{"id":814,"date":"2026-01-12T14:12:12","date_gmt":"2026-01-12T14:12:12","guid":{"rendered":"https:\/\/uptimerobot.com\/knowledge-hub\/?p=814"},"modified":"2026-01-12T14:40:31","modified_gmt":"2026-01-12T14:40:31","slug":"subnet-cheat-sheet","status":"publish","type":"post","link":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/","title":{"rendered":"Subnet Cheat Sheet"},"content":{"rendered":"\n<p>We\u2019ve put together a <strong>quick-reference subnet cheat sheet<\/strong> for IPv4 and IPv6 designed for fast lookups.&nbsp;<\/p>\n\n\n\n<p>If you already work with CIDR notation and just need to quickly check a subnet mask, usable hosts, wildcard mask, or block size, this page is meant to give you the information cleanly and directly.<\/p>\n\n\n\n<p>There\u2019s no subnetting theory in the main sections. Just clean tables you can scan, copy, and use when you\u2019re in the middle of a task.<\/p>\n\n\n\n<p>If you want a bit of context or a refresher, optional explanations are included after the tables.<\/p>\n\n\n\n    <div class=\"wp-block-knowledge-hub-theme-intext-sidebar ur-intext-sidebar\">\n        <div class=\"widget-img\">\n            <img decoding=\"async\" src=\"https:\/\/uptimerobot.com\/knowledge-hub\/wp-content\/themes\/generatepress-child\/assets\/images\/img-intext-sidebar.png\" alt=\"UptimeRobot\">\n        <\/div>\n        <div class=\"widget-left\">\n            <div class=\"widget-title\">\n                <span>Downtime happens.<\/span>\n                <span class=\"text-primary\">Get notified!<\/span>\n            <\/div>\n            <div class=\"widget-text\">Join the world&#039;s leading uptime monitoring service with 3.2M+ happy users.<\/div>\n        <\/div>\n        <div class=\"widget-button\">\n            <a href=\"https:\/\/dashboard.uptimerobot.com\/sign-up?utm_source=uptimerobot&#038;utm_medium=kh&#038;utm_campaign=intext-sidebar\" class=\"button\">\n                <span>Register for FREE<\/span>\n            <\/a>\n        <\/div>\n    <\/div>\n    \n\n\n\n<h4 class=\"wp-block-heading\">Key takeaways<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use the IPv4 tables to quickly find CIDR prefixes, subnet masks, wildcard masks, usable hosts, and block sizes.<\/li>\n\n\n\n<li>A \/24 subnet is common, but \/26 and \/30 show up frequently in real-world networks.<\/li>\n\n\n\n<li>Usable hosts are usually total IPs minus two, with \/31 and \/32 as exceptions.<\/li>\n\n\n\n<li>IPv6 subnetting focuses on standard prefixes, not host exhaustion or broadcast addresses.<\/li>\n\n\n\n<li>Wildcard masks are mainly used in ACLs, firewall rules, and legacy configurations.<\/li>\n\n\n\n<li>Cheat sheets work best for fast reference; calculators are better for validation and complex planning.<\/li>\n<\/ul>\n\n\n\n<p><strong>Tip: <\/strong>If you\u2019re working across mixed environments, it helps to <strong>understand when IPv4 and IPv6 behave differently<\/strong>, especially around addressing, subnetting conventions, and compatibility.<\/p>\n\n\n\n<p>For a quick, practical breakdown, see <a href=\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/ipv4-ipv6\/?utm_source=uptimerobot.com&amp;utm_medium=blog&amp;utm_campaign=subnet+cheat+sheet&amp;utm_content=tip\" target=\"_blank\" rel=\"noreferrer noopener\">IPv4 vs IPv6: What\u2019s the difference and when does it matter?<\/a> and <a href=\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">Subnet Explained<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IPv4 subnet cheat sheet table<\/h2>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>CIDR prefix<\/strong><\/td><td><strong>Subnet mask<\/strong><\/td><td><strong>Wildcard mask<\/strong><\/td><td><strong>Total IP addresses<\/strong><\/td><td><strong>Usable hosts<\/strong><\/td><td><strong>Block size<\/strong><\/td><\/tr><tr><td>\/32<\/td><td>255.255.255.255<\/td><td>0.0.0.0<\/td><td>1<\/td><td>1<\/td><td>1<\/td><\/tr><tr><td>\/31<\/td><td>255.255.255.254<\/td><td>0.0.0.1<\/td><td>2<\/td><td>2<\/td><td>2<\/td><\/tr><tr><td>\/30<\/td><td>255.255.255.252<\/td><td>0.0.0.3<\/td><td>4<\/td><td>2<\/td><td>4<\/td><\/tr><tr><td>\/29<\/td><td>255.255.255.248<\/td><td>0.0.0.7<\/td><td>8<\/td><td>6<\/td><td>8<\/td><\/tr><tr><td>\/28<\/td><td>255.255.255.240<\/td><td>0.0.0.15<\/td><td>16<\/td><td>14<\/td><td>16<\/td><\/tr><tr><td>\/27<\/td><td>255.255.255.224<\/td><td>0.0.0.31<\/td><td>32<\/td><td>30<\/td><td>32<\/td><\/tr><tr><td>\/26<\/td><td>255.255.255.192<\/td><td>0.0.0.63<\/td><td>64<\/td><td>62<\/td><td>64<\/td><\/tr><tr><td>\/25<\/td><td>255.255.255.128<\/td><td>0.0.0.127<\/td><td>128<\/td><td>126<\/td><td>128<\/td><\/tr><tr><td>\/24<\/td><td>255.255.255.0<\/td><td>0.0.0.255<\/td><td>256<\/td><td>254<\/td><td>256<\/td><\/tr><tr><td>\/23<\/td><td>255.255.254.0<\/td><td>