ad placeholder image ad placeholder image

IPv4 Reserved Addresses: Complete Guide

Not all IPv4 addresses are available for general use. Certain address ranges are reserved for special purposes, private networks, documentation, testing, and future use. Understanding reserved addresses is essential for network design, troubleshooting, and avoiding configuration errors. This comprehensive guide explains all IPv4 reserved address ranges and their purposes.

What Are Reserved Addresses?

Reserved IP addresses are ranges set aside by IANA (Internet Assigned Numbers Authority) for specific purposes. These addresses cannot be used for regular internet routing or may have special meanings in network protocols.

Categories of Reserved Addresses

Private addresses: For use in private networks (RFC 1918) Special-use addresses: Specific protocol purposes Documentation addresses: Safe for examples Loopback addresses: Local testing Link-local addresses: Automatic configuration Multicast addresses: Group communication Reserved for future use: Not currently allocated

Private Address Ranges (RFC 1918)

Class A Private Range

Range: 10.0.0.0 - 10.255.255.255

CIDR: 10.0.0.0/8

Subnet mask: 255.0.0.0

Total addresses: 16,777,216

Purpose: Large private networks

Common uses: - Enterprise networks - Large organizations - VPN networks - Cloud private networks

Example configuration: Corporate HQ: 10.0.0.0/16 Branch Office 1: 10.1.0.0/16 Branch Office 2: 10.2.0.0/16 VPN Users: 10.100.0.0/16

Characteristics: - Most flexible range - Plenty of address space - Easy subnetting - Industry standard for large networks

Class B Private Range

Range: 172.16.0.0 - 172.31.255.255

CIDR: 172.16.0.0/12

Subnet mask: 255.240.0.0

Total addresses: 1,048,576 (16 Class B networks)

Purpose: Medium-sized private networks

Common uses: - Medium enterprises - Campus networks - Data centers - Docker default network

Example configuration: Main Network: 172.16.0.0/16 DMZ: 172.17.0.0/16 Guest Network: 172.18.0.0/16 Management: 172.19.0.0/16

Note: Only 172.16.0.0 through 172.31.255.255 are private - 172.15.x.x is public - 172.32.x.x is public

Class C Private Range

Range: 192.168.0.0 - 192.168.255.255

CIDR: 192.168.0.0/16

Subnet mask: 255.255.0.0

Total addresses: 65,536 (256 Class C networks)

Purpose: Small private networks

Common uses: - Home networks - Small offices - SOHO (Small Office/Home Office) - Default router configurations

Example configuration: Home Network: 192.168.1.0/24 Guest WiFi: 192.168.2.0/24 IoT Devices: 192.168.3.0/24

Characteristics: - Most common for home use - Easy to remember - Default for many routers - 192.168.1.1 typical gateway

Loopback Addresses (RFC 1122)

Range: 127.0.0.0 - 127.255.255.255

CIDR: 127.0.0.0/8

Most common: 127.0.0.1

Purpose: Local loopback testing

Characteristics: - Traffic never leaves device - Always available - No network card needed - Used for localhost

Uses: Testing: ping 127.0.0.1 Web development: http://localhost:8080 Database: mysql://127.0.0.1:3306 Services: 127.0.0.1:80

Special addresses: 127.0.0.1 - Standard loopback 127.0.0.2 - Also valid loopback 127.x.x.x - All valid loopback 127.255.255.255 - Broadcast loopback

Link-Local Addresses (RFC 3927)

Range: 169.254.0.0 - 169.254.255.255

CIDR: 169.254.0.0/16

Subnet mask: 255.255.0.0

Purpose: Automatic Private IP Addressing (APIPA)

When used: DHCP server unavailable No static IP configured Automatic fallback Zero-configuration networking

How it works: 1. Device requests DHCP 2. No DHCP response 3. Device auto-assigns 169.254.x.x 4. Can communicate with other link-local devices 5. No internet access

Troubleshooting: If you see 169.254.x.x: - DHCP server is down - Network cable unplugged - DHCP exhausted - Configuration error

Example: Windows: ipconfig Autoconfiguration IPv4 Address: 169.254.123.45 Subnet Mask: 255.255.0.0 Default Gateway: (none)

Documentation Addresses (RFC 5737)

Purpose: Safe to use in documentation and examples

Ranges:

