#routingsecurity search results

🧵AS24028 announced again prefix 2001:500:2f::/48, which belongs to the Internet Systems Consortium's “F-Root” domain server, one of the authoritative name servers for the DNS root zone, effectively conducting an exact prefix hijack. #hijack #routingsecurity

leftman76's tweet image. 🧵AS24028 announced again prefix 2001:500:2f::/48, which belongs to the Internet Systems Consortium's “F-Root” domain server, one of the authoritative name servers for the DNS root zone, effectively conducting an exact prefix hijack. 
#hijack #routingsecurity

The @CodeBGP Platform detected that AS24028 conducted an exact prefix hijack of prefix: 2001:500:2f::/48, which belongs to the Internet Systems Consortium's “F-Root” domain server, one of the authoritative name servers for the DNS root zone. #hijack #routingsecurity

leftman76's tweet image. The @CodeBGP Platform detected that AS24028 conducted an exact prefix hijack of prefix: 2001:500:2f::/48, which belongs to the Internet Systems Consortium's “F-Root” domain server, one of the authoritative name servers for the DNS root zone.
#hijack #routingsecurity

🧵1/3 Since last night the @CodeBGP Platform has detected that AS17639 is hijacking prefix 2001:500:a8::/48, which belongs to @NASA (Ames Research Center) and serves as the IPv6 prefix of the “E-Root” domain server. #hijack #routingsecurity #CodeBGP

leftman76's tweet image. 🧵1/3 Since last night the @CodeBGP  Platform has detected that AS17639 is hijacking prefix 2001:500:a8::/48, which belongs to @NASA  (Ames Research Center) and serves as the IPv6 prefix of the “E-Root” domain server. 
#hijack #routingsecurity #CodeBGP
leftman76's tweet image. 🧵1/3 Since last night the @CodeBGP  Platform has detected that AS17639 is hijacking prefix 2001:500:a8::/48, which belongs to @NASA  (Ames Research Center) and serves as the IPv6 prefix of the “E-Root” domain server. 
#hijack #routingsecurity #CodeBGP

3/3 Interestingly, the suspicious announcements were only picked up by only one RIS Peer. The blog post raises concerns about the low visibility of these announcements and suggests the possibility of a RIS peer malfunction. #CodeBGP #routingsecurity

leftman76's tweet image. 3/3 Interestingly, the  suspicious announcements were only picked up by only one RIS Peer. The  blog post raises concerns about the low visibility of these  announcements and suggests the possibility of a RIS peer malfunction.
#CodeBGP #routingsecurity

Route Origin Authorizations (ROAs) Stats - MANRS OBSERVATORY IPv4 Valid Route 57,05% roa-stats.manrs.org #ROA #RPKI #routingsecurity #MANRS #BGP #IPv4

mauro_ronzana's tweet image. Route Origin Authorizations (ROAs) Stats - MANRS OBSERVATORY

IPv4 Valid Route 57,05%

roa-stats.manrs.org
#ROA #RPKI #routingsecurity  #MANRS #BGP #IPv4

Today, we've republished an article on "The IRR Landscape: Where Do ASes Keep Their Routes?" that originally appeared on the RIPE NCC blog. manrs.org/2025/11/the-ir… #routingsecurity #MANRS #IRR #InternetRoutingRegistries #IXP #InternetExchangePoint


Great post "Dissecting the FCC’s Proposal to Improve BGP Security" via @DougMadory @kentikinc - clearly some US ISPs still have work to do! #BGP #RoutingSecurity #RPKI #ROV #ROA #BGPsecurity #FCC kentik.com/blog/dissectin…

jlivingood's tweet image. Great post "Dissecting the FCC’s Proposal to Improve BGP Security" via @DougMadory @kentikinc - clearly some US ISPs still have work to do! #BGP #RoutingSecurity #RPKI #ROV #ROA #BGPsecurity #FCC kentik.com/blog/dissectin…

