Top
Best
New

Posted by petercooper 1/20/2026

IP Addresses Through 2025(www.potaroo.net)
194 points | 147 comments
Fiveplus 1/20/2026|
The collapse in IPv4 transfer prices is what caught my eye here, dropping from a ~$55 peak in 2021 to a mean of $22 in early 2026 (figure 12).

This validates my hypothesis that the run-up in 2020–2022 was an artificial scarcity bubble driven largely by hyperscalers. AWS was right up there stockpiling before they shifted their pricing model. Once AWS introduced the hourly charge for public IPv4 addresses (effectively passing the scarcity cost to the consumer), their acquisition pressure vanished. The text notes Amazon stopped announcing almost 15M addresses in Nov 2025. I think they have moved from aggressive accumulation to inventory management.

We are seeing asset stranding in real-time. The market has realized that between the AWS tax and the efficacy of mobile CGNAT, the desperate thirst for public v4 space was not infinite. I'm curious to hear more takes on this.

JulianHart 1/20/2026||
The CGNAT point is underrated. Carriers have zero incentive to move away from it - thousands of users per public IP, no transition cost.

The interesting downstream effect is on IP reputation systems. Traditional detection assumed 1 IP = 1 user. CGNAT breaks that entirely - platforms can't aggressively filter mobile carrier IPs without blocking legitimate customers by the thousands.

Makes sense the IPv4 price dropped once mobile networks proved you can serve massive user bases with relatively few public addresses.

patmorgan23 1/20/2026|||
Expect CG-NAT boxes are expensive, and introduce another point of failure into the network. Most mobile carriers are running IPv6 first networks these days anyway.

Like you said, CG-NAT does have the benefit of making v4 address reputation less reliable, which means it's not as big a deal for the transition to v6.

pixl97 1/20/2026||
>CG-NAT does have the benefit of making v4 address reputation less reliable

heh, less reliable is doing a lot of heavy lifting there. You mean "complete and total trash". We need to get to the point where Cloudflare/AWS/some other big sites just block CG-NAT nodes for a day going this IP address is a risk.

Instead if you're a website, instead of doing an easy block by IP, you're left filtering out AI crawlers, spammers, and lots of other crap hiding behind a single IP with thousands of other users behind it, and ISPs that don't really give a shit about doing anything about it.

We need to push the value of IPv4 to nearly zero and finally move away from that crap.

cvalka 1/21/2026||
[flagged]
tomhow 1/22/2026|||
Could you please stop posting unsubstantive comments and flamebait? You've unfortunately been doing it repeatedly. It's not what this site is for, and destroys what it is for.

If you wouldn't mind reviewing https://news.ycombinator.com/newsguidelines.html and taking the intended spirit of the site more to heart, we'd be grateful.

achierius 1/21/2026|||
Why? How is it "discrimination" if it actually corresponds to a single user, who has been doing bad things to your server (e.g. slamming it with requests)? Do you expect to be able to go and knock on people's doors all day and not have them tell you off?
wcfields 1/20/2026||||
Anecdotally on how this affects the day to day user experience: I just deployed T-Mobile 5G Business Internet to a temporary pop-up art space (it's only active for a few months) and I'd say twice daily I get a CAPTCHA challenge on Google search.
pixl97 1/20/2026|||
And I hope it gets worse for users behind CG-NAT to the point that websites and ISPs move to IPv6.
kalleboo 1/21/2026|||
I would have thought that a 5G connection would have IPv6 and wouldn't need CGNAT to Google properties
SchemaLoad 1/21/2026||||
I wonder if all these new tools that punch through CGNAT like tailscale will end up breaking it when they force these NAT boxes to maintain tons of long lived connections.

With the uptake in smart home and internet connected CCTV by consumers, things could dramatically shift.

anyfoo 1/21/2026|||
I personally hate CGNAT, but I cannot deny that nowadays, the overwhelmingly vast majority of customers most likely does not care (and much less know) that they are behind CGNAT, so this is valid.

