{"id":3651,"date":"2025-06-25T08:00:24","date_gmt":"2025-06-25T15:00:24","guid":{"rendered":"https:\/\/www.geoplugin.com\/resources\/?p=3651"},"modified":"2025-12-30T09:03:16","modified_gmt":"2025-12-30T17:03:16","slug":"what-is-a-subnet-mask-everything-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/","title":{"rendered":"What is a Subnet Mask? Everything You Need to Know"},"content":{"rendered":"\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/What-is-a-subnet-mask-1024x683.png\" alt=\"Image showing the text \u201cwhat is a subnet mask\u201d along with its decimal notation.\n255.255.255.0\n\" class=\"wp-image-3703\" srcset=\"https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/What-is-a-subnet-mask-1024x683.png 1024w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/What-is-a-subnet-mask-300x200.png 300w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/What-is-a-subnet-mask-768x512.png 768w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/What-is-a-subnet-mask.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>You\u2019ve probably come across this string or something similar with an IP address and found yourself wondering what it means.<\/p>\n\n\n\n<p>That string is known as a subnet mask. But what is a subnet mask exactly, and why does it appear alongside IP addresses?<\/p>\n\n\n\n<p>This article will walk you through everything you need to know about subnet masks.&nbsp;<\/p>\n\n\n\n<p>You will take away a crystal clear understanding of the following concepts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What is a subnet mask<\/li>\n\n\n\n<li>What are subnets<\/li>\n\n\n\n<li>How does subnetting work<\/li>\n\n\n\n<li>Why subnet masks, subnets, and subnetting matter in networking<\/li>\n<\/ul>\n\n\n\n<p>To make it easier, the article provides clear examples that demonstrate how all these pieces fit together.<\/p>\n\n\n\n<p>Let\u2019s begin.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#What_is_a_Subnet_Mask\" >What is a Subnet Mask?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#What_is_an_IP_Address\" >What is an IP Address?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Subnet_Mask\" >Subnet Mask<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Representation_of_a_Subnet_Mask\" >Representation of a Subnet Mask<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#How_CIDR_Solved_Classful_Addressing_Limitations\" >How CIDR Solved Classful Addressing Limitations<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Difference_Between_Subnet_vs_Subnet_Mask\" >Difference Between Subnet vs Subnet Mask<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#What_Is_Subnetting_How_To_Do_It\" >What Is Subnetting &amp; How To Do It?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Step_1_Define_the_Goal\" >Step 1: Define the Goal<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Step_2_Borrow_Host_Bits\" >Step 2: Borrow Host Bits<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Step_3_Divide_the_Network\" >Step 3: Divide the Network<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#How_Do_Organizations_Choose_IP_Ranges_for_Their_Networks\" >How Do Organizations Choose IP Ranges for Their Networks?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#A_Scenario\" >A Scenario<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Other_Factors_When_Choosing_IP_Ranges\" >Other Factors When Choosing IP Ranges<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#What_Is_The_Purpose_Of_A_Subnet_Mask_Subnetting\" >What Is The Purpose Of A Subnet Mask &amp; Subnetting?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Routing_Network_Identification\" >Routing &amp; Network Identification<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Breaking_Down_Large_Networks_for_Manageability_Subnetting\" >Breaking Down Large Networks for Manageability (Subnetting)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Enhancing_Network_Security_Subnetting\" >Enhancing Network Security (Subnetting)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Conserving_IPv4_Addresses_Subnetting\" >Conserving IPv4 Addresses (Subnetting)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#Use_GeoPlugin_To_Monitor_IP_Address_Activity\" >Use GeoPlugin To Monitor IP Address Activity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#FAQs\" >FAQs<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#What_is_my_subnet_mask\" >What is my subnet mask?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#How_to_figure_out_subnet_mask_from_IP_address\" >How to figure out subnet mask from IP address?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/#What_is_a_subnet_mask_for_wifi\" >What is a subnet mask for wifi?