ipdetecto.com logo
ipdetecto.com
My IPSpeed
Knowledge Hub
HomeKnowledge HubReserved Ip
© 2026 ipdetecto.com
support@ipdetecto.comAboutContactPrivacyTermsllms.txt
Basics
5 MIN READ
Apr 13, 2026

What Is a Reserved IP Address? Special Blocks You Can't Use

Reserved IP addresses are blocks set aside by IANA for specific purposes like private networking, loopback testing, and link-local fallback. Understanding which ranges are reserved and why prevents common misconfigurations.

Why Some IP Addresses Cannot Be Routed Publicly

The global routing system for the public internet operates on one fundamental rule: every IP address on the routing table must be globally unique, and every packet sent to that address must reach exactly one destination. This works because the organizations that manage IP address allocation — IANA (Internet Assigned Numbers Authority) at the global level, and Regional Internet Registries like ARIN, RIPE, and APNIC at the regional level — maintain strict control over which addresses are assigned to which organizations.

But not all IP addresses go through that assignment process. IANA has set aside a substantial portion of the IPv4 address space for specific technical purposes that require addresses to exist on networks without being routable on the public internet. These are reserved IP addresses, and they represent some of the most important infrastructure decisions in networking history. Misunderstanding which ranges are reserved — and why — is a consistent source of configuration errors that range from harmless (a misconfigured test environment) to serious (a production service accidentally configured with a private range).

The Major Reserved IP Ranges in IPv4

The following blocks are defined by IANA and various RFCs as reserved for specific purposes. None of them should appear as destination addresses in BGP routing tables on the public internet.

RangeCIDR BlockPurposeRFC
Private Network — Class A10.0.0.0/8Private intranets; 16.7 million addressesRFC 1918
Private Network — Class B172.16.0.0/12Private intranets; covers 172.16.x.x through 172.31.x.xRFC 1918
Private Network — Class C192.168.0.0/16Private intranets; home and small office networksRFC 1918
Loopback127.0.0.0/8Localhost; traffic stays on the local deviceRFC 5735
Link-Local (APIPA)169.254.0.0/16Automatic IP assignment when DHCP is unavailableRFC 3927
Shared Address Space (CGNAT)100.64.0.0/10Carrier-Grade NAT between ISP and customersRFC 6598
Documentation and Examples192.0.2.0/24, 198.51.100.0/24, 203.0.113.0/24Reserved for use in documentation and examples onlyRFC 5737
Future Use / Class E240.0.0.0/4Reserved; not allocated for general useRFC 1112
Multicast224.0.0.0/4IP multicast group addressingRFC 5771
TEST-NET (IETF Protocol Assignments)192.0.0.0/24IETF protocol assignments and testingRFC 6890

The RFC 1918 Private Ranges: The Foundation of Every Internal Network

The three private address ranges defined in RFC 1918 — 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 — are the backbone of every internal network ever built. The critical design principle is that these addresses are free to use by any organization on their internal networks, with one absolute constraint: traffic to and from these addresses must never be forwarded onto the public internet. Public routers are configured to drop packets with RFC 1918 source or destination addresses.

This is why Network Address Translation (NAT) exists. Your home router gives every device on your network an address in the 192.168.x.x range. When those devices communicate with the internet, the router replaces the private source address with its own public IP address before forwarding the packet. Return traffic comes back to the router's public IP, and the router uses its NAT table to forward each packet to the correct private address. This lets an entire household — or an enterprise with thousands of devices — share a single public IP address.

Loopback: When a Device Talks to Itself

The entire 127.0.0.0/8 range is reserved for loopback, though in practice almost all software uses only 127.0.0.1. Traffic sent to any address in this range is processed entirely within the local networking stack — it never leaves the machine, never touches a network interface card, and is never visible to any external device.

Loopback addresses are essential for software development and service configuration. When you start a web server on a development machine and access it at http://127.0.0.1:8080, the request travels through the OS networking stack but never goes out to the network. Database servers like PostgreSQL and MySQL default to binding on 127.0.0.1 for exactly this reason — it ensures that the database is not accidentally exposed to external connections. Many distributed system components use loopback for health check endpoints and internal inter-process communication.

