The Good Tech Companies - How IPinfo Turns Registry Data into Real Intelligence
Episode Date: October 27, 2025This story was originally published on HackerNoon at: https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence. Explore IP addresses, ASNs, and RIR c...hallenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #ip-addresses-explained, #what-is-an-asn, #whois-limitations, #regional-internet-registries, #ipinfo-datasets, #ip-geolocation-accuracy, #bgp-routing-as-numbers, #good-company, and more. This story was written by: @ipinfo. Learn more about this writer by checking @ipinfo's about page, and for more stories, please visit hackernoon.com. The Internet runs on unique IP addresses and ASNs, allocated by RIRs and tracked in WHOIS records. But registry data is static, inconsistent, and often unreliable for geolocation or ownership. IPinfo enhances these datasets with real-time measurements, privacy detection, and standardized intelligence—helping operators, researchers, and defenders move from assumptions to evidence.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
How IP Info turns registry data into real intelligence by IP info, IP data provider.
The internet is a decentralized network by nature. Hundreds of thousands of computer networks,
each with their own peculiarities and policies, are interconnected together to form a larger,
global network. There is little to no coordination between these networks.
Each network IS mainly concerned with its peering neighbors, but it doesn't need to
care about networks further away. A network operator in Japan does not need to ever coordinate
with a network operator in Europe to be able to exchange packets with them. They do not need
to use the same equipment, vendors, software, or configurations on their networks. It might seem
impossible for such a system to work at a global scale and over a long period of time,
and yet, for the most part it does. This is achieved in part thanks to standards organizations
like the IETF, which dictates the technical standards that must be used to interconnect networks,
but also through the regional internet registries, RIRs, which coordinate the allocation of
iPad addresses and other shared internet resources. In this blog post I will explain what IP addresses
and autonomous system number sorry, how they are allocated successfully on the internet,
along with their limitations, and how IP Info's actively measured data sets turn static registry data
into a verifiable, real-time intelligence layer.
IP network challenges.
The common point to all networks on the Internet
is the use of the aptly named Internet protocol or IP protocol.
In an IP network, each piece of equipment IS assigned an IP address
that can be used to send messages to others.
There are two key challenges in IP networks,
finding paths or routes, between two computers.
Making sure each piece of equipment is assigned a unique address
amongst a finite set of possible addresses. To better understand the routing challenge,
let's have a closer look at an IP network. A typical IP network is made up of multiple
computers interconnected together through a device called a switch. Each interface of the switch
is either connected to a computer or to another switch. Two IP networks within each network
hosts are connected through a switch and can send broadcast messages to all other computers
in the same network. Broadcast messages are not allowed past the network
boundary. Instead, a device called a router is used. A router knows in advance how to reach all
other networks. A switch has two modes of operation when it receives a message from one computer
to another. Either it knows, from observing the traffic, to which specific interface the message must
be forwarded, or it doesn't and it sends the message to all interfaces except the interface
where the message arrived in a process called flooding. In this setup, there is no need to know
the outgoing interface for all destinations in advance since a message can always be broadcast
to everyone when the interface is not known. Networks that support broadcast messages are convenient,
but they also suffer from scalability issues. Imagine if every time a computer wanted to send
a message to a new destination on the internet, the message would be sent to all other computers on
the internet in the hope that it would eventually reach its intended destination. Not only would
this be a privacy nightmare, this would also clog the network with useless traffic. From local
networks to autonomous systems, to solve this scalability issue, broadcast
messages are not allowed between networks. Instead, another type of device, called a router, is used
to interconnect networks. Unlike a switch, a router must know the outgoing interface for each
destination in advance. One way to populate this routing table is for the network to manually
input each route into all routers. However, this process doesn't scale to large networks and
doesn't allow dynamic reconfiguration when new routers are added or removed, or when links
between them become unavailable, e. G, due to a broken cable. Instead, the most common way of
populating routing tables is by using a routing protocol. Various kinds of routing protocols exist,
but the main idea is for each router to share the list of the network it is connected to
with its neighbors and also the networks it learned from its neighbors. After some convergence
time, routers should share the same view of the network. In practice, different organizations
will use different routing protocols and policies depending on their needs, for example,
to optimize for throughput or latency. They might also want to filter which routes they accept
from other networks to control where their traffic will go. A collection of networks that share
a common routing policy is called an autonomous system or as. Typically ISPs and large
organizations will operate one or more as is. Within each as they are free to use.
