<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//blog.apnic.net/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://blog.apnic.net/2018/03/08/event-wrap-nznog-2018/</loc>
		<lastmod>2021-07-30T04:45:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/NZNOG-18-Group-shot_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/03/13/event-wrap-hknog-6-0/</loc>
		<lastmod>2021-07-30T04:45:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/GHuston_HKNOG6.0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/02/26/register-phnog-2018-workshops/</loc>
		<lastmod>2021-07-30T04:46:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/02/Image-Today-11_20_38-AM1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/08/08/event-wrap-phnog-regional-conference-2018/</loc>
		<lastmod>2021-07-30T04:46:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/07/PhNOG2018RegConf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/08/08/collaboration-among-keys-success-sgnog/</loc>
		<lastmod>2021-07-30T04:48:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/06/DSC_0053.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/11/01/event-wrap-dns-oarc-nanog-71-arin-40/</loc>
		<lastmod>2021-07-30T04:49:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/10/NANOG_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/11/28/event-wrap-aintec-2017-thainog-meeting-2/</loc>
		<lastmod>2021-07-30T04:50:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/AINTEC-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/05/event-wrap-phnog-regional-conference-2017-philippines/</loc>
		<lastmod>2021-07-30T04:50:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/12/PHNOG_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/10/04/event-wrap-hknog-5-0/</loc>
		<lastmod>2021-07-30T04:51:27+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/10/HKNOG_5.0_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/09/25/event-wrap-ausnog-2017-melbourne/</loc>
		<lastmod>2021-07-30T04:51:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/09/AusNOG2017.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/09/25/event-wrap-sgnog-5-singapore/</loc>
		<lastmod>2021-07-30T04:52:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/09/SGNOG5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/08/08/event-wrap-idnog-4-jakarta/</loc>
		<lastmod>2021-07-30T04:52:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/08/IDNOG-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/08/17/event-wrap-janog-40-fukushima/</loc>
		<lastmod>2021-07-30T04:52:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/08/JANOG-40_3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/09/08/event-wrap-2017-vnnic-ip-members-meeting-vnix-nog/</loc>
		<lastmod>2021-07-30T04:52:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/09/VNNOGmeeting2017.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/08/02/event-wrap-sanog-30-india/</loc>
		<lastmod>2021-07-30T04:52:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/07/SANOG-30-banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/11/14/lknog-fill-needs-growing-netops-community/</loc>
		<lastmod>2021-07-30T04:53:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/LkNOG-banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/LKNOG-committee-2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/11/28/event-wrap-bdnog-7/</loc>
		<lastmod>2021-07-30T04:53:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/bdNOG-7_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/11/event-wrap-npnog-3-nepal/</loc>
		<lastmod>2021-07-30T04:53:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/Image-Today-at-17_21_47.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/08/07/invaluable-learning-experience-sanog-30/</loc>
		<lastmod>2021-07-30T04:53:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/07/SANOG30-fellows.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/11/01/event-wrap-lknog-2017/</loc>
		<lastmod>2021-07-30T04:53:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/10/LKNOG_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/06/30/event-wrap-28th-twnic-opm-twnog-2017/</loc>
		<lastmod>2021-07-30T04:54:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/06/TWNIC_TWNOG_Shane_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/02/13/sanog-fellowship-learning-sharing-experience/</loc>
		<lastmod>2021-07-30T04:56:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/SANOG29_shams.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/SANOG29_shams2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/04/18/newest-nog-meeting-nepals-demand/</loc>
		<lastmod>2021-07-30T04:56:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/12/SAM_9550.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/04/NPNOG-1-workshop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/05/31/event-wrap-bdnog-6/</loc>
		<lastmod>2021-07-30T04:56:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bdnog6-1_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/06/28/event-wrap-npnog-2-nepal-member-gathering/</loc>
		<lastmod>2021-07-30T04:57:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/06/NPNOG_group_BLOG.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/06/Tashi_Shaq_noNPG_WS_SMALL-e1498449460573.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/03/23/event-wrap-phnog-2017-philippines/</loc>
		<lastmod>2021-07-30T04:58:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/PhNOG-2017.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/APNIC-Member_Ph_PLDT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/APNIC-Member_Philippiens_Global-Telekom.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/APNIC-Member_Philippines_Eastern-e1489974098200.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/Anna-with-Assistant-Secretary-of-Department-of-Information-and-Communications-Technology.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/03/10/event-wrap-mmnog-2017-myanmar/</loc>
		<lastmod>2021-07-30T04:58:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/MMNOG2017_banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/Image-Today-12_57_20.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/Image-Today-17_04_37.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/03/08/nznog-returns-bang/</loc>
		<lastmod>2021-07-30T04:58:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/2017-01-26_09-20-12-936.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/03/01/event-wrap-hknog-4-0-hong-kong/</loc>
		<lastmod>2021-07-30T04:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/Image-Today-10_06_56-am.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/03/01/event-wrap-nanog-69/</loc>
		<lastmod>2021-07-30T04:59:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/meeting_banner_N69.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/02/14/nanog-69-iot-security/</loc>
		<lastmod>2021-07-30T04:59:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/capitol-building-washington.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/nanog69-f1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/nanog69-f2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/nanog69-f3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/nanog69-f4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/02/09/event-wrap-nznog-2017-tauranga/</loc>
		<lastmod>2021-07-30T05:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/IMG_4945.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/02/09/event-wrap-sanog-29-islamabad/</loc>
		<lastmod>2021-07-30T05:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/2017-01-23_10-16-49-709.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/12/22/event-wrap-npnog-1-nepal/</loc>
		<lastmod>2021-07-30T05:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/12/SAM_9550.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/02/03/iot-high-agenda-hknog-4-0/</loc>
		<lastmod>2021-07-30T05:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/GIH_HKNOG_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/12/08/event-wrap-vnix-nog-viet-nam/</loc>
		<lastmod>2021-07-30T05:01:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/12/VNIX_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/01/03/three-of-the-best-cybersecurity-3/</loc>
		<lastmod>2021-07-30T05:02:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/ThreeOfTheBest_Security_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/12/30/three-of-the-best-ipv6-3/</loc>
		<lastmod>2021-07-30T05:03:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/ThreeOfTheBest2019_IPv6_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/12/27/three-of-the-best-long-reads-2/</loc>
		<lastmod>2021-07-30T05:03:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/ThreeOfTheBest2019_LongReads_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/01/07/three-of-the-best-cybersecurity-2/</loc>
		<lastmod>2021-07-30T05:03:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/12/3best_security_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/01/04/three-of-the-best-development-2/</loc>
		<lastmod>2021-07-30T05:04:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/12/3best_Development_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/01/02/three-of-the-best-how-to-2018/</loc>
		<lastmod>2021-07-30T05:04:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/12/3best_howto_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/12/26/three-best-development-2/</loc>
		<lastmod>2021-07-30T05:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/12/ThreeofBest_Development_2017-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/12/29/three-of-the-best-cybersecurity/</loc>
		<lastmod>2021-07-30T05:05:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/12/1st_2nd_3rd_yellow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/12/27/three-of-the-best-internet-governance-2/</loc>
		<lastmod>2021-07-30T05:05:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/12/1st_2nd_3rd_purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/12/25/three-of-the-best-development/</loc>
		<lastmod>2021-07-30T05:06:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/12/1st_2nd_3rd_light_green.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/12/27/three-of-the-best-internet-governance/</loc>
		<lastmod>2021-07-30T05:06:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/12/1st_2nd_3rd_purple.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/12/25/three-of-the-best-network-security/</loc>
		<lastmod>2021-07-30T05:07:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/12/1st_2nd_3rd_green.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/12/23/three-of-the-best-dnsdnssec/</loc>
		<lastmod>2021-07-30T05:07:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/12/1st_2nd_3rd_blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/12/14/dns-over-https-in-unbound/</loc>
		<lastmod>2021-07-30T05:08:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/DoH-unbound-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/07/23/responses-to-mozillas-trusted-recursive-resolver-public-consultation/</loc>
		<lastmod>2021-07-30T05:10:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Mozilla-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/07/08/a-survey-on-securing-inter-domain-routing-part-1/</loc>
		<lastmod>2021-07-30T05:12:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/BGP_security_banner1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/SIDR1_Img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/SIDR1_Img2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/SIDR1_Img3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/SIDR1_Img4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/07/01/rens-pioneers-of-the-internet-asia-pacific/</loc>
