It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.
By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.
The RIPE Database allows Whois queries on Internet resources.
Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".
Search results from ripe.net
75 items matching your search terms
61
Page
- On RIPE Labs
This is the first of two articles in which we present a new attack vector on the routing infrastructure of the Internet using BGP communities.
62
Page
- On RIPE Labs
How does the largest cloud provider worldwide perform Traffic-Engineering? What are the implications for the geo-distributed applications running in the cloud? ...
63
Page
- On RIPE Labs
DNS over TLS (DoT) is an extension to the DNS over UDP/53 (Do53) protocol, which provides additional confidentiality to the DNS messages between client and ...
64
Page
- On RIPE Labs
One of the most noble narratives about the Internet is that it is built on trust. This article sets out to check if that saying still holds true.
65
Page
- On RIPE Labs
There are many resources available to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling.
66
Page
- On RIPE Labs
In this article, we investigate the various relationships between MPLS tunnels and standard probing techniques (i.e., ping and traceroute). We investigate ...
67
Page
- On RIPE Labs
The Internet was built using an architectural principle of a simple network and agile edges. The basic approach was to assume that the network is a simple ...
68
Page
- On RIPE Labs
BGP prefix hijacking is a persistent threat against Internet organisations, attributed to a lack of authorisation and authentication mechanisms in the ...
69
Page
- On RIPE Labs
We're looking at user-to-user connections, based on RIPE Atlas measurements and ISP's end-user market share estimates provided by the APNIC.
70
Page
- On RIPE Labs
The number of Resource Certificates and ROAs is steadily growing, especially in the RIPE NCC service region. However, it remains unclear how widely BGP ...
75 items matching your search terms