- Order by phone: 0800 033 8006
- Blog
- Coverage checker
- Store locator
yesterday
I am hoping someone from Three’s technical team can clarify what is actually being provided on 5G broadband. After detailed testing, it is clear that although Three does issue public IPv4 addresses, unsolicited inbound connectivity is still blocked upstream in a way that behaves like CGNAT.
I hope to confirm and validate if others see the same behaviour while on the "3internet" APN.
**NOTE: This was also tested using Eero to rule out misconfigurations. However, this behaviour is persistent across all devices and should be reproducible.
IP Address: 92.40.102.[REDACTED] Gateway: 92.40.102.13 Netmask: 255.255.255.0 DNS: 92.40.102.13, 192.168.0.1
Unsolicited inbound packets never reach my equipment.
The following nmap commands were executed from another network (Outside Three's network):
nmap -Pn 92.40.102.[REDACTED]
Why Nmap? It is a simple standard tool to determine port state: open, closed, or filtered (RFC 793, TCP).
Host is up. PORT STATE SERVICE 22/tcp filtered ssh 23/tcp filtered telnet 25/tcp filtered smtp 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 1900/tcp filtered upnp 2869/tcp filtered icslap
nmap -Pn 92.40.102.99
Host is up. PORT STATE SERVICE 25/tcp filtered smtp 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 1900/tcp filtered upnp 2869/tcp filtered icslap
nmap -Pn 92.40.102.13
PORT STATE SERVICE 53/tcp open domain 22/tcp filtered ssh 25/tcp filtered smtp 80/tcp filtered http 443/tcp filtered https 445/tcp filtered microsoft-ds
This explains why port forwarding, DMZ, IP Passthrough, and UPnP have no effect... Basically, all packets are filtered before they even reach your home equipment.
I just want clarity on what level of connectivity is provided.
Three 5G provides a public IPv4 address, but inbound traffic is blocked by a carrier-side stateful firewall applied to a shared /24 subnet, making it functionally equivalent to CGNAT. Verified via Nmap scans of my IP, a random IP in the same subnet, and the gateway.
yesterday - last edited yesterday
I use Tailscale to allow inbound connectivity to my home network from remote locations and it works well.
There is no need to open ports or use the external IP address which changes every time the hub reconnects.
yesterday
Hey @MymsMan,
I completely agree! Tailscale, ZeroTier, and NetBird are excellent solutions for secure remote access to a home network. They work really well without needing to open ports, without relying on changing public IPs, or deal with NAT issues. I personally use all three myself depending on the setup, and they are reliable and safe for most scenarios.
That said, I don’t think there’s any reason for Three to deploy restrictive firewalls on public IPv4 addresses.
For example, I run a personal web server that requires ports 80 and 443 to be open for HTTP/HTTPS traffic, including obtaining Let’s Encrypt certificates and reverse proxying. I also self-host my own Nextcloud instance (friends and family only) and occasionally a Minecraft server or two.
However, blocking all inbound traffic seems overly restrictive for users like me who are just trying to use their connections fairly.
While VPN overlays and mesh networks are fantastic for many scenarios, there are still legitimate cases where having true inbound connectivity makes things simpler, more reliable, and compatible with standard internet protocols.