		<lastmod>2021-07-30T05:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/REN-header-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/TEIN-network-map-1-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/APOnet-final-_web-res_6.10.21Map-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/06/25/ipv6-adoption-in-2021/</loc>
		<lastmod>2021-07-30T05:14:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/IPv6-Adoption-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-1-%E2%80%94-Changes-in-APNIC-IPv6-Capability-June-2021-vs-June-2020.-View-the-interactive-map..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-2-%E2%80%94-Changes-in-APNIC-IPv6-Capability-at-1-June-2020..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/06/16/are-large-dns-messages-falling-to-bits/</loc>
		<lastmod>2021-07-30T05:15:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/DNS-falling-to-bits-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-1-%E2%80%94-Response-sizes-per-server-IP-version-for-July-2020..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-2-%E2%80%94-UDP-fragmented-queries-for-.nl-authoritative-servers..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-3-%E2%80%94-NS1-CDF-of-DNS-UDP-TC-responses-for-.nl-July-2020..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-4-%E2%80%94-DNS-UDP-TC-responses-followed-by-TPC-queries.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-5%E2%80%94-Daily-EDNS-buffer-distribution-by-resolvers-y-axis-in-log-2-scale.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/06/07/opinion-is-big-necessarily-bad/</loc>
		<lastmod>2021-07-30T05:17:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/centrality-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-1-%E2%80%94-Karl-Marx-was-one-of-the-first-economists-to-think-about-the-market-economy-as-a-global-entity.-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-2-%E2%80%94-Provided-a-definition-an-an-efficient-market..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-3-%E2%80%94-Louis-Brandeis-argued-that-big-business-was-too-big-to-be-managed-effectively-in-all-cases..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/05/05/growing-a-game-of-community-engagement/</loc>
		<lastmod>2021-07-30T05:19:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Header-image-IPGO.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/early-card-version-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Ipgo-2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Sunny-ipgo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/04/21/event-wrap-bdsig-2021/</loc>
		<lastmod>2021-07-30T05:21:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/bdSOG2021.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/04/21/anycast-performance-monitoring-with-anteater/</loc>
		<lastmod>2021-07-30T05:22:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Anteater-feature-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-1-Anteater-pipeline.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-2-Anteater-Grafana-graph-RTT-per-authoritative-server-IP-version.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-3-RTT-per-anycast-site-for-IPv6-to-one-of-nls-authoritative-servers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-4-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-5-route-leaks-and-increases-in-the-query-rate-and-resolver-count-at-the-Sydney-site.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/04/20/the-importance-of-network-operators-in-nepal-during-covid-19/</loc>
		<lastmod>2021-07-30T05:22:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/netops-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/04/19/skidmap-and-malicious-dns-data-mining/</loc>
		<lastmod>2021-07-30T05:23:27+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/skidmap-ft-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-1-%E2%80%94-DNSMon-blocking-subdomains..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-2-%E2%80%94-Access-history-of-the-domain-names..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-3-%E2%80%94-Analyzing-the-infrastructure-and-associations-of-automatically-blocked-domains-using-the-graph-system..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-4-%E2%80%94-Client-and-cloud-distribution..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-5-%E2%80%94-Go-live-requests-between-2300-on-13-November-2020-and-2300-on-14-November-2020..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-6-%E2%80%94-The-console-can-perform-batch-remote-command-execution-and-single-shell-login-for-victims..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Figure-7-%E2%80%94-Nearly-900-clients-connected-shortly-after-the-server-started-but-the-actual-figure-is-probably-much-higher..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/04/05/web-co-location-and-its-impact-on-the-privacy-benefits-of-domain-name-encryption/</loc>
		<lastmod>2021-07-30T05:24:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/colation-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-1-%E2%80%94-Domain-name-encryption-prevents-any-on-path-observers-from-seeing-the-domain-name-information-exposed-as-plaintext-on-the-wire..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-2-%E2%80%94-CDF-of-the-k-anonymity-value-colocation-degree-of-all-studied-domains..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/03/03/what-will-happen-when-the-routing-table-hits-1024k/</loc>
		<lastmod>2021-07-30T05:29:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/1024k-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/bgpfig25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-28-%E2%80%94-IPv6-BGP-Table-Size-from-January-2012.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-3-%E2%80%94-A-visual-history-of-various-types-of-router..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-4-%E2%80%94-An-image-showing-some-basic-router-architecture..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/19/stop-spoofed-traffic-at-the-door-destination-side-sav/</loc>
		<lastmod>2021-07-30T05:30:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/DSAV_Ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-1-%E2%80%94-If-we-receive-this-query-at-our-authoritative-server-we-can-be-confident-that-DSAV-is-not-present.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/18/building-your-own-fibre-to-premises-network/</loc>
		<lastmod>2021-07-30T05:30:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/ECFiber-feature.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/7-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/ECFiber-poles.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/ECFiber-Map.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/12/event-wrap-sanog-36/</loc>
		<lastmod>2021-07-30T05:31:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/SANOG-banner-dave-phelan-tutorial.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/12/event-wrap-ibcast-2021-pakistan/</loc>
		<lastmod>2021-07-30T05:31:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/IBCAST-Banner-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/03/the-internet-of-trash/</loc>
		<lastmod>2021-07-30T05:32:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Internet-of-trash-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/01/20/event-wrap-lknog4/</loc>
		<lastmod>2021-07-30T05:33:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/LKNOG-banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/01/13/how-critical-are-submarine-cables-to-end-users/</loc>
		<lastmod>2021-07-30T05:35:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/submarine-cable-banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Submarine-cables-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Submarine-figure-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/01/12/china-telecoms-ipv6-efforts-are-beginning-to-show-in-the-numbers/</loc>
		<lastmod>2021-07-30T05:35:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/Skyline-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/Chart-1-Shanghai.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/Chart-2-Chengdu.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/12/22/event-wrap-connections-2020/</loc>
		<lastmod>2021-07-30T05:37:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/Connections-2020.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/12/10/introducing-jdr-explore-inspect-and-troubleshoot-rpki/</loc>
		<lastmod>2021-07-30T05:39:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/JDR-tool_banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/ASN1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/8587.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/overview_with_errors.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/RPKI-at-APNIC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/11/05/event-wrap-2020-sri-lanka-cert-cyber-security-week/</loc>
		<lastmod>2021-07-30T05:41:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/Cyberweek.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/11/02/what-is-opentelemetry/</loc>
		<lastmod>2021-07-30T05:42:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/opentelemetry_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/OpenTelemetry_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/OpenTelemetry_Fig2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/OpenTelemetry_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/OpenTelemetry_Fig4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/12/18/doppelganger-a-new-tool-for-sharing-time-series-data-with-gans/</loc>
		<lastmod>2021-07-30T05:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/stormtrooper_star_wars_lego_storm_trooper_parade_star_war-1040863.jpgd_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/autocorr_nsdi20_annotated.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/03/06/on-the-need-of-a-common-framework-to-manage-smart-city-data/</loc>
		<lastmod>2021-07-30T05:43:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/Data-Ciity_BIG_2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/01/18/is-wifi-too-polite/</loc>
		<lastmod>2021-07-30T05:44:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Polite-wifi-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Polite-Wifi-fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Polite-WiFi-table-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Polite-wifi-figure-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/12/23/how-to-detect-iot-devices-in-a-network/</loc>
		<lastmod>2021-07-30T05:45:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/iOt-FEATURED.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/IoT-Fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/IoT-fig-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/IoT-Fig-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/IoT-Fig-4-isp_num_unique_sam_alexa_34dev_per_day.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/03/18/visualizations-of-periodic-iot-traffic/</loc>
		<lastmod>2021-07-30T05:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/02/light-bulb_banner.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/02/tuya_5min.png-WEBP-Image-731-%C3%97-360-pixels-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/02/baixin_5min.png-WEBP-Image-731-%C3%97-360-pixels-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/11/22/how-consumer-iot-devices-expose-information/</loc>