0.0.1.255<\/td><td>512<\/td><td>510<\/td><td>512<\/td><\/tr><tr><td>\/22<\/td><td>255.255.252.0<\/td><td>0.0.3.255<\/td><td>1,024<\/td><td>1,022<\/td><td>1,024<\/td><\/tr><tr><td>\/21<\/td><td>255.255.248.0<\/td><td>0.0.7.255<\/td><td>2,048<\/td><td>2,046<\/td><td>2,048<\/td><\/tr><tr><td>\/20<\/td><td>255.255.240.0<\/td><td>0.0.15.255<\/td><td>4,096<\/td><td>4,094<\/td><td>4,096<\/td><\/tr><tr><td>\/19<\/td><td>255.255.224.0<\/td><td>0.0.31.255<\/td><td>8,192<\/td><td>8,190<\/td><td>8,192<\/td><\/tr><tr><td>\/18<\/td><td>255.255.192.0<\/td><td>0.0.63.255<\/td><td>16,384<\/td><td>16,382<\/td><td>16,384<\/td><\/tr><tr><td>\/17<\/td><td>255.255.128.0<\/td><td>0.0.127.255<\/td><td>32,768<\/td><td>32,766<\/td><td>32,768<\/td><\/tr><tr><td>\/16<\/td><td>255.255.0.0<\/td><td>0.0.255.255<\/td><td>65,536<\/td><td>65,534<\/td><td>65,536<\/td><\/tr><tr><td>\/15<\/td><td>255.254.0.0<\/td><td>0.1.255.255<\/td><td>131,072<\/td><td>131,070<\/td><td>131,072<\/td><\/tr><tr><td>\/14<\/td><td>255.252.0.0<\/td><td>0.3.255.255<\/td><td>262,144<\/td><td>262,142<\/td><td>262,144<\/td><\/tr><tr><td>\/13<\/td><td>255.248.0.0<\/td><td>0.7.255.255<\/td><td>524,288<\/td><td>524,286<\/td><td>524,288<\/td><\/tr><tr><td>\/12<\/td><td>255.240.0.0<\/td><td>0.15.255.255<\/td><td>1,048,576<\/td><td>1,048,574<\/td><td>1,048,576<\/td><\/tr><tr><td>\/11<\/td><td>255.224.0.0<\/td><td>0.31.255.255<\/td><td>2,097,152<\/td><td>2,097,150<\/td><td>2,097,152<\/td><\/tr><tr><td>\/10<\/td><td>255.192.0.0<\/td><td>0.63.255.255<\/td><td>4,194,304<\/td><td>4,194,302<\/td><td>4,194,304<\/td><\/tr><tr><td>\/9<\/td><td>255.128.0.0<\/td><td>0.127.255.255<\/td><td>8,388,608<\/td><td>8,388,606<\/td><td>8,388,608<\/td><\/tr><tr><td>\/8<\/td><td>255.0.0.0<\/td><td>0.255.255.255<\/td><td>16,777,216<\/td><td>16,777,214<\/td><td>16,777,216<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">How to read this table<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Each row represents one subnet size.<\/li>\n\n\n\n<li><strong>Total IP addresses<\/strong> includes network and broadcast addresses.<\/li>\n\n\n\n<li><strong>Usable hosts<\/strong> is the number of assignable IPs in most real networks.<\/li>\n\n\n\n<li><strong>Block size<\/strong> shows how much the subnet increments when calculating ranges.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Notes<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Most IPv4 subnets subtract two IPs for network and broadcast.<\/li>\n\n\n\n<li><strong>\/31 and \/32 are special cases<\/strong> and do not follow the usual usable-host rule.<\/li>\n\n\n\n<li>Commonly used subnets like <strong>\/24<\/strong>, <strong>\/26<\/strong>, and <strong>\/30<\/strong> are highlighted visually in practice to make scanning easier.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">IPv4 subnet mask to CIDR conversion table<\/h2>\n\n\n\n<p>This table is for <strong>reverse lookups<\/strong> when you\u2019re given a subnet mask and need the CIDR prefix fast.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Subnet mask<\/strong><\/td><td><strong>CIDR prefix<\/strong><\/td><td><strong>Wildcard mask<\/strong><\/td><\/tr><tr><td>255.255.255.255<\/td><td>\/32<\/td><td>0.0.0.0<\/td><\/tr><tr><td>255.255.255.254<\/td><td>\/31<\/td><td>0.0.0.1<\/td><\/tr><tr><td>255.255.255.252<\/td><td>\/30<\/td><td>0.0.0.3<\/td><\/tr><tr><td>255.255.255.248<\/td><td>\/29<\/td><td>0.0.0.7<\/td><\/tr><tr><td>255.255.255.240<\/td><td>\/28<\/td><td>0.0.0.15<\/td><\/tr><tr><td>255.255.255.224<\/td><td>\/27<\/td><td>0.0.0.31<\/td><\/tr><tr><td>255.255.255.192<\/td><td>\/26<\/td><td>0.0.0.63<\/td><\/tr><tr><td>255.255.255.128<\/td><td>\/25<\/td><td>0.0.0.127<\/td><\/tr><tr><td>255.255.255.0<\/td><td>\/24<\/td><td>0.0.0.255<\/td><\/tr><tr><td>255.255.254.0<\/td><td>\/23<\/td><td>0.0.1.255<\/td><\/tr><tr><td>255.255.252.0<\/td><td>\/22<\/td><td>0.0.3.255<\/td><\/tr><tr><td>255.255.248.0<\/td><td>\/21<\/td><td>0.0.7.255<\/td><\/tr><tr><td>255.255.240.0<\/td><td>\/20<\/td><td>0.0.15.255<\/td><\/tr><tr><td>255.255.224.0<\/td><td>\/19<\/td><td>0.0.31.255<\/td><\/tr><tr><td>255.255.192.0<\/td><td>\/18<\/td><td>0.0.63.255<\/td><\/tr><tr><td>255.255.128.0<\/td><td>\/17<\/td><td>0.0.127.255<\/td><\/tr><tr><td>255.255.0.0<\/td><td>\/16<\/td><td>0.0.255.255<\/td><\/tr><tr><td>255.254.0.0<\/td><td>\/15<\/td><td>0.1.255.255<\/td><\/tr><tr><td>255.252.0.0<\/td><td>\/14<\/td><td>0.3.255.255<\/td><\/tr><tr><td>255.248.0.0<\/td><td>\/13<\/td><td>0.7.255.255<\/td><\/tr><tr><td>255.240.0.0<\/td><td>\/12<\/td><td>0.15.255.255<\/td><\/tr><tr><td>255.224.0.0<\/td><td>\/11<\/td><td>0.31.255.255<\/td><\/tr><tr><td>255.192.0.0<\/td><td>\/10<\/td><td>0.63.255.255<\/td><\/tr><tr><td>255.128.0.0<\/td><td>\/9<\/td><td>0.127.255.255<\/td><\/tr><tr><td>255.0.0.0<\/td><td>\/8<\/td><td>0.255.255.255<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">When to use this table<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>When reviewing <strong>legacy configurations<\/strong> that list subnet masks instead of CIDR.