You need to verify whether a routed prefix is authorized to originate from a specific ASN.
RPKI ROA Check
Validate whether a routed prefix is authorized to originate from an ASN.
Use RPKI ROA Check to compare a public IP or routed prefix with public route-origin authorization data so you can quickly see whether the visible origin looks valid, invalid, or uncovered before moving to deeper routing analysis.
Check route-origin authorization before assuming the live prefix and ASN are trustworthy.
Lookup result
8.8.8.8
Validation details
ROA validation states
No validation states were returned.
When to use this tool
A route leak, hijack, or wrong-origin event is suspected and you need a fast RPKI check first.
An IP address lands in an unexpected network and you want to confirm whether the visible origin is covered by a ROA.
You have a prefix and ASN from logs or routing data and need to validate the origin before going deeper.
You want to compare route-origin expectations with what public routing data currently shows.
You need a quick next step before moving to deeper BGP or RPKI tooling.
How to interpret results
Valid
The prefix and ASN combination matches a covering ROA.
Invalid ASN
A covering ROA exists, but for a different ASN.
Invalid length
The prefix is more specific than the ROA allows.
Unknown
No covering ROA was found for the prefix and ASN combination.
No visible origin
The routing dataset did not return a usable public origin ASN for the resource.
Common issues this tool helps uncover
The visible origin ASN does not match the ROA-authorized ASN
The prefix length being announced is more specific than the ROA allows
A route looks correct operationally but has no visible ROA coverage
An IP was checked instead of the routed prefix, hiding the actual validation target
The routed prefix belongs to the expected network but the live origin has changed
The resource is not visible enough in public routing data to derive an origin cleanly
Next steps
Run ASN Lookup
Confirm the operator and ownership context for the origin ASN you are validating.
Run ASN LookupRun Traceroute
If routing still looks wrong, inspect the network path next.
Run TracerouteCheck IP Lookup
If you started from an IP address, compare the returned prefix and network metadata.
Check IP LookupOpen DNS Lookup
If the routing issue started from a hostname or domain, compare it with the DNS layer next.
Open DNS LookupRelated tools
ASN Lookup
Look up AS numbers, prefixes, and operator ownership details.
Traceroute
Trace the network path between a client and destination host.
IP Lookup
Inspect basic ownership, reverse DNS, and network details for an IP.
Subnet Calculator
Calculate network ranges, masks, and host counts from CIDR blocks.
DNS Lookup
Query A, AAAA, CNAME, TXT, and other DNS records for a domain.
RPKI ROA Check FAQ
What does RPKI ROA Check do?
It checks whether a routed prefix is authorized to originate from a specific ASN according to public RPKI validation data.
What input should I enter?
Enter a public IP address or routed prefix. Optionally enter an origin ASN such as AS15169 if you want to validate a specific origin directly.
What happens if I do not enter an ASN?
The tool will try to derive one or more visible origin ASNs from public routing data for the entered IP or prefix and validate those automatically.
What does invalid ASN mean?
It means a covering ROA exists for the prefix, but the live or tested origin ASN does not match the authorized ASN in that ROA.
What should I check after this tool?
Usually ASN Lookup, Traceroute, IP Lookup, and the exact routed prefix or ROA configuration for the affected network.