		<lastmod>2021-07-30T05:45:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Danger_IoT_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/IoT_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/IoT_img2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/IoT_img3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/IoT_img4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/IoT_img5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/IoT_img6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/06/17/network-protocols-and-their-use-security-and-privacy/</loc>
		<lastmod>2021-07-30T05:45:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/Private_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/05/14/protecting-the-internet-of-things-with-mud/</loc>
		<lastmod>2021-07-30T05:46:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/05/IoTnetwork_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/05/MUD_fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/05/MUD_fig-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/02/26/up-and-down-the-stack-through-a-nerds-eyes-making-the-internet-better-the-internet-way/</loc>
		<lastmod>2021-07-30T05:46:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/AndrewSullivan.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/05/31/event-wrap-ripe-74/</loc>
		<lastmod>2021-07-30T05:46:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/dmr_tue_pic2_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/05/26/encouraging-ipv6-iot-investment-viet-nam/</loc>
		<lastmod>2021-07-30T05:46:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/Viet_IPv6_21-copy.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/05/22/event-wrap-asia-pacific-digital-society-policy-forum-2017/</loc>
		<lastmod>2021-07-30T05:46:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/Klee_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/03/30/ietf-98-chicago-homenet-hunt-name/</loc>
		<lastmod>2021-07-30T05:46:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/HomeNet_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/10/27/event-wrap-lacnic-26-costa-rica/</loc>
		<lastmod>2021-07-30T05:46:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/InternetSocietyLAC-on-Twitter-Durante-toda-la-semana-viviremos-en-CostaRica-el-encuentro-LACNIC26-LACNOG16.-Puedes-seguirlo-en-vivo-desde-https-t.co-2PwQO9jKVW-https-t.co-T3l0FYvpLx-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/10/12/iot-solutions-help-reduce-human-elephant-conflict-sri-lanka/</loc>
		<lastmod>2021-07-30T05:46:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/DSC0037.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/field-recording-elephant.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/08/09/successes-challenges-ipv6-transition-technologies-apnic/</loc>
		<lastmod>2021-07-30T05:47:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/11/ipv6-apnic-ci.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/BBIX_img1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/07/20/ietf99-prague-homenet-tries-solve-naming-problem/</loc>
		<lastmod>2021-07-30T05:47:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/HomeNet_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/03/16/wi-fi-security-enterprise-wi-fi-networks/</loc>
		<lastmod>2021-07-30T05:47:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/wifi_security_yellow_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/03/15/wi-fi-security-public-wi-fi-networks/</loc>
		<lastmod>2021-07-30T05:47:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/wifi_security_blue_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/03/14/wi-fi-security-home-office-wi-fi-networks/</loc>
		<lastmod>2021-07-30T05:47:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/wifi_security_orange_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/Wifi_evil-twin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/09/16/ipv6-in-the-pacific-island-communities-new-caledonia-goes-fibre-to-the-home/</loc>
		<lastmod>2021-07-30T05:49:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/09/SubmarineNetworkMap_blog_2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/11/19/can-we-build-it-aye-we-can/</loc>
		<lastmod>2021-07-30T05:49:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/11/HighlandMighty15_CNT_10jan13_LisaJohnson_b_646x430.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/12/13/aintec-2016-community-building-alive-well-thailand/</loc>
		<lastmod>2021-07-30T05:50:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/12/AINTEC-2016.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/12/08/event-wrap-10th-aintec-2014/</loc>
		<lastmod>2021-07-30T05:50:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/GGM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/12/08/aintec-chiang-mai-and-the-asian-internet-research-scene/</loc>
		<lastmod>2021-07-30T05:50:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/12/aintec3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/04/03/the-ddos-threat-landscape-in-2017/</loc>
		<lastmod>2021-07-30T05:51:07+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/Flag_ddos_colour_orange.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Picture1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Picture2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Picture3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Picture4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Picture5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Picture6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Picture7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/12/10/going-global-ii-where-is-whois/</loc>
		<lastmod>2021-07-30T05:52:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/12/Cloud_Stock_15_by_Blackwolfe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/01/13/apricot-and-apnic-conference-locations-rotation-on-hold-while-events-remain-online/</loc>
		<lastmod>2021-07-30T05:53:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/APRICOT2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/11/26/event-wrap-bdigf-2020/</loc>
		<lastmod>2021-07-30T05:54:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/bdigf2020-youthigf-panelists.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/02/16/nzseries-light-bulb-moment-allows-new-zealands-research-community-to-make-a-difference/</loc>
		<lastmod>2021-07-30T05:57:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/02/BarVict185a_banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/07/15/apnic-membership-hits-8000/</loc>
		<lastmod>2021-07-30T06:01:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/06/8000_banner_BIG.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/06/Top-8-Industries-2020.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/06/Top-5-Economies-2020.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/06/industry-vs-economypng.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/12/18/apnic-fee-schedule-change-for-all-account-holders-from-1-january-2020/</loc>
		<lastmod>2021-07-30T06:01:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/08/apnic-logos.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/Fees_table-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/Fees_table-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/06/19/apnic-community-supports-training/</loc>
		<lastmod>2021-07-30T06:01:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/06/DNSSEC-ID_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/04/21/architecture-at-apnic-eventual-consistency/</loc>
		<lastmod>2021-07-30T06:01:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/04/architecture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/11/04/event-wrap-infotel-2014/</loc>
		<lastmod>2021-07-30T06:02:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/11/Pubudu_Infotel_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/03/19/event-wrap-arm-in-bangkok/</loc>
		<lastmod>2021-07-30T06:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/03/ARM_7_Group_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/11/14/a-different-type-of-pacinet-2014-training/</loc>
		<lastmod>2021-07-30T06:03:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/PacINET_Nurul_Blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/10/16/bits-and-bytes-from-my-apnic-38-fellowship/</loc>
		<lastmod>2021-07-30T06:04:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/Sarah_APNIC38_BLOG2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/10/15/the-good-practice-of-legitimacy-of-address-loa-checks/</loc>
		<lastmod>2021-07-30T06:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/Nurul_Training_BLOG.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/option1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/option2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/option3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/option4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/08/06/successful-oceania-event-caps-off-the-nfh-series/</loc>
		<lastmod>2021-07-30T06:05:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/NFH4_Banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/OC_chart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/02/03/making-an-ixp-possible-in-samoa/</loc>
		<lastmod>2021-07-30T06:06:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/01/660_Apia_Samoa_SS_68568130.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/01/IMG_3528.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/05/25/apply-now-for-an-apnic-40-fellowship/</loc>
		<lastmod>2021-07-30T06:06:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/05/apnic38-fellows_BLOG.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/05/apnic36-fellows.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/11/03/apnic-training-responsive-and-pro-active/</loc>
		<lastmod>2021-07-30T06:07:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/08/Nural-Cambodia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/10/22/smishing-evolves-in-south-korea/</loc>
		<lastmod>2021-07-30T06:07:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/10/Smishing-banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/08/06/expanding-eduroam-in-the-asia-pacific/</loc>
		<lastmod>2021-07-30T06:09:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/EAP-Trainer-Vlad-Mencl-from-REANNZ.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/01/27/register-for-mpls-workshop-malaysia/</loc>
		<lastmod>2021-07-30T06:10:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/01/14840045037_e919cf73b1_z.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/02/16/change-of-paradigm-with-ipv6-no-global-addresses-on-router-interfaces/</loc>
		<lastmod>2021-07-30T06:11:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/09/EricV_Technical_Keynote_BLOG.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/02/APnic-blog-LLA-only-evyncke.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/02/APnic-blog-LLA-only-evyncke2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/07/25/event-wrap-oecd-ministerial-meeting-2016/</loc>
		<lastmod>2021-07-30T06:11:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/07/20160622_103404_resized.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/03/09/apnic-2014-annual-report-published/</loc>
		<lastmod>2021-07-30T06:12:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/08/apnic-logos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/08/05/talking-malware-analysis-asia-pacific-certs/</loc>
		<lastmod>2021-07-30T06:12:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/07/JICA.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/07/photo_2016-07-29_11-58-28.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/06/04/a-new-base-for-data-discussions/</loc>
