What Is an IPv6 Address? A Complete, Practical Guide
We use IPv6 addresses every day to keep modern networks scalable, secure, and globally reachable. Understanding how these 128-bit identifiers work is essential if you design, operate, or secure any serious infrastructure.
Why IPv6 Exists: Beyond IPv4 Exhaustion
IPv4 uses 32-bit addresses, supporting about 4.3 billion unique IPs. That pool is now essentially exhausted, especially with the explosion of mobile devices, IoT, and cloud services.
IPv6 solves this by expanding the address size to 128 bits, giving approximately 3.4×10³⁸ unique addresses enough to assign billions of addresses to every person on Earth.
This isn’t just about “more numbers.” With IPv6, we gain:
- Abundant addressing without resorting to heavy NAT
- Cleaner, more hierarchical routing
- Built-in support for modern autoconfiguration and security mechanisms
- Better support for large, distributed, multi-cloud environments
Global IPv6 deployment is no longer theoretical: depending on the day of the week, around 45–49% of Google users now access services over IPv6, with some countries already above 50% adoption.
IPv6 Address Structure: 128 Bits, Clearly Explained
Human-Readable Format
An IPv6 address is 128 bits, written as 8 groups of 4 hexadecimal digits, separated by colons:
2001:0db8:85a3:0000:0000:8a2e:0370:7334
Each group (called a hextet) represents 16 bits.
Network Prefix and Interface Identifier
In most real networks, an IPv6 unicast address is logically split into:
- Network prefix (first 64 bits) – routing and subnetting
- Interface identifier (last 64 bits) – uniquely identifies the interface on that link
This structure is defined in the IPv6 addressing architecture (RFC 4291).
Typical layout:
- Global routing prefix (e.g., /32 or /48 from your ISP or RIR)
- Subnet ID (remaining bits up to /64)
- Interface ID (last 64 bits on each subnet)
So an enterprise might receive a /48 and carve it into 65,536 /64 subnets, each with 2⁶⁴ addresses.
IPv6 Address Types: Unicast, Anycast, and Multicast
IPv6 defines three fundamental address types.
1. Unicast Addresses
A unicast address identifies a single interface. Packets sent to a unicast address are delivered to exactly one destination.
Key unicast categories:
- Global Unicast
- Routable on the public Internet
- Typically starts with
2xxx:or3xxx:(e.g.,2001:db8::/32is documentation space) - Used for servers, clients, and devices needing public connectivity
- Link-Local (
fe80::/10)- Automatically configured on every IPv6 interface.
- Valid only on the local Layer-2 link (not routed)
- Heavily used by Neighbor Discovery, SLAAC, and routing protocols.
- Unique Local (
fc00::/7, commonlyfdxx:)- Private addressing, analogous to RFC1918 space in IPv4
- Not intended to be globally routed.
- Ideal for internal infrastructure, labs, and multi-site VPN designs
2. Anycast Addresses
Anycast uses a unicast format but is assigned to multiple interfaces. Packets are routed to the nearest instance (according to the routing protocol). Typical uses:
- Redundant DNS resolvers
- CDN edge nodes
- Geographically distributed services
3. Multicast Addresses (ff00::/8)
IPv6 replaces IPv4 broadcast with multicast. A multicast address identifies a group of interfaces; packets sent to the address are delivered to all group members.
Examples:
ff02::1– all nodes on the local linkff02::2– all routers on the local link
Multicast is essential for routing protocols and service discovery.
IPv6 Address Scopes: Where an Address Is Valid
Every IPv6 address (except the unspecified::) has a scope.
- Link-Local Scope
fe80::/10and::1loopback- Only valid on a single link
- Never routed
- Global Scope
- Global unicast and unique local addresses
- Potentially reachable across the entire IPv6 Internet (depending on routing)
Scope matters when multiple addresses exist on an interface; stacks choose an appropriate source address based on scope and reachability.
IPv6 Text Representation and Shortening Rules
Full Notation
The full representation always shows 8 hextets:
2001:0db8:0000:0000:0000:0000:0000:0001
Rule 1: Leading Zero Suppression
Leading zeros inside each hextet can be dropped:
2001:db8:0:0:0:0:0:1
Rule 2: Zero Compression (::)
One single sequence of consecutive all-zero hextets can be replaced with :::
2001:db8::1
Valid examples:
2001:db8::(zeros to the end)::1(loopback)fe80::1234:abcd(short link-local)
Invalid example (two compressions):
2001:db8::1:0::1 # not allowed
To normalize or compare addresses, tools use a canonical format defined by the IETF.