the routing protocol of their choice. The internet is a collection of autonomous systems,
each with their own internal routing protocols and policies that use the border gateway protocol,
BGP, to exchange routes between them. A proto-internet with two autonomous systems,
inside-in as the network operator is free to implement any routing policy and use any routing protocol.
Between as is the BGP routing protocol must be used. One key requirement of the BGP protocol
is that each has a unique number, called an autonomous system number, ASN, assigned to it.
The need for unique resources. For the internet to work, we need two things, unique IP addresses
and unique autonomous system numbers. If we let network operators pick these values atrandom,
there is a very high risk of collision, which would result in parts of the network being
unreachable or receiving traffic not meant for them. The allocation of these resources is coordinated
by the regional internet registries, RIR. RIRs are non-profit organizations that maintain a registry,
or database, of internet resources. There are five RIRs that cover different parts of the world.
AFRINIC for Africa, ARIN for North America, APNIC for Asia and Oceania, Lacknick for South America,
and the RIPNCC for Europe and the Middle East. The exact types of records and metadata
recorded in each database depend on the RIR, but the two most important are IP address ranges
in autonomous system numbers. Resource allocation is hierarchical in nature. The internet-assigned
numbers authority, YANA, distributes these resources to RIRs, which in turn distributes them to
organizations who need them, which in turn can distribute them to their customers. IPV4 addresses
are by far the scarcest resources, with only 4.2 billion 32 byte addresses to split for every device,
on the planet. RIRs now have a waiting listing place, as they've run out of available
IPV4 addresses and have strict quotas. For example, the Ripe NCC limits the maximum number
of IPV4 addresses allocated to an ISP to 256 addresses. IPV6 addresses do not suffer from
this problem thanks to the use of 128 byte addresses, which provides a vastly larger
address space. The majority of the IPV6 address space is currently unallocated and reserved for
future use. ASNs used to be defined using 16-bit numbers, meaning a maximum of 65,536 ASNs could be
allocated, but were later extended to 32 bits to account for the growing number of ASNs,
more than 120K as of 2025. The current allocation of these resources to RIRs can be seen in
the YANA IPV-4 address space registry, the YANA IPV-6 Global Unicast Address Assignments,
and THE YANA Autonomous System Numbers list.
The exact resource allocation policy depends on each RIR, but they will typically distinguish
two types of allocations, ISPs and end users.
ISP allocations can be further sub-allocated by the ISP to its own customers.
We can also say that the ISP acts as a local internet registry, LIR.