🧵1/3 The @CodeBGP Platform has detected that AS137661 is announcing prefix 199.7.83.0/24, which belongs to @ICANN and is the “L-Root” IPv4 DNS prefix. Blog post with all the details: codebgp.com/blog/suspiciou… #CodeBGP #RoutingSecurity

leftman76's tweet image. 🧵1/3 The @CodeBGP Platform has detected that AS137661 is announcing prefix 199.7.83.0/24, which belongs to @ICANN and is the “L-Root” IPv4 DNS prefix.
Blog post with all the details: codebgp.com/blog/suspiciou…
#CodeBGP #RoutingSecurity

Route Origin Authorizations (ROAs) Stats - IPv6 Valid Route 59,97% (Source MANRS OBSERVATORY) roa-stats.manrs.org #ROA #RPKI #routingsecurity #MANRS #BGP #IPv6

mauro_ronzana's tweet image. Route Origin Authorizations (ROAs) Stats - IPv6 Valid Route 59,97% (Source MANRS OBSERVATORY)

roa-stats.manrs.org
#ROA #RPKI #routingsecurity  #MANRS #BGP #IPv6

ASPA support has now been merged into the main branch of Routinator. As of today, I’m counting 47 ASPAs out in the wild. #RPKI #RoutingSecurity

routinator3000's tweet image. ASPA support has now been merged into the main branch of Routinator. As of today, I’m counting 47 ASPAs out in the wild. #RPKI #RoutingSecurity

If you’re at #NANOG95 and are responsible for #RoutingSecurity at your organization, don’t miss our hands-on #RPKI #DeepDive workshop on Wednesday afternoon! Additional sign-up required: nanog.org/events/rpki-de… @nanog #NetworkOperators #Cybersecurity #Workshop #Training

TeamARIN's tweet image. If you’re at #NANOG95 and are responsible for #RoutingSecurity at your organization, don’t miss our hands-on #RPKI #DeepDive workshop on Wednesday afternoon! 

Additional sign-up required: nanog.org/events/rpki-de… 

@nanog #NetworkOperators #Cybersecurity #Workshop #Training

🔐 Strengthening Internet routing security starts here! Nicolas Antoniello (#ICANN), Santiago Aggio, and Silvia Chávez are leading the "Secure Routing and Origin Validation Lab" at #LACNIC43. 📺 Watch live: bit.ly/42Wai9W #RoutingSecurity #InternetSecurity

ICANN's tweet image. 🔐 Strengthening Internet routing security starts here!
Nicolas Antoniello (#ICANN), Santiago Aggio, and Silvia Chávez are leading the "Secure Routing and Origin Validation Lab" at #LACNIC43.
📺 Watch live: bit.ly/42Wai9W
#RoutingSecurity #InternetSecurity

FINAL REMINDER: The Origin AS field will be removed from the ARIN database on 28 July. We recommend any customers who query the Origin AS database for #RoutingSecurity or operational purposes transition to a more modern+secure alternative like #RPKI or IRR arin.net/announcements/…

TeamARIN's tweet image. FINAL REMINDER: The Origin AS field will be removed from the ARIN database on 28 July. We recommend any customers who query the Origin AS database for #RoutingSecurity or operational purposes transition to a more modern+secure alternative like #RPKI or IRR arin.net/announcements/…

Our #RPKI webinar helps with #routingsecurity and explains the steps needed to implement RPKI in your network. It includes demos showing RPKI implementation from end-to-end. This webinar is open to all, register for free at: learning.ripe.net/w/courses/23-d…

ripencc's tweet image. Our #RPKI webinar helps with #routingsecurity and explains the steps needed to implement RPKI in your network. It includes demos showing RPKI implementation from end-to-end. This webinar is open to all, register for free at:
learning.ripe.net/w/courses/23-d…

The Origin AS field has now been removed from the ARIN database. Customers who queried the Origin AS database for #RoutingSecurity or operational purposes should transition to a more modern and secure alternative such as #RPKI or the IRR. Learn more: arin.net/announcements/…