Special IPv6 Addresses and Reserved Ranges
Several ranges have special purposes:
- Unspecified:
::/128- All bits zero
- Used only internally by software, never assigned to an interface
- Loopback:
::1/128- Like
127.0.0.1in IPv4 - Traffic returns to the same host
- Like
- IPv4-Mapped:
::ffff:0:0/96- Encodes an IPv4 address inside IPv6 (e.g.,
::ffff:192.0.2.1) - Used in dual-stack implementations and transition tools
- Encodes an IPv4 address inside IPv6 (e.g.,
- NAT64 Translation:
64:ff9b::/96- Well-known prefix for IPv4/IPv6 translation in NAT64 environments
- Discard Prefix:
100::/64- Used in routing scenarios where traffic should be safely dropped
How IPv6 Addresses Are Assigned: SLAAC, DHCPv6, and Static
Stateless Address Autoconfiguration (SLAAC)
With SLAAC, a host:
- Generates a link-local address (
fe80::…) - Listens for Router Advertisements (RAs)
- Learns network prefixes (e.g.,
2001:db8:1234:1::/64) - Builds a full address by combining the advertised prefix with a local interface ID
This behavior is defined as part of IPv6 Neighbor Discovery.
DHCPv6
DHCPv6 works similarly to DHCP in IPv4 but is fully IPv6-aware:
- Can hand out addresses, prefixes, or only “other configuration” (DNS, NTP)
- Often combined with SLAAC: routers advertise prefixes; DHCPv6 supplies DNS and other parameters.
Manual (Static) Addressing
Critical infrastructure (routers, firewalls, servers) often uses static IPv6 addresses for:
- Predictable addressing
- Easier documentation
- Stable DNS records
Because address space is abundant, static designs are usually cleanly hierarchical (e.g., one /64 per VLAN).
Privacy and Interface Identifiers
Originally, interface IDs could be built from the network card’s MAC address (EUI-64). This made addresses globally unique, but also raised privacy concerns because hardware identifiers became visible on the Internet.
Modern stacks typically use:
- Privacy extensions – temporary, randomized addresses that change over time
- Stable, non-MAC interface IDs – deterministic but not tied to hardware
This balances traceability for operations with privacy for end users.
IPv6 vs IPv4: Functional Advantages
Beyond address space, IPv6 improves how networks are designed and operated:
- No heavy NAT requirements
- End-to-end connectivity is restored.
- Simplifies troubleshooting and application design
- Cleaner, hierarchical routing
- ISPs allocate large, contiguous blocks.
- Enterprises get big prefixes and subdivide cleanly.
- Global routing tables aggregate more efficiently.
- Integrated multicast and anycast
- No broadcast storms
- Efficient one-to-many and nearest-node delivery
- Better suited for automation and scale
- SLAAC, DHCPv6, and prefix delegation assist large-scale deployments
- Ideal for IoT, data centers, and multi-cloud topologies
- Security is baked into the design.
- IPv6 was specified with IPsec as a required component.
- Many security frameworks were written with IPv6 in mind
IPv6 Subnetting and Address Planning
IPv6 subnetting is conceptually similar to IPv4, but the scale is dramatically larger.
Typical Allocation Hierarchy
From the global pool, IANA allocates large blocks (e.g., /12, /23) to Regional Internet Registries (RIRs). RIRs then allocate prefixes to ISPs and organizations, often /32, /36, or /48.
Common patterns:
- ISP → Enterprise:
/48 - Enterprise → Site: multiple
/56or/60 - Site → VLAN/Subnet:
/64per network segment
Why /64 per Subnet?
The IPv6 architecture strongly recommends /64 for all standard subnets because:
- SLAAC assumes a 64-bit interface ID
- Many implementations break or behave strangely with non-/64 LANs
- Tools and security policies often assume
/64boundaries
In practice, you design:
- Region bits
- Site bits
- Building/floor/VLAN bits
- Leave plenty of room for future growth
Transition and Coexistence: IPv4 and IPv6 Together
IPv4 will not disappear overnight, so several coexistence strategies are used.
