beanz Magazine


Nick Royer on Flickr

Bogons are not an evil race of aliens. But they do shine a light on one part of the internet little known outside of a few security technologists.

A bogon is a unique IP (internet protocol) address currently listed as inactive but used by someone to login to a website or send email.

If you don’t know, every computer on the internet has a unique IP address assigned to it. That’s how traffic for websites, email, video, and so on gets to the right place. These IP addresses are handed out in blocks of many numbers, not individual numbers. These unused address ranges are available publicly online and spammers and others deliberately use them.

The name bogon has several possible sources. Australians in Melbourne were among the first to realize traffic from these fake unused IP addresses could be used to stop spam and other malicious traffic. In Australian culture, a bogon has a similar meaning as redneck in the US culture, a word to designate someone of lower economic class. But the term bogon also represents bogus networks, bogus being American slang.

So, sorry, bogons are not an evil race of aliens.

As mentioned above, every computer connected to the internet has its own unique address. The address works like your postal address: you live on a specific street with a unique location made up of a number, street name, city, and so on.

On the internet, addresses for computers are made up of three-digit chunks separated by dots, for example, This is called IPv4 because there are four chunks of these three-digit numbers. Currently IPv6 is being rolled out because the older numbers are assigned. IPv6 has, you guessed it, six three-digit chunks separated by dots, for example,

IPv6 is needed because of the vast number of phones and other computers connected to the internet that need, and will need, unique IP addresses to identify and route traffic to and from them.

If you want to see IP addresses in the wild, open command line software like Terminal or iTerm and type this command:


When a few entries return in response to this command, type Control + C to stop the flow of data. You don’t want to hassle internet computers.

This ping command will return lines like this one:

64 bytes from icmp_seq=0 ttl=246 time=92.069 ms

The is the IPv4 address for Or, I should say, one possible address because larger organizations sometimes use several different IP addresses depending on where their websites and applications are hosted.

People who want to use the internet to send spam email have difficulty getting hold of IP addresses for computers to send out their emails. Looking up an unused IP address range, or block, of numbers is an easy way to send out their traffic with a fake address.

To combat the use of bogons, people who administer computer networks use a bogon reference list to block email and other traffic from these unused addresses. However, the list changes somewhat over time and traffic can be blocked when it should be allowed. And, in theory, not every computer network pays attention to the bogon list. Traffic gets through. It’s estimated using the bogon reference list shuts out 60% of spam and other malicious traffic.

While bogons are not an alien race in a comic book series, there is an equivalent of the Justice League, the DC Comics invention with Superman, Batman, Flash, Wonder Woman, Aquaman, and my favorite name, the Martian Manhunter.

Team Cymru, pronounced kum-ree in Welsh, doesn’t have Superman or Wonder Woman, but they do have a neat red dragon logo (I like dragons). They also actively promote interest in and use of the bogon list and other security initiatives. Founded in 1998, they are a group of researchers from around the world who work on internet security issues.

Learn More


Martian Packets

Unsung Heroes Save Net from Chaos

IANA (Internet Assigned Numbers Authority)

Team Cymru

Bogons Ate My Website

Justice League

Also In The May 2014 Issue

Computer Science Unplugged

The Computer Science Unplugged movement introduces non-technical people to computer hardware and software concepts that drive the technologies we use.

What is Computational Thinking?

While computers think in rigid predictable patterns, learning computational thinking helps us understand how and why computers work.


We've all used Captchas and found some impossible to solve. Here's why they exist, how they work, and less frustrating alternatives.

Data Types

Programming languages use data types to allocate memory and enforce data integrity. They also reveal the nature of a language.

Lauren Ipsum

If the idea of a computer science book without computers upsets you, please close your eyes until you've finished reading.

The Turing Test

The Turing Test, and its creator Alan Turing, have had a profound effect on computer science and artificial intelligence.

If debugging is the process of removing software bugs, then programming must be the process of putting them in.

May 2014 Learn More Links

Links from the bottom of all the May 2014 articles, collected in one place for you to print, share, or bookmark.


One of two key programming languages (Lisp is the other), FORTRAN defined many of the key ideas used in programming languages.

May 2014 News Wire

Interesting stories about computer science, software programming, and technology for the month of April 2014.

How to Create (and Crack) Secret Codes and Ciphers

Secret codes, or ciphers, are a great way to teach computational thinking.

Grace Hopper

One of the first female programmers, Grace Hopper also worked as a mathematician and had an unusual career for women in the 1900s.


Bogons are not an evil race of aliens. But they do shine a light on one part of the internet little known outside of a few security technologists.