<\/li>\n\n\n\n<li>When working with <strong>ACLs or firewall rules<\/strong> that rely on wildcard masks.<\/li>\n\n\n\n<li>When documenting or auditing networks that mix notation styles.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">IPv6 subnet cheat sheet table<\/h2>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>IPv6 prefix<\/strong><\/td><td><strong>Total addresses<\/strong><\/td><td><strong>Typical use case<\/strong><\/td><\/tr><tr><td>\/128<\/td><td>1<\/td><td>Single interface or loopback<\/td><\/tr><tr><td>\/64<\/td><td>18 quintillion<\/td><td>Standard LAN or subnet<\/td><\/tr><tr><td>\/56<\/td><td>2\u2077\u00b2 addresses<\/td><td>ISP customer allocation<\/td><\/tr><tr><td>\/48<\/td><td>2\u2078\u2070 addresses<\/td><td>Site or organization allocation<\/td><\/tr><tr><td>\/32<\/td><td>2\u2079\u2076 addresses<\/td><td>Large provider allocation<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">How to use this table<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IPv6 does not use broadcast addresses.<\/li>\n\n\n\n<li>Host exhaustion is not a practical concern in IPv6 subnetting.<\/li>\n\n\n\n<li>Most IPv6 networks use \/64 for individual subnets, regardless of size.<\/li>\n\n\n\n<li>Planning is based on standard prefixes and conventions, not address counts.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Wildcard mask cheat Sheet<\/h2>\n\n\n\n<p>Wildcard masks are most commonly used in <strong>ACLs, firewall rules, and routing filters<\/strong>. This table shows the relationship between CIDR, subnet masks, and their wildcard equivalents.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>CIDR prefix<\/strong><\/td><td><strong>Subnet mask<\/strong><\/td><td><strong>Wildcard mask<\/strong><\/td><td><strong>Common usage<\/strong><\/td><\/tr><tr><td>\/32<\/td><td>255.255.255.255<\/td><td>0.0.0.0<\/td><td>Single host match<\/td><\/tr><tr><td>\/31<\/td><td>255.255.255.254<\/td><td>0.0.0.1<\/td><td>Point-to-point links<\/td><\/tr><tr><td>\/30<\/td><td>255.255.255.252<\/td><td>0.0.0.3<\/td><td>Small routed networks<\/td><\/tr><tr><td>\/29<\/td><td>255.255.255.248<\/td><td>0.0.0.7<\/td><td>Device groups<\/td><\/tr><tr><td>\/28<\/td><td>255.255.255.240<\/td><td>0.0.0.15<\/td><td>Small subnets<\/td><\/tr><tr><td>\/27<\/td><td>255.255.255.224<\/td><td>0.0.0.31<\/td><td>Department networks<\/td><\/tr><tr><td>\/26<\/td><td>255.255.255.192<\/td><td>0.0.0.63<\/td><td>Medium subnets<\/td><\/tr><tr><td>\/25<\/td><td>255.255.255.128<\/td><td>0.0.0.127<\/td><td>Large subnets<\/td><\/tr><tr><td>\/24<\/td><td>255.255.255.0<\/td><td>0.0.0.255<\/td><td>Common LAN networks<\/td><\/tr><tr><td>\/16<\/td><td>255.255.0.0<\/td><td>0.0.255.255<\/td><td>Broad network ranges<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">How to use this table<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Wildcard masks are the inverse of subnet masks.<\/li>\n\n\n\n<li>They define which bits must match and which bits can vary.<\/li>\n\n\n\n<li>This is useful when writing or reviewing ACLs and firewall rules.<\/li>\n\n\n\n<li>Vendor-specific syntax varies, but the wildcard logic stays the same.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Binary subnet mask reference table<\/h2>\n\n\n\n<p>This table shows <strong>where the network boundary sits<\/strong> by breaking subnet masks into binary. It\u2019s mainly useful for manual subnetting and exams.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>CIDR prefix<\/strong><\/td><td><strong>Subnet mask (decimal)<\/strong><\/td><td><strong>Subnet mask (binary)<\/strong><\/td><\/tr><tr><td>\/32<\/td><td>255.255.255.255<\/td><td>11111111.11111111.11111111.11111111<\/td><\/tr><tr><td>\/30<\/td><td>255.255.255.252<\/td><td>11111111.11111111.11111111.11111100<\/td><\/tr><tr><td>\/29<\/td><td>255.255.255.248<\/td><td>11111111.11111111.11111111.11111000<\/td><\/tr><tr><td>\/28<\/td><td>255.255.255.240<\/td><td>11111111.11111111.11111111.11110000<\/td><\/tr><tr><td>\/27<\/td><td>255.255.255.224<\/td><td>11111111.11111111.11111111.11100000<\/td><\/tr><tr><td>\/26<\/td><td>255.255.255.192<\/td><td>11111111.11111111.11111111.11000000<\/td><\/tr><tr><td>\/25<\/td><td>255.255.255.128<\/td><td>11111111.11111111.11111111.10000000<\/td><\/tr><tr><td>\/24<\/td><td>255.255.255.0<\/td><td>11111111.11111111.11111111.00000000<\/td><\/tr><tr><td>\/23<\/td><td>255.255.254.0<\/td><td>11111111.11111111.11111110.00000000<\/td><\/tr><tr><td>\/22<\/td><td>255.255.252.0<\/td><td>11111111.11111111.11111100.00000000<\/td><\/tr><tr><td>\/21<\/td><td>255.255.248.0<\/td><td>11111111.11111111.11111000.00000000<\/td><\/tr><tr><td>\/20<\/td><td>255.255.240.0<\/td><td>11111111.11111111.11110000.00000000<\/td><\/tr><tr><td>\/16<\/td><td>255.255.0.0<\/td><td>11111111.11111111.00000000.00000000<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>How to use this table<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The 1 bits represent the network portion.