You are here: Home > Publications > RIPE Labs
RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

147 items matching your search terms
51
This article describes a newly discovered DNS protocol vulnerability that affects most recursive DNS resolvers. NXNSAttack allows the execution of random ...
52
Keeping the channels of communication between us and the wider Internet community open has always been one of our main priorities. Just lately we received ...
53
Border Gateway Protocol (BGP) is the only exterior gateway protocol created to control traffic between Internet Service Providers (ISPs) all over the world. ...
54
Page - On RIPE Labs
In this article we are looking at possible ways to prevent denial of service attacks. One solution could be to use TCP instead of UDP for large DNS responses. ...
55
Through empirical research, SHARE Foundation created a map of the Internet in Serbia and analysed the implications network structure could have on Internet ...
56
Please read this guest post by Tony Scheid about fighting Distributed Denial of Service (DDoS) attacks during the Olympics in Rio de Janeiro.
57
This article explains our approach when a resource holder has an invalid abuse contact and does not respond to our automated emails.
58
In this article, we describe how we detected a large number of fraudulent sites using tools developed by SIDN Labs.
59
This article describes a technical design for the introduction of abuse contact details in the RIPE Database and streamlining the general approach to handling ...
60
Page - On RIPE Labs
Much has been said in recent weeks about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial ...
147 items matching your search terms