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_a_Subnet_Mask\"><\/span>What is a Subnet Mask?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>To understand what is a subnet mask, we\u2019ll have to start with <a href=\"https:\/\/www.geoplugin.com\/resources\/types-of-ip-address-functions-and-uses-of-different-ips\/\" target=\"_blank\" rel=\"noopener\" title=\"\">IP addresses<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Depositphotos_129353764_L-1-1024x683.jpg\" alt=\"\" class=\"wp-image-3705\" srcset=\"https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Depositphotos_129353764_L-1-1024x683.jpg 1024w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Depositphotos_129353764_L-1-300x200.jpg 300w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Depositphotos_129353764_L-1-768x512.jpg 768w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Depositphotos_129353764_L-1-1536x1024.jpg 1536w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Depositphotos_129353764_L-1-2048x1366.jpg 2048w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Depositphotos_129353764_L-1-1568x1046.jpg 1568w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_an_IP_Address\"><\/span>What is an IP Address?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You know that a home address identifies a specific house within a city or a street. Similarly, an IP address string identifies a host device on a larger network.<\/p>\n\n\n\n<p>Just as a postal address contains both the neighborhood and the exact house number, an IP address contains information about the network it belongs to as well as the unique identifier of the device itself.&nbsp;<\/p>\n\n\n\n<p>For example, let\u2018s say your address is &#8220;123 Main Street, Springfield.&#8221; The &#8220;Springfield&#8221; part represents the network (a larger group), while &#8220;123 Main Street&#8221; pinpoints the exact location (the host).&nbsp;<\/p>\n\n\n\n<p>Similarly, in an IP address like 192.168.1.10, certain bits determine the network, while some bits identify the device.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Subnet-Mask-1024x576.png\" alt=\"Image showing how an IP address is linked to a subnet mask.\n\" class=\"wp-image-3706\" srcset=\"https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Subnet-Mask-1024x576.png 1024w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Subnet-Mask-300x169.png 300w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Subnet-Mask-768x432.png 768w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Subnet-Mask.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Subnet_Mask\"><\/span>Subnet Mask<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>However, unlike a postal address, where the separation between city and street is apparent to humans, an IP address alone doesn\u2019t show which part is the network and which is the host.&nbsp;<\/p>\n\n\n\n<p>For that, you need another 32-bit number called the subnet mask.<\/p>\n\n\n\n<p>A subnet mask acts like a filter that tells devices how to interpret a given IP address.&nbsp;<\/p>\n\n\n\n<p>It does this by using a sequence of 1s (indicating the network portion) followed by 0s (indicating the host portion).&nbsp;<\/p>\n\n\n\n<p>When the IP address and subnet mask are compared using a bitwise AND operation, the result reveals the network address, while the remaining bits identify the host.<\/p>\n\n\n\n<p>For example:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><\/td><td><\/td><td><strong>Binary notation<\/strong><\/td><\/tr><tr><td><strong>IP Address<\/strong><\/td><td>192.168.1.10<\/td><td>11000000.10101000.00000001.00001010<\/td><\/tr><tr><td><strong>Subnet Mask<\/strong><\/td><td>255.255.255.0<\/td><td>11111111.11111111.11111111.00000000<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Since the subnet mask has 1s in the first three octets, the first three octets of the IP address represent the network ID. It means 192.168.1 is the network ID.<\/p>\n\n\n\n<p>The last octet (0) of the subnet mask allows for host addresses, so .10 is the specific device.<\/p>\n\n\n\n<p>This means the given IP address belongs to a network that can contain devices from 192.168.1.1 to 192.168.1.254.&nbsp;<\/p>\n\n\n\n<p>Now, this entire range of host addresses forms a subnet (we\u2019ll get into what are subnets later).<\/p>\n\n\n\n<p>Another example:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><\/td><td><\/td><td><strong>Binary notation<\/strong><\/td><\/tr><tr><td><strong>IP Address<\/strong><\/td><td>10.0.0.5<\/td><td>00001010.00000000.00000000.00000101<\/td><\/tr><tr><td><strong>Subnet Mask<\/strong><\/td><td>255.0.0.0<\/td><td>11111111.00000000.00000000.00000000<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Here, only the first octet of the subnet mask (255) is the network part, so 10. is the network.