<\/li>\n\n\n\n<li>The 0 bits represent the host portion.<\/li>\n\n\n\n<li>The transition point shows where subnets split.<\/li>\n\n\n\n<li>This is especially useful for <strong>manual calculations<\/strong> and <strong>certification exams<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p>The tables above cover everything you need for <strong>day-to-day subnetting reference<\/strong>.<\/p>\n\n\n\n<p>If you\u2019re just here to look something up, you can stop there. The sections below are optional and focus on using the cheat sheet correctly and avoiding common mistakes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to use a subnet cheat sheet correctly<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Start with the number of hosts you actually need.<\/li>\n\n\n\n<li>Pick the smallest subnet that comfortably fits that number, not the closest round number. This avoids wasting address space and makes future changes easier.<\/li>\n\n\n\n<li>Use the <strong>block size<\/strong> to find subnet boundaries.<\/li>\n\n\n\n<li>The block size tells you how much the network increments. For example, a \/26 subnet increments by 64, so valid networks start at .0, .64, .128, and .192.<\/li>\n\n\n\n<li>Identify the network and broadcast addresses early.<\/li>\n\n\n\n<li>The first IP in a subnet is the network address. The last IP is the broadcast address. Everything in between is usable in most cases.<\/li>\n\n\n\n<li>When in doubt, validate your result.<\/li>\n<\/ol>\n\n\n\n<p>Cheat sheets are great for speed, but if you\u2019re configuring production systems, double-check with a subnet calculator or test environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding usable hosts vs total IP addresses<\/h2>\n\n\n\n<p>Most IPv4 subnets reserve two addresses.<\/p>\n\n\n\n<p>One address is used for the <strong>network<\/strong>, and one is used for <strong>broadcast<\/strong>. That\u2019s why a subnet with 256 total IPs, like a \/24, ends up with 254 usable hosts.<\/p>\n\n\n\n<p>This rule applies to most common subnets.<\/p>\n\n\n\n<p>It does <strong>not<\/strong> apply to \/31 and \/32.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\/31<\/strong> is typically used for point-to-point links, where both IPs are usable.<\/li>\n\n\n\n<li><strong>\/32<\/strong> represents a single host, often used for loopbacks or host routes.<\/li>\n<\/ul>\n\n\n\n<p>In real networks, this distinction matters.<\/p>\n\n\n\n<p>If you size a subnet based on total IPs instead of usable hosts, you can easily end up short on addresses. That usually shows up later, when devices fail to connect or monitoring targets can\u2019t be added.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IPv4 vs. IPv6 subnetting differences<\/h2>\n\n\n\n<p>IPv4 subnetting is constrained by address scarcity.<\/p>\n\n\n\n<p>You spend time calculating usable hosts, avoiding waste, and splitting networks carefully to make everything fit.<\/p>\n\n\n\n<p>IPv6 flips that model. The address space is vast, so subnetting is based on <strong>standard prefixes<\/strong>, not host counts. You don\u2019t size an IPv6 subnet based on how many devices you have.<\/p>\n\n\n\n<p>There is no broadcast address in IPv6. That simplifies network behavior and removes the need to reserve addresses the way IPv4 does.<\/p>\n\n\n\n<p>The <strong>\/64 prefix<\/strong> is standard for most IPv6 subnets.<\/p>\n\n\n\n<p>Even if a network only needs a handful of addresses, \/64 is still used. This keeps addressing consistent and compatible with IPv6 features like SLAAC.<\/p>\n\n\n\n<p>IPv6 planning is simpler, but more rigid.<\/p>\n\n\n\n<p>You gain flexibility from the large address space, but you\u2019re expected to follow conventions more closely than in IPv4.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common subnetting mistakes to avoid<\/h2>\n\n\n\n<p>These are issues that show up again and again in real networks, especially when subnetting is done quickly or under pressure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Miscounting usable hosts<\/h3>\n\n\n\n<p>This is the most common problem. Planning around total IP addresses instead of usable hosts often leads to subnets that look correct but run out of space once devices are added.