Come to think of it, for my use cases, I would probably be fine to be behind IPv4 NAT as long as I also have an un-NATted IPv6 prefix. But a big part of the question here of course is whether IPv6 adoption is worthwhile...

zokier 1/20/2026|||
It is noteworthy that in 2020 AWS had very limited ipv6 support, but these days they have at least some support in the most critical services.
WorldMaker 1/20/2026|||
> efficacy of mobile CGNAT

At driving the majority of mobile traffic to IPv6? Otherwise, it seems hard to describe mobile CGNAT as efficacious to me.

inemesitaffia 1/20/2026|||
Amazon LEO

Aka Kuiper

>stopped announcing almost 15M addresses in Nov 2025

dlcarrier 1/20/2026|||
As someone with a background in electronics who doesn't manage any internet-connected equipment but has multiple embedded devices connected to a WAN, I'm glad that IPv4 still seems to have a bit of life left in it.

When IPv6 was developed, over 30 years ago, connecting everything to the internet seemed like a great idea. I know that IPv6 can be made secure, but I don't have the background or research time to learn how to do so, and the NAT-by-default of IPv4 effectively means that I get the benefit of a default-deny security strategy that makes it impossible to accidentally directly connect anything to the internet.

I'm hoping I can keep using IPv4 until IPv8 or IPv4.5 or whatever comes next is developed with the modern proliferation of cheap insecure IoT in mind.

For some background on why IoT products are so insecure:

Hardware manufacturers don't really comprehend the idea of updates, let alone timely of security patches. Hardware has to work on the day of release, so everything is documented and tested to verify it will work. I have hardware with a TCP/IP stack that was released 20 years, (https://docs.wiznet.io/Product/Chip/Ethernet/W5500) and doesn't have a single errata published, despite widespread use. This is expected for every single component, for even the smallest 1-cent transistor, which has dozens of guaranteed performance characteristics laid out over several pages of documentation (https://en.mot-mos.com/vancheerfile/files/pdf/MOT2302B2.pdf).

When manufacturers venture into a product that runs software, they don't realize that for a given complexity, working through undocumented or, worse yet, incorrectly documented APIs takes more time than the equivalent hardware development and documentation. I've worked on multiple projects where software bugs were fixed with hardware workarounds, because it's faster, cheaper, and easier to develop, test, document, retool, and add a few cents of bill-of-materials cost per product, than to get reliable output from the already-written library that's supposed to provide the functionality.

The hardware TCP/IP stack that I linked to was developed at a time when it was the cheapest way to connect a low-power embedded system to a network. Modern low-power embedded systems have multiple cores running at hundreds to thousands of MIPS making the resources to run a softtware TCP/IP stack trivial, but the product still sells well, because when security is an absolute must, the hardware development and maintenance cost for the functionality is still cheaper than through software, even when there's no marginal cost to run the software.

johnmaguire 1/20/2026|||
> the NAT-by-default of IPv4

IPv4 is not NAT-by-default. The reality of the world we live in today is that most home networks have a NAT, because you need multiple devices behind a single IP.

That said, I agree: it's quite unknowable how many services I've turned on on local machines with the expectation that a router firewall sat between me and potential clients.

But that doesn't go away with IPv6 - the NAT does, the router doesn't, and the firewall shouldn't either. For example, the default UniFi firewall rules for IPv6 are: 1. Allow Established/Related Traffic (outbound return traffic), 2. Block Invalid Traffic, 3. Block All Other Traffic

You must explicitly open a firewall rule for inbound IPv6 traffic. NAT is not the firewall.

cyberax 1/20/2026||
> NAT is not the firewall.

NAT _is_ a firewall. And a much safer one than IPv6 firewalls, because NAT will fail safe if misconfigured.

johnmaguire 1/20/2026||
NAT is not a firewall: all it does is rewrite packets, it does not drop them.
jonathanlydall 1/20/2026|||
The article actually remarks on this kind of argument.