		<lastmod>2021-07-30T06:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/05/16769471615_1861cb1d78_z.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/08/02/casm-api-needs/</loc>
		<lastmod>2021-07-30T06:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/07/API_tools_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/08/07/event-wrap-china-internet-conference/</loc>
		<lastmod>2021-07-30T06:14:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/08/China-Internet-Conference-2017.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/09/30/event-wrap-pacinet-2014/</loc>
		<lastmod>2021-07-30T06:14:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/09/PacINET_Group_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/06/10/event-wrap-afrinic-22-and-ais-15/</loc>
		<lastmod>2021-07-30T06:15:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/07/AFRINIC22_Group_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/09/27/enhancing-traffic-light-protocol-with-iep/</loc>
		<lastmod>2021-07-30T06:16:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/TLS_banner-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/What-is-TLP_slide.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/TLP-Limitations_slide.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/Why-IEP_slide.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/11/12/sometimes-the-power-problem-is-unsolvable/</loc>
		<lastmod>2021-07-30T06:17:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/11/9UxNQrwE.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/10/01/stop-think-connect/</loc>
		<lastmod>2021-07-30T06:18:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/10/Stop-Think-Connect.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/10/02/openwrt-and-firefox-underpin-an-open-bus-virtual-isp-model-in-china/</loc>
		<lastmod>2021-07-30T06:18:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/matchstick.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/06/22/event-wrap-communicasia-2015/</loc>
		<lastmod>2021-07-30T06:19:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/06/CommunicAsia2015_Group_Group_2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/10/08/event-wrap-2nd-interpol-europol-cybercrime-conference/</loc>
		<lastmod>2021-07-30T06:19:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/Europol_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/07/16/the-internet-is-everybodys-business/</loc>
		<lastmod>2021-07-30T06:19:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/07/NetHui_shoes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/05/08/apnic-hosts-pacific-security-experts/</loc>
		<lastmod>2021-07-30T06:20:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/IMG_0336_scaled_header.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/2018-05-02-PHOTO-00000003.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/05/29/its-time-to-replace-tcp-with-online-learning-congestion-control/</loc>
		<lastmod>2021-07-30T06:21:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/Congestion-control_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/TCP-PCC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/08/19/event-wrap-satrc-15/</loc>
		<lastmod>2021-07-30T06:21:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/08/SATRC_Group_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/07/30/where-text-protocols-came-from-and-why-theyre-not-going-anywhere/</loc>
		<lastmod>2021-08-02T23:29:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/text-protocols-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/06/23/learning-the-latest-skills-to-manage-and-monitor-networks/</loc>
		<lastmod>2021-08-09T02:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Tongan-training-header.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/NMM-room-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/NMM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/07/16/the-ripe-nccs-experience-introducing-rov-to-its-own-network/</loc>
		<lastmod>2021-08-09T09:46:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/RIPE-key-header.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/05/11/reflections-of-intent/</loc>
		<lastmod>2021-08-11T01:48:27+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/05/keep-off-grass_banner.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/11/rpki-mylab-environment/</loc>
		<lastmod>2021-08-11T22:38:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/RPKI_LAB_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Fig1_NetworkSetup.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Fig2_ServicesSetup.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/12/whats-interop-testing-and-why-is-it-so-tricky/</loc>
		<lastmod>2021-08-12T02:03:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Interop-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/State-transmission-diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/16/hybrid-cloud-should-you-use-it/</loc>
		<lastmod>2021-08-16T04:01:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Hybrid-cloud-banner-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/17/the-results-of-the-first-ietf-community-survey/</loc>
		<lastmod>2021-08-17T00:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/IETF-header.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/09/satellite-communication-and-regulation/</loc>
		<lastmod>2021-08-18T03:16:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Satellite-regulation-header-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/05/whats-your-wish-list-for-the-perfect-rpki-validator/</loc>
		<lastmod>2021-08-18T03:53:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/RPKI-checklist-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/04/event-wrap-communicasia-2021/</loc>
		<lastmod>2021-08-18T03:54:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/commasia-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/03/decrypting-tls-traffic-with-polarproxy/</loc>
		<lastmod>2021-08-18T04:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/PolarProxy-FT-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Figure-1-%E2%80%94-DNS-over-HTTPS-DoH-traffic-in-the-file-proxy-191023-091924.pcap_..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Figure-2-%E2%80%94-PolarProxy-removes-all-TLS-data-before-saving-the-decrypted-traffic-to-a-capture-file..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/02/dissecting-the-performance-of-production-quic/</loc>
		<lastmod>2021-08-18T04:19:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/QUIC-Track-Watch_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/testHarness.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/QUICBenchWorkflow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/ExtraLossFigure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/07/27/opinion-why-is-this-unusual/</loc>
		<lastmod>2021-08-18T04:59:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/outage-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/07/26/solo-effort-to-clean-up-rpki-invalids-across-a-region/</loc>
		<lastmod>2021-08-18T05:06:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Invalids-AFRINIC-FT-copy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Figure-1-%E2%80%94-Screenshot-of-parts-of-the-NIST-RPKI-Monitoring-Tool-menu-with-%E2%80%98Invalid-Prefix-Origin-Pairs..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Figure-2-%E2%80%94-A-detailed-view-of-the-analysis-feature-of-each-RPKI-Invalid-Prefix-Origin-pair-on-the-NIST-RPKI-Monitoring-tool..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Figure-3-%E2%80%94-A-screenshot-of-a-typical-e-mail-sent-to-relevant-network-operators.-Specific-details-have-been-removed-to-protect-the-reputation-of-the-network-operators-involved..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Figure-4-%E2%80%94-AFRINIC-Prefix-Origin-Pairs.-Source-NIST-RPKI-Monitor..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/13/dns-cache-snooping-attacks/</loc>
		<lastmod>2021-08-18T05:08:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/cache-snooping-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/10/how-to-effectively-reduce-the-threat-of-day-one-exploits/</loc>
		<lastmod>2021-08-18T05:09:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/day-one-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/18/twitter-has-introduced-roa/</loc>
		<lastmod>2021-08-20T06:42:40+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Twitter-roa-header.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/ROA@APNIC_ad-banner-for-blogposts.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/19/whatever-it-is-you-need-more/</loc>
		<lastmod>2021-08-20T07:02:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/enough_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/08/10/welcome-to-the-blog/</loc>
		<lastmod>2021-08-23T03:29:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/08/speechbubbles.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/18/improving-accessibility-at-apnic/</loc>
		<lastmod>2021-08-23T04:17:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Accessibility-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/24/the-game-theory-behind-running-cubic-and-bbr-on-the-internet/</loc>
		<lastmod>2021-08-24T00:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Game_car_speed_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/23/what-is-hitting-our-honeypots/</loc>
		<lastmod>2021-08-24T04:38:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/honeynet-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure-1-%E2%80%94-Infected-host-sending-SYN-packets-to-the-destination-port-23-at-multiple-IP-addresses..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure-2-%E2%80%94-Linux-Tsunami-found-in-the-Yara-result..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure-3-%E2%80%94-IRC-server-as-command-and-control-for-the-botnet..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/25/multi-signer-dnssec-models/</loc>
		<lastmod>2021-08-25T00:01:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Multi-signer-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure-1-%E2%80%94-In-Multi-Signer-Model-1-the-zone-owner-controls-the-KSK-and-each-provider-maintains-their-own-ZSK..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure-2-%E2%80%94-In-Multi-Signer-Model-1-the-zone-owner-obtains-the-ZSKs-signs-and-pushes-the-DNSKEY-set-to-each-provider..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure-3-%E2%80%94-In-Model-2-each-provider-has-their-own-KSK-and-ZSK..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Figure-4-%E2%80%94-Model-2-cross-imports-ZSKs-across-providers-and-publishes-the-DS-corresponding-to-each-of-their-KSKs-in-the-parent-DS-RRset..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/27/kernel-stacks-and-5g/</loc>
		<lastmod>2021-08-27T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Bypass_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/mobile-packet-core.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/30/lets-all-suppress-router-advertisements/</loc>
		<lastmod>2021-08-30T00:35:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Suppress_IPv6_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Sending-out-RAs-at-regular-intervals-copy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Sending-out-RAs-in-response-to-RSs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/31/tls-with-dane/</loc>
		<lastmod>2021-08-31T00:01:47+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/TLS-DANE-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/30/event-wrap-asean-japan-cyber-security-seminar/</loc>
