CIDR Conversion Table

CIDR Conversion Table

Understanding:

Class A, B, and C Networks:

The above table uses Class A, B, and C to define network types. Network classes define how many addresses are allowed on the network, with class A being the largest and class C being the smallest. Specific size details are defined in the following class definitions:

Class A: Allows 224 host addresses on the network. The starting host address is 0.0.0.0 and the ending address is 127.0.0.0. These networks use the 255.0.0.0 subnet mask, or /8 CIDR notation.

Class B: Allows 216 host addresses on the network. The starting host address is 128.0.0.0 and the ending address is 191.255.0.0. These networks use the 255.255.0.0 subnet mask, or /16 CIDR notation.

Class C: Allows 28 host addresses on the network. The starting host address is 192.0.0.0 and the ending address is 223.255.255.0. These networks use the 255.255.255.0 subnet mask, or /24 CIDR notation.

CIDR Conversion Table:

CIDR LengthMask# of Networks#  of Hosts

/1

128.0.0.0

128 A

2,147,483,392

/2

192.0.0.0

64 A

1,073,741,696

/3

224.0.0.0

32 A

536,870,848

/4

240.0.0.0

16 A

268,435,424

/5

248.0.0.0

8 A

134,217,712

/6

252.0.0.0

4 A

67,108,856

/7

254.0.0.0

2 A

33,554,428

/8

255.0.0.0

1 A

16,777,214

/9

255.128.0.0

128 B

8,388,352

/10

255.192.0.0

64 B

4,194,176

/11

255.224.0.0

32 B

2,097,088

/12

255.240.0.0

16 B

1,048,544

/13

255.248.0.0

8 B

524,272

/14

255.252.0.0

4 B

262,136

/15

255.254.0.0

2 B

131,068

/16

255.255.0.0

1 B

65,024

/17

255.255.128.0

128 C

32,512

/18

255.255.192.0

64 C

16,256

/19

255.255.224.0

32 C

8,128

/20

255.255.240.0

16 C

4,064

/21

255.255.248.0

8 C

2,032

/22

255.255.252.0

4 C

1,016

/23

255.255.254.0

2 C

508

/24

255.255.255.0

1 C

254

/25

255.255.255.128

2 subnets

124

/26

255.255.255.192

4 subnets

62

/27

255.255.255.224

8 subnets

30

/28

255.255.255.240

16 subnets

14

/29

255.255.255.248

32 subnets

6

/30

255.255.255.252

64 subnets

2

/31

255.255.255.254

none

none

/32

255.255.255.255

none

1




Hacker's Mantra:A hacker is someone who uses a combination of high-tech cybertools and social engineering to gain illicit access to someone else's data. - John McAfee

Last updated