Network 203.173.106.0/24

Search for

Network Information

Prefix203.173.106.0/24
Announced As203.173.96.0/19
Origin ASAS9318
CIDR/24
Total IPs256
Usable IPs254
IP Range203.173.106.0 - 203.173.106.255
RPKI StatusNOT_FOUND # NO ROAS FOUND, OR RPKI VALIDATION NOT ENABLED FOR SOURCE
RegistryREACH
Last Modified2023-11-13
14537142271137869304325902676132098233270927341995245232029146939137409645349544140627249721859135377395793203.173.106.0/24BGP Paths to 203.173.106.0/2412 paths from 1 origin AS

AS Looking Glass

BGP paths to 203.173.106.0/24 (origin on the right, matching graph above)

All 15 BGP Paths

Complete list of all observed paths (origin on the right)

Hostnames in AS

Raw WHOIS Data
route: 203.173.96.0/19 descr: REACH (Customer Route) tech-c: RRNOC1-REACH origin: AS9318 remarks: This auto-generated route object was created remarks: for a REACH customer route remarks: remarks: This route object was created because remarks: some REACH peers filter based on these objects remarks: and this route may be rejected remarks: if this object is not created. remarks: remarks: Please contact irr@team.telstra.com if you have any remarks: questions regarding this object. notify: irr@team.telstra.com mnt-by: MAINT-REACH-NOC changed: irr@team.telstra.com 20060428 source: REACH rpki-ov-state: not_found # No ROAs found, or RPKI validation not enabled for source route: 203.173.96.0/19 descr: PACNET (proxy-registered route object) origin: AS10068 remarks: This route object is for a PACNET customer route which is being exported under this origin AS. + This route object was created because no existing route object with the same origin was found, and since some PACNET peers filter based on these objects this route may be rejected if this object is not created. + Please contact abuse@pacnet.net if you have any Concerns regarding Spam/Abuses related to this object + Please contact ip-noc@pacnet.net if you have any other Questions regarding this object. notify: ip-noc@pacnet.net mnt-by: MAINT-AS4637 changed: ip-noc@pacnet.net 20100201 source: RADB last-modified: 2023-11-13T15:58:52Z rpki-ov-state: not_found # No ROAs found, or RPKI validation not enabled for source route: 203.173.96.0/19 descr: proxy for HANARO TELECOM route origin: AS10068 mnt-by: MAINT-HANARO changed: ce-support@us.ntt.net 20080504 source: NTTCOM rpki-ov-state: not_found # No ROAs found, or RPKI validation not enabled for source route: 203.173.96.0/19 descr: Flex-Net_AS38676 origin: AS38676 mnt-by: MAINT-AS9318 changed: empires@sk.com 20150619 #23:53:08Z source: RADB last-modified: 2023-11-13T15:47:48Z rpki-ov-state: not_found # No ROAs found, or RPKI validation not enabled for source route: 203.173.96.0/19 origin: AS216425 descr: Creative Lab mnt-by: MAINT-AS9957 changed: noc@kinx.net 20250402 # 08:56 GMT source: RADB last-modified: 2025-04-02T08:56:17Z rpki-ov-state: not_found # No ROAs found, or RPKI validation not enabled for source route: 203.173.106.0/24 origin: AS216425 descr: Korea Internet & Security Agency (KISA) Seocho-ro 398, Seocho-gu, Seoul, Korea mnt-by: MNT-KRNIC-AP last-modified: 2024-12-10T00:25:14Z source: APNIC rpki-ov-state: valid route: 203.173.106.0/24 origin: AS395793 descr: Korea Internet & Security Agency (KISA) Seocho-ro 398, Seocho-gu, Seoul, Korea mnt-by: MNT-KRNIC-AP last-modified: 2025-11-18T00:15:28Z source: APNIC rpki-ov-state: valid