<\/p>\n\n\n\n<p>The remaining three octets (0.0.0) allow for millions of hosts, with .5 being one of them.<\/p>\n\n\n\n<p>And the network can contain host addresses from 10.1.0.0 to 10.255.255.255.<\/p>\n\n\n\n<p>Here\u2019s a more complex case:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><\/td><td><\/td><td><strong>Binary notation<\/strong><\/td><\/tr><tr><td><strong>IP Address<\/strong><\/td><td>172.16.128.200<\/td><td>10101100.00010000.10000000.11001000<\/td><\/tr><tr><td><strong>Subnet Mask<\/strong><\/td><td>255.255.192.0<\/td><td>11111111.11111111.11000000.00000000<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The first 18 bits (from 255.255.192.0) define the network, resulting in 172.16.128.0.<\/p>\n\n\n\n<p>The remaining 14 bits allow for host addresses, making .200 part of a larger possible range.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"972\" height=\"458\" src=\"https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/IP-Address-in-dotted-decimal-notation.png\" alt=\"Image showing an IP address in dotted decimal notation.\" class=\"wp-image-3708\" srcset=\"https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/IP-Address-in-dotted-decimal-notation.png 972w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/IP-Address-in-dotted-decimal-notation-300x141.png 300w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/IP-Address-in-dotted-decimal-notation-768x362.png 768w\" sizes=\"auto, (max-width: 972px) 100vw, 972px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Representation_of_a_Subnet_Mask\"><\/span>Representation of a Subnet Mask<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The most efficient and widely used method to represent subnet masks today is <a href=\"https:\/\/en.wikipedia.org\/wiki\/Classless_Inter-Domain_Routing\" target=\"_blank\" rel=\"noopener\" title=\"\">CIDR (Classless Inter-Domain Routing)<\/a> notation.&nbsp;<\/p>\n\n\n\n<p>Before CIDR, IPv4 relied on classful addressing, where the subnet mask was implied by the IP address itself. The first few bits of an IP address determined whether it was Class A, B, or C, and thus its default mask.&nbsp;<\/p>\n\n\n\n<p>The concept of classful addressing dictated that an IP address&#8217;s inherent class automatically determined its subnet mask. No additional configuration was needed.&nbsp;<\/p>\n\n\n\n<p>This system, rooted in the early days of the Internet, divided <a href=\"https:\/\/www.geoplugin.com\/resources\/types-of-ip-address-functions-and-uses-of-different-ips\/\" target=\"_blank\" rel=\"noopener\" title=\"\">IPv4 addresses<\/a> into three primary classes (A, B, C). It was on the basis of the first few bits of the address.&nbsp;<\/p>\n\n\n\n<p>However, this rigid system wasted IP addresses, as networks had to fit into fixed sizes.&nbsp;<\/p>\n\n\n\n<p>For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Class A<\/strong> addresses always began with a 0 in the first bit (e.g., 1.0.0.0 to 126.0.0.0).\n<ul class=\"wp-block-list\">\n<li><strong>Default mask:<\/strong> 255.0.0.0 (or \/8 in CIDR terms).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>This meant the first octet was the network. And the remaining three octets (16.7 million hosts) were for devices, an impractical scale for most organizations.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Class B<\/strong> started with 10 in the first two bits (e.g., 128.0.0.0 to 191.255.0.0).\n<ul class=\"wp-block-list\">\n<li><strong>Default mask:<\/strong> 255.255.0.0 (\/16).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Here, the first two octets defined the network, leaving 65,534 hosts, suitable for large universities or corporations. But still wasteful for smaller entities.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Class C<\/strong> began with 110 (e.g., 192.0.0.0 to 223.255.255.0).\n<ul class=\"wp-block-list\">\n<li><strong>Default mask:<\/strong> 255.255.255.0 (\/24).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_CIDR_Solved_Classful_Addressing_Limitations\"><\/span>How CIDR Solved Classful Addressing Limitations<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Only 254 hosts were allowed per network, which was too restrictive for mid-sized businesses.<\/p>\n\n\n\n<p>CIDR eliminated this inefficiency by allowing variable-length subnet masks (VLSM). VLSM allowed for flexible adjustment of the division between network and host portions.<\/p>\n\n\n\n<p>In CIDR notation, we represent the subnet mask with a slash followed by a number (e.g., \/24). This indicates how many bits in the IP address the network portion uses.