		<lastmod>2021-08-31T03:30:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/08/Security_cookie_cutter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/25/seven-policy-proposals-up-for-discussion-at-apnic-52/</loc>
		<lastmod>2021-08-31T07:54:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Policy-prop-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/02/land-of-the-rising-regional-ixp/</loc>
		<lastmod>2021-09-02T05:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/JANOG48.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Internet-Traffic-Japan-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/02/event-wrap-pandi-meeting-12/</loc>
		<lastmod>2021-09-02T06:01:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Pandi12.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/02/event-wrap-cambodia-cert-seminar/</loc>
		<lastmod>2021-09-02T06:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/camcert2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/02/how-do-we-improve-internet-connectivity-outside-major-cities-a-japanese-approach/</loc>
		<lastmod>2021-09-02T06:26:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Fukuoka_Osaka.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/regional-ISPs-in-Japan.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Sendai-and-Fukuoka-IXP-connections.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/IXP-chicke-egg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/06/event-wrap-2021-cncert-international-partnership-conference/</loc>
		<lastmod>2021-09-05T22:37:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/CNCERtFT-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/07/another-five-reasons-to-peer/</loc>
		<lastmod>2021-09-07T00:01:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Peering-FT2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/06/five-reasons-to-peer/</loc>
		<lastmod>2021-09-07T00:40:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/peeringFT2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/08/need-to-measure-quic-packet-loss-theres-a-spin-bit-cousin-for-that/</loc>
		<lastmod>2021-09-08T01:55:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/fidgetspinner_spin_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/testbed_scheme.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/plot-random.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/plot-time-curve.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/plot-gemodel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/plot-flowlength.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/09/jscontact-tools/</loc>
		<lastmod>2021-09-09T00:52:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/JSContact-tools-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/13/the-prevalence-of-dns-over-https/</loc>
		<lastmod>2021-09-13T01:45:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/DoH_eye_banner-555203.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/org2-2020-doh-dot-doq.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/org3-doh-user-country-norm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/14/apnic-52-starts-today/</loc>
		<lastmod>2021-09-14T00:25:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/52-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/17/opinion-regulating-big-tech/</loc>
		<lastmod>2021-09-17T01:09:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/BIG-tech-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/20/peeringdb-2021-user-survey/</loc>
		<lastmod>2021-09-20T01:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/past-future-survey-header.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/20/whois-data-incident-review-report-at-apnic-52/</loc>
		<lastmod>2021-09-20T02:01:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/apnic-logos-555x202.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/21/the-role-of-service-providers-in-transforming-security/</loc>
		<lastmod>2021-09-21T01:36:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/transforming-sec-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/26/geofeeds-and-shepherding-where-is-that-network/</loc>
		<lastmod>2021-09-22T04:28:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Geofeeds-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/22/did-you-validate-your-routing-policies/</loc>
		<lastmod>2021-09-22T06:47:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/tangle_cable_banner.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Fig1_Tangled_testbed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Fig2_Tangled-data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/23/exploring-apnics-2021-themes-apnic-agility/</loc>
		<lastmod>2021-09-23T02:01:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Agility-themes4-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/16/part-3-trust-but-verify-bgp/</loc>
		<lastmod>2021-09-23T03:18:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/trust-but-verify-banner-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/10/routing-concepts-you-may-have-forgotten-part-2-bgp-is-just-harnessing-gossip/</loc>
		<lastmod>2021-09-23T03:21:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/BGP-gossip-header-bubble.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/01/routing-concepts-you-may-have-forgotten-part-1-prefixes/</loc>
		<lastmod>2021-09-23T03:23:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Prefix-header-magnifier.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Prefixes-main-text-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/24/basic-routing-concepts-part-4-nats-arent-evil/</loc>
		<lastmod>2021-09-24T01:16:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/NAT-header-image-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/NAT-diagram-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/27/certainty-cyberattacks/</loc>
		<lastmod>2021-09-26T23:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Duck_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/TWCERT_overview-slide_APNIC52.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/TWCERT_recommendations_APNIC52.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/28/dohot-better-security-privacy-and-integrity-via-load-balanced-dns-over-https-over-tor/</loc>
		<lastmod>2021-09-28T00:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/DoHoT_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/DoH-over-TOR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/summary-latency-spreadsheet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/100-lookups-of-random-IPv4s-DoHoT-in-red.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/28/event-wrap-hknog-10-0/</loc>
		<lastmod>2021-09-28T04:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/HKNOG10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/30/the-elusive-nature-of-qos-in-the-internet/</loc>
		<lastmod>2021-09-30T05:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/QOS_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Avg-US-measure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Application-Pulse-profile.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/05/a-new-internet-architecture/</loc>
		<lastmod>2021-10-05T00:01:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/SCION-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/SCION-ISDs_paths.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/SCION-Packet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/01/the-role-of-ip-addresses-in-security-processes/</loc>
		<lastmod>2021-10-05T04:09:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/IPsec-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/06/weaponizing-middleboxes-for-tcp-reflected-amplification/</loc>
		<lastmod>2021-10-06T00:15:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/middlebox_attack_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/reflected-aplification-attack-example.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/threewayhandshake.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/weaponizing_middleboxes.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/packet_sequences.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/amplification-patterns.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/rank-order-plot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/infiniteroutingloops.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/victimsustained.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/11/the-relevance-of-heavy-hitters-and-the-rise-of-big-fast-flows/</loc>
		<lastmod>2021-10-11T02:21:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Hydrant_flow_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/percentiles_tcp_100ms.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/big_fast.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/analyzer_arch.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/04/who-emailed-who-institutional-privacy-risks-in-the-dns/</loc>
		<lastmod>2021-10-11T23:42:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/email-server_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/dnsbl_mx_all_apnic-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/cats_insts_apnic-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/12/event-wrap-idnic-special-meeting-apjii-national-meeting-2021/</loc>
		<lastmod>2021-10-12T04:01:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/APJII-2021.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/10/23/heres-a-tip-automate-your-threat-intelligence/</loc>
		<lastmod>2021-10-12T01:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/MISP_Banner1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/10/21/dont-just-automate-address-the-root-cause/</loc>
		<lastmod>2021-10-12T01:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/Hype_Banner.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/abuseipdb-screenshot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/DShield_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/virustotal.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/otx-alienvault.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/asn-feed-url-house.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/10/20/machine-learning-is-no-automatic-security-fix/</loc>
		<lastmod>2021-10-12T01:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/AlanTuring_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/ML_process_LINK3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/10/19/the-promises-and-peril-of-machine-learning-for-cybersecurity/</loc>
		<lastmod>2021-10-12T01:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/Security_machine-learning_can_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/12/dns-security-and-key-ceremonies/</loc>
		<lastmod>2021-10-12T04:43:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/KSK-safe-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/08/introducing-rex-a-new-approach-for-the-internet-directory/</loc>
		<lastmod>2021-10-12T04:44:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/REx-header.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/REx-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/REx-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/REx-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/REx-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/REx-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/REx-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/13/can-dns-support-encryption-without-enabling-centralization/</loc>
		<lastmod>2021-10-13T00:10:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/DNS_Query_Basket_Centrality_Banner-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/pageload_boxplots_multiresolver.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/pageload_boxplots_singleresolver.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/CDF_latency.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/14/dnssec-ksk-ceremony-43/</loc>
