Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 168

CIDR Notation

What is CIDR Notation?

CIDR NotationClassless Inter-Domain Routing notation expresses an IP prefix as an address followed by a slash and the number of significant bits, e.g., 10.0.0.0/8.


CIDR, introduced in RFC 1518 and RFC 1519 and refined in later RFCs, replaced the rigid Class A/B/C scheme of early IPv4. A CIDR prefix is written as an address plus a slash and a prefix length, such as 192.168.0.0/24 (the first 24 bits are the network portion, leaving 8 bits for hosts). The same notation applies to IPv6, e.g., 2001:db8::/32. CIDR enables route aggregation (supernetting), variable-length subnet masking, and finer-grained allocations than classful addressing. In security work, CIDR ranges are the unit of expression for firewall rules, security-group sources, BGP advertisements, and threat-intelligence indicators - so accurate CIDR hygiene directly affects exposure and detection.

Examples

  1. 01

    A cloud security group allows 0.0.0.0/0 to reach port 443 but only 10.0.0.0/16 to reach port 22.

  2. 02

    An autonomous system advertises 198.51.100.0/24 instead of multiple /28 supernets.

Frequently asked questions

What is CIDR Notation?

Classless Inter-Domain Routing notation expresses an IP prefix as an address followed by a slash and the number of significant bits, e.g., 10.0.0.0/8. It belongs to the Network Security category of cybersecurity.

What does CIDR Notation mean?

Classless Inter-Domain Routing notation expresses an IP prefix as an address followed by a slash and the number of significant bits, e.g., 10.0.0.0/8.

How does CIDR Notation work?

CIDR, introduced in RFC 1518 and RFC 1519 and refined in later RFCs, replaced the rigid Class A/B/C scheme of early IPv4. A CIDR prefix is written as an address plus a slash and a prefix length, such as 192.168.0.0/24 (the first 24 bits are the network portion, leaving 8 bits for hosts). The same notation applies to IPv6, e.g., 2001:db8::/32. CIDR enables route aggregation (supernetting), variable-length subnet masking, and finer-grained allocations than classful addressing. In security work, CIDR ranges are the unit of expression for firewall rules, security-group sources, BGP advertisements, and threat-intelligence indicators - so accurate CIDR hygiene directly affects exposure and detection.

How do you defend against CIDR Notation?

Defences for CIDR Notation typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for CIDR Notation?

Common alternative names include: Slash notation, Prefix length.

Related terms