While you are technically correct about NAT not being a firewall, it is in practice a widely used front-line defense which even if not “perfect”, it has indisputably proven to be quite effective against a lot of malicious activity.

Against highly determined malicious actors you will of course want a proper firewall, but for 99% of people, NAT is enough to keep from being bothered by run of the mill malicious actors.

Kind of like physical home security, a lot of it is very easy to bypass, but it’s good enough for the common threats.

johnmaguire 1/20/2026||
> Against highly determined malicious actors you will of course want a proper firewall, but for 99% of people, NAT is enough to keep from being bothered by run of the mill malicious actors.

Maybe, maybe not, but regardless 99% of people are not protected by a NAT. They are protected by a "proper firewall," which happens to support NAT (and typically, is enabled for IPv4 networks.)

That is to say, while most home routers support NATs, they also ship with a default-deny firewall turned on. Typically, enabling NAT mappings also configures the firewall for users. But they are not the same thing and we need to stop conflating them because it causes a lot of confusion when people think that IPv6 is "open by default" and that IPv4 is "protected by NAT." It's not. They are both protected by your router using the same default-deny firewall.

cyberax 1/20/2026||
This is BS. "Default deny" or "default accept" makes no practical difference with NAT. You can leave the "default accept" rule with NAT and you'll be perfectly fine except in some weird edge cases.

That's because it's exploitable only if you control the next hop from the NAT router, which is typically within the ISP infrastructure. So the attacker will need to either hack your ISP or mess with your NAT router's physical uplink.

Both cases require a very dedicated attacker.

johnmaguire 1/20/2026||
A default deny firewall is a good idea to protect services everywhere in your network, including those which run on the router itself (e.g. many routers run a local DNS server.) Without NAT, packets are not dropped, they simply do not have their destination rewritten to another device on the network. The traffic is still destined for the router and will be processed by it. This is why routers ship with a default-deny firewall rule.

NAT is not a firewall. It is address translation. It will not drop packets.

cyberax 1/21/2026||
Sure, a default deny is a good idea. However, it's not _critical_. If you forget to enforce it on your NAT router, you'll be fine. And if you are behind a CGNAT, it's even safer.

In IPv6 it becomes absolutely essential. If you forget to include it, your network becomes wide open. And you don't have an easy way to detect this because you need an external service to probe your network.

> NAT is not a firewall. It is address translation. It will not drop packets.

Yes, it is a firewall because it enables the address space isolation.

tyingq 1/21/2026||||
You have to squint a little and see they mean that most consumer routers don't map inbound unsolicited packets to anything internal unless the user specifically configured it to. Which is basically a firewall.
jcalvinowens 1/21/2026|||
That's not true in my experience, consumer grade routers will often happily route packets with rfc1918 destination addresses from the WAN to the LAN interface all day. The "firewall" is only that nobody can get packets with those destination addresses to the home router's WAN interface through the internet.
johnmaguire 1/21/2026|||
This is because most consumer routers have a firewall, which is separate from the NAT. Creating NAT mappings also creates firewall entries.

Otherwise, the router would happily pass the packet along to any IP address it finds in a packet it receives. That's the job of a router, after all.

dlcarrier 1/21/2026|||
A NAT will drop all packets, until something upstream opens a port. Dropping packets is the default behavior of a NAT.
johnmaguire 1/21/2026||
Nope, it's the default behavior of a typical firewall. NAT rewrites packets but it never drops packets. An un-rewritten packet may fail to route (i.e. "destination unknown".) But that depends on the destination in the packet.
simoncion 1/20/2026||||
> I know that IPv6 can be made secure, but I don't have the background or research time to learn how to do so, and the NAT-by-default of IPv4 effectively means that I get the benefit of a default-deny security strategy that makes it impossible to accidentally directly connect anything to the internet.

To get the "unsolicted traffic is rejected or dropped" behavior of the typical IPv4 NAT, forward inbound traffic that's related to an established connection and drop or reject the rest.