&nbsp;<\/p>\n\n\n\n<p>The remaining bits are for hosts. This is more concise than writing out the full dotted-decimal mask (like 255.255.255.0) and directly shows the network\u2019s granularity. For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>192.168.1.0\/24 means the first 24 bits are the network, leaving 8 bits (2\u2078 = 256 addresses) for hosts.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>10.0.0.0\/8 reserves only the first 8 bits for the network, allowing over 16 million hosts (2\u00b2\u2074).<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>172.16.128.0\/18 (from the earlier example) uses 18 network bits, creating larger subnets than a \/24** but smaller than a \/16.<\/li>\n<\/ul>\n\n\n\n<p>This shift from classful to classless addressing gave administrators finer control over IP allocation.&nbsp;<\/p>\n\n\n\n<p>For instance, a company with 500 devices no longer had to take a whole Class B network (wasting ~65,000 addresses).&nbsp;<\/p>\n\n\n\n<p>With CIDR, it could just use a \/23 (512 addresses).&nbsp;<\/p>\n\n\n\n<p>Similarly, <a href=\"https:\/\/www.geoplugin.com\/resources\/ip-address-format-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\" title=\"\">IPv6 exclusively uses CIDR notation<\/a> (like 2001:db8::\/32) because its vast address space requires efficient segmentation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Difference_Between_Subnet_vs_Subnet_Mask\"><\/span>Difference Between Subnet vs Subnet Mask<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Many people use the terms &#8220;subnet&#8221; and &#8220;subnet mask\u201d interchangeably. However, this is a mistake.<\/p>\n\n\n\n<p>These two terms, while related, have different meanings.<\/p>\n\n\n\n<p>A subnet, short for subnetwork, is a subdivision of a larger network created to group devices into smaller, isolated segments. You create subnets through a process called subnetting (more on this in the next heading).<\/p>\n\n\n\n<p>In contrast, a subnet mask is a number that defines how to split an IP address between the network and host portions. This number essentially acts as a &#8220;rulebook&#8221; for determining which subnets exist and where devices belong.<\/p>\n\n\n\n<p>A subnet cannot exist without a subnet mask because the mask creates the subnet by defining its boundaries.<\/p>\n\n\n\n<p>You may think of it like a neighborhood (subnet) and its zoning laws (subnet mask). The laws dictate where houses (hosts) can be built, but the neighborhood is the physical result.<\/p>\n\n\n\n<p>To put it simply:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The subnet is the actual partitioned network (e.g., 192.168.1.0\/24 is a network that can accommodate 254 hosts).<\/li>\n\n\n\n<li>The subnet mask is the mechanism that creates and enforces these partitions (e.g., 255.255.255.0 or \/24).\u00a0<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Subnetting-IPv4-address-1.png\" alt=\"Image showing the results before and after performing subnetting in IPv4 addresses.\" class=\"wp-image-3710\" srcset=\"https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Subnetting-IPv4-address-1.png 800w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Subnetting-IPv4-address-1-300x169.png 300w, https:\/\/www.geoplugin.com\/resources\/wp-content\/uploads\/2025\/06\/Subnetting-IPv4-address-1-768x432.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Is_Subnetting_How_To_Do_It\"><\/span>What Is Subnetting &amp; How To Do It?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>To explain subnetting and demonstrate how to perform it, I will use an example.<\/p>\n\n\n\n<p>Imagine you run a small business, say a design agency, with 12 computers.&nbsp;<\/p>\n\n\n\n<p>Your business has three departments: Design, Sales, and HR.&nbsp;<\/p>\n\n\n\n<p>Each team needs its own private network space so that its data stays within its circle. Right now, everyone is on the same network, sharing all traffic. That\u2019s chaos, and we don\u2019t want that.&nbsp;<\/p>\n\n\n\n<p>So, to fix this, we perform a process called subnetting.<\/p>\n\n\n\n<p>Subnetting is a fancy term for breaking one big network into smaller and more manageable ones called subnets.&nbsp;<\/p>\n\n\n\n<p>To subnet a network, we borrow bits from the host part and add them to the network part. This lets us divide that one big network into smaller ones.<\/p>\n\n\n\n<p>Now, let me show you how to apply subnetting to our scenario.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step_1_Define_the_Goal\"><\/span>Step 1: Define the Goal<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Let\u2019s say your IP address is 192.0.2.130. And the default subnet mask is 255.255.255.0 (which is 24 bits long, commonly written as \/24).&nbsp;<\/p>\n\n\n\n<p>This default setup gives you 1 network with up to 254 usable host addresses. Why not 256? Because you always lose two: one for the network address and one for the broadcast.