | 240.0.0.0 | 268435456 | 15.255.255.255 |
/3 | 224.0.0.0 | 536870912 | 31.255.255.255 |
/2 | 192.0.0.0 | 1073741824 | 63.255.255.255 |
/1 | 128.0.0.0 | 2147483648 | 127.255.255.255 |
/0 | 0.0.0.0 | 4294967296 | 255.255.255.255 |
Having your IP address publicly exposed is a risky business. It’s like driving around the city in a Ferrari with your home address written on the hood.
NordVPN masks your IP address and encrypts traffic, enhancing your security and privacy. The Threat Protection feature will even block website trackers and invasive ads. It’s an easy-to-use app, allowing you to secure up to six devices. It’s the perfect VPN for multiple devices because NordVPN is compatible with all major platforms.
NordVPN’s Meshnet also allows users to remotely access multiple devices across a single subnet, something that could come in use for anyone looking to alter their subnet settings. With a VPN turned on, your traffic is redirected through an encrypted tunnel, which is your safe harbor.
Here are some of the reasons as to why you may want to hide your IP address.
When it comes to cybersecurity, it’s always best to stay ahead of the curve. Having a proactive attitude towards your online security will keep you a step ahead of hackers and snoopers.