TeamARIN's tweet image. The Origin AS field has now been removed from the ARIN database. Customers who queried the Origin AS database for #RoutingSecurity or operational purposes should transition to a more modern and secure alternative such as #RPKI or the IRR. Learn more: arin.net/announcements/…

Internet at a crossroad session. Kevin Chege explains routing incident examples that cause real world problems. #ISOCDay #routingsecurity @AIS_Africa #routeleaks #hijacking

Saltaail's tweet image. Internet at a crossroad session. 
Kevin Chege explains routing incident examples that cause real world problems. #ISOCDay #routingsecurity @AIS_Africa #routeleaks #hijacking

ARIN recently participated in @TheCtunion's #ICT Week, focusing on "Driving Change: Connecting Futures." The event highlighted the importance of #RoutingSecurity, #IPv6 adoption, and number resource autonomy in the Caribbean. Read more on the blog: arin.net/blog/2025/10/1…

TeamARIN's tweet image. ARIN recently participated in @TheCtunion's #ICT Week, focusing on "Driving Change: Connecting Futures." The event highlighted the importance of #RoutingSecurity, #IPv6 adoption, and number resource autonomy in the Caribbean. Read more on the blog: arin.net/blog/2025/10/1…

Route Origin Authorizations (ROAs) Stats - MANRS OBSERVATORY IPv4 Valid Route 55,55% roa-stats.manrs.org #ROA #RPKI #routingsecurity #MANRS #BGP #IPv4

mauro_ronzana's tweet image. Route Origin Authorizations (ROAs) Stats - MANRS OBSERVATORY

IPv4 Valid Route 55,55%

roa-stats.manrs.org
#ROA #RPKI #routingsecurity  #MANRS #BGP #IPv4

Why is #RoutingSecurity important & how does #RPKI enhance it? Watch to learn, then: Visit arin.net/rpki to get started; view an on-demand RPKI webinar at arin.net/webinars; & register for #ARINAcademy at arinacademy.tovuti.io to take an interactive RPKI course.


Will you be at the @enisa_eu Telecom & Digital Infrastructure Security Forum this Wednesday? Then you have the opportunity to chat to Enea VP of Government Relations, @RowlandCorr. Don't miss his talk exploring #RoutingSecurity risks & oversight in #MobileSignaling. Details⬇️

EneaGovBodies's tweet image. Will you be at the @enisa_eu Telecom & Digital Infrastructure Security Forum this Wednesday? Then you have the opportunity to chat to Enea VP of Government Relations, @RowlandCorr. Don't miss his talk exploring #RoutingSecurity risks & oversight in #MobileSignaling. Details⬇️

Today, we've republished an article on "The IRR Landscape: Where Do ASes Keep Their Routes?" that originally appeared on the RIPE NCC blog. manrs.org/2025/11/the-ir… #routingsecurity #MANRS #IRR #InternetRoutingRegistries #IXP #InternetExchangePoint


Route Origin Authorizations (ROAs) Stats - MANRS OBSERVATORY IPv4 Valid Route 57,05% roa-stats.manrs.org #ROA #RPKI #routingsecurity #MANRS #BGP #IPv4

mauro_ronzana's tweet image. Route Origin Authorizations (ROAs) Stats - MANRS OBSERVATORY

IPv4 Valid Route 57,05%

roa-stats.manrs.org
#ROA #RPKI #routingsecurity  #MANRS #BGP #IPv4

If you’re at #NANOG95 and are responsible for #RoutingSecurity at your organization, don’t miss our hands-on #RPKI #DeepDive workshop on Wednesday afternoon! Additional sign-up required: nanog.org/events/rpki-de… @nanog #NetworkOperators #Cybersecurity #Workshop #Training

TeamARIN's tweet image. If you’re at #NANOG95 and are responsible for #RoutingSecurity at your organization, don’t miss our hands-on #RPKI #DeepDive workshop on Wednesday afternoon! 

