Browse Definitions :
Definition

Martian address (Martian packet)

A Martian address is a source or destination IP address that does not exist on Planet Earth and is, thus, invalid and/or non-routable. Martian addresses are typically created accidentally by misconfigured systems, but they can also belong to a pool of reserved IANA (Internet Assigned Numbers Authority) addresses. In this context, a Martian address may also be referred to as a bogon.

Martian packets were first mentioned in 1995 in RFC 1812, Requirements for IP Version 4 Routers. Today, most networks filter for Martian addresses. Once an IP address has been found invalid, the address is rejected and Martian packets are dropped. Filtering prevents IP spoofing and ensures that attackers can't use Martian addresses as the preliminary step for a denial of service (DoS) or man-in-the-middle (MitM) attack. 

It is important to remember that IANA is constantly updating and assigning new address space and today's invalid IP address may be a legitimate destination some time in the future. When this happens, the address ceases to be Martian.

Scott Morris explains why Martian packets never make it through the routing table. 

This was last updated in December 2019

Continue Reading About Martian address (Martian packet)

Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • IT project management

    IT project management is the process of planning, organizing and delineating responsibility for the completion of an ...

  • chief financial officer (CFO)

    A chief financial officer (CFO) is the corporate title for the person responsible for managing a company's financial operations ...

  • chief strategy officer (CSO)

    A chief strategy officer (CSO) is a C-level executive charged with helping formulate, facilitate and communicate an ...

HRSoftware
  • HR automation

    Human resources automation (HR automation) is a method of using software to automate and streamline repetitive and laborious HR ...

  • compensation management

    Compensation management is the discipline and process for determining employees' appropriate pay and benefits.

  • HR technology (human resources tech)

    HR technology (human resources technology) is an umbrella term for hardware and software used to automate the human resource ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close