Banner image

RIPE NCC

Latest articles

kyc cover

KYC at the RIPE NCC: How We Keep Member Information Accurate

Author image
Gabor de Wit

10 min read

Becoming a RIPE NCC member is straightforward, but keeping a trusted registry means doing careful checks behind the scenes. This article explains how we verify members at onboarding, monitor changes over time, and follow up on escalations.

Article tags:

20 Please read the article before liking.
0
aspa_cover

ASPA in the RPKI Dashboard: A New Layer of Routing Security

Author image
Tim Bruijnzeels

10 min read

ASPA is now available in the RIPE NCC RPKI Dashboard, adding a way to express and validate your upstream relationships on top of ROA-based origin validation. Building on its introduction at RIPE 91, this article explains what ASPA does, why it matters, and how to start thinking about deployment.

Article tags:

53 Please read the article before liking.
0
IPv4-Lease-Price-Trends-Predictions-for-2025

IPv4 Transfer Policies and Market Dynamics: Observations Across the RIR System

Author image
Paulius Judickas

5 min read

The exhaustion of IPv4 address space continues to influence how Regional Internet Registries (RIRs) operate and how network operators plan their strategies. While IPv6 adoption advances, IPv4 remains essential for connectivity, particularly in commercial and large-scale deployments. As scarcity gro…

Article tags:

29 Please read the article before liking.
0
digital stop

Automated Self-Service to End Sponsoring of Independent Resources

Author image
Marco Schmidt

6 min read

Our new fully-automated self-service form lets LIRs end sponsorship of Provider Independent (PI) resources instantly - cutting errors, easing the end-of-year rush, and improving follow-up.

Article tags:

54 Please read the article before liking.
1

All articles

nro_rirs

A Solution to Concerns on the Current RPKI Trust Anchor Configuration

Author image
Sofía Silva Berenguer

3 min read

Representatives of the five RIRs propose RPKI Trust Anchor constraints - a draft RPKI protocol that binds each trust anchor to its rightful resources, enabling safe inter-RIR transfers and so closing a long-standing validation gap.

Article tags:

28 Please read the article before liking.
0
sdg_ncc_cover

Enabling Sustainable Development Through Internet Coordination

Author image
Hisham Ibrahim

9 min read

The path to sustainable development runs through the Internet’s technical core. Beneath every digital service, every collaboration, and every step forward in how societies grow and adapt lies the infrastructure that supports progress in education, healthcare, governance, innovation, and more. The R…

Article tags:

49 Please read the article before liking.
0
irr cover

The IRR Landscape: Where Do ASes Keep Their Routes?

Author image
Stavros Konstantaras

18 min read

We map where networks actually publish routing data - across RIR-run and third-party IRRs - and how that data is used in practice. Connecting our findings with RPKI growth and exploring regional patterns, we examine legacy space and operational risks to suggest clear clean-up priorities.

Article tags:

117 Please read the article before liking.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Andrei Robachevsky - ICP-2 In Review: Charting the RIR Lifecycle

Author image
Alun Davies

4 min read

ICP-2 lays out the criteria for the recognition of new RIRs. But what about the rest of the lifecycle of the organisations that coordinate the allocation and public registration of unique IP numbers? In this episode, Andrei Robachevsky of the NRO NC talks about the ICP-2 review.

Article tags:

76 Please read the article before liking.
0
Piracy Shield

Live-Event Blocking at Scale: Effectiveness vs. Collateral Damage in Italy’s Piracy Shield

Author image
Antonio Prado

9 min read

Italy’s Piracy Shield blocks IPs and domains within minutes, but measurements performed by researchers at the University of Twente and colleagues show broad collateral damage to legitimate services. We share the results of those measurements in the hopes of sparking a community discussion around th…

Article tags:

47 Please read the article before liking.
3
CA 2025 cover

CAPIF 4: Advancing Internet Technologies in Central Asia

Author image
Qasim Lone

13 min read

Ahead of CAPIF 4, we once again pause to examine the latest in Central Asia’s digital transformation. Against a backdrop of deepening regional cooperation, we chart improvements in routing security and IPv6 adoption, while also probing interconnection patterns as seen in K-root data.

Article tags:

67 Please read the article before liking.
0

Showing 328 article(s)

Previous
1 2 3 ... 33
Next