Additional sign-up required: nanog.org/events/rpki-de… 

@nanog #NetworkOperators #Cybersecurity #Workshop #Training

Attending #NANOG95 next week? Join our Dir. of Customer Technical Services, Brad Gorman, for a hands-on #RPKI workshop on Wednesday, 29 October, at 2-4 PM CT. Additional registration required — spots are limited, so secure yours now! nanog.org/events/rpki-de… #RoutingSecurity

Level Up Your Game at These N95 Workshops! Register (Oct. 27-29) in #Arlington, #TX #BGP For #DataCenters - Hands-on #workshop - #BorderGatewayProtocol nanog.org/events/bgp-for… #RPKI Deep Dive - Securing the global #routing infrastructure is critical. nanog.org/events/rpki-de…

nanog's tweet image. Level Up Your Game at These N95 Workshops!
Register (Oct. 27-29) in #Arlington, #TX 

#BGP For #DataCenters - Hands-on #workshop - #BorderGatewayProtocol nanog.org/events/bgp-for…

#RPKI Deep Dive - Securing the global #routing infrastructure is critical.  nanog.org/events/rpki-de…


ARIN recently participated in @TheCtunion's #ICT Week, focusing on "Driving Change: Connecting Futures." The event highlighted the importance of #RoutingSecurity, #IPv6 adoption, and number resource autonomy in the Caribbean. Read more on the blog: arin.net/blog/2025/10/1…

TeamARIN's tweet image. ARIN recently participated in @TheCtunion's #ICT Week, focusing on "Driving Change: Connecting Futures." The event highlighted the importance of #RoutingSecurity, #IPv6 adoption, and number resource autonomy in the Caribbean. Read more on the blog: arin.net/blog/2025/10/1…

The @theNRO has a new reference page to help create Route Origin Authorizations (ROAs) across all five RIRs, bringing together documentation, contacts, and process differences, to make it easier to deploy RPKI. #RoutingSecurity #RPKI #ROA #MANRS #RIRs manrs.org/2025/10/a-new-…


Route Origin Authorizations (ROAs) Stats - IPv6 Valid Route 59,97% (Source MANRS OBSERVATORY) roa-stats.manrs.org #ROA #RPKI #routingsecurity #MANRS #BGP #IPv6

mauro_ronzana's tweet image. Route Origin Authorizations (ROAs) Stats - IPv6 Valid Route 59,97% (Source MANRS OBSERVATORY)

roa-stats.manrs.org
#ROA #RPKI #routingsecurity  #MANRS #BGP #IPv6

Day two of @CaribNOG 30 is underway! Tune in to the live webcast 👇 and be sure to catch ARIN CTO Mark Kosters' presentation on "Routing Security 101: Understanding RPKI" at 11:20 AM ET/AST 🔐 #CaribNOG30 #RoutingSecurity #RPKI #CaribbeanTech #Networking youtube.com/live/uQVKyb0hj…

TeamARIN's tweet card. CaribNOG 30 Regional Gathering Day 2

youtube.com

YouTube

CaribNOG 30 Regional Gathering Day 2


SIDN Labs studied how to measure routing security controls for MANRS+, finding gaps in current metrics & building a prototype for stronger compliance checks. Report + code now live. Read more 👉 manrs.org/2025/09/manrs-… #MANRS #routingsecurity #BGP #ROV #RPKI


No results for "#routingsecurity"

We're at #NANOG91 this week! Come chat with @LeslieLDaigle about #MANRS and #routingsecurity.

RoutingMANRS's tweet image. We're at #NANOG91 this week! Come chat with @LeslieLDaigle about #MANRS and #routingsecurity.

ARIN recently participated in @TheCtunion's #ICT Week, focusing on "Driving Change: Connecting Futures." The event highlighted the importance of #RoutingSecurity, #IPv6 adoption, and number resource autonomy in the Caribbean. Read more on the blog: arin.net/blog/2025/10/1…

TeamARIN's tweet image. ARIN recently participated in @TheCtunion's #ICT Week, focusing on "Driving Change: Connecting Futures." The event highlighted the importance of #RoutingSecurity, #IPv6 adoption, and number resource autonomy in the Caribbean. Read more on the blog: arin.net/blog/2025/10/1…