		<lastmod>2021-10-14T04:13:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Key-43-ft2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/15/exploring-an-idea-can-spreading-out-repositories-speed-up-rpki/</loc>
		<lastmod>2021-10-15T03:48:27+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/RPKI-spread.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/18/dnssec-with-rsa-4096-keys/</loc>
		<lastmod>2021-10-19T00:46:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/RSA-4096.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-1-%E2%80%94-DNS-UDP-truncation-and-re-query-over-TCP..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-2-%E2%80%94-Distribution-of-EDNS0-UDP-buffer-size-values-by-query..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-3-%E2%80%93-Cumulative-Distribution-of-EDNS0-UDP-buffer-size-values-by-user..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/18/asia-pacific-organizations-becoming-more-proactive-in-cybersecurity-reducing-dwell-time/</loc>
		<lastmod>2021-10-19T09:52:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Hunting_banner_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Detection-by-region.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Dwell-Time-APAC-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Global-media-dwell-time_table.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/20/event-wrap-vnix-nog-2021/</loc>
		<lastmod>2021-10-19T23:05:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/VNIX-NOG2021.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/19/threat-hunting-101-hunting-with-yara-rules/</loc>
		<lastmod>2021-10-21T00:22:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/yararule_banner-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig1_promotion-doc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig2_WinMD5Free_Screenshot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig5_notepad.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig4_command-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig5_notepad-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig6_command.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig7_notepad.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig8_notepad_highlighted.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig9_command.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig10_command.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Fig11_command.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/20/sigma-a-generic-log-signature-format/</loc>
		<lastmod>2021-10-21T00:31:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/SIGMA_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Sigma-description.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/202110-APNIC-Blog-2-Sigma-rule.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/202110-APNIC-Blog-3-Sigma-rule.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/202110-APNIC-Blog-4-Create-Sigma-rule.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/21/how-to-threat-hunting-and-threat-intelligence/</loc>
		<lastmod>2021-10-21T23:30:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Bug_threathunting_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/intel_cycle2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/tweet1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/tweet2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/tweet3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/shodan2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/github1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/log1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/log2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/22/opinion-the-internets-next-fifty-years/</loc>
		<lastmod>2021-10-22T01:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/50-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/22/asia-pacific-ipv6-deployment-grants-now-available/</loc>
		<lastmod>2021-10-22T04:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Isif-banner-blog-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Cropped-IPv6-deployment.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/apply-now-button.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/25/evaluation-of-anti-ddos-features-in-full-service-resolvers/</loc>
		<lastmod>2021-10-24T23:45:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/anti-DDoS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-1-%E2%80%94-JPRS-conducted-an-experiment-into-anti-DDoS-functionalities-implemented-in-full-service-resolver-implementations-with-these-nine-Japanese-ISPs..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-2-%E2%80%94-Step-1.-The-test-evaluation-scenario..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-3-%E2%80%94-Step-2.-The-victim-authoritative-server-becomes-unresponsive..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-4-%E2%80%94-The-victim-switches-to-another-DNS-provider-B-but-the-stale-cache-entry-is-still-used..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/26/event-wrap-y4it-2021/</loc>
		<lastmod>2021-10-26T22:49:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Y4IT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/27/how-to-connect-to-the-internet-with-your-own-ip-addresses-and-asns/</loc>
		<lastmod>2021-10-27T03:53:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/member-ip2-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-1-%E2%80%94-APNIC-Membership-fees..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-2-%E2%80%94-APNIC-new-Membership-types..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-3-%E2%80%94-Organization-details..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-4-%E2%80%94-Resource-allocation.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/29/mobile-phone-capabilities-are-key-to-improving-connectivity-in-developing-economies/</loc>
		<lastmod>2021-10-29T00:06:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/MobilePhones_Store_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Avg-RAM-capacity-mobiles.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/impact-of-various-network-connectivity-speeds-on-mobiles.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/02/dnssec-provisioning-automation-with-cds-cdnskey-in-the-real-world/</loc>
		<lastmod>2021-11-02T00:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/CDNSKEY-ft-copy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-1-%E2%80%94-Status-of-publication..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-2-%E2%80%94-CDS-status-found-at-switch.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-3-%E2%80%94-CDS-final-status.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-4-%E2%80%94-2x-CDS-found-upon-key-rollover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/05/07/exploring-apnics-2021-themes-online-participation/</loc>
		<lastmod>2021-11-02T01:13:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/05/apnic-themes-online-participation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/08/20/what-is-the-role-of-ixps-in-oceania/</loc>
		<lastmod>2021-11-02T01:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/NFH-IXP-panel-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/08/18/rpki-slowly-catching-on-in-australia-and-new-zealand/</loc>
		<lastmod>2021-11-02T01:14:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/RPKI_AUNZ_Banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/RPKI_AU_Routing-completness.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/RPKI_NZ_Routing-completness.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/RPKI-Validation_AU.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/RPKI-Validation_NZ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_Virtutel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_Internode.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_TPG.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_SydneyUni.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_AussieBB-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_Telstra.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_Superloop.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_Vodafone-NZ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_SNAP-Internet-NZ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_Auckland-University.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_SPARK-NZ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_AussieBB_unreachable.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Reachability_Superloop_unreachable.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/03/ccid5-evaluating-bbr-for-datagram-congestion-control-protocol/</loc>
		<lastmod>2021-11-02T23:45:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/CCID5_banner-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure1_Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure2_Single_path.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure3_multipath_UDCP.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure4_multipath_TCP.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/02/remote-technical-assistance-now-available-to-apnic-members-on-apnic-academy/</loc>
		<lastmod>2021-11-04T06:30:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/apnic-logos-555x202-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/TAP-main_banner_04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/05/openbsd-part-2-why-use-openbsd/</loc>
		<lastmod>2021-11-05T05:27:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OpenBSD2-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/tshirt-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/20210528_085741_cropped-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/08/wifimon-monitoring-wi-fi-network-performance-from-the-end-user-perspective/</loc>
		<lastmod>2021-11-08T00:06:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/wifimon-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-1-%E2%80%94-The-architecture-of-WiFiMon.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-2-%E2%80%94-The-Overview-tab-of-WiFiMon..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-3-%E2%80%94-Results-of-hardware-probe-measurements..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-4-%E2%80%94-Average-download-throughput-reported-by-crowdsourced-measurements-during-the-pilots-first-symposium-day.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-5-%E2%80%94-Average-download-throughput-reported-by-two-hardware-probes-during-the-pilots-first-symposium-day..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/08/event-wrap-philippine-international-cybersecurity-conference-2021/</loc>
		<lastmod>2021-11-08T07:05:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/envelope_padlock_banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/01/dns-openness/</loc>
		<lastmod>2021-11-09T04:02:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/DNS_Open-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-1-%E2%80%94-Graffiti-in-Turkey-in-2014-in-response-to-a-DNS-based-block-on-accessing-Twitter..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-2-%E2%80%94-%E2%80%98Google-Announcement-from-XKCD..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-3-%E2%80%94-Host-view-of-the-DNS..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-4-%E2%80%94-Idealized-DNS-model..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-5-%E2%80%94-DNS-resolver-infrastructure..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-6-%E2%80%94-DNSSEC-validation-process..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-7-%E2%80%94-Uptake-of-DNSSEC-validation-over-time.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-8-%E2%80%94-Use-of-open-resolvers-in-the-DNS.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-9-%E2%80%94-User-share-of-the-three-largest-open-DNS-resolvers-DNS.-Source..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/09/dns-over-tcp-considered-vulnerable/</loc>