APIPA / Link-Local: The Fallback Address

When a device is configured to use DHCP but cannot reach a DHCP server, modern operating systems use a protocol called APIPA (Automatic Private IP Addressing) to self-assign an address in the 169.254.0.0/16 range. On Linux and macOS this is implemented as the Zeroconf / link-local mechanism defined in RFC 3927. On Windows it is marketed as APIPA.

The self-assigned address allows the device to communicate with other devices on the same physical network segment that have also fallen back to link-local addressing — useful for local file sharing or printer access when a router is down. However, link-local addresses have no route to any other network and no gateway. They are strictly local to a single network segment. If you see a 169.254.x.x address on a device that should have a normal IP, it is a strong indicator that the device cannot reach the DHCP server — the router may be down, the DHCP lease pool may be exhausted, or there may be a cable or port issue.

Shared Address Space (100.64.0.0/10): The CGNAT Range

The 100.64.0.0/10 block, defined in RFC 6598, was added in 2012 to solve a specific problem faced by ISPs deploying Carrier-Grade NAT (CGNAT). ISPs need IP addresses for the internal network between their NAT devices and their customers' routers. They cannot use RFC 1918 space because many customers already use those ranges for their home networks, which would create overlapping address conflicts. They cannot use public IPs for this internal purpose because it would waste scarce public address space. RFC 6598 created a new reserved range specifically for this ISP-internal use case.

If you see a 100.64.x.x address, you are behind a CGNAT deployment — your ISP is sharing a single public IP among many customers, each with their own 100.64.x.x internal address assigned by the ISP's NAT infrastructure. This has implications for geolocation accuracy and for services that use IP addresses for per-user rate limiting.

Common Misconceptions

Misconception 1: Reserved IPs Are Wasted Address Space

The private RFC 1918 ranges are among the most heavily used addresses in existence — they are used simultaneously by billions of devices worldwide. Because they are never routed on the public internet, the same 192.168.1.1 address exists in millions of home networks simultaneously without conflict. The entire architecture of home networking, enterprise intranets, and cloud virtual private networks depends on this design. The loopback range similarly carries enormous traffic volume on every networked machine.

Misconception 2: Using 192.168.x.x on a Cloud Server Is Safe

On a bare-metal server or your home network, using 192.168.x.x for internal interfaces is standard. In cloud environments, the story is more complex. Cloud providers like AWS and Google Cloud use their own internal address spaces (often in the 10.x.x.x range) for VPC networking. If you manually assign a 192.168.x.x address to an interface inside a cloud VPC, it may conflict with the provider's internal routing or with VPN tunnels connecting on-premises networks where the same range is used. Always check the address plan of your cloud VPC before assigning private addresses manually.

Misconception 3: 127.0.0.1 Is the Only Loopback Address

The entire 127.0.0.0/8 block is reserved for loopback — that is 16,777,216 addresses, all of which route to the local device. While 127.0.0.1 is the universal convention and what nearly all software uses, any address in that range has identical behavior. Some testing frameworks assign multiple distinct loopback addresses to simulate multiple hosts on a single machine.

Misconception 4: Seeing 169.254.x.x Always Means a Serious Problem

A link-local address is always a symptom of a missing DHCP lease, but the severity depends on context. On a device that is supposed to reach the internet, a 169.254.x.x address is a connectivity-blocking problem. On an isolated test network intentionally running without a DHCP server, link-local addressing is functional and expected. Some IoT devices and industrial systems also use link-local addressing by design for local discovery protocols.

