IP Range Info
developer/v1/ip/rangeReturns detailed information about an IP address range specified in CIDR notation. Calculates range boundaries, total usable addresses, network/broadcast addresses, and resolves ASN ownership, RIR allocation data, and abuse contact information.
What It Does
Parses and validates CIDR notation, then returns comprehensive range details: first/last IP addresses, total addresses in range, usable host count (excluding network and broadcast for IPv4), network and broadcast addresses, subnet mask, wildcard mask, associated ASN with organization name, RIR allocation details (registry, date, status), and abuse contact email where available.
Why It's Useful
Essential for network planning, IP allowlist/blocklist management, and abuse handling. Understanding the scope and ownership of IP blocks prevents over-blocking in security rules, enables accurate capacity planning, and provides the right contacts for abuse reporting.
Use Cases
Network Capacity Planning
Evaluate IP ranges for subnetting, peering decisions, or address space allocation by understanding exact range boundaries and available host count.
Make informed allocation decisions with precise range size calculations and ownership data.
Abuse Report Routing
Determine the correct organization and abuse contact for a malicious IP range to route incident reports and takedown requests.
Direct abuse reports to the responsible party with accurate ownership data and contact information.
Blocklist Scope Assessment
Before adding a CIDR block to a firewall blocklist, verify the range size and owner to avoid accidentally blocking legitimate traffic from shared hosting or CDN ranges.
Prevent over-blocking by understanding that a /16 contains 65,536 addresses vs a /24 with only 256.
Parameters
| Name | Type | Required | Description |
|---|---|---|---|
ip | string | Required | IP range in CIDR notation (e.g., 8.8.8.0/24)Example: 8.8.8.0/24 |
Response Fields
| Field | Type | Description |
|---|---|---|
cidr.cidr | string | The CIDR range in notation |
cidr.first_ip | string | First IP address in range |
cidr.last_ip | string | Last IP address in range |
cidr.prefix_length | number | CIDR prefix length (0-32 for IPv4, 0-128 for IPv6) |
cidr.total_ips | string | Total addresses in range (string for IPv6 precision) |
cidr.ip_version | number | IP version (4 or 6) |
cidr.usable_hosts | string | Usable host addresses (excludes network/broadcast for IPv4) |
cidr.network_address | string | Network address |
cidr.broadcast_address | string | Broadcast address (IPv4 only, null for IPv6) |
cidr.subnet_mask | string | Subnet mask (IPv4 only) |
cidr.wildcard_mask | string | Wildcard mask (IPv4 only) |
asn | number | Autonomous System Number from Team Cymru DNS |
organization | string | Organization name from RDAP |
network_name | string | Network handle name from RDAP |
rir | string | Regional Internet Registry (ARIN, RIPE, APNIC, LACNIC, AFRINIC) |
abuse_contact.email | string | Abuse reporting email address |
abuse_contact.name | string | Abuse contact name |
is_bogon | boolean | Whether the IP is a bogon (reserved/private) address |
bogon_type | string | Bogon classification (e.g., rfc1918_private, rfc5737_documentation) |
Code Examples
curl "https://api.edgedns.dev/v1/ip/range" \
-H "Authorization: Bearer YOUR_API_KEY" \
-d "ip=8.8.8.0/24"const response = await fetch(
'https://api.edgedns.dev/v1/ip/range?ip=8.8.8.0%2F24',
{
headers: {
'Authorization': 'Bearer YOUR_API_KEY'
}
}
);
const data = await response.json();
console.log(data);import requests
response = requests.get(
'https://api.edgedns.dev/v1/ip/range',
headers={'Authorization': 'Bearer YOUR_API_KEY'},
params={
'ip': '8.8.8.0/24'
}
)
data = response.json()
print(data)Read the full IP Range Info guide
Why it matters, real-world use cases, parameters, response fields, and how to call it from Claude, ChatGPT, or Gemini via MCP.
Read the guide →Related Endpoints
External References
Learn more about the standards and protocols behind this endpoint.
Try This Endpoint
Test the IP Range Info endpoint live in the playground.