Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 508

ICMP

What is ICMP?

ICMPA network-layer control and diagnostics protocol (RFC 792 for IPv4, RFC 4443 for IPv6) used by hosts and routers to report errors and signal path conditions.


The Internet Control Message Protocol is an integral part of IP, defined in RFC 792 for IPv4 and RFC 4443 for IPv6. Routers and end hosts use it to send error messages (destination unreachable, time exceeded, fragmentation needed) and diagnostic queries (echo request/reply, used by ping and traceroute). ICMP rides directly over IP with protocol number 1 (or 58 for ICMPv6) and has no ports. It is essential for Path MTU Discovery and IPv6 Neighbor Discovery, so blanket-blocking ICMP often breaks connectivity. Abuses include ping floods, Smurf-style amplification, ICMP redirect attacks that alter local routing tables, and ICMP tunneling used for command-and-control or data exfiltration.

Examples

  1. 01

    ping example.com sends ICMP echo requests and measures the time to receive echo replies.

  2. 02

    A router returns ICMP type 3 code 4 to signal that fragmentation is needed but DF is set.

Frequently asked questions

What is ICMP?

A network-layer control and diagnostics protocol (RFC 792 for IPv4, RFC 4443 for IPv6) used by hosts and routers to report errors and signal path conditions. It belongs to the Network Security category of cybersecurity.

What does ICMP mean?

A network-layer control and diagnostics protocol (RFC 792 for IPv4, RFC 4443 for IPv6) used by hosts and routers to report errors and signal path conditions.

How does ICMP work?

The Internet Control Message Protocol is an integral part of IP, defined in RFC 792 for IPv4 and RFC 4443 for IPv6. Routers and end hosts use it to send error messages (destination unreachable, time exceeded, fragmentation needed) and diagnostic queries (echo request/reply, used by ping and traceroute). ICMP rides directly over IP with protocol number 1 (or 58 for ICMPv6) and has no ports. It is essential for Path MTU Discovery and IPv6 Neighbor Discovery, so blanket-blocking ICMP often breaks connectivity. Abuses include ping floods, Smurf-style amplification, ICMP redirect attacks that alter local routing tables, and ICMP tunneling used for command-and-control or data exfiltration.

How do you defend against ICMP?

Defences for ICMP typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for ICMP?

Common alternative names include: Internet Control Message Protocol.

Related terms

See also