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Using the wrong wildcard mask<\/h3>\n\n\n\n<p>Wildcard masks are easy to get backwards, especially when switching between subnet masks and ACL rules. One incorrect bit can dramatically change what traffic is allowed or blocked.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Mixing CIDR and classful assumptions<\/h3>\n\n\n\n<p>CIDR is classless, but classful thinking still sneaks in. Assuming boundaries based on old class A, B, or C rules causes confusion when working with prefixes like \/21 or \/27.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Over-subnetting without VLSM planning<\/h3>\n\n\n\n<p>Equal-sized subnets are easy to design, but they often waste address space or make future expansion harder if VLSM isn\u2019t considered.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Skipping validation<\/h3>\n\n\n\n<p>Even experienced engineers make quick subnetting mistakes. A fast check with a calculator or test environment can prevent unnecessary troubleshooting later.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">When to use a subnet calculator instead<\/h2>\n\n\n\n<p>Subnet cheat sheets are best for <strong>speed<\/strong>.<\/p>\n\n\n\n<p>They\u2019re ideal when you already know what you\u2019re looking for and just need to confirm a prefix, mask, block size, or usable host count.<\/p>\n\n\n\n<p>Subnet calculators are better for <strong>validation and planning<\/strong>.<\/p>\n\n\n\n<p>Use a calculator when:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You need to confirm network and broadcast addresses.<\/li>\n\n\n\n<li>You\u2019re working with unfamiliar or irregular subnet sizes.<\/li>\n\n\n\n<li>You\u2019re planning multiple subnets and want to avoid overlap.<\/li>\n\n\n\n<li>You\u2019re documenting or automating configurations.<\/li>\n<\/ul>\n\n\n\n<p>In practice, both tools are useful. Cheat sheets help you move quickly, and calculators help you double-check your work before changes go live.<\/p>\n\n\n\n<p>If you need to validate your work quickly, <strong>Uptime Robot offers a <\/strong><a href=\"https:\/\/uptimerobot.com\/free-tools\/ip-subnet-calculator\/?utm_source=uptimerobot.com&amp;utm_medium=blog&amp;utm_campaign=subnet+cheat+sheet&amp;utm_content=when+to+use+calculator\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>free IPv4 subnet calculator<\/strong><\/a> and a <a href=\"https:\/\/uptimerobot.com\/free-tools\/ipv6-subnet-calculator\/\" target=\"_blank\" rel=\"noreferrer noopener\">free IPv6 subnet calculator<\/a> that lets you check CIDR ranges, usable hosts, and subnet details in seconds.<\/p>\n\n\n\n<div id=\"faq\" class=\"faq-block py-8 \">\n            <h2 id=\"faqs\" class=\"faq-block__title\">\n            FAQ&#039;s        <\/h2>\n    \n    <ul class=\"faq-accordion\" data-faq-accordion>\n                    <li class=\"faq-accordion__item\">\n                <button \n                    class=\"faq-accordion__title\"\n                    type=\"button\"\n                    aria-expanded=\"false\"\n                    data-faq-trigger>\n                    <h3 id=\"what-is-the-most-commonly-used-subnet\" class=\"faq-accordion__question\">\n                        What is the most commonly used subnet?                    <\/h3>\n                    <span class=\"faq-accordion__icon\" aria-hidden=\"true\">+<\/span>\n                <\/button>\n                <div class=\"faq-accordion__content-wrapper\">\n                    <div class=\"faq-accordion__content\">\n                        <div class=\"faq-accordion__content-inner\">\n                            <!-- wp:paragraph -->\n<p>The <strong>\/24 subnet<\/strong> is still the most common in IPv4 networks. It provides 254 usable hosts and is easy to recognize, document, and troubleshoot.<\/p>\n<!-- \/wp:paragraph -->                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/li>\n                    <li class=\"faq-accordion__item\">\n                <button \n                    class=\"faq-accordion__title\"\n                    type=\"button\"\n                    aria-expanded=\"false\"\n                    data-faq-trigger>\n                    <h3 id=\"why-does-a-24-subnet-have-254-usable-hosts\" class=\"faq-accordion__question\">\n                        Why does a \/24 subnet have 254 usable hosts?                    <\/h3>\n                    <span class=\"faq-accordion__icon\" aria-hidden=\"true\">+<\/span>\n                <\/button>\n                <div class=\"faq-accordion__content-wrapper\">\n                    <div class=\"faq-accordion__content\">\n                        <div class=\"faq-accordion__content-inner\">\n                            <!-- wp:paragraph -->\n<p>A \/24 subnet has 256 total IP addresses. Two are reserved: one for the network address and one for the broadcast address. That leaves <strong>254 usable hosts<\/strong>.<\/p>\n<!