You can also use the exact same NAT techniques you use for IPv4 addresses with IPv6 addresses. The only differences are that instead of you using RFC 1918 Private Internets addresses (10./8 and friends) you use RFC 4193 ULA addresses (fd00::/8), and you need the usual NAT rules on your edge router, except for IPv6, rather than IPv4. Remember that IPv6 is still IP, just with larger addresses.

It's recommended that you generate your ULA subnet rather than selecting one by hand, but absolutely nothing stops you from choosing fd::/64. If you're statically assigning addresses to your LAN hosts, then your router could be -say- fd::1 and you count up from there. Also note that DHCP exists for IPv6 [0] and is used by every non-toy OS out there except for Android.

> I'm hoping I can keep using IPv4 until IPv8 or IPv4.5 or whatever comes next...

IPvnext is not happening in either of our lifetimes. You're either going to have to buy edge gear that's set up with a "reject or drop unsolicited inbound forwarding traffic" firewall, or learn how to set it up yourself. Either path is not hard. Well, I guess there's secret option #3: "Die without doing either.". That's also not hard.

[0] It has been around for nearly twenty-three years.

dlcarrier 1/21/2026|||
Yeah, that's the kind of stuff that I know how it works from a network protocol standpoint, but have no clue how to configure on any given system, let alone verify I configured it correctly. I installed DD-WRT on my router, hoping it would be easier to set up. The user interface was much easier to navigate, but the labels of the settings were so sparse that I couldn't tell what anything was referring to, even knowing the terminology for the the lower layers of network protocols. I wouldn't be surprised if I never get around to working on it in my lifetime, as long as I can play around with electronics projects.

Regarding Android OS, I'm not convinced it isn't a toy OS. I feel like they threw in the Linux kernel, but didn't bother including most of the useful features, and pat themselves on the back whenever they add one back. It took almost a decade before they figured out that you could install fonts without reinstalling the operating system. If they ever discover DKMS, we can stop throwing our phones away every few years, and have some actually useful hardware. Then again, it took Apple two years to add copy and paste to a phone, so maybe it's an industry-wide problem. If I could buy a modern Jornada 700 series running Linux or BSD, I'd never need to pick up an Android or iOS device again.

simoncion 1/21/2026||
> DD-WRT

Since you're in the mood for experimentation, you might try OpenWRT. They even have a somewhat-fancy-shmancy configuration GUI called LuCI.

themafia 1/20/2026|||
I don't think you even need a stateful firewall. If it's an IoT device that's not meant to provide services to the internet then it seems to me you can just drop all non local subnet originated traffic and get most of the security you would expect with NAT.
oasisbob 1/20/2026||
If you want to drop all non-local subnet originated traffic, you need to keep state. Otherwise, how can you tell which side originated the flow?

Even that is only a partial solution - UPNP hole punching exploits holes in this logic to allow peer-to-peer traffic into a network which otherwise has a default-deny ACL.

ianburrell 1/20/2026||||
IPv6 is just as secure as IPv4. NAT usually combines address translation with a stateful firewall. I remember when they were separate things. IPv6 has the stateful firewall, all the same security but without the mess of address translation.

Also, if you have devices connected to WAN, then they are insecure because they are not NATed.

dlcarrier 1/21/2026||
Oops, I meant to say LAN, not WAN.
huslage 1/20/2026||||
NAT is not a security measure at all. It just obscures what's behind a firewall, but that is leaky and not reliable from a security perspective. It might make you feel better, but that is not security.
dlcarrier 1/21/2026|||
A firewall has nothing to filter, if nothing is routed to it. My IoT devices communicate with a server running in my network. As long as I am behind an IPv4 router, their communications to that server will never make it to the internet, and any communications from the internet have no way of addressing any device on my network. I literally can't add any security to a firewall because there's no communications to handle. Sure, I have personal computers on the same network, which aren't on a separate VLAN because I'm not familiar enough with my router to set that up, so a compromised PC could forward attacks to my IoT devices, but the firewall would be useless at that point.

