IP Prefix & BGP Route Lookup - Routing Intelligence
A prefix lookup examines BGP routing data for any IP block — showing the announcing AS, route paths, origin validation, and routing anomalies. Use rtsak.com to investigate prefix ownership, detect hijacks, and troubleshoot connectivity.
How BGP Routing Works
Border Gateway Protocol (BGP) is how networks share reachability information. When a network announces a prefix, that advertisement propagates globally, telling other networks how to reach those addresses.
BGP routes include:
- Prefix - The IP address block being announced
- AS path - The sequence of networks the announcement traversed
- Origin AS - Which Autonomous System originated the announcement
- RPKI status - Whether the origin is cryptographically authorized
- Communities - Tags affecting how other networks treat the route
Why Prefix Origin Matters
IP hijacking occurs when unauthorized networks announce prefixes they don't own. Traffic intended for legitimate destinations gets misdirected — enabling interception, denial of service, or fraud.
Prefix origin validation answers: "Who is supposed to announce this prefix, and does current routing match?"
Validation Data Sources
- Regional Internet Registry (RIR) allocations - Official IP address assignments
- Internet Routing Registry (IRR) - Published routing policy and origin ASNs
- RPKI ROAs - Cryptographically signed origin authorizations
- Historical routing - Long-term patterns showing established origin
Reading Prefix Results
Authorized origin - The ASN with documented rights to announce the prefix, from IRR or RPKI data.
Observed origin - ASNs currently announcing the prefix in BGP.
Match status - Whether observed matches authorized. Mismatches warrant investigation.
ROA validity - RPKI status: Valid (matches ROA), Invalid (conflicts with ROA), or Unknown (no ROA exists).
AS path - The sequence of networks the announcement traversed. Different vantage points show different paths — this is normal BGP behavior.
Use Cases
Verify announcements - Confirm your prefixes are visible globally and through expected paths. Misconfiguration can cause partial reachability.
Detect hijacks - Unauthorized announcements create conflicting routes. Prefix lookup shows all origins advertising a prefix.
Path debugging - When traffic takes unexpected paths, examine AS paths to understand routing decisions.
Change validation - After BGP configuration changes, verify routes appear as intended.
Investigating Mismatches
Not every mismatch is malicious. Legitimate causes include:
- Outdated IRR records after authorized transfers
- Anycast configurations with multiple legitimate origins
- Customer prefix announcements by upstream providers
- Transition periods during network changes
Multiple origins for the same prefix (MOAS) isn't always malicious — legitimate scenarios include anycast, authorized co-hosting, and transitions. Context determines whether MOAS indicates a problem.
→ Look up a prefix on rtsak.com
FAQ
What's an RPKI ROA?
What does AS path prepending do?
Why do I see different AS paths from different locations?
What causes route flapping?
Can I create ROAs for my prefixes?
How do I report a hijack?
Related Tools
- IP Lookup - Geolocation and network details for any IP
- Reverse DNS Lookup - Find hostnames for an IP
- WHOIS Lookup - Domain registration information