BGP route leak at Angola Cables slows Internet connectivity for many Australians manrs.org/2023/05/bgp-ro… #routingsecurity

RoutingMANRS's tweet image. BGP route leak at Angola Cables slows Internet connectivity for many Australians manrs.org/2023/05/bgp-ro…
#routingsecurity

Bem-vindo à família de #routingsecurity CCI Internet (AS265461)🇧🇷

RoutingMANRS's tweet image. Bem-vindo à família de #routingsecurity CCI Internet (AS265461)🇧🇷

Enterprises, connectivity providers, and governments must work together to increase routing security manrs.org/2023/08/enterp… #RPKI #routingsecurity

RoutingMANRS's tweet image. Enterprises, connectivity providers, and governments must work together to increase routing security
manrs.org/2023/08/enterp…

#RPKI #routingsecurity

🔐 Strengthening Internet routing security starts here! Nicolas Antoniello (#ICANN), Santiago Aggio, and Silvia Chávez are leading the "Secure Routing and Origin Validation Lab" at #LACNIC43. 📺 Watch live: bit.ly/42Wai9W #RoutingSecurity #InternetSecurity

ICANN's tweet image. 🔐 Strengthening Internet routing security starts here!
Nicolas Antoniello (#ICANN), Santiago Aggio, and Silvia Chávez are leading the "Secure Routing and Origin Validation Lab" at #LACNIC43.
📺 Watch live: bit.ly/42Wai9W
#RoutingSecurity #InternetSecurity

Join us in welcoming @PCCWGlobal to the MANRS community #ProtectTheCore #RoutingSecurity

RoutingMANRS's tweet image. Join us in welcoming @PCCWGlobal to the MANRS community 
#ProtectTheCore #RoutingSecurity

Willkommen @DECIX Leipzig to the #IXP MANRS community. Thank you for your work toward improving #routingsecurity for us all.

RoutingMANRS's tweet image. Willkommen @DECIX Leipzig to the #IXP MANRS community. 
Thank you for your work toward improving #routingsecurity for us all.

Good MANRS make an impression on governments in USA and Netherlands, writes Ryan Polk manrs.org/2023/09/good-m… #RPKI #routingsecurity

RoutingMANRS's tweet image. Good MANRS make an impression on governments in USA and Netherlands, writes Ryan Polk
manrs.org/2023/09/good-m…

#RPKI #routingsecurity

ICYMI you can now see global Route Origin Validation #ROV data via the MANRS Observatory 🌐 6% globally 💪14% MANRS participants observatory.manrs.org/#/overview #rpki #routingsecurity

RoutingMANRS's tweet image. ICYMI you can now see global Route Origin Validation #ROV data via the MANRS Observatory 
🌐 6% globally
💪14% MANRS participants 
observatory.manrs.org/#/overview
#rpki #routingsecurity

Our #RPKI webinar helps with #routingsecurity and explains the steps needed to implement RPKI in your network. It includes demos showing RPKI implementation from end-to-end. This webinar is open to all, register for free at: learning.ripe.net/w/courses/23-d…

ripencc's tweet image. Our #RPKI webinar helps with #routingsecurity and explains the steps needed to implement RPKI in your network. It includes demos showing RPKI implementation from end-to-end. This webinar is open to all, register for free at:
learning.ripe.net/w/courses/23-d…

Enterprises lack tools to verify the security posture of their connectivity providers, survey manrs.org/2023/08/survey… #RPKI #routingsecurity

RoutingMANRS's tweet image. Enterprises lack tools to verify the security posture of their connectivity providers, survey manrs.org/2023/08/survey…
#RPKI #routingsecurity

From next month, MANRS Readiness Scores for Network Operator participants will be made public via manrs.org Learn more: manrs.org/2023/06/manrs-… #RPKI #IRR #RoutingSecurity

RoutingMANRS's tweet image. From next month, MANRS Readiness Scores for Network Operator participants will be made public via manrs.org Learn more: manrs.org/2023/06/manrs-… #RPKI #IRR #RoutingSecurity

