Network 116.213.45.0/24


Network Information

Prefix116.213.45.0/24
Announced As116.213.32.0/20
Origin ASAS7545
CIDR/24
Total IPs256
Usable IPs254
IP Range116.213.45.0 - 116.213.45.255
RPKI StatusNOT_FOUND # NO ROAS FOUND, OR RPKI VALIDATION NOT ENABLED FOR SOURCE
RegistryRADB
Last Modified2023-11-13
1422712448225091145379304759419952414062724973389117433561299645368306939291467624954410316006835487136180116.213.45.0/24BGP Paths to 116.213.45.0/2414 paths from 1 origin AS

AS Looking Glass

BGP paths to 116.213.45.0/24 (origin on the right, matching graph above)

All 15 BGP Paths

Complete list of all observed paths (origin on the right)

Raw WHOIS Data
route: 116.213.32.0/20 descr: (139763) origin: AS7545 remarks: Do not use the notify or changed attribute to report incidents. remarks: Check the inetnum object at the regional registries for contact remarks: information (dereference the admin-c & tech-c attributes). notify: routing@connect.com.au mnt-by: MAINT-AS2764 changed: nobody@connect.com.au 20120207 source: RADB last-modified: 2023-11-13T16:16:07Z rpki-ov-state: not_found # No ROAs found, or RPKI validation not enabled for source route: 116.213.32.0/20 descr: (141588) origin: AS9268 remarks: Do not use the notify or changed attribute to report incidents. remarks: Check the inetnum object at the regional registries for contact remarks: information (dereference the admin-c & tech-c attributes). notify: routing@connect.com.au mnt-by: MAINT-AS2764 changed: nobody@connect.com.au 20110811 source: RADB last-modified: 2023-11-13T16:16:06Z rpki-ov-state: not_found # No ROAs found, or RPKI validation not enabled for source route: 116.213.32.0/20 descr: PACNET (proxy-registered route object) origin: AS10095 remarks: This route object is for a PACNET customer route which is being exported under this origin AS. + This route object was created because no existing route object with the same origin was found, and since some PACNET peers filter based on these objects this route may be rejected if this object is not created. + Please contact abuse@pacnet.net if you have any Concerns regarding Spam/Abuses related to this object + Please contact ip-noc@pacnet.net if you have any other Questions regarding this object. notify: ip-noc@pacnet.net mnt-by: MAINT-AS4637 changed: ip-noc@pacnet.net 20100201 source: RADB last-modified: 2023-11-13T15:58:53Z rpki-ov-state: not_found # No ROAs found, or RPKI validation not enabled for source route: 116.213.32.0/20 descr: ApexN origin: AS10095 notify: noc@pipenetworks.com mnt-by: MAINT-PIPENOC changed: networks@pipenetworks.com 20080613 source: NTTCOM rpki-ov-state: not_found # No ROAs found, or RPKI validation not enabled for source route: 116.213.32.0/20 descr: (140720) origin: AS23753 remarks: Do not use the notify or changed attribute to report incidents. remarks: Check the inetnum object at the regional registries for contact remarks: information (dereference the admin-c & tech-c attributes). notify: routing@connect.com.au mnt-by: MAINT-AS2764 changed: nobody@connect.com.au 20090303 source: RADB last-modified: 2023-11-13T16:16:05Z rpki-ov-state: not_found # No ROAs found, or RPKI validation not enabled for source route: 116.213.44.0/22 descr: Vultr Customer Route origin: AS136180 notify: network@choopa.com mnt-by: MAINT-AS20473 changed: network@choopa.com 20221202 #00:36:26-18000 source: RADB last-modified: 2023-11-13T16:13:11Z rpki-ov-state: valid route: 116.213.44.0/22 origin: AS136180 descr: Beijing Tiantexin Tech. Co., Ltd. Baiziwan Xili, No. 402 - 1706 Chaoyang District mnt-by: MAINT-IPIP-CN last-modified: 2021-11-24T08:55:59Z source: APNIC rpki-ov-state: valid route: 116.213.44.0/23 origin: AS136180 descr: Beijing Tiantexin Tech. Co., Ltd. Baiziwan Xili, No. 402 - 1706 Chaoyang District mnt-by: MAINT-IPIP-CN last-modified: 2021-11-24T08:56:00Z source: APNIC rpki-ov-state: valid route: 116.213.45.0/24 origin: AS136180 descr: Beijing Tiantexin Tech. Co., Ltd. Baiziwan Xili, No. 402 - 1706 Chaoyang District mnt-by: MAINT-IPIP-CN last-modified: 2021-11-24T08:56:03Z source: APNIC rpki-ov-state: valid