<\/p>\n\n\n\n<p>But we only need 3 smaller networks for our 3 departments. So, how do we do it?&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step_2_Borrow_Host_Bits\"><\/span>Step 2: Borrow Host Bits<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>We need at least 3 subnets, but subnetting always gives us powers of 2.&nbsp;<\/p>\n\n\n\n<p>So, to get at least 3, we need to borrow 2 bits from the host portion.&nbsp;<\/p>\n\n\n\n<p>Why 2 bits? Because 2 bits gives us 2\u00b2 = 4 subnets. That\u2019s one more than we need, but hey, extra is good.<\/p>\n\n\n\n<p>By borrowing those 2 bits, our subnet mask changes. Originally, the last octet (the fourth one) in binary was:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>00000000 (which equals 0)<\/li>\n<\/ul>\n\n\n\n<p>Now we change the first 2 bits in that octet from 0 to 1:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>11000000 = 192 in decimal<\/li>\n<\/ul>\n\n\n\n<p>So our new subnet mask becomes 255.255.255.192 or \/26 in CIDR notation.<\/p>\n\n\n\n<p>This change gives us 4 subnets, and each subnet can now hold 62 usable hosts (64 total addresses minus 2 reserved ones).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step_3_Divide_the_Network\"><\/span>Step 3: Divide the Network<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>With a \/26 mask, the 192.168.1.0 network splits into 4 subnets:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Subnet #<\/strong><\/td><td><strong>Network Address<\/strong><\/td><td><strong>Usable Host Range<\/strong><\/td><td><strong>Broadcast Address<\/strong><\/td><\/tr><tr><td>Subnet 1<\/td><td>192.0.2.0<\/td><td>192.0.2.1 \u2013 192.0.2.62<\/td><td>192.0.2.63<\/td><\/tr><tr><td>Subnet 2<\/td><td>192.0.2.64<\/td><td>192.0.2.65 \u2013 192.0.2.126<\/td><td>192.0.2.127<\/td><\/tr><tr><td>Subnet 3<\/td><td>192.0.2.128<\/td><td>192.0.2.129 \u2013 192.0.2.190<\/td><td>192.0.2.191<\/td><\/tr><tr><td>Subnet 4<\/td><td>192.0.2.192<\/td><td>192.0.2.193 \u2013 192.0.2.254<\/td><td>192.0.2.255<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>From this breakdown, you can pick three subnets, one for each department. For instance:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Design team lives in Subnet 1.<\/li>\n\n\n\n<li>Sales chills in Subnet 2.<\/li>\n\n\n\n<li>HR keeps to themselves in Subnet 3.<\/li>\n<\/ul>\n\n\n\n<p>And just like that, each department now has its own subnet. Their traffic stays private, they won\u2019t step on each other\u2019s toes, and your network is now cleanly organized.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_Do_Organizations_Choose_IP_Ranges_for_Their_Networks\"><\/span>How Do Organizations Choose IP Ranges for Their Networks?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Alright, let\u2019s talk about how organizations pick their IP address ranges because they cannot just pick any.<\/p>\n\n\n\n<p>A small company doesn\u2019t need a flood of IP addresses, while a global ISP definitely isn\u2019t getting by on 254 hosts.<\/p>\n\n\n\n<p>First off, IP addresses come in classes, which basically just help group networks by size. These are Class A, B, and C for commercial use. Classes D and E are for government stuff and experiments, so we won\u2019t cover them in this guide.<\/p>\n\n\n\n<p>Each class has a default subnet mask and a fixed range of IP addresses.<\/p>\n\n\n\n<p>Here\u2019s a quick rundown:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Class<\/strong><\/td><td><strong>First Octet Range<\/strong><\/td><td><strong>Default Subnet Mask<\/strong><\/td><td><strong>Usable Hosts (Approx.)<\/strong><\/td><\/tr><tr><td>A<\/td><td>1 \u2013 126<\/td><td>255.0.0.0<\/td><td>~16 million<\/td><\/tr><tr><td>B<\/td><td>128 \u2013 191<\/td><td>255.255.0.0<\/td><td>~65,000<\/td><\/tr><tr><td>C<\/td><td>192 \u2013 223<\/td><td>255.255.255.0<\/td><td>254<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>So, how does an organization pick one? It depends on the number of hosts (i.e., devices like computers, printers, and coffee machines with IPs) they plan to have on their network.<\/p>\n\n\n\n<p>Let\u2019s jump into a scenario to make this crystal clear.