IPv6 Full (Expanded + Compressed) Regex for JavaScript
/^(([0-9a-fA-F]{1,4}:){7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:(:[0-9a-fA-F]{1,4}){1,6}|:(:[0-9a-fA-F]{1,4}){1,7}|::)$/iWhat this pattern does
This page provides a comprehensive, battle-tested regular expression for matching ipv6 full (expanded + compressed), ported and verified for JavaScript. A rigorously tested regex reduces debugging time and protects your application from edge-case failures. The snippet below is ready to drop into your JavaScript project — whether you're validating in an Express middleware, a Next.js API route, or a client-side form.
Javascript Implementation
// IPv6 Full (Expanded + Compressed)
// ReDoS-safe | RegexVault — Web & Network > IPv6
const ipv6FullExpandedCompressedRegex = /^(([0-9a-fA-F]{1,4}:){7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:(:[0-9a-fA-F]{1,4}){1,6}|:(:[0-9a-fA-F]{1,4}){1,7}|::)$/i;
function validateIpv6FullExpandedCompressed(input: string): boolean {
return ipv6FullExpandedCompressedRegex.test(input);
}
// Example
console.log(validateIpv6FullExpandedCompressed("2001:db8::1")); // trueTest Cases
Matches (Valid) | Rejects (Invalid) |
|---|---|
2001:db8::1 | :::1 |
::1 | 2001::db8::1 |
fe80::1 | gggg::1 |
:: | 2001:db8:85a3:0000:0000:8a2e:0370:7334:extra |
2001:0db8:85a3::8a2e:0370:7334 | 192.168.1.1 |
1:2:3:4:5:6:7:8 | — |
When to use this pattern
This pattern is drawn from the Web & Network > IPv6 category and carries a ReDoS-safe certification. That matters for JavaScript developers because especially critical in long-running Node.js event loops where a ReDoS vulnerability can block the entire process. RegexVault audits patterns against known backtracking attack vectors, ensuring you have the necessary context before using this regex in a high-stakes production environment.
Common Pitfalls
The :: (all zeros) case must be explicitly included as the final alternation. Do not try to simplify this with a single alternation — it will either over-match or under-match.
Technical Notes
Each alternation handles a specific number of groups before/after ::. The :: can appear at most once (enforced by alternation structure, not lookahead). Go's RE2 may have issues with alternation of this complexity — use net.ParseIP() in Go instead.
Have a pattern that belongs in the vault?
Submit it for review — community-verified patterns get credited to your GitHub handle. Free submissions join the queue. Priority review available for $15.
Submit a Pattern