-- \/wp:paragraph -->                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/li>\n                    <li class=\"faq-accordion__item\">\n                <button \n                    class=\"faq-accordion__title\"\n                    type=\"button\"\n                    aria-expanded=\"false\"\n                    data-faq-trigger>\n                    <h3 id=\"do-ipv6-subnets-have-usable-host-limits\" class=\"faq-accordion__question\">\n                        Do IPv6 subnets have usable host limits?                    <\/h3>\n                    <span class=\"faq-accordion__icon\" aria-hidden=\"true\">+<\/span>\n                <\/button>\n                <div class=\"faq-accordion__content-wrapper\">\n                    <div class=\"faq-accordion__content\">\n                        <div class=\"faq-accordion__content-inner\">\n                            <!-- wp:paragraph -->\n<p>No practical limits. IPv6 subnets are not sized based on host counts, and address exhaustion is not a concern. Subnetting focuses on standard prefixes instead.<\/p>\n<!-- \/wp:paragraph -->                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/li>\n                    <li class=\"faq-accordion__item\">\n                <button \n                    class=\"faq-accordion__title\"\n                    type=\"button\"\n                    aria-expanded=\"false\"\n                    data-faq-trigger>\n                    <h3 id=\"what-is-a-wildcard-mask-used-for\" class=\"faq-accordion__question\">\n                        What is a wildcard mask used for?                    <\/h3>\n                    <span class=\"faq-accordion__icon\" aria-hidden=\"true\">+<\/span>\n                <\/button>\n                <div class=\"faq-accordion__content-wrapper\">\n                    <div class=\"faq-accordion__content\">\n                        <div class=\"faq-accordion__content-inner\">\n                            <!-- wp:paragraph -->\n<p>Wildcard masks are mainly used in <strong>ACLs, firewall rules, and routing filters<\/strong>. They specify which bits must match and which bits can vary when matching IP addresses.<\/p>\n<!-- \/wp:paragraph -->                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/li>\n                    <li class=\"faq-accordion__item\">\n                <button \n                    class=\"faq-accordion__title\"\n                    type=\"button\"\n                    aria-expanded=\"false\"\n                    data-faq-trigger>\n                    <h3 id=\"is-cidr-still-relevant-today\" class=\"faq-accordion__question\">\n                        Is CIDR still relevant today?                    <\/h3>\n                    <span class=\"faq-accordion__icon\" aria-hidden=\"true\">+<\/span>\n                <\/button>\n                <div class=\"faq-accordion__content-wrapper\">\n                    <div class=\"faq-accordion__content\">\n                        <div class=\"faq-accordion__content-inner\">\n                            <!-- wp:paragraph -->\n<p>Yes. CIDR is the standard way IP networks are designed, documented, and routed. It applies to both IPv4 and IPv6 and replaces classful addressing entirely.<\/p>\n<!-- \/wp:paragraph -->                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/li>\n            <\/ul>\n<\/div>\n\n<script type=\"application\/ld+json\">\n{\"@context\":\"https:\/\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is the most commonly used subnet?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The \/24 subnet is still the most common in IPv4 networks. It provides 254 usable hosts and is easy to recognize, document, and troubleshoot.\"}},{\"@type\":\"Question\",\"name\":\"Why does a \/24 subnet have 254 usable hosts?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A \/24 subnet has 256 total IP addresses. Two are reserved: one for the network address and one for the broadcast address. That leaves 254 usable hosts.\"}},{\"@type\":\"Question\",\"name\":\"Do IPv6 subnets have usable host limits?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"No practical limits. IPv6 subnets are not sized based on host counts, and address exhaustion is not a concern. Subnetting focuses on standard prefixes instead.\"}},{\"@type\":\"Question\",\"name\":\"What is a wildcard mask used for?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Wildcard masks are mainly used in ACLs, firewall rules, and routing filters. They specify which bits must match and which bits can vary when matching IP addresses.\"}},{\"@type\":\"Question\",\"name\":\"Is CIDR still relevant today?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes. CIDR is the standard way IP networks are designed, documented, and routed. It applies to both IPv4 and IPv6 and replaces classful addressing entirely.