Mapping ASNs to organizations with ASINT
Guest Post: A new research tool helps map ASNs to their real operating organizations, reducing false positives in BGP hijack detection and improving operational visibility.
Guest Post: A new research tool helps map ASNs to their real operating organizations, reducing false positives in BGP hijack detection and improving operational visibility.
The IPv6 deployment session at APNIC 60 covered new IPv6 scanning techniques, Vietnamese IPv6-only ambitions, how IPv6 enables IoT use cases, and more.
Geoff Huston discusses AusNOG 2025, and his measurement of ECN
Guest Post: How to create a thriving Internet Exchange Point that benefits all participants.
Guest Post: The technical community has identified the best ways to get started with RPKI. Some our most important RPKI experience is collected in this post.
Guest Post: IPID has a 25+ year history of abuse as a network side channel. This post categorizes IPID exploits, and makes a surprising recommendation about mitigating them.
Network operations, BGP, post-quantum cryptography, and more from AusNOG 2025.
The Open Source Technologies session at APNIC 60 explored four use cases for open source tech in network operations.
Where does Explicit Congestion Notification (ECN) fit into TCP congestion control on the public Internet? The data shows it in very specific places, like the networks of AI data centres.
Leslie Daigle and Vu The Binh opened APNIC 60 with keynotes: Leslie on tackling bad traffic, and Vu on Viet Nam’s path to IPv6-only and its strategies for IPv6, data centres, and CDNs.