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"A_Scenario\"><\/span>A Scenario<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Byte-Sized Bakery is a growing business that started out baking cookies but now runs:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Three bakeries<\/li>\n\n\n\n<li>A central warehouse<\/li>\n\n\n\n<li>And a small office<\/li>\n<\/ul>\n\n\n\n<p>They\u2019ve got around 80 devices across the company, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Point-of-sale systems<\/li>\n\n\n\n<li>Cameras<\/li>\n\n\n\n<li>Computers<\/li>\n\n\n\n<li>And a couple of Wi-Fi fridges that send passive-aggressive alerts<\/li>\n<\/ul>\n\n\n\n<p>Now, they want to segment their network to improve performance and security. Their goal is to divide their 80 devices into 3 smaller networks:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>One for the storefronts<\/li>\n\n\n\n<li>One for the warehouse<\/li>\n\n\n\n<li>And one for the office\/admin staff<\/li>\n<\/ul>\n\n\n\n<p>Because their total number of devices is under 254, a Class C IP range is perfect. It\u2019s affordable, manageable, and totally adequate for their needs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Other_Factors_When_Choosing_IP_Ranges\"><\/span>Other Factors When Choosing IP Ranges<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In the real world, organizations also consider a few other factors when choosing IP ranges:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Scalability:<\/strong> Will this range still work as the company grows?<\/li>\n\n\n\n<li><strong>Security:<\/strong> Segmenting networks helps reduce risks. One infected coffee machine doesn\u2019t bring down your whole operation.<\/li>\n\n\n\n<li><strong>Addressing policies:<\/strong> Companies often use <a href=\"https:\/\/www.geoplugin.com\/resources\/non-routing-ip-addresses-definition-importance-and-more\/\">private IP ranges<\/a> (like 10.x.x.x, 172.16.x.x \u2013 172.31.x.x, or 192.168.x.x). Why? To avoid conflicts with public internet IPs.<\/li>\n\n\n\n<li><strong>Routing simplicity:<\/strong> Neatly segmented networks make life easier for the network engineers who manage routing and firewalls.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Is_The_Purpose_Of_A_Subnet_Mask_Subnetting\"><\/span>What Is The Purpose Of A Subnet Mask &amp; Subnetting?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>By now, we have understood what is a subnet mask and the concept of subnetting. But what is the purpose of a subnet mask exactly? The following are the main reasons.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Routing_Network_Identification\"><\/span>Routing &amp; Network Identification<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A subnet mask helps devices and routers figure out whether an IP address belongs to the same network or a different one.&nbsp;<\/p>\n\n\n\n<p>Before the invention of CIDR (Classless Inter-Domain Routing), networks relied on classful IP addressing. Your IP address\u2019s first few bits would tell whether it was Class A, B, or C. From that, devices could figure out what part of the IP referred to the network and what part referred to the host.&nbsp;<\/p>\n\n\n\n<p>But CIDR came along and tossed that rigid system aside. Now, networks define their own subnet masks instead of being trapped in fixed classes.<\/p>\n\n\n\n<p>So now, when a device wants to communicate with another, it uses the subnet mask in conjunction with the IP address to determine where the message should go. Here\u2019s how it works:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>A device takes its own IP address and subnet mask and calculates the network address.<\/li>\n\n\n\n<li>Then, when it wants to send data to another IP, it calculates the destination&#8217;s network address using the same mask.<\/li>\n\n\n\n<li>If the two network addresses match, the device knows the destination is local and sends the message directly.<\/li>\n\n\n\n<li>If not, it punts the message to the default gateway, usually a router, which then handles the journey from there.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Breaking_Down_Large_Networks_for_Manageability_Subnetting\"><\/span>Breaking Down Large Networks for Manageability (Subnetting)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>When all devices are on the same network, communication between any two of them often involves broadcasting.\u00a0<\/p>\n\n\n\n<p>That means sending messages out to everyone and hoping the right recipient answers. It\u2019s kind of like yelling in a crowded mall, hoping your friend hears you.&nbsp;<\/p>\n\n\n\n<p>And when hundreds or thousands of devices are all broadcasting at once? You get chaos. Network traffic slows, problems become hard to trace, and everything generally becomes a mess.<\/p>\n\n\n\n<p>Subnetting fixes this by chopping large networks into smaller, isolated networks called subnets. Routers separate these subnets and don\u2019t let random broadcasts through. Only the necessary data gets routed to other networks, and everything else stays nice and quiet.