FINAL REMINDER: The Origin AS field will be removed from the ARIN database on 28 July. We recommend any customers who query the Origin AS database for #RoutingSecurity or operational purposes transition to a more modern+secure alternative like #RPKI or IRR arin.net/announcements/…

TeamARIN's tweet image. FINAL REMINDER: The Origin AS field will be removed from the ARIN database on 28 July. We recommend any customers who query the Origin AS database for #RoutingSecurity or operational purposes transition to a more modern+secure alternative like #RPKI or IRR arin.net/announcements/…

🧵1/3 Since last night the @CodeBGP Platform has detected that AS17639 is hijacking prefix 2001:500:a8::/48, which belongs to @NASA (Ames Research Center) and serves as the IPv6 prefix of the “E-Root” domain server. #hijack #routingsecurity #CodeBGP

leftman76's tweet image. 🧵1/3 Since last night the @CodeBGP  Platform has detected that AS17639 is hijacking prefix 2001:500:a8::/48, which belongs to @NASA  (Ames Research Center) and serves as the IPv6 prefix of the “E-Root” domain server. 
#hijack #routingsecurity #CodeBGP
leftman76's tweet image. 🧵1/3 Since last night the @CodeBGP  Platform has detected that AS17639 is hijacking prefix 2001:500:a8::/48, which belongs to @NASA  (Ames Research Center) and serves as the IPv6 prefix of the “E-Root” domain server. 
#hijack #routingsecurity #CodeBGP

Great post "Dissecting the FCC’s Proposal to Improve BGP Security" via @DougMadory @kentikinc - clearly some US ISPs still have work to do! #BGP #RoutingSecurity #RPKI #ROV #ROA #BGPsecurity #FCC kentik.com/blog/dissectin…

jlivingood's tweet image. Great post "Dissecting the FCC’s Proposal to Improve BGP Security" via @DougMadory @kentikinc - clearly some US ISPs still have work to do! #BGP #RoutingSecurity #RPKI #ROV #ROA #BGPsecurity #FCC kentik.com/blog/dissectin…

The #MANRS Q1 newsletter is now online via LinkedIn here: linkedin.com/posts/routingm… Participants get it earlier to their inboxes. Join us in the fight to improve #routingsecurity!

RoutingMANRS's tweet image. The #MANRS Q1 newsletter is now online via LinkedIn here: linkedin.com/posts/routingm…

Participants get it earlier to their inboxes. Join us in the fight to improve #routingsecurity!

The @CodeBGP Platform detected that AS24028 conducted an exact prefix hijack of prefix: 2001:500:2f::/48, which belongs to the Internet Systems Consortium's “F-Root” domain server, one of the authoritative name servers for the DNS root zone. #hijack #routingsecurity

leftman76's tweet image. The @CodeBGP Platform detected that AS24028 conducted an exact prefix hijack of prefix: 2001:500:2f::/48, which belongs to the Internet Systems Consortium's “F-Root” domain server, one of the authoritative name servers for the DNS root zone.
#hijack #routingsecurity

Bem-vindo à família de #routingsecurity Banco Nacional do Desenvolvimento Economico e Social - @bndes (AS270694)🇧🇷 manrs.org/participant/39…

RoutingMANRS's tweet image. Bem-vindo à família de #routingsecurity Banco Nacional do Desenvolvimento Economico e Social - @bndes  (AS270694)🇧🇷 manrs.org/participant/39…

🧵AS24028 announced again prefix 2001:500:2f::/48, which belongs to the Internet Systems Consortium's “F-Root” domain server, one of the authoritative name servers for the DNS root zone, effectively conducting an exact prefix hijack. #hijack #routingsecurity

leftman76's tweet image. 🧵AS24028 announced again prefix 2001:500:2f::/48, which belongs to the Internet Systems Consortium's “F-Root” domain server, one of the authoritative name servers for the DNS root zone, effectively conducting an exact prefix hijack. 
#hijack #routingsecurity

Loading...

Something went wrong.


Something went wrong.


United States Trends