For these kinds of allocations, ISPs usually pay a membership fee that funds the registry
operation. On the other hand, end-user allocations are usually exempt of membership requirements,
but have the restriction that they cannot be sub-allocated. Let's have a look at a concrete example,
with the 2A-01-C-910-1-20E. Skeptical Smiley Face, 64 IPV-6 range. The allocation hierarchy is as
follows. We clearly see the Yana right-pointing arrow RIR, right-pointing arrow LIR's right-pointing
arrow end user allocation hierarchy. Who needs to own resources? One might wonder why bother obtaining
IP addresses from RIR or LIR when an organization could just use the IP addresses handed out by
their ISP? The main reasons for owning IP addresses are portability. The ability for an organization
to move IP addresses across ISPs without renumbering all of its devices. I.E. Having provider
independent address space. Multihoming. Announcing
announcing IP addresses from multiple ISPs for redundancy. Additional benefits can be
reputation. By controlling how IP addresses are used, the owner can make sure they are not
used for nefarious purposes. E. G. Sending spam and implement its own abuse handling policy
by setting point of contact fields in the WHOIS database. Reverse DNS delegation. The YANA
maintains the root zone for reverse DNS records in ADDR. ARPA and IP6, ARPA, and delegates the
child zones to the RIRs, which in turn can delegate the zones matching the owned resources to the
organization's own DNS servers. See Ripe NCC's documentation, for example. The reason for obtaining
an as number is simpler, it is required to establish public BGP sessions. Thus, any network willing
to announce IPs on the internet must have its own ASN. Note that IPs
addresses and ASN allocations are independent. An organization might have an ASN, but only root IPs
brought by its customer, and similarly an organization can own IPs, but not have the infrastructure
to root them and relian an ISP with an ASN for that. In practice, most smaller organizations
are fine using IP space assigned by their ISP and don't need their own ASN. Ownership becomes
important for companies that run large-scale infrastructure, provide internet services, or need
independence and resilience, such as ISPs, hosting providers, CDNs, and enterprises with complex
networks. For these organizations, direct resource ownership offers control, stability,
and flexibility that simply leasing addresses from an ISP cannot match. What WHOIS and RIR data reveal?
IP address and ASN records in the RIR databases contain information about the owner of these
resources, but they can also contain additional metadata like the intended usage of these resources
or contact addresses. Let's have a look at some resources. To do so, we will use the W-H-O-I-S protocol
with the Hoy's command line utility, but note that there is also a newer HTTP-based protocol called
RDAP. We can query the Ripe database for the 2A-01-910-1-20E. Skeptical Smileyface,
64 range with the following command. Hoy's H-Hoy's.
Ripe. Net 2A.01. C. 910 to 1. 20E. Sceptical Smiley Face, 64 if the W.H.O.I.S. Server is not specified, Hoys. Ripe. Net in this case, then the Whois command will use the YANA server, Hoys. Yana, org, which will redirect to the appropriate RIR server in most cases. However, it's good practice to specify the proper W.HOIS server to make sure you get the expected record.
allocation in the Ripe database. The record tells us multiple things. The name of the IP range
gives us a hint as to its purpose. In this case, it seems allocated to the French post. The country
tells us that this range is probably used in France, although this attribute is completely free for
the user to set and might be unrelated to IP geolocation. See the next section. The admin C and
TechC attribute give us the administrative and technical contacts for this IP range. In this case,
A82914 RIPE links to a record containing the addresses of Orange Business Services, the LIR support
center while DL 7113 RIPE tells us the address of the French Postal Service IT services.
The MNT by attribute tells us the entity allowed to make changes to the Inetnam record itself.
Naturally in this case it's the LIR, Orange Business Services.
The roll records linked in the admin C, TechC and MNT by attributes contain postal addresses.
phone numbers and email addresses. For example, if we look upon a 2914, RIP, point of contact in the
RIP database, W-H-O-I-S and R-I-R-R limitations, W-H-O-I-S does not equal GEOL-O-CATI-O-N-W-H-I-S records are often used as a proxy
for IP geolocation. However, this US-Ages precarious as there is no guarantee that the addresses in the records
are recorrect or linked to the actual location where the IP addresses
are used. For example, the Ripe database documentation has this to say regarding the country
attribute. This identifies a country using the ISO 3166 minus two letter country codes. It has never
been specified what this country represents. It could be the location of the head office of a
multinational company or where the server center is based or the home of the end user. Therefore,
it cannot be used in any reliable Way Tomap IP addresses to countries. Furthermore, the granularity of
IP address allocation is often too coarse to represent anything below the country level.
The proper solution for network operators to share geolocation information are geofeeds.
