Understanding how prefixes are filtered, added, and removed in Spectops
Prefixes on the whitelist are never exported/announced. Use this for safe prefixes you never want to blackhole (e.g., your own infrastructure, partner networks, critical services).
Prefixes on the blacklist are always included in exports, even if no source provides them. Use this for manually adding known bad actors or custom prefixes you always want to block.
What happens when a prefix is on both whitelist and blacklist?
Whitelist Always Wins
If a prefix appears on both the whitelist and blacklist, it will be excluded. This is a safety measure to prevent accidental blocking of critical infrastructure.
Session Whitelist Has Highest Priority
Session whitelists override all blacklists (global, ASN, and session). Use session whitelists when you need to allow specific prefixes for a particular BGP session, even if they're blocked everywhere else.
Block or allow all prefixes announced by an external ASN
Origin ASN rules let you target an entire network by its ASN number. When you create a rule, the system automatically syncs all prefixes announced by that ASN from routing data and applies them to your exports and BGP sessions.
All prefixes from the ASN are added to your blackhole set. Safety: you cannot block your own ASNs or AS49094.
All prefixes from the ASN are added to your whitelist (exemption set). These override blacklists, including other Origin ASN BLOCK rules.
Downloadable blocklists for firewalls, DNS blockers, etc.
Export Lists let you download aggregated blocklists in various formats:
plain - One CIDR prefix per line (default)JSON_TAGGED - JSON with provenance, communities, and metadata (v2 format)bird - BIRD routing daemon filter formatmikrotik - MikroTik RouterOS address-list formatCIDR - Clean CIDR listHOSTS - Hosts file format (0.0.0.0 sinkhole; CIDRs reduced to network address)IPTABLES - iptables/ip6tables DROP rulesNGINX_DENY - nginx deny directivesNFT - nftables set elementsRPZ - DNS RPZ zone (BIND 9, Unbound, PowerDNS Recursor)Export lists use a three-level whitelist/blacklist precedence for file exports:
Whitelist always overrides blacklist at each level. If a prefix is on both lists at the same level, it will be excluded from the export (whitelist wins).
Note: ASN-level lists are NOT applied to file exports. They only apply to BGP sessions.
Export Lists can be configured to apply or skip the global whitelist and blacklist:
Both toggles are enabled by default. Account-level lists always apply to your exports.
Downloads require both an API key and a download token for security:
Use format=JSON_TAGGED for the tagged JSON export.
Manage your API keys and export lists from the dashboard after logging in.
Prefixes announced via BGP to your routers
BGP exports involve multiple layers of filtering and can have both ASN-level and session-level controls.
Where each type of list applies
| List Type | Scope | Applies To |
|---|---|---|
| Global Blacklist | System-wide | All BGP exports (admin only) |
| Global Whitelist | System-wide | All BGP exports (admin only) |
| ASN Blacklist | Per ASN account | All sessions for that ASN |
| ASN Whitelist | Per ASN account | All sessions for that ASN |
| Session Blacklist | Per BGP session | Single BGP session only |
| Session Whitelist ⭐ | Per BGP session | Single BGP session only (HIGHEST PRIORITY) |
| Export List Blacklist | Per export list | Single export list only |
| Export List Whitelist | Per export list | Single export list only |
Configuration examples and API documentation are available after logging in.