Dual Stack
Devices run both IPv4 and IPv6:
- Preferred for networks that fully control their infrastructure
- Provides gradual migration: services slowly move from IPv4-only to dual-stack to IPv6-preferred
Tunneling
IPv6 traffic is encapsulated inside IPv4:
- Useful where IPv6 is not natively supported end-to-end
- Examples include 6th and various ISP-specific mechanisms
Translation (NAT64 / DNS64)
IPv6-only clients reach IPv4-only services via:
- NAT64 – translates IPv6 addresses to IPv4 and back
- DNS64 – synthetically creates AAAA records from A records for IPv4-only hosts
This approach is especially popular in mobile core networks and large ISPs.
IPv6 Security Considerations
IPv6 changes the threat landscape in several ways:
Benefits
- IPsec Integration
- IPv6 was standardized with IPsec as part of the protocol suite, making secure tunnels and authenticated sessions a first-class citizen.
- No NAT as a “pseudo-firewall.”
- Security must be deliberate (firewalls, ACLs, policy), not accidentally relied on via NAT behavior.
- Rich Multicast and Anycast
- Better tools for resilient services (e.g., anycast DNS) and efficient routing.
New and Different Risks
Network teams must consider:
- Larger attack surface per host
- Hosts often have multiple IPv6 addresses (global, link-local, temporary, ULA)
- Firewalls and IDS/IPS must understand and monitor all of them.
- Neighbor Discovery and RA Attacks
- Rogue Router Advertisements can misdirect traffic.
- Mitigations: RA Guard, DHCPv6 Guard, first-hop security features on switches
- Complexity of Visibility
- Long hexadecimal addresses can complicate manual log review.
- Logging, tooling, and SIEM integrations must handle IPv6 correctly
Practical IPv6 Address Examples
Global Unicast Server Address
2001:db8:1234:10::80
Interpretation:
2001:db8:1234::/48– enterprise allocation10– specific subnet (e.g., “DMZ VLAN 10”)::80– host address (e.g., web server)
Unique Local Address (Internal Service)
fd12:3456:789a:20::10
Interpretation:
fd12:3456:789a::/48– internal ULA block20– application subnet::10– internal API gateway
Link-Local Address (Per Interface)
fe80::1a2b:3c4d:5e6f:7a8b%eth0
fe80::/10– link-local prefix%eth0– interface zone index (used by many OSes)
Frequently Asked Questions About IPv6 Addresses
Do we still need IPv4 if we deploy IPv6?
In the short to medium term, yes. Many services remain IPv4-only, and users may be behind legacy ISPs. Dual-stack or translation solutions bridge the gap.
Is IPv6 faster than IPv4?
Not inherently. Performance depends on routing, peering, and implementation quality. However, removing layers of NAT and using cleaner routing often results in equal or better real-world performance.
Do we still use NAT with IPv6?
Classic IPv4-style NAPT is no longer necessary for address conservation, which is a major advantage. Some specialized NAT or translation techniques exist (e.g., NAT66, NPTv6), but they are typically used for policy or topology reasons, not scarcity.
How many IPv6 addresses do we need per device?
Standard practice is to give each subnet a /64, meaning each device can have multiple addresses:
- One or more global unicast addresses
- One or more temporary privacy addresses
- A link-local address
This is normal in IPv6.
IPv6 addresses are 128-bit identifiers that bring massive scalability, simpler routing, modern autoconfiguration, and integrated security features to today’s networks. By understanding their structure, types, scopes, and deployment models, we can design networks that are cleaner, more future-proof, and better aligned with the realities of global Internet growth.
With careful planning of prefixes, consistent /64 subnetting, robust security policies, and an informed transition strategy, IPv6 becomes not just a replacement for IPv4, but an upgrade in how we architect and operate IP networks at scale.
At IPv4Hub.net, we specialize in helping businesses secure clean, reliable IPv4 space while they plan and execute their transition to IPv6. We operate as a transparent brokerage and leasing marketplace, matching verified buyers with vetted IPv4 address holders and performing thorough reputation and blacklist checks on every subnet. Our team manages the full lifecycle from due diligence and compliance to transfer coordination with RIRs so organizations can scale their networks without operational risk. By combining structured IPv4 acquisition with forward-looking IPv6 planning, we enable carriers, hosting providers, and enterprises to grow confidently in a dual-stack world.