[148553] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: ANNOUNCE: bgptables.merit.edu - understanding visibility of your

daemon@ATHENA.MIT.EDU (Robert Kisteleki)
Wed Jan 18 09:38:07 2012

Date: Wed, 18 Jan 2012 15:37:11 +0100
From: Robert Kisteleki <robert@ripe.net>
To: "nanog@nanog.org list" <nanog@nanog.org>
In-Reply-To: <28673266-0FE2-408D-BAAC-4297ED92AA41@gmail.com>
Cc: Manish Karir <mkarir@merit.edu>, Arturo Servin <arturo.servin@gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On 2012.01.18. 15:22, Arturo Servin wrote:
> 
> 	For example for any given prefix to get which ASNs have originated that prefix over time and when.
> 
> 	I think that could be interesting for discovering if a prefix has been hijacked in the past.
> 
> 	RIS from RIPE NCC provides something like this:
> 
> http://www.ripe.net/data-tools/stats/ris/routing-information-service
> 
> 	We have used it to verify some "suspicious" announcements of prefixes. 
> 
> Regards,
> as

One can also try RIPEstat for this: http://stat.ripe.net/

Amongst other modules it gives full (~10 year) BGP history for prefixes.

(Disclaimer: our team is working on this tool.)

Robert




home help back first fref pref prev next nref lref last post