If I have an IPv6 router, I can miss-configure it in a way where all of my internal communications between IoT devices work as expected, but they also have discoverable addresses on the internet. This would give the firewall something to do, but I'd rather there be no route in the first place.

Also, if I trusted myself to properly configure my router for IPv6, I would put all of my IoT equipment on ULAs, which much like an IPv4 NAT would leave me with nothing to configure in the firewall.

If I were to take your claims at face value, using GUAs with packet filtering is far more reliable and secure than ULAs, and that seems preposterous.

A properly configured firewall for sure adds security, but isolation always wins out.

pixl97 1/20/2026|||
Yea, people consider NAT a firewall, but at best it stops direct connections from outside. People use this as a rationale to non secure individual devices on the network. Then the moment a single device on your network is compromised (do you really trust that Chinese IOT device?) every host that doesn't have its own firewall is at risk.

With IPv6 you at least say "Holy crap, anyone could connect to this, I better secure it from outside and inside attacks" which is how actual security works.

immibis 1/20/2026|||
For some background why IoT products will stop being insecure: if you sell one in the EU, you're liable for all the damage your botnet causes.

Luckily, common EU home routers have firewalls, even for IPv6. And it's so much easier to punch holes on purpose! Instead of messing with port forwarding and internal and external IP addresses, you can just say "this device is a server, please allow traffic on port 80 and 443, thank you"

dlcarrier 1/21/2026||
I don't see how the logistics for that would work. Even when you know what devices are part of a botnet, which itself is no easy task, each device in a botnet is only doing cents worth of damage, and mostly to the target, but product liability only applies to the owner of the product.

Also, everyone I know that lives in Europe (although most of them not within EU countries) imports their IoT controllers directly from China or the US, because there is very little available from manufacturers in Europe.

immibis 1/21/2026||
[dead]
TNorthover 1/20/2026|||
[dead]
newsoftheday 1/20/2026||
When AWS rolled out plans to start charging for IPv4 addresses:

https://aws.amazon.com/blogs/aws/new-aws-public-ipv4-address...

"As you may know, IPv4 addresses are an increasingly scarce resource and the cost to acquire a single public IPv4 address has risen more than 300% over the past 5 years. This change reflects our own costs and is also intended to encourage you to be a bit more frugal with your use of public IPv4 addresses and to think about accelerating your adoption of IPv6 as a modernization and conservation measure."

Their move disgusted me and I moved from AWS to OCI.

knollimar 1/20/2026||
What disgusted you about it? I'm out of the loop
jdsully 1/20/2026|||
They hadn't bothered to add ipv6 support to most of their services and the ones that did have it usually were only dual stack - still requiring an ipv4 address.
huslage 1/20/2026|||
They didn't require you to have a public IPv4 address. Just an IPv4 address.
pixl97 1/20/2026||
Which requires dual-stack and all the issues that come with it, especially with private addresses.
knollimar 1/20/2026|||
That sounds like a failure in every direction. I see why you moved
newsoftheday 1/20/2026|||
It was clearly a corporate money grab, not an altruistic motion as they made it sound.
blakesterz 1/20/2026||
This closes on a bit of a downer:

  "As the Internet continues to evolve, it is no longer the technically innovative challenger pitted against venerable incumbents in the forms of the traditional industries of telephony, print newspapers, television entertainment and social interaction. The Internet is now the established norm. The days when the Internet was touted as a poster child of disruption in a deregulated space are long since over, and these days we appear to be increasingly looking further afield for a regulatory and governance framework that can challenge the increasing complacency of the very small number of massive digital incumbents. 

  It is unclear how successful we will be in this search for responses to this oppressive level of centrality in many aspects of the digital environment. We can but wait and see."
bigbadfeline 1/20/2026||
> We can but wait and see.