		<lastmod>2021-11-10T01:13:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Choc-bar-TCP_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/DNS-packet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Vulnerable-domains_2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/12/all-the-gs-part-3-5g-and-the-future/</loc>
		<lastmod>2021-11-12T00:19:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/All_the_Gs_3_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/05/26/ipv6-easy-learn-test-deploy/</loc>
		<lastmod>2021-11-12T02:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Learn_test_deploy_banner-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/27/all-the-gs-part-1-governing-the-radio-spectrum/</loc>
		<lastmod>2021-11-15T00:30:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/alltheGs-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/04/2g-to-4g/</loc>
		<lastmod>2021-11-15T00:31:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/All_the_Gs_2_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/16/micro-bgp-suite-the-swiss-army-knife-of-routing-analysis/</loc>
		<lastmod>2021-11-15T23:31:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/armyknife_banner_blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/16/event-wrap-mnnog-3/</loc>
		<lastmod>2021-11-15T23:41:40+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/mnNOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/17/who-of-whois-clients/</loc>
		<lastmod>2021-11-17T04:26:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/whois-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/18/vulnerabilities-show-why-starttls-should-be-avoided-if-possible/</loc>
		<lastmod>2021-11-17T23:26:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Email_encryption_STARTTTLS_banner-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/18/dns-at-ietf-112/</loc>
		<lastmod>2021-11-18T09:03:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/IETF-112-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/19/insights-from-operating-an-ip-exchange-provider/</loc>
		<lastmod>2021-11-18T22:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Airport_board_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IPX-Ecosystem.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IPX-Monitoring.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/22/notes-from-dinr-2021/</loc>
		<lastmod>2021-11-22T02:45:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/DINR-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/fig1-DINR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Fig2-DINR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Fig3-DINR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Fig4-DINR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Fig5-DINR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Fig6-DINR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/22/event-wrap-ums-cybersecurity-awareness-seminar/</loc>
		<lastmod>2021-11-22T05:45:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/08/Security_cookie_cutter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/22/event-wrap-youth-internet-governance-forum-viet-nam-2021/</loc>
		<lastmod>2021-11-22T05:46:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/YouthIGF_VN.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/23/more-notes-from-ietf-112/</loc>
		<lastmod>2021-11-23T01:20:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/IETF-112-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-1-%E2%80%94-L4S-ECN-signalling.-Source..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Example-idealized-data-flow-in-BBRv2.-Source..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/24/should-information-flows-be-controlled-by-the-internet-plumbers/</loc>
		<lastmod>2021-11-23T23:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Plumber_banner-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/24/anyopt-predicting-and-optimizing-ip-anycast-performance/</loc>
		<lastmod>2021-11-24T22:51:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Replicate_anycast_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/fig1.AnyArch.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/fig2.3siteRTT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/fig3.3siteDiss.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/fig4.sys_.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Anyopt-Fig-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Anyopt-Fig-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/25/event-wrap-peering-asia-2021v/</loc>
		<lastmod>2021-11-25T05:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/PeeringAsia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/20/running-code-at-ietf/</loc>
		<lastmod>2021-11-25T22:56:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/running-code.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/07/opinion-learning-from-facebooks-mistakes/</loc>
		<lastmod>2021-11-25T22:56:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/FB-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-1-%E2%80%94-Facebook-4-October-outage-report..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-2-%E2%80%94-NBC-News-report-on-Facebooks-4-October-outage.-Source..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/26/impact-of-private-relay-netops-isps/</loc>
		<lastmod>2021-11-25T23:30:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/broken-glass-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/01/28/developing-a-common-interface-between-transport-and-application-layers/</loc>
		<lastmod>2021-11-26T01:39:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Taps-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Trammell-image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Trammell-image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/01/29/discussing-the-future-of-rpki/</loc>
		<lastmod>2021-11-26T01:39:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/RPKI-future-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Discussion-image-RPKI-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/23/tracking-rpki-repository-performance-with-a-ripe-atlas-measurement-bundle/</loc>
		<lastmod>2021-11-26T01:43:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/RIPE-WIKI-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-1-%E2%80%94-Latencies-to-rrdp.ripe_.net-from-RIPE-Atlas-Anchors-on-13-Jan-2021-930-UTC.-Green-is-low-latencies.-Red-is-high-latencies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-2-%E2%80%94-Latencies-to-rrdp.ripe_.net-from-RIPE-Atlas-Anchors-13-Jan-2021-1030-UTC.-Green-is-low-latencies.-Red-is-high-latencies..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-3-%E2%80%94-Screenshot-of-the-JDR-web-interface-showing-how-it-integrates-results-from-the-RIPE-Atlas-RPKI-measurements-bundle.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/11/notes-from-dns-oarc-34/</loc>
		<lastmod>2021-11-26T01:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/DNSOARC-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-1-%E2%80%94-EDNS0-buffer-size-distribution-from-Measuring-DNS-Flag-Day-2020.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-2-%E2%80%94-Detecting-anycast-routing-leaks-using-TCP-handshake-timing-data-from-Dr-Giovane-Moura%E2%80%99s-presentation..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-3-%E2%80%94-Chrome-DoH-load-from-Jason-Weil-and-Todd-Medbury%E2%80%99s-presentation..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-4-%E2%80%93-DNS-Query-transports-as-seen-by-AdGuard-from-Andrey-Meshkov%E2%80%99s-presentation..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-5-%E2%80%94-Post-Quantum-crypto-algorithm-properties-from-Moritz-M%C3%BCller-and-Jins-de-Jong%E2%80%99s-presentation..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-6-%E2%80%94-Hashed-RPZ-example-from-Jeroen-Massar%E2%80%99s-presentation..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-7-%E2%80%94-Update-of-Security-related-DNS-RRs-over-the-past-three-years-from-Robert-Mortimer%E2%80%99s-contribution..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/02/a-comprehensive-audit-of-the-afrinic-whois-database/</loc>
		<lastmod>2021-11-26T01:46:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Afrinic-banner-lightest-grey.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Count-IPv4-addresses-versus-status-cropped.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/03/24/measuring-roas-and-rov/</loc>
		<lastmod>2021-11-26T01:47:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/measuring-ROA-ROV-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-1-%E2%80%94-Example-of-transitive-drop-invalid..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-2-%E2%80%94-RPKI-Filtered-outcomes-corresponding-to-anycast-configuration-for-South-America-from-APNIC-Labs..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-3-%E2%80%94-RPKI-filtered-outcomes-for-the-Internet-June-2020-%E2%80%93-March-2021-from-APNIC-Labs..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-4-%E2%80%94-Distribution-of-the-relative-levels-of-drop-invalid-ROV-filtering-from-APNIC-Labs..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-5-%E2%80%94-Distribution-of-the-relative-levels-of-ROA-coverage-from-APNIC-Labs..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-6-%E2%80%94-ROA-report-for-AS4608..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-7-%E2%80%94-Prefix-report-for-AS4608..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-8-%E2%80%94-Prefix-report-for-AS24560..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-9-%E2%80%94-Prefix-report-for-122.160.23.0-24..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-10-%E2%80%94-ROV-invalid-routes-from-APNIC-Labs..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/03/15/which-rpki-related-rfcs-should-you-read/</loc>
		<lastmod>2021-11-26T01:48:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/MANRS-RFC-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-4-%E2%80%94-RFC-6811-brief..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/04/30/gimme-a-slice/</loc>
		<lastmod>2021-11-26T01:50:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Network-slicing-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Dhruv-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/Dhruv-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/04/22/new-update-to-dash/</loc>
		<lastmod>2021-11-26T01:51:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/dash-ft-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/05/10/seeking-expressions-of-interest-online-fellowship-mentors/</loc>
		<lastmod>2021-11-26T01:54:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/05/Fellows_blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/06/21/what-are-ping-and-traceroute-really/</loc>
		<lastmod>2021-11-26T01:55:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Ping-and-traceroute-header-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/In-text-image-1-PING-screen.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/In-text-image-3-TTL-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/In-text-image-4-TTL-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/In-text-image-2-different-routes-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/28/event-wrap-cybersecurity-asia-2021-conference/</loc>
