Browse Definitions :
Definition

Martian address (Martian packet)

A Martian address is a source or destination IP address that does not exist on Planet Earth and is, thus, invalid and/or non-routable. Martian addresses are typically created accidentally by misconfigured systems, but they can also belong to a pool of reserved IANA (Internet Assigned Numbers Authority) addresses. In this context, a Martian address may also be referred to as a bogon.

Martian packets were first mentioned in 1995 in RFC 1812, Requirements for IP Version 4 Routers. Today, most networks filter for Martian addresses. Once an IP address has been found invalid, the address is rejected and Martian packets are dropped. Filtering prevents IP spoofing and ensures that attackers can't use Martian addresses as the preliminary step for a denial of service (DoS) or man-in-the-middle (MitM) attack. 

It is important to remember that IANA is constantly updating and assigning new address space and today's invalid IP address may be a legitimate destination some time in the future. When this happens, the address ceases to be Martian.

Scott Morris explains why Martian packets never make it through the routing table. 

This was last updated in December 2019

Continue Reading About Martian address (Martian packet)

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • password cracking

    Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close