Towards understanding city-level routing using BGP location communities
Guest Post: An inference method that exploits the spatial correlation between a network prefix’s origin, and the location of the router that attaches a location community.
Guest Post: An inference method that exploits the spatial correlation between a network prefix’s origin, and the location of the router that attaches a location community.
Mapping Internet number resources from IP addresses to organizations is straightforward using whois or RDAP, but listing all resources held by a given organization is far more challenging. This post explores a simpler, data-driven approach using RIR extended statistics and reg-id identifiers.
MyAPNIC now supports RPKI Signed Checklists (RSCs), providing Members with a new way to cryptographically sign and verify documents using their RPKI resources. Your feedback is welcome.
Two groups of students from NITK discuss the work they did at the IETF 122 Bangkok hackathon, and afterwards in their WG. Professor Mohit Taliani is seeking to encourage new entrants to join IETF protocol and standards development.
What IPv4 and IPv6 addressing in 2025 tells us about the changing nature of the network.
Guest Post: New collectors and tools, improved data access, and ongoing behind-the-scenes work to make the platform more stable, sustainable, and useful.
Guest Post: In modern network architecture, we often assume that perimeter defences are robust enough to keep internal traffic secure. However, vulnerabilities inherent in the trust mechanisms of fundamental network protocols reveal that unencrypted tunnels can become fatal backdoors in enterprise intranets.
Guest Post: How does the scope of failure awareness affect routing performance and resilience in Low Earth Orbit satellite constellations?
Guest Post: APNIC 2025 Fellow Rabby prepares future Fellows to make the most of their Fellowship experience by sharing what he learned during his time as an APNIC Fellow.
Guest Post: After twelve days, and 63,247 attacks later, we are confident recommending some steps you can take to protect your own network.