CIDR Conversion Table
CIDR Conversion Table
Understanding:
Class A, B, and C Networks:
The above table uses Class A, B, and C to define network types. Network classes define how many addresses are allowed on the network, with class A being the largest and class C being the smallest. Specific size details are defined in the following class definitions:
Class A: Allows 224 host addresses on the network. The starting host address is 0.0.0.0 and the ending address is 127.0.0.0. These networks use the 255.0.0.0 subnet mask, or /8 CIDR notation.
Class B: Allows 216 host addresses on the network. The starting host address is 128.0.0.0 and the ending address is 191.255.0.0. These networks use the 255.255.0.0 subnet mask, or /16 CIDR notation.
Class C: Allows 28 host addresses on the network. The starting host address is 192.0.0.0 and the ending address is 223.255.255.0. These networks use the 255.255.255.0 subnet mask, or /24 CIDR notation.
CIDR Conversion Table:
/1
128.0.0.0
128 A
2,147,483,392
/2
192.0.0.0
64 A
1,073,741,696
/3
224.0.0.0
32 A
536,870,848
/4
240.0.0.0
16 A
268,435,424
/5
248.0.0.0
8 A
134,217,712
/6
252.0.0.0
4 A
67,108,856
/7
254.0.0.0
2 A
33,554,428
/8
255.0.0.0
1 A
16,777,214
/9
255.128.0.0
128 B
8,388,352
/10
255.192.0.0
64 B
4,194,176
/11
255.224.0.0
32 B
2,097,088
/12
255.240.0.0
16 B
1,048,544
/13
255.248.0.0
8 B
524,272
/14
255.252.0.0
4 B
262,136
/15
255.254.0.0
2 B
131,068
/16
255.255.0.0
1 B
65,024
/17
255.255.128.0
128 C
32,512
/18
255.255.192.0
64 C
16,256
/19
255.255.224.0
32 C
8,128
/20
255.255.240.0
16 C
4,064
/21
255.255.248.0
8 C
2,032
/22
255.255.252.0
4 C
1,016
/23
255.255.254.0
2 C
508
/24
255.255.255.0
1 C
254
/25
255.255.255.128
2 subnets
124
/26
255.255.255.192
4 subnets
62
/27
255.255.255.224
8 subnets
30
/28
255.255.255.240
16 subnets
14
/29
255.255.255.248
32 subnets
6
/30
255.255.255.252
64 subnets
2
/31
255.255.255.254
none
none
/32
255.255.255.255
none
1
Hacker's Mantra:
A hacker is someone who uses a combination of high-tech cybertools and social engineering to gain illicit access to someone else's data. - John McAfee
Last updated
Was this helpful?