IP Subnet Calculator
Paste an IPv4/CIDR value or enter an IP with a subnet mask, or two IPv4 addresses, and the page will derive the CIDR and network range automatically.
| Input Value | |
|---|---|
| CIDR | |
| Subnet Mask | |
| Wildcard Mask | |
| Total Addresses | |
| Usable Hosts | |
| IP / Mask Binary |
- Paste a value like
192.168.10.34/27into the CIDR field and the tool will split the IP address and mask automatically. - If you only have the IP and subnet mask, enter them separately. The mask field accepts dotted decimal masks and plain prefix values.
- If you enter two IPv4 addresses, the tool derives the smallest CIDR block that includes both addresses.
- The page updates automatically as soon as the input is complete, and you can still use “Calculate” if you prefer a manual trigger.
- The result table also shows the binary form of the IP and mask, which is useful when checking bit boundaries.
- Use “Load Example” to test the calculator quickly with a sample /27 subnet.
When would I use this tool?
It is useful when you are configuring routers, firewalls, VPCs, VPNs, or server network interfaces and need to confirm the network, broadcast, and usable host range for a specific CIDR block.
Can I enter only a subnet mask without CIDR notation?
Yes. You can enter a dotted decimal mask such as 255.255.255.0 or a plain prefix length such as 24.
Why are /31 and /32 handled differently?
A /31 subnet is commonly used for point-to-point links, so both addresses are considered usable. A /32 represents a single-host route with no additional host range.
Does this tool support IPv6?
Not in the first version. The current scope is intentionally limited to IPv4 so the validation rules and results remain clear and consistent.
What is a wildcard mask used for?
A wildcard mask is the inverse of the subnet mask. It is commonly used in ACLs, Cisco configuration, and network device rule definitions.
Why You Need an Online Unit Converter: Engineers Use One Every Day
Unit conversion is not a school-only topic. From API specs and hardware docs to global collaboration, engineers deal with mismatched units constantly. This article explains why an online unit converter is a practical daily tool.
JSON Complete Guide: From Data Structures to Practical API Design
JSON is the common language of modern web services. This guide covers syntax, data modeling, validation, security, and performance patterns for production-ready JSON workflows.
How Do Computers Generate Random Numbers? Pseudo-Random, True Random, and Cryptographically Secure Random Explained
Computers are deterministic machines — they fundamentally cannot be "truly random." This article fully explains how pseudo-random number generators (PRNGs) like LCG and Mersenne Twister work, how true randomness is harvested from entropy sources, why cryptographically secure random numbers (CSPRNG) matter, and why Math.random() must never be used for password generation.
Complete WHOIS Guide: Domain Info Lookup, Expiry Monitoring & IP Tracing
WHOIS is the core protocol for querying domain and IP address registration data. This guide covers what WHOIS reveals, how to read the data format, the impact of GDPR privacy redaction, and practical uses in domain monitoring, security investigations, and IP attribution.
World Clock Complete Guide: Time Zones, UTC, Daylight Saving Time, and Cross-Timezone Communication
Time zones are the invisible barrier in global collaboration. This guide explains UTC vs. GMT, how Daylight Saving Time works, the IANA time zone database, and practical tips for scheduling meetings and avoiding deadline mix-ups across time zones.
What Is a Unix Timestamp? A Complete Guide to Epoch Time
A Unix timestamp is the number of seconds elapsed since January 1, 1970, 00:00:00 UTC. Learn why it exists, how it works, how to convert it, and what the Y2038 problem means for your systems.