RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

45 items matching your search terms
21
You might not have noticed, but there are chances that your ISP is playing nasty tricks with your DNS traffic.
22
Page - On RIPE Labs
One way or another we’ve been working on various aspects of securing the Internet’s inter-domain routing system for many years.
23
Page - On RIPE Labs
The adoption of the RPKI system is growing rapidly. To make sure the system scales, we’ve developed a new protocol that should drastically improve fetch times ...
24
In this article I am looking a some fundamental developments on the Internet over the last decade. Nothing much has changed - or has it?
25
Route Origin Validation (ROV), based on Route Origination Authorization (ROA), is increasingly being deployed by registries, organisations and users worldwide ...
26
There are many flavours of BGP hijacks, misconfigurations or outdated implementations. Here are some examples and tips how to verify your announcements.
27
ARTEMIS is a defense approach against BGP prefix hijacking attacks. It is (a) based on accurate and fast detection operated by the AS itself, by leveraging the ...
28
When the Internet started to become widely used in the 1990s, most traffic used just a few protocols: IPv4 routed packets, TCP turned those packets into ...
29
Before we decide to implement a stricter operational practices, we needed to find out how many routes with invalid origins are actually being used and how much ...
30
In this article, we investigated booter-based DDoS attacks in the wild and the impact of an FBI takedown targeting fifteen booter websites in December 2018. We ...
45 items matching your search terms