\"}}]}<\/script>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve put together a quick-reference subnet cheat sheet for IPv4 and IPv6 designed for fast lookups.&nbsp; If you already work with CIDR notation and just need to quickly check a subnet mask, usable hosts, wildcard mask, or block size, this page is meant to give you the information cleanly and directly. There\u2019s no subnetting theory [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-814","post","type-post","status-publish","format-standard","hentry","category-devops"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Subnet Cheat Sheet: IPv4, IPv6, CIDR, Usable Hosts &amp; Wildcards<\/title>\n<meta name=\"description\" content=\"A complete subnet cheat sheet with IPv4 and IPv6 tables, CIDR notation, usable hosts, and wildcard masks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Subnet Cheat Sheet: IPv4, IPv6, CIDR, Usable Hosts &amp; Wildcards\" \/>\n<meta property=\"og:description\" content=\"A complete subnet cheat sheet with IPv4 and IPv6 tables, CIDR notation, usable hosts, and wildcard masks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/\" \/>\n<meta property=\"og:site_name\" content=\"UptimeRobot Knowledge Hub\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-12T14:12:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T14:40:31+00:00\" \/>\n<meta name=\"author\" content=\"Laura Clayton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laura Clayton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/\"},\"author\":{\"name\":\"Laura Clayton\",\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/#\/schema\/person\/c05598f15bcbd26ed4d53240dff2ae34\"},\"headline\":\"Subnet Cheat Sheet\",\"datePublished\":\"2026-01-12T14:12:12+00:00\",\"dateModified\":\"2026-01-12T14:40:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/\"},\"wordCount\":1403,\"publisher\":{\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/#organization\"},\"articleSection\":[\"DevOps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/\",\"url\":\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/\",\"name\":\"Subnet Cheat Sheet: IPv4, IPv6, CIDR, Usable Hosts & Wildcards\",\"isPartOf\":{\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/#website\"},\"datePublished\":\"2026-01-12T14:12:12+00:00\",\"dateModified\":\"2026-01-12T14:40:31+00:00\",\"description\":\"A complete subnet cheat sheet with IPv4 and IPv6 tables, CIDR notation, usable hosts, and wildcard masks.\",\"breadcrumb\":{\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Knowledge Hub\",\"item\":\"https:\/\/uptimerobot.com\/knowledge-hub\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DevOps\",\"item\":\"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Subnet Cheat Sheet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/#website\",\"url\":\"https:\/\/uptimerobot.com\/knowledge-hub\/\",\"name\":\"UptimeRobot Knowledge Hub\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/uptimerobot.com\/knowledge-hub\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/#organization\",\"name\":\"UptimeRobot Knowledge Hub\",\"url\":\"https:\/\/uptimerobot.com\/knowledge-hub\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/uptimerobot.com\/knowledge-hub\/wp-content\/uploads\/2024\/04\/cropped-knowledge-hub-logo.png\",\"contentUrl\":\"https:\/\/uptimerobot.com\/knowledge-hub\/wp-content\/uploads\/2024\/04\/cropped-knowledge-hub-logo.png\",\"width\":2000,\"height\":278,\"caption\":\"UptimeRobot Knowledge Hub\"},\"image\":{\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/#\/schema\/person\/c05598f15bcbd26ed4d53240dff2ae34\",\"name\":\"Laura Clayton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/uptimerobot.com\/knowledge-hub\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/uptimerobot.com\/knowledge-hub\/wp-content\/uploads\/2024\/04\/laura_clayton-150x150.jpeg\",\"contentUrl\":\"https:\/\/uptimerobot.com\/knowledge-hub\/wp-content\/uploads\/2024\/04\/laura_clayton-150x150.jpeg\",\"caption\":\"Laura Clayton\"},\"description\":\"Laura Clayton has over a decade of experience in the tech industry, she brings a wealth of knowledge and insights to her articles, helping businesses maintain optimal online performance. Laura's passion for technology drives her to explore the latest in monitoring tools and techniques, making her a trusted voice in the field.