Don't bring technology to a political fight, the hoarders've got more tech than you, "wait and see" is what a bag of sand does at the gun range.

dlcarrier 1/20/2026||
If you think the time that a given social network spends at the top is long now, wait until there's a "regulatory and governance framework" knocking out most newcomers.
tokyobreakfast 1/20/2026||
The real story here is China and India have been quietly buying up gobs of African IP blocks - most of which are used for botting operations. I see it in my server logs.

China already de-facto owns half of Africa so it's natural they would prey on their scarce IP resources as well.

When you see AI scraping at a massive scale originating from $AFRICAN_COUNTRY IP space, and that country's GDP is smaller than Rhode Island, you sure as shit know someone else is behind it.

rendx 1/20/2026|
I see this often that people refer to countries as actors. Are you implying that the government of these countries bought those resources and they're now owned by the government? Or are you saying that citizens/corporations of those countries are buying? I find it weird, I wouldn't use the phrase "The United States is buying XYZ" unless it was the current government doing so?
tokyobreakfast 1/20/2026|||
Both.

In the case of China, I believe it's government or CCP-controlled entities, and the end-game is something more nefarious.

For India, IMO it's private industry. They're just trying to make a buck.

landl0rd 1/20/2026||||
China does not have a meaningful distinction between private industry and the state. She also maintains a level of surveillance and control, particularly in the IT world, that makes this hard with some level of government sanction.
Andrex 1/21/2026|||
Sidebar: I've never stopped and considered the gender of nations, but in the tradition of ships I guess it makes sense.
butvacuum 1/20/2026||||
It seems to be widly accepted that the Chinese State (don't know about India) often imposes on or sponsers citizens to perform actions it finds adventagious.

And, I'd say, the US is known to do this. I'll lead with 'Project Azorian' to back it up.

Earendil137 1/20/2026||
India does it too. You see it on all socials as well as reddit. Brain dead posts and comments praising the current govt or gate against anyone criticising.
leosanchez 1/20/2026||
> You see it on all socials as well as reddit

Almost all the Indian subreddits are against the current government. You will be banned from a subreddit even if you rightly speak in support of current government on Reddit.

It's hard to take your rest of your comment seriously if you are blatantly dishonest about this.

wongogue 1/21/2026||
The official one isn’t but there are a lot more in support of it. They are just named differently. Local language (we have a lots of them) or endonyms etc.
leosanchez 1/21/2026||
All national subreddits are anti-government. The popular regional ones like r/delhi is anti-government too. If you know any pro-government subreddits let me know, I would love to join.
TrueDuality 1/20/2026||||
I'm not sure the distinction matters, and attribution is inherently hard and easy to get wrong. I frequently read Country X is doing Y, less as a indicator of government action and more of a single that we can't be more specific of who within the country is performing an action but we know the behavior is occurring there.

In the case of IP address purchases, these are publicly tied to specific public and private entities and can be easily queried through the regional registries. These private entities are frequently the same kind of shell company you'll get with hiding shady financial details.

pixl97 1/20/2026||||
>Are you implying that the government of these countries bought those resources and they're now owned by the government

You have to take these issues with nuance instead of looking at them black and white.

If the US government gives you a billion dollar subsidy to do some particular action, is the action that is done the will of the corporation or the will of the government?

If the US government is paying private companies to 'gain information on' foreign entities, is that the will of the private companies or of the government itself?

If when a US company acquires a resource the US government can ask nicely for it with the threat of implied violence if you don't give it, is that a private resource or not?

And, note, I'm talking about the US that has relatively strong property rights and not about China where the government has far more leeway with the operation of companies, and absolutely uses them for nation state level information gathering.

WarmWash 1/20/2026|||
In the US, the government can apply pressure and bargain with companies for favor, but there is no legal requirement of companies agreeing (shy of court orders). Far more than cases of corporate compliance with the government are cases of corporate defiance.