TEST-NET-1: Range: 192.0.2.0 - 192.0.2.255 CIDR: 192.0.2.0/24

TEST-NET-2: Range: 198.51.100.0 - 198.51.100.255 CIDR: 198.51.100.0/24

TEST-NET-3: Range: 203.0.113.0 - 203.0.113.255 CIDR: 203.0.113.0/24

Why use these? - Won't conflict with real addresses - Safe for documentation - Won't accidentally route - Industry standard

Example usage: In documentation: "Configure your server at 192.0.2.10" "Connect to 198.51.100.50" "Route traffic to 203.0.113.1"

Multicast Addresses (RFC 5771)

Range: 224.0.0.0 - 239.255.255.255

CIDR: 224.0.0.0/4

Purpose: One-to-many communication

Subdivisions:

Local Network Control (224.0.0.0/24): 224.0.0.1 - All hosts on subnet 224.0.0.2 - All routers on subnet 224.0.0.5 - OSPF routers 224.0.0.6 - OSPF designated routers 224.0.0.9 - RIPv2 routers 224.0.0.13 - PIM routers 224.0.0.22 - IGMPv3

Internetwork Control (224.0.1.0/24): 224.0.1.1 - NTP (Network Time Protocol) 224.0.1.2 - SGI Dogfight 224.0.1.39 - Cisco Auto-RP 224.0.1.40 - Cisco RP-Announce

Source-Specific Multicast (232.0.0.0/8): 232.0.0.0 - 232.255.255.255 For SSM applications

GLOP Addressing (233.0.0.0/8): 233.0.0.0 - 233.255.255.255 Statically assigned Based on AS numbers

Administratively Scoped (239.0.0.0/8): 239.0.0.0 - 239.255.255.255 Private multicast Organization-local

Uses: - IPTV streaming - Stock market data - Video conferencing - Routing protocols - Service discovery

Broadcast Addresses

Limited Broadcast: Address: 255.255.255.255 Scope: Local network only Never routed All devices on segment receive

Directed Broadcast: Format: Network address with all host bits set to 1 Example: 192.168.1.255 (for 192.168.1.0/24) Usually blocked by routers Security risk (DDoS amplification)

Special-Purpose Addresses

This Network (RFC 1122)

Range: 0.0.0.0 - 0.255.255.255

CIDR: 0.0.0.0/8

Purpose: "This network"

Uses: 0.0.0.0 - Default route 0.0.0.0/0 - All addresses (routing) Source address when no IP assigned DHCP discovery source

Example: Routing table: 0.0.0.0/0 via 192.168.1.1 (default gateway)

Shared Address Space (RFC 6598)

Range: 100.64.0.0 - 100.127.255.255

CIDR: 100.64.0.0/10

Purpose: Carrier-Grade NAT (CGNAT)

Uses: - ISP internal addressing - CGNAT implementations - Shared between customers - Not routed on internet

Example: ISP assigns: 100.64.25.100 Your router WAN IP: 100.64.25.100 Public IP (shared): 203.0.113.45

IETF Protocol Assignments (RFC 6890)

Range: 192.0.0.0 - 192.0.0.255

CIDR: 192.0.0.0/24

Purpose: IETF protocol assignments

Special addresses: 192.0.0.0/29 - DS-Lite 192.0.0.8/32 - IPv4 dummy address 192.0.0.9/32 - Port Control Protocol 192.0.0.10/32 - Traversal Using Relays around NAT

IPv4 Service Continuity (RFC 7335)

Range: 192.0.0.0/29

Purpose: IPv6 transition mechanisms

Benchmarking (RFC 2544)

Range: 198.18.0.0 - 198.19.255.255

CIDR: 198.18.0.0/15

Purpose: Network benchmarking

Uses: - Performance testing - Network device testing - Benchmark traffic generation - Not routed publicly

Reserved for Future Use (RFC 1112)

Range: 240.0.0.0 - 255.255.255.254

CIDR: 240.0.0.0/4

Purpose: Reserved for future use

Status: - Class E addresses - Never allocated - Some proposals to reclaim - Compatibility issues prevent use

Exception: 255.255.255.255 - Limited broadcast (Part of this range but has specific use)