<\/p>\n\n\n\n<p>So when a device tries to communicate with another device, it first checks within its own small subnet. If the device doesn\u2019t exist in the local network, the broadcast travels outside the network to other routers and checks the routing table for the destination address.&nbsp;<\/p>\n\n\n\n<p>If a router\u2019s destination table has the recipient\u2019s address, only then does the router let the broadcast in and send it to the respective recipient.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Enhancing_Network_Security_Subnetting\"><\/span>Enhancing Network Security (Subnetting)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In enterprise networks where thousands of devices are interconnected and sensitive data is constantly on the move, subnetting limits the damage if things go sideways.<\/p>\n\n\n\n<p>Imagine your network as a big mansion, and subnets as individual locked rooms. If a burglar (a.k.a. a hacker) breaks into one room, they can only cause trouble in that space.&nbsp;<\/p>\n\n\n\n<p>The rest of the mansion is still secure. That\u2019s exactly what subnetting does. It segments the network into isolated chunks. If one subnet is compromised, the hacker\u2019s view is limited to just that subnet. They can&#8217;t see or interact with devices in the other subnets without breaching more layers.<\/p>\n\n\n\n<p>Beside isolation, subnetting also works hand in hand with other security tools to form a layered defense. Here\u2019s how:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access Control Lists (ACLs):<\/strong> They decide who\u2019s allowed in or out based on defined rules.<\/li>\n\n\n\n<li><strong>Route Maps:<\/strong> These help steer traffic smartly, ensuring sensitive data doesn\u2019t pass through risky or exposed routes.<\/li>\n\n\n\n<li><strong>Quality of Service (QoS):<\/strong> This ensures that mission-critical applications (like your security monitoring system) always get top priority, even when the network is busy.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conserving_IPv4_Addresses_Subnetting\"><\/span>Conserving IPv4 Addresses (Subnetting)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>When the <a href=\"https:\/\/www.geoplugin.com\/resources\/ip-address-format-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\" title=\"\">creators created IPv4<\/a>, they probably didn\u2019t expect that one day, even your fridge would need an IP address.&nbsp;<\/p>\n\n\n\n<p>But here we are: smartphones, smart TVs, smart toasters, each one wanting its own IP address. And with only about 4.3 billion IPv4 addresses to go around, that address pool started looking real thin.<\/p>\n\n\n\n<p>Subnetting helped stretch the IPv4 pool.<\/p>\n\n\n\n<p>Originally, IP addresses were doled out rather generously. An organization might get a whole block of addresses, even if it only needed a few. But subnetting allowed administrators to split a single IP block into multiple smaller networks.&nbsp;<\/p>\n\n\n\n<p>That way, dozens or even hundreds of devices could share a common network identity without each one needing a separate public IP address.<\/p>\n\n\n\n<p>Here&#8217;s a quick look at what this might look like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A <a href=\"https:\/\/www.geoplugin.com\/resources\/how-are-ip-addresses-assigned-answers-revealed\/\" target=\"_blank\" rel=\"noopener\" title=\"\">business gets a public IP<\/a>: 203.0.113.1<\/li>\n\n\n\n<li>Internally, they subnet their network using private IP ranges like 192.168.1.0\/24, 192.168.2.0\/24, etc.<\/li>\n\n\n\n<li>Each subnet has its own range of private IPs (e.g., 192.168.1.1 to 192.168.1.254)<\/li>\n\n\n\n<li>All outbound traffic from these subnets goes through that one public IP<\/li>\n<\/ul>\n\n\n\n<p>This is how subnetting allows networks to support many more devices without needing more public addresses.&nbsp;<\/p>\n\n\n\n<p>In a way, subnetting helped stave off the exhaustion of IPv4 address space, buying the world time to slowly roll out IPv6, which has more addresses to be enough for a long time.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Use_GeoPlugin_To_Monitor_IP_Address_Activity\"><\/span>Use GeoPlugin To Monitor IP Address Activity<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>By now, you must have understood what is a subnet mask and how subnetting facilitates network management.<\/p>\n\n\n\n<p>But securing your network in real time requires more than just theory.<\/p>\n\n\n\n<p>That\u2019s where services like GeoPlugin come in handy.&nbsp;<\/p>\n\n\n\n<p>GeoPlugin provides an <a href=\"https:\/\/www.geoplugin.com\/ip-geolocation-api\" target=\"_blank\" rel=\"noopener\" title=\"\">IP geolocation API<\/a> that helps you investigate IP addresses interacting with your systems. It can provide detailed information about any IP, such as geographic location, ISP, and even whether it\u2019s part of a suspicious range or a <a href=\"https:\/\/www.geoplugin.com\/resources\/bogon-ip-address-what-it-is-and-how-to-detect-it\/\" target=\"_blank\" rel=\"noopener\" title=\"\">bogon address<\/a>.