Browse Definitions :

216-color browser-safe palette

Go directly to the 216-color browser-safe palette table
136 browser colors with names

When specifying colors for Web page backgrounds, fonts, and other elements for 256-color displays (the most common display capability), you will probably want to choose from the 216 colors that look the same on both PC and Mac operating systems. Both the Netscape and Microsoft browsers have to work without the colors that each operating system reserves for itself. Since there are a total of 40 reserved colors on both systems, that leaves 216 colors for you to use. If you do use one of the 40 colors, each system tries to approximate it with some combination of the 216 acceptable colors (this is called dithering). Unfortunately, each operating system does dithering a bit differently. The result on a browser on one or both of the operating systems is likely to not be what you intended.

By using only the colors in the "browser-safe palette" table below, you'll be sure that your colors will look the same on both operating systems. The table shows the hexadecimal or red-green-blue (RGB) intensity value that you need to specify in the < BODY > tag for backgrounds and in the < FONT > and other tags containing color attributes. The first two hexadecimal (hex) digits are the red (R) value in the color; the second two are the green (G) value; and the third two are the blue (B) value. The six hexadecimal values create over 16 million possible colors and with a display adapter capable of providing those colors, all of them can be used. Remember that the 216-color limit is because you're assuming many of your viewers will have only a 256-color capable display.

As it happens, each RGB hex pair in the browser-safe palette contains one of values: 00, 33, 66, 99, CC, or FF. Each block illustrates the effects of increasing the levels of each color. Each block of 36 colors, from top to bottom, contains a twenty percent increase in red. From left to right in each box, the amount of green is increased by twenty percent. From top to bottom in each box, each block shows an increase of blue by twenty percent. The hex value you would code is superimposed on the color it produces.

Most Web page creation or HTML editors include a facility that lets you easily view and select colors for your page. You may find this table handy, however, when your editor is not accessible. Photoshop and other art creation tools now tend to include some version of this table. Or you can order a mousepad that shows the 216 colors from Raymond Pirouz, author of click here.


000000 003300 006600 009900 00CC00 00FF00
000033 003333 006633 009933 00CC33 00FF33
000066 003366 006666 009966 00CC66 00FF66
000099 003399 006699 009999 00CC99 00FF99
0000CC 0033CC 0066CC 0099CC 00CCCC 00FFCC
0000FF 0033FF 0066FF 0099FF 00CCFF 00FFFF


330000 333300 336600 339900 33CC00 33FF00
330033 333333 336633 339933 33CC33 33FF33
330066 333366 336666 339966 33CC66 33FF66
330099 333399 336699 339999 33CC99 33FF99
3300CC 3333CC 3366CC 3399CC 33CCCC 33FFCC
3300FF 3333FF 3366FF 3399FF 33CCFF 33FFFF


660000 663300 666600 669900 66CC00 66FF00
660033 663333 666633 669933 66CC33 66FF33
660066 663366 666666 669966 66CC66 66FF66
660099 663399 666699 669999 66CC99 66FF99
6600CC 6633CC 6666CC 6699CC 66CCCC 66FFCC
6600FF 6633FF 6666FF 6699FF 66CCFF 66FFFF


990000 993300 996600 999900 99CC00 99FF00
990033 993333 996633 999933 99CC33 99FF33
990066 993366 996666 999966 99CC66 99FF66
990099 993399 996699 999999 99CC99 99FF99
9900CC 9933CC 9966CC 9999CC 99CCCC 99FFCC
9900FF 9933FF 9966FF 9999FF 99CCFF 99FFFF


CC0000 CC3300 CC6600 CC9900 CCCC00 CCFF00
CC0033 CC3333 CC6633 CC9933 CCCC33 CCFF33
CC0066 CC3366 CC6666 CC9966 CCCC66 CCFF66
CC0099 CC3399 CC6699 CC9999 CCCC99 CCFF99


FF0000 FF3300 FF6600 FF9900 FFCC00 FFFF00
FF0033 FF3333 FF6633 FF9933 FFCC33 FFFF33
FF0066 FF3366 FF6666 FF9966 FFCC66 FFFF66
FF0099 FF3399 FF6699 FF9999 FFCC99 FFFF99

216-Color Browser-Safe Palette


This was last updated in April 2008


  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...


  • principle of least privilege (POLP)

    The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are ...

  • biometric authentication

    Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they...

  • denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...



  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...


  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...