In China, there is no meaningful difference between the party and any Chinese company. Companies are seed funded by the state and carry the will of the state. There is no "come back with a court order" in China. And even if there was, the courts are also just another arm of the party.

snowwrestler 1/20/2026||
I pay close attention to IPv4 addresses for outgoing emails. At work we use several email services and pay for a dedicated IP(v4) at each. And when we provision a new service, we expect our new IP address to be “clean,” by which I mean it is ideally not found on any email reputation list.

For websites and services I don’t care. Some hosting platforms publish via CNAME, and some via A and AAAA records. Most seem to use a mix of v4 and v6 addressing.

The falling price of IPv4 addresses looks to me like we’ve made it to other side of the IPv6 rollout: demand for IPv4 is falling faster than supply now. Not clear if those prices are adjusted for inflation; the post-COVID spike looks like a lot of other nominal price graphs. If not, then the recent price drop is even more dramatic than it appears.

Perhaps in the long run, IPv4 becomes an artisanal choice for uses that depend on stable IP reputation: email sending, primarily. And everyone else relies on TLS for reputation signals, not caring about the IP address.

hnuser123456 1/20/2026||
There is a growing grey market for IPv4 still, though, and probably always will be. It seemed like people were treating them like crypto for a while. Still people out there trying to re-route old abandoned ranges. There are still a lot of legacy ranges that belong to defunct organizations and never got properly sold.
cyberax 1/20/2026|||
> dig AAAA github.com > dig AAAA amazon.com

Hm...

It's more likely that the widespread deployment of CGNAT and 464XLAT in mobile networks made the IPv4 scarcity a non-issue. The some CGNAT solutions can multiplex more than 20000 devices onto a single IPv4 address.

I'm a very early adopter of IPv6, and I _still_ have operational issues with it.

betaby 1/21/2026||
amazon.com is IPv4-only redirector to www.amazon.com which is dual-staked.

The same is true for amazon.fr.

SchemaLoad 1/21/2026||
In the future we will have v6 only clients making v4 almost worthless since not all users will be able to connect to it.
assimpleaspossi 1/20/2026||
Just yesterday--and I don't know how I wound up there--I looked at RFC1166 (from 1990) which is "a status report on the network numbers and autonomous system numbers used in the Internet community." There's a long list of companies and individuals who were assigned "internet numbers". To my surprise, my real name is listed there! I have no clue why.
petercooper 1/20/2026||
Not to spoil the article (but there's a lot in there) but I was particularly intrigued by the ongoing tumbling of the price of IPs. After peaking in 2022, "these days the low price of $9 per address is back to the same price that was seen in 2014."
Bluecobra 1/20/2026||
I was also surprised to find that out the other day when someone on Reddit was complaining they couldn’t get a good price on a /17 they were hoarding to sell for a profit. Good riddance.
bastardoperator 1/20/2026||
There is no shortage. Go look at IPXO, you can sublease any block size. The RiR's should be reclaiming these unused addresses, but instead the ASN is allowed to sit on them or rent them out, regardless they're not being used. The shortage is caused by hoarding and RiR's not doing their job.
ilvez 1/21/2026||
During the holidays I refactored my home network. It was a fun project and I'm still kind of tinkering with it. At one point I decided that now let's go all in on IPv6 and it works now. Only thing that I couldn't do was route traffic from internet to my end devices, because I understood my ISP and the provided modem. I'm yet to pressure them, maybe they can do it manually for me.. But I'm glad I did it and getting 10/10 in https://test-ipv6.com/ is satisfying. At least this home traffic contributes to migration..

I'm thinking about going full on IPv6 now with NAT64, but that a stretch already, because it needs upgrading a gear.

jcgl 1/27/2026|
Fwiw (in case it hadn't occurred to you already), there's no technical requirement to run your NAT64 on your router/modem/CPE. You could run the NAT64 on a Raspberry Pi or some other little device for instance.
rmoriz 1/20/2026||
There are plenty of vectors left to squeeze the existing IPv4 space especially all the Legacy assignments held by deceased companies and individuals. There is no procedure to reclaim them. Even when you invest time and money to find the relatives, the RIR may decline a transfer so nobody invests here as long as plenty of former hosting, colocation and regional access providers leave the market after their customers moved to the US hyperscalers or out or business.