<\/p>\n\n\n\n<p>By integrating GeoPlugin, you\u2019ll be better equipped to monitor access, control traffic intelligently, and strengthen your subnet-level defenses. All using a single GeoPlugin API!<\/p>\n\n\n\n<p>So, what are you waiting for? <a href=\"https:\/\/www.geoplugin.com\/\">Sign up for GeoPlugin<\/a>\u2019s easy-to-use API today and be aware of your network traffic.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"FAQs\"><\/span>FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Here are some of the frequently asked questions about what is a subnet mask IP address.<\/p>\n\n\n\n<div data-schema-only=\"false\" class=\"wp-block-aioseo-faq\"><h3 class=\"aioseo-faq-block-question\"><span class=\"ez-toc-section\" id=\"What_is_my_subnet_mask\"><\/span>What is my subnet mask?<span class=\"ez-toc-section-end\"><\/span><\/h3><div class=\"aioseo-faq-block-answer\">\n<p>To find your subnet mask:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Router:<\/strong> Log in to your router\u2019s admin panel (usually via 192.168.1.1) and check the LAN settings.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Windows:<\/strong> Open Command Prompt and type <strong>ipconfig<\/strong>. Look for &#8220;Subnet Mask&#8221; under your network adapter.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mac\/Linux:<\/strong> Open Terminal and type ifconfig (or ip a on Linux). The subnet mask appears as &#8220;netmask&#8221; or &#8220;subnet.&#8221;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div data-schema-only=\"false\" class=\"wp-block-aioseo-faq\"><h3 class=\"aioseo-faq-block-question\"><span class=\"ez-toc-section\" id=\"How_to_figure_out_subnet_mask_from_IP_address\"><\/span>How to figure out subnet mask from IP address?<span class=\"ez-toc-section-end\"><\/span><\/h3><div class=\"aioseo-faq-block-answer\">\n<p>If you know the IP\u2019s CIDR notation (e.g., \/24), the subnet mask is:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\/24 \u2192 255.255.255.0<\/li>\n\n\n\n<li>\/16 \u2192 255.255.0.0<\/li>\n\n\n\n<li>\/8 \u2192 255.0.0.0<\/li>\n<\/ul>\n\n\n\n<p>For classful IPs (e.g., 192.168.x.x), the default is usually 255.255.255.0.<\/p>\n<\/div><\/div>\n\n\n\n<div data-schema-only=\"false\" class=\"wp-block-aioseo-faq\"><h3 class=\"aioseo-faq-block-question\"><span class=\"ez-toc-section\" id=\"What_is_a_subnet_mask_for_wifi\"><\/span>What is a subnet mask for wifi?<span class=\"ez-toc-section-end\"><\/span><\/h3><div class=\"aioseo-faq-block-answer\">\n<p>So, what is a subnet mask for WiFi? Your Wi-Fi subnet mask defines the local network\u2019s size (e.g., home networks often use 255.255.255.0). To check it:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>On a router:<\/strong> See the LAN\/DHCP settings in the admin panel.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>On a phone\/tablet:<\/strong> Go to Wi-Fi settings, tap your network, and check &#8220;Subnet Mask&#8221; under advanced details.<\/li>\n<\/ul>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>You\u2019ve probably come across this string or something similar with an IP address and found yourself wondering what it means. That string is known as a subnet mask. But what is a subnet mask exactly, and why does it appear alongside IP addresses? This article will walk you through everything you need to know about&hellip; <a class=\"more-link\" href=\"https:\/\/www.geoplugin.com\/resources\/what-is-a-subnet-mask-everything-you-need-to-know\/\">Continue reading <span class=\"screen-reader-text\">What is a Subnet Mask? Everything You Need to Know<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":3703,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-3651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networking","entry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/posts\/3651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/comments?post=3651"}],"version-history":[{"count":29,"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/posts\/3651\/revisions"}],"predecessor-version":[{"id":4367,"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/posts\/3651\/revisions\/4367"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/media\/3703"}],"wp:attachment":[{"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/media?parent=3651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/categories?post=3651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.geoplugin.com\/resources\/wp-json\/wp\/v2\/tags?post=3651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}