Field | Value | Copy |
---|---|---|
{{ f.label }} | {{ f.value }} |
Prefix | IP Version | Copy |
---|---|---|
{{ p.prefix }} | {{ p.ip_version }} | |
No prefixes. |
ASN | Name | Type | Copy |
---|---|---|---|
{{ pr.asn }} | {{ pr.name }} | {{ pr.type }} | |
No peers. |
Autonomous System Numbers (ASNs) are identifiers for routing domains that publish policy through the Border Gateway Protocol. An ASN names a network that advertises routes on the wider internet, sometimes called an autonomous system or just an AS. Operators often search autonomous system lookup to confirm who originates specific prefixes and how those announcements relate to neighboring networks during troubleshooting.
You enter an AS number or a single IP address and receive a compact dossier that maps the organization and country. It lists status dates, announced prefixes and nearby autonomous systems, giving you a snapshot of routing presence. If you start from an IP it is first resolved to its origin AS using connection data from a geolocation service.
For example, querying AS15169 returns the holder name plus IPv4 and IPv6 blocks such as 8.8.8.0/24 and several neighboring ASNs. You can scan the shortest prefix length to gauge aggregation and copy rows into tickets or runbooks for quick follow‑up. Treat contact addresses and external websites with care, and confirm routing with multiple sources before pushing changes.
When comparing networks focus on the direction of peering counts and whether the table includes native IPv6 space for current reachability. Use prefix sorting to spot discontiguous ranges, or filter neighbor type to examine left, right or uncertain relationships as modeled by the source data. Cross‑check dates before incident reports and change reviews during postmortems.
The lookup resolves input to an origin ASN and aggregates routing and registry facts from multiple operator data sources. Core outputs are organization, country, status timestamps, prefix list, peer counts, neighboring ASNs, and selected RDAP contacts. Prefix statistics summarize IPv4 versus IPv6 and shortest or longest CIDR lengths. Sorting and filtering operate on the fetched lists only, never on hidden data. Processing is deterministic for identical upstream responses. Network requests use a short timeout and are cancelled when superseded by a new query. Supplemental metadata may include BGPView names, brief descriptions, looking glass references, and PeeringDB fields such as policy URL or IRR AS‑SET when available.
Parameter | Meaning | Unit/Datatype | Typical Range | Sensitivity | Notes |
---|---|---|---|---|---|
asn |
AS number or IP input | string | “AS15169”, “15169”, “8.8.8.8”, IPv6 literal | High | Only the first nonempty line is processed. |
limit_prefixes |
Maximum prefixes to show | integer | 0–10 000 | Medium | 0 shows all; applied after sorting. |
prefix_sort |
Sorting strategy for prefixes | enum | “”, “length”, “alpha” | Low | Length sorts by CIDR size; alpha is lexical. |
peer_type |
Neighbour type filter | enum | “”, “left”, “right”, “uncertain” | Low | Matches source‑provided relationship labels. |
Field | Type | Min | Max | Step/Pattern | Error Text | Placeholder |
---|---|---|---|---|---|---|
ASN or IP | text | — | — |
IPv4: ^(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)$ IPv6: ^(([0-9A-Fa-f]{1,4}:){1,7}[0-9A-Fa-f]{1,4}|(([0-9A-Fa-f]{1,4}:){1,7}:)|(::([0-9A-Fa-f]{1,4}:){0,6}[0-9A-Fa-f]{1,4}))$ IPv6 also accepted if the string contains “::”. ASN normalize: ^\d{1,10}$ after removing a leading “AS”.
|
Enter an ASN or IP address. · Lookup failed. | AS15169 or 8.8.8.8 |
Limit prefixes | number | 0 | — | step 1 | — | rows |
Prefix sort | select | — | — | [source order | length | alpha] | — | — |
Peer type | select | — | — | [all | left | right | uncertain] | — | — |
Input | Accepted Families | Output | Encoding/Precision | Rounding |
---|---|---|---|---|
Single string | ASN (“ASn” or digits), IPv4, IPv6 | Tables (Info, Prefixes, Peers) and JSON | Integers and strings; JSON keys: inputs , warnings , overview , peerInfo , prefixes , peers , rdap , bgpview , peeringdb |
Not applicable; values are discrete |
Input: 8.8.8.8
.
Derived: Resolve to an origin ASN, then fetch overview, prefixes, peer counts, neighbours, and RDAP contacts.
Result: Organization and country, prefix list with IP version, peer counts and neighbour rows, plus optional RDAP and directory metadata.
vcardArray
emails.Requests originate from your browser to the listed services; no persistent server‑side storage is used by this page.
Use this sequence to identify a route’s owner, context, and neighbours.
Example: Input AS15169
, then download AS15169_prefixes.csv
for an audit note.
Warning Double‑check organization names and dates before changes.
No persistent storage is used by this page; requests are dispatched from your browser to external data providers.
Results mirror upstream sources. Always corroborate critical findings with multiple registries or route views when preparing changes or incident reports.
ASNs with or without the “AS” prefix, IPv4 dotted‑decimal, and IPv6 textual forms. Only the first nonempty line is processed.
No. Network lookups require live access to operator and registry endpoints.
Yes. You can copy tables to the clipboard or download CSV files and a structured JSON payload for records.
Paste the IP, run Lookup, then read the organization in the Info tab. Review prefixes and neighbours for fuller routing context.
Those are neighbour types supplied by the source model. They indicate inferred relationship direction and confidence, not contractual peering.