List of PL IPv4 and IPv6 networks in various formats.
It is generated from the same database polish IRCnet servers use to generate their I-lines (access lines). As new networks come to life, their admins (or users) tell us to add them, hence I hope the list is quite complete. If you see any errors or omissions, let me know.
To get notifications of new IP ranges as they are added use RSS channel
Here you can quickly check if your IP is on our list:
IP 126.96.36.199/22 is covered by: 188.8.131.52/22 # AS50767: PL-FIBERLINK-20171121 % Information related to '184.108.40.206 - 220.127.116.11' % Abuse contact for '18.104.22.168 - 22.214.171.124' is 'firstname.lastname@example.org' inetnum: 126.96.36.199 - 188.8.131.52 netname: PL-FIBERLINK-20171121 country: PL org: ORG-FSZO20-RIPE admin-c: ML20503-RIPE tech-c: ML20503-RIPE status: ALLOCATED PA mnt-routes: pl-fiberlink-1-mnt mnt-domains: pl-fiberlink-1-mnt mnt-by: RIPE-NCC-HM-MNT mnt-by: pl-fiberlink-1-mnt created: 2017-11-21T13:30:19Z last-modified: 2018-03-27T09:11:53Z source: RIPE % Information related to '184.108.40.206/22AS50767' route: 220.127.116.11/22 origin: AS50767 mnt-by: pl-fiberlink-1-mnt created: 2017-12-03T18:02:48Z last-modified: 2017-12-03T18:02:48Z source: RIPE % This query was served by the RIPE Database Query Service version 1.92.6 (WAGYU)
You can fetch list of IPs in various formats, try your own:
Due to repeated requests from IPv6 tunnel brokers I also prepared list of our K-lines for *@cidr ranges, so it can be used to deny tunnels requested for K-line evasion. These are only active K-lines for full IPv4 hosts or networks.
Should anyone care, here's also full list of our active K-lines.