Summary Table

| Range | CIDR | Purpose | Routable | |-------|------|---------|----------| | 0.0.0.0/8 | 0.0.0.0 - 0.255.255.255 | This network | No | | 10.0.0.0/8 | 10.0.0.0 - 10.255.255.255 | Private (Class A) | No | | 100.64.0.0/10 | 100.64.0.0 - 100.127.255.255 | CGNAT | No | | 127.0.0.0/8 | 127.0.0.0 - 127.255.255.255 | Loopback | No | | 169.254.0.0/16 | 169.254.0.0 - 169.254.255.255 | Link-local | No | | 172.16.0.0/12 | 172.16.0.0 - 172.31.255.255 | Private (Class B) | No | | 192.0.0.0/24 | 192.0.0.0 - 192.0.0.255 | IETF Protocol | No | | 192.0.2.0/24 | 192.0.2.0 - 192.0.2.255 | Documentation | No | | 192.168.0.0/16 | 192.168.0.0 - 192.168.255.255 | Private (Class C) | No | | 198.18.0.0/15 | 198.18.0.0 - 198.19.255.255 | Benchmarking | No | | 198.51.100.0/24 | 198.51.100.0 - 198.51.100.255 | Documentation | No | | 203.0.113.0/24 | 203.0.113.0 - 203.0.113.255 | Documentation | No | | 224.0.0.0/4 | 224.0.0.0 - 239.255.255.255 | Multicast | Special | | 240.0.0.0/4 | 240.0.0.0 - 255.255.255.254 | Reserved | No | | 255.255.255.255/32 | 255.255.255.255 | Broadcast | No |

Common Mistakes

Mistake 1: Using Reserved Addresses

Wrong: Assigning 127.0.0.5 to a server Using 169.254.x.x for static IPs Routing 192.0.2.x on production

Correct: Use appropriate private ranges Use public IPs for internet-facing Use documentation IPs only in docs

Mistake 2: Confusing Private Ranges

Wrong: 172.15.0.0 is private (it's not!) 172.32.0.0 is private (it's not!) Only 172.16.0.0 - 172.31.255.255 is private

Correct: Verify exact ranges 172.16.0.0/12 only Check subnet calculator

Mistake 3: Blocking Necessary Multicast

Wrong: Blocking all 224.x.x.x Breaks routing protocols Breaks service discovery

Correct: Allow necessary multicast 224.0.0.0/24 for local protocols Specific ranges for services

Best Practices

Network Design

1. Use appropriate private ranges Large network: 10.0.0.0/8 Medium network: 172.16.0.0/12 Small network: 192.168.0.0/16

2. Don't mix ranges unnecessarily Stick to one private range if possible Easier management Clearer design

3. Reserve space Don't use all available addresses Leave room for growth Document allocations

Documentation

1. Use documentation ranges Examples: 192.0.2.x Tutorials: 198.51.100.x Samples: 203.0.113.x

2. Never use real IPs in docs Privacy concerns Potential conflicts Unprofessional

Troubleshooting

1. Check for reserved addresses 169.254.x.x → DHCP issue 127.x.x.x → Loopback (local only) 100.64.x.x → Behind CGNAT

2. Verify routing Private IPs shouldn't route to internet Check NAT configuration Verify firewall rules

3. Monitor multicast Ensure necessary multicast allowed Check routing protocol operation Verify service discovery

Security Considerations

Private Address Leakage

Problem: Private IPs in public DNS Private IPs in email headers Private IPs in HTTP headers

Solution: Scrub private IPs at edge Use NAT properly Configure proxies correctly

Spoofing Prevention

Ingress filtering: Block private source IPs from internet Block loopback from external Block documentation ranges RFC 2827 / BCP 38

Egress filtering: Prevent private IPs leaving network Block spoofed sources Implement BCP 38

Conclusion

Understanding IPv4 reserved addresses is crucial for proper network design, configuration, and troubleshooting. These ranges serve specific purposes and must be used appropriately to avoid conflicts, routing issues, and security problems.


Related Articles

IPv4 Address Types

IPv4 Fundamentals

Network Configuration

Explore More

Key takeaways: - Private ranges: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16 - Loopback: 127.0.0.0/8 (localhost) - Link-local: 169.254.0.0/16 (APIPA) - Documentation: 192.0.2.0/24, 198.51.100.0/24, 203.0.113.0/24 - Multicast: 224.0.0.0/4 - CGNAT: 100.64.0.0/10 - Reserved for future: 240.0.0.0/4 - Never route private addresses to internet - Use documentation ranges in examples - Understand special-purpose addresses

Proper use of reserved addresses ensures network functionality, prevents conflicts, and maintains internet routing integrity. Whether designing networks, writing documentation, or troubleshooting issues, knowledge of reserved address ranges is essential for network professionals.

ad placeholder image ad placeholder image
Three funny piglies - an illustration ippigly.com