I think around 2000 every new LIR at RIPE got a /19 allocation. Smaller companies are now almost 30 years old and the founders divest their assets step by step unless someone buys everything.

1970-01-01 1/20/2026|
I'm interested in any new successful startups going full IPV6 from the beginning. Once we cross that bridge, where your internal IPV4 knowledge is equivalent to token ring knowledge, there's nothing else to watch.
awestroke 1/20/2026||
Github still refuses to switch on support for ipv6 traffic for some reason, so you can't interact with github then
Andrex 1/21/2026||
There has to be a tech reason (beyond the normal) for that, right? What could it be?
immibis 1/21/2026||
[dead]
massysett 1/20/2026|||
Relatedly: wouldn't there be many applications for which ipv4 isn't needed?

For example, Walmart has electronic eink shelf tags they can update remotely. Each one needs a unique address. I wouldn't think it needs ipv4. It doesn't have to connect to the SpaceJam website.

I would think that as time goes by, the number of these new devices would swamp the number of old ones that need ipv4. v4 would still be around and might even seem important to the fogies using web browsers on laptops...meanwhile the street lamp has five ipv6 addresses and no ipv4 ones.

kalleboo 1/21/2026||
An example of this is Matter, the new industry standard for IoT devices. It uses IPv6 addressing, so if you want your IoT devices bridged onto your LAN, your LAN needs to support IPv6.

https://en.wikipedia.org/wiki/Matter_(standard)

Aloisius 1/21/2026|||
While definitely not a startup, the National Archives made https://clintonwhitehouse1.archives.gov/ and https://clintonwhitehouse2.archives.gov/ IPv6-only.

While I don't think a couple administration's website archives are enough to drive adoption, one could imagine there might be some government resources that might.

Sadly browsers don't seem to warn users that they couldn't connect because of the lack of IPv6 (and doing so would be difficult for IPv6-only DNS servers), so it just looks like a regular connection failure.

SchemaLoad 1/21/2026|||
One interesting development is the Matter standard for controlling smart home devices is v6 only. Every lightbulb, switch, sensor etc gets a v6 address and can be individually communicated to without having a manufacturers hub translating in the middle.
speedgoose 1/20/2026|||
It would be a strange and unnecessary risk to take for a startup in my opinion.
patmorgan23 1/20/2026||
It's really not a risk, as long as you dual stack your edge.
oasisbob 1/20/2026||
Exclusively IPv6 without any transitional mechanisms would be difficult to succeed with.

However, there are network upstarts like Jio (India) which made huge v6 investments from day one which use 464xlat for subscribers to access v4-only resources.

1970-01-01 1/20/2026|||
>Exclusively IPv6 without any transitional mechanisms would be difficult to succeed with.

That's my point; why is it still difficult? What exactly are the pain points for a fully commercialized native IPV6-only business, and why do we think it will be easier to maintain the status quo?

patmorgan23 1/20/2026|||
There are still lots of customers with IPv6, if you go completely and totally v6 only then you limit your potential customer base. Now going v6 internally with a dual stack edge makes sense, Meta has done this.
pixl97 1/20/2026||||
Because a few large companies are holdouts. Github for example. Some AWS backend stuff. Many smaller ISPs that represent a very long tail.

Most of it is not any particular difficulty for you, but because of someone else.

tormeh 1/20/2026|||
Many wired networks are IPv4-only, so you've excluded a bunch of consumers. It'd be like not supporting the Edge browser.
immibis 1/20/2026|||
Also every mobile phone network ever (with a handful of exceptions) is IPv6-only, with a slow translation layer to reach v4 sites. Your app or website literally runs faster if you use IPv6.
More comments...