Root objects are informational only another common source of confusion regarding WHOIS records
come from root records.
These records tell us which ASNs are expected to announce an IP range.
For example, the following record tells us that 90-38-016th should be announced by as 3,200,
route record in the Ripe Database. However, these records are purely informational. Some
network operators might use them to reject routes where the origin ASN doesn't match, but
some might not use those records at all. Furthermore, these records can exist even if an IPrange
is not actually announced. As such, these records cannot be used tootermen which ASN announces
an IP range. This information can, however, be obtained from the BGP routing protocol. The
Messiness of public registry data, the RIR's databases are publicly available, which makes
them great sources of information about the entities operating on the internet. However, this data
can also be quite messy. RIRs do not all support the same record types, and even for common
records, the attributes supported might be different. Furthermore, some fields, like the address,
are freeform and their validity is not enforced by the RIRs. It is not uncommon to find invalid or
mangled addresses in WHOIS records. How IP Info transforms static records into dynamic intelligence,
the Internet's addressing system was built on a cooperative trust model,
registries publish allocations, operators document routing intentions, and the community
assumes these records are correct. However, this model also allowed some actors to disguise
malicious or unwanted traffic. For example, web crawlers can rotate IP addresses and ASN's often
tovade detection. See this.
Cloudflare blog post for a recent example. IP info data sheds light into these issues with our
rich data. IP hoys RIP data maps IP ranges to their owners in a standardized and enriched
format across all regional internet registries. This data is useful to understand the allocation
hierarchy and history of an IP address and, for example, to distinguish stable, ISP allocated
IPs from IPs from IP brokers who might change hands frequently. This data can also be used to
to discover assets owned by a particular organization and estimate their attack surface for proactive
management. IP to company and IP ranges are IP to company and IP ranges dataset are distilled
versions of our Hoy's data set that always return the most specific information for an IP address.
They are useful when one cares only about the final owner of an IP address and not the full
allocation hierarchy. They allow users to easily obtain all IP ranges belonging to an organization
by looking up its name or domain name.
IP to ASN are IP to ASN data maps IP addresses to their origin ASN,
the organization that hurts the IP address on the internet.
This data can be used to know the ISPOFA user,
but also to filter human traffic from bot traffic often originating from hosting
in cloud providers ASNs.
IP Geolocation are IP Geolocation data, informed by ProbeNet,
our internet measurement platform, provides accurate location attribution
down to the city level, detecting discrepancies between WHOIS country codes and the IPs observed geography.
IP privacy detection are IP privacy detection data flags IPs using VPNs, proxies, tour nodes, residential
proxies and other anonymizing services, enabling users to filter bot traffic, prioritize investigations,
and handle anonymized connections with the appropriate caution. From assumptions to evidence,
traditional registry data is valuable but incomplete. Without validation, it's easy to misattribute
ownership, geography, or routing, leading to costly blind spots. IP info uses publicly available
signals, like WHOIS data and geo-feeds, standardizes and organizes that information into a consistent
format, and builds off that foundation with partner, vendor data as well as our own proprietary
intelligence. This approach turns registry data from a static directory into a dynamic,
verifiable intelligence layer. It enables network defenders, researchers, and operators to move from
assumption-based analysis to evidence-backed mapping of internet resources, reducing false positives
and uncovering infrastructure that would remain hidden in traditional WHOIS-only workflows. Ready to see
beyond registry records, static WHOIS and RIR data only tell part of the story. IEP Info's datasets
combine registry information with real-time measurements, advanced privacy detection, and
curated intelligence to give you a complete view of the internet's infrastructure. About the author,
Maxine Moosey Max currently works as a data engineer on IP Geolocation at IP Inf. Previously,
he was a postdoctoral researcher at Sorbonne University where he worked on multipath tracer out
measurements. Thank you for listening to this Hackernoon story, read by artificial intelligence.
Visit hackernoon.com to read, write, learn and publish.
