RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

75 items matching your search terms
41
There have been growing concerns over the last few years about the excessive concentration of control over the Internet's markets and infrastructure — what is ...
42
The secondary IP address market has become a viable source of IPv4 address space, but it may also present opportunities to malicious networks to bypass ...
43
Open DNS resolvers that answer queries coming from anyone have been the main component of a large number of DDoS attacks in recent years.
44
BGP Route Flap Damping (RFD) and its use has been a controversial topic in the past. Recommendations have been revised multiple times over the past two decades ...
45
All Internet communication relies on the Domain Name System (DNS), which maps a human-readable name to an IP address before two endpoints establish a ...
46
In this article, we investigated booter-based DDoS attacks in the wild and the impact of an FBI takedown targeting fifteen booter websites in December 2018. We ...
47
Measuring domain usage on centralised public DNS resolvers can be very useful, but it's also pretty hard to do. Trufflehunter is a new open source tool that ...
48
It’s 1990: the Internet has a few million users and the first commercial companies have recently embraced this new distributed infrastructure.
49
Amplification DDoS attacks are one of the most prevalent forms of denial-of-service attacks. The SISSDEN project (sissden.eu) operates a network of honeypots ...
50
Dual-stack has been one of the most popular transition technologies used to deploy IPv6. This is largely because it allows for routing of IPv4 and IPv6 traffic ...
75 items matching your search terms