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/laura-clayton-b00a4aa4\/\"],\"url\":\"https:\/\/uptimerobot.com\/knowledge-hub\/author\/laura\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Subnet Cheat Sheet: IPv4, IPv6, CIDR, Usable Hosts & Wildcards","description":"A complete subnet cheat sheet with IPv4 and IPv6 tables, CIDR notation, usable hosts, and wildcard masks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/","og_locale":"en_US","og_type":"article","og_title":"Subnet Cheat Sheet: IPv4, IPv6, CIDR, Usable Hosts & Wildcards","og_description":"A complete subnet cheat sheet with IPv4 and IPv6 tables, CIDR notation, usable hosts, and wildcard masks.","og_url":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/","og_site_name":"UptimeRobot Knowledge Hub","article_published_time":"2026-01-12T14:12:12+00:00","article_modified_time":"2026-01-12T14:40:31+00:00","author":"Laura Clayton","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Laura Clayton","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/#article","isPartOf":{"@id":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/"},"author":{"name":"Laura Clayton","@id":"https:\/\/uptimerobot.com\/knowledge-hub\/#\/schema\/person\/c05598f15bcbd26ed4d53240dff2ae34"},"headline":"Subnet Cheat Sheet","datePublished":"2026-01-12T14:12:12+00:00","dateModified":"2026-01-12T14:40:31+00:00","mainEntityOfPage":{"@id":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/"},"wordCount":1403,"publisher":{"@id":"https:\/\/uptimerobot.com\/knowledge-hub\/#organization"},"articleSection":["DevOps"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/","url":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/","name":"Subnet Cheat Sheet: IPv4, IPv6, CIDR, Usable Hosts & Wildcards","isPartOf":{"@id":"https:\/\/uptimerobot.com\/knowledge-hub\/#website"},"datePublished":"2026-01-12T14:12:12+00:00","dateModified":"2026-01-12T14:40:31+00:00","description":"A complete subnet cheat sheet with IPv4 and IPv6 tables, CIDR notation, usable hosts, and wildcard masks.","breadcrumb":{"@id":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/subnet-cheat-sheet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Knowledge Hub","item":"https:\/\/uptimerobot.com\/knowledge-hub\/"},{"@type":"ListItem","position":2,"name":"DevOps","item":"https:\/\/uptimerobot.com\/knowledge-hub\/devops\/"},{"@type":"ListItem","position":3,"name":"Subnet Cheat Sheet"}]},{"@type":"WebSite","@id":"https:\/\/uptimerobot.com\/knowledge-hub\/#website","url":"https:\/\/uptimerobot.com\/knowledge-hub\/","name":"UptimeRobot Knowledge Hub","description":"","publisher":{"@id":"https:\/\/uptimerobot.com\/knowledge-hub\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uptimerobot.com\/knowledge-hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uptimerobot.com\/knowledge-hub\/#organization","name":"UptimeRobot Knowledge Hub","url":"https:\/\/uptimerobot.com\/knowledge-hub\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uptimerobot.com\/knowledge-hub\/#\/schema\/logo\/image\/","url":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-content\/uploads\/2024\/04\/cropped-knowledge-hub-logo.png","contentUrl":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-content\/uploads\/2024\/04\/cropped-knowledge-hub-logo.png","width":2000,"height":278,"caption":"UptimeRobot Knowledge Hub"},"image":{"@id":"https:\/\/uptimerobot.com\/knowledge-hub\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/uptimerobot.com\/knowledge-hub\/#\/schema\/person\/c05598f15bcbd26ed4d53240dff2ae34","name":"Laura Clayton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uptimerobot.com\/knowledge-hub\/#\/schema\/person\/image\/","url":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-content\/uploads\/2024\/04\/laura_clayton-150x150.jpeg","contentUrl":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-content\/uploads\/2024\/04\/laura_clayton-150x150.jpeg","caption":"Laura Clayton"},"description":"Laura Clayton has over a decade of experience in the tech industry, she brings a wealth of knowledge and insights to her articles, helping businesses maintain optimal online performance. Laura's passion for technology drives her to explore the latest in monitoring tools and techniques, making her a trusted voice in the field.","sameAs":["https:\/\/www.linkedin.com\/in\/laura-clayton-b00a4aa4\/"],"url":"https:\/\/uptimerobot.com\/knowledge-hub\/author\/laura\/"}]}},"_links":{"self":[{"href":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-json\/wp\/v2\/posts\/814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-json\/wp\/v2\/comments?post=814"}],"version-history":[{"count":0,"href":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-json\/wp\/v2\/posts\/814\/revisions"}],"wp:attachment":[{"href":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-json\/wp\/v2\/media?parent=814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-json\/wp\/v2\/categories?post=814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uptimerobot.com\/knowledge-hub\/wp-json\/wp\/v2\/tags?post=814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}