Pro Tips for Network Engineers and Administrators

  • Plan your internal address space before deploying: Choose one of the three RFC 1918 ranges and define a subnetting scheme for your organization before you deploy any services. Re-numbering an internal network after services are deployed is painful. The 10.0.0.0/8 range offers the most room; use it for large deployments or future growth.
  • Avoid using 192.168.1.0/24 for enterprise networks: This is the default range for most consumer routers and is heavily used in home networks. If your organization deploys a VPN that allows remote workers to connect from home, there is a high probability of IP conflicts if your corporate network also uses 192.168.1.0/24. Use 10.x.x.x or 172.16.x.x ranges for corporate infrastructure.
  • Use documentation ranges in examples and training materials: RFC 5737 reserved 192.0.2.0/24, 198.51.100.0/24, and 203.0.113.0/24 specifically for use in documentation and examples. Using these ranges in runbooks, training materials, and network diagrams prevents any risk of accidentally routing example traffic to real destinations.
  • Treat 169.254.x.x as a monitoring alert trigger: Configure your monitoring system to alert when DHCP-enabled devices report link-local addresses. A device that acquires a 169.254.x.x address is telling you it cannot reach DHCP — catching this early prevents silent connectivity failures.
  • Understand CGNAT implications before building customer-IP-based systems: If your application uses client IP addresses for rate limiting, fraud detection, or geolocation, CGNAT means multiple users may share a single public IP. Systems designed around the assumption of one IP per user will misfire in CGNAT environments. Factor this into your architecture for consumer-facing services.
  • Check for accidental public routing of private ranges: Use tools like BGP routing table viewers or your cloud provider's route analysis tools to verify that no private range addresses are being inadvertently advertised into public routing. This is a configuration error that can expose internal services or create routing loops.

Reserved IP address ranges are not arbitrary restrictions — each one exists because a specific technical need required addresses that could be used universally without coordination with the global addressing system. Understanding which ranges are reserved and what they are for is fundamental to designing, troubleshooting, and securing any network. Check what type of IP address you are currently using here.

Frequently Asked Questions

Q.What is a reserved IP address?

A reserved IP address is an IP address belonging to a block that IANA (Internet Assigned Numbers Authority) has set aside for a specific technical purpose rather than for general public internet use. Reserved ranges include private network addresses (RFC 1918), loopback addresses, link-local addresses, and others. Packets destined for reserved IP addresses are not forwarded by public internet routers.

Q.What are the RFC 1918 private IP address ranges?

RFC 1918 defines three private address ranges: 10.0.0.0/8 (approximately 16.7 million addresses), 172.16.0.0/12 (covering 172.16.x.x through 172.31.x.x), and 192.168.0.0/16 (65,536 addresses commonly used in home networks). These ranges can be used freely on internal networks by any organization but must never be routed on the public internet.

Q.What is the loopback address and what is it used for?

The loopback address is 127.0.0.1 (with the entire 127.0.0.0/8 block reserved for this purpose). Traffic sent to loopback addresses never leaves the local device — it is processed entirely within the operating system's networking stack. Loopback is used by developers to test web servers and applications locally, and by services like database servers that default to binding only to localhost to prevent external exposure.

Q.What does a 169.254.x.x address mean on my device?

A 169.254.x.x address is an APIPA (Automatic Private IP Addressing) or link-local address, assigned automatically by the operating system when a device configured for DHCP cannot reach a DHCP server. It means the device has lost contact with your router or the DHCP lease pool is exhausted. Devices with link-local addresses can only communicate with other devices on the same physical network segment — they have no internet access and no gateway route.

Q.Can I use a reserved IP address on the public internet?

No. Public internet routers are configured to drop packets with reserved IP addresses as source or destination addresses. If you send traffic to a private RFC 1918 address from the internet, the packet will be dropped before it reaches any destination. Private addresses are only meaningful within the local network where devices have direct network-layer connectivity to each other.

Q.What is the 100.64.0.0/10 range used for?

The 100.64.0.0/10 block is the Shared Address Space defined in RFC 6598, reserved for Carrier-Grade NAT (CGNAT) deployments by ISPs. ISPs use this range for the internal network between their NAT devices and their customers' routers. If you see a 100.64.x.x address on your network interface, your ISP is using CGNAT and you share a single public IP with other customers.

Q.Why do home routers default to 192.168.1.x addresses?

Consumer router manufacturers chose 192.168.1.0/24 as their default because it is a small, easy-to-remember range within the RFC 1918 192.168.0.0/16 block. There is no technical reason it has to be this specific subnet — it is purely a convention. This is why enterprise networks typically use the 10.x.x.x range instead, to avoid conflicts with the home networks that remote workers use when connecting via VPN.

Q.What IP ranges should I use for examples in documentation?

Use the documentation ranges defined in RFC 5737: 192.0.2.0/24 (TEST-NET-1), 198.51.100.0/24 (TEST-NET-2), and 203.0.113.0/24 (TEST-NET-3). These ranges are reserved specifically for use in examples, documentation, and training materials. Using them ensures that any example code or configuration snippets can never accidentally route traffic to real IP addresses.

Q.What is multicast addressing and which range does it use?

Multicast addressing allows a single packet to be delivered simultaneously to a group of subscribed receivers rather than to a single host. The 224.0.0.0/4 range (224.x.x.x through 239.x.x.x) is reserved for multicast group addresses as defined in RFC 5771. Protocols like OSPF, RIP, and mDNS use specific multicast addresses within this range for routing protocol messages and local service discovery.

Q.What happens if an RFC 1918 address accidentally leaks onto the public internet?

Well-configured routers will drop packets with RFC 1918 source or destination addresses at their internet-facing interfaces. However, misconfigured routers can sometimes advertise RFC 1918 routes into BGP, causing routing anomalies. These are known as bogon routes and are filtered by Internet Exchange Points and ISPs using bogon filter lists. From a security perspective, accidentally binding a service to a private IP and then exposing it via a misconfigured NAT rule is a more common and dangerous scenario.

Q.Why was the 240.0.0.0/4 range not used to extend IPv4?

The 240.0.0.0/4 range (Class E) was originally reserved for future use, and there have been proposals to make it usable as regular unicast addresses, which would add roughly 268 million addresses to the IPv4 pool. However, many existing routers and operating systems treat this range as invalid and drop packets destined for it, meaning any allocation would require widespread firmware updates across decades of deployed hardware. The community instead focused on IPv6 adoption as the long-term solution.

Q.How does NAT allow RFC 1918 addresses to access the internet?

Network Address Translation (NAT) on a router replaces the private source IP address of each outbound packet with the router's public IP address, then records the mapping in a NAT table. When the response arrives at the router's public IP, the router uses the NAT table to translate the destination address back to the correct private address and forwards the packet to the correct internal device. This allows many devices with private IP addresses to share a single public IP address.

Q.Does IPv6 also have reserved address ranges?

Yes. IPv6 has several reserved ranges including fc00::/7 for Unique Local Addresses (the IPv6 equivalent of RFC 1918 private ranges), fe80::/10 for link-local addresses, and ::1/128 for loopback. IPv6 also reserves the 2001:db8::/32 range specifically for documentation and examples, analogous to the RFC 5737 ranges in IPv4. The much larger IPv6 address space means scarcity is less of a concern, but the same categories of reserved use cases exist.
TOPICS & TAGS
reserved ipprivate ip rangeapipaloopbackianaRFC 1918link-local address127.0.0.1 loopback169.254 APIPA10.0.0.0 private range192.168.0.0 private range172.16.0.0 private rangewhat is a reserved ip address special blocks guideunderstanding the red tape of global ip assignment 2026private network ranges 192.168.x.x and 10.x.x.xloopback address 127.0.0.1 for local device testingapipa 169.254.x.x last resort fallback explainediana reserved blocks for future proofing the webwhy reserved ips cannot be used on public routersforbidden ip addresses essential for stabilitynetwork service areas and traffic lane logicidentifying your internal local neighbors via subnetsimpact of reserved blocks on ipv4 conservationtechnical specs of Class E and future use rangeshow your computer talks to itself using loopbackit basics for internal addressing and subnettingpreventing local traffic from flooding the global net100.64.0.0 CGNAT shared address space240.0.0.0 future use range IPv4