		<lastmod>2021-11-26T01:57:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/CybersecAsia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/26/event-wrap-broadband-india-forum-session-on-ipv6/</loc>
		<lastmod>2021-11-26T01:58:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/GIH_BIF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/20/event-wrap-36th-twnic-opm/</loc>
		<lastmod>2021-11-26T01:59:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/PW_TWNIC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/20/event-wrap-aprigf-2021/</loc>
		<lastmod>2021-11-26T01:59:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/APrIGF-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/05/event-wrap-asia-pacific-youth-igf-2021/</loc>
		<lastmod>2021-11-26T02:01:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/YouthIGF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/16/ospfv3-building-the-topology/</loc>
		<lastmod>2021-11-26T02:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPF-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-1-%E2%80%94-Network-topology..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPFcode1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPFcode2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-2-%E2%80%94-The-two-links-described-in-the-R1-Router-LSA..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPFcode3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPFcode4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPFcode5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-3-%E2%80%94-Designated-Router-completed..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPFcode6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPFcode7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPFcode8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPFcode9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OSPFcode10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Figure-4-%E2%80%94-The-final-network-topology-reconstructed..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/10/rsa-vs-ecdsa-for-dnssec/</loc>
		<lastmod>2021-11-26T02:03:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Measuring-ECDSA-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-1-%E2%80%94-Distribution-of-user-populations-who-use-DNSSEC-validating-resolvers-without-support-for-ECDSA-P-256..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/10/alpaca-attack-analysing-and-mitigating-cracks-in-tls-authentication/</loc>
		<lastmod>2021-11-26T02:03:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Alpaca_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/alpaca-overview.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/29/event-wrap-itu-global-cyberdrill-2021/</loc>
		<lastmod>2021-11-26T02:04:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/ITU-Global-Cyberdrill.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/23/micro-bgp-suite/</loc>
		<lastmod>2021-11-26T02:05:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/micro-bgp-ft-copy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/22/event-wrap-pacific-igf-2021/</loc>
		<lastmod>2021-11-26T02:05:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Pacific-IGF.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/22/event-wrap-sea-igf-2021/</loc>
		<lastmod>2021-11-26T02:06:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/sea-igf-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/20/observing-dnssec-key-life-cycles/</loc>
		<lastmod>2021-11-26T02:06:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/DNSSEC_keys_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/DNSSEC_Validation_Capability_Metrics.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Lewis_DNSSEC-visualization_2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/17/thats-a-wrap-apnic-52/</loc>
		<lastmod>2021-11-26T02:07:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/52-FT-wrap.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Sponsors-final-52.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/15/event-wrap-youthxpolicymakers-internet-governance-workshop/</loc>
		<lastmod>2021-11-26T02:07:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/YouthIGF-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/15/event-wrap-apec-tel-63/</loc>
		<lastmod>2021-11-26T02:07:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/APEC-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/14/another-dns-oarc-meeting/</loc>
		<lastmod>2021-11-26T02:07:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/OARConline-35a-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Figure-1-%E2%80%93-DNS-Root-System-Anycast-Deployment.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Figure-2-%E2%80%93-Abrupt-changes-in-DNS-query-Volumes.-Source..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/11/event-wrap-youth-igf-bangladesh-2021/</loc>
		<lastmod>2021-11-26T02:10:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/youth-igf-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/16/event-wrap-btnog-8/</loc>
		<lastmod>2021-11-26T02:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Tashi_btnog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/07/05/security-round-up-april-june-2021/</loc>
		<lastmod>2021-11-26T02:11:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Auscert-image-header.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/29/should-you-update-your-route-flap-damping-parameters/</loc>
		<lastmod>2021-11-28T23:15:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/flap_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/figure2_scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/figure3_XanBhSs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/figure9_scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/figure10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/29/npm-encryption-and-the-challenges-ahead-part-1/</loc>
		<lastmod>2021-11-29T00:16:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/NPM-FT-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/12/apricot-2022-call-for-papers-now-open/</loc>
		<lastmod>2021-11-29T01:01:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/APRICOT-2022-FT-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/30/event-wrap-ietf-112/</loc>
		<lastmod>2021-11-29T23:20:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/IETF-112-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/30/modern-oses-dns-cache-poisoning-attacks/</loc>
		<lastmod>2021-11-30T03:14:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Poison_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Ephemeral-Ports.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/SADDNS_fig2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/17/ripes-rpki-validator-is-being-phased-out-so-what-are-the-other-options/</loc>
		<lastmod>2021-11-30T05:50:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/RPKI-validation-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/routinator-ui-validity-checker.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/RPKIVIZ_Fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/01/arp-problems-in-evpn/</loc>
		<lastmod>2021-12-01T00:04:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/ARP-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-1%E2%80%94-ARP-suppression..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-2-%E2%80%94-A-simple-network-with-an-L3-switch-separating-two-subnets..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-3-%E2%80%94-Asymmetric-IRB..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/01/event-wrap-dinr-2021-virtual-workshop/</loc>
		<lastmod>2021-12-01T04:45:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/DINR-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/02/help-develop-the-dns-data-dictionary/</loc>
		<lastmod>2021-12-01T22:10:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/DNS_definition_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/03/notes-from-ripe-83/</loc>
		<lastmod>2021-12-03T01:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/ripe83-header.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Figure-1-%E2%80%94-2020-Retail-cost-of-Mobile-Data-in-US-China-and-India-from-Benedict-Evans-The-Great-Unbundling..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Figure-2-%E2%80%94-2.1Ghz-Spectrum-license-costs-from-Sheikh-MD-Seum-Janata-Wifi..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Figure-3-%E2%80%94-Idealized-Internal-BGP-data-structures-from-RPKI-Based-Policy-without-Route-Refresh-Clemens-Mosig-Randy-Bush-Cristel-Pelsser-Thomas-C.-Schmidt-and-Matthias-Wahlisch..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Figure-4-%E2%80%94-Collapsed-Adj-RIB-Ins-from-RPKI-Based-Policy-without-Route-Refresh-Clemens-Mosig-Randy-Bush-Cristel-Pelsser-Thomas-C.-Schmidt-and-Matthias-Wahlisch..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/06/npm-encryption-and-the-challenges-ahead-part-2/</loc>
		<lastmod>2021-12-06T01:59:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/NPM-FT-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-1-%E2%80%94-An-example-of-synthetic-monitors-used-to-assess-business-critical-applications.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-2-%E2%80%94-Example-of-some-SaaS-applications-being-actively-monitored-with-synthetics.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/07/event-wrap-insig-2021/</loc>
		<lastmod>2021-12-07T00:25:07+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/inSIG2021.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/07/event-wrap-ripe-83/</loc>
		<lastmod>2021-12-07T00:26:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/ripe83-header.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/07/icarus-beware-of-flying-satellites/</loc>
		<lastmod>2021-12-07T06:31:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/satellite_red_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/ISL.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/ISL_targeting.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/08/efficient-multipath-transport-with-quic-video-services/</loc>
		<lastmod>2021-12-08T05:39:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Mobile-train_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/XLINK-diagram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Fig2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/XLINK_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/XLINK_Fig4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/10/akamai-shows-support-is-key-to-growing-ipv6/</loc>
		<lastmod>2021-12-09T21:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Akamai_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Google-IPv6-adoption.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Akamai_TMobile_IPv6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_website_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_academy_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_stats_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_blog_pointer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/09/improving-the-resiliency-of-rpki-relying-party-software/</loc>
		<lastmod>2021-12-09T01:31:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/resilient.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/10/event-wrap-iigf-2021/</loc>
		<lastmod>2021-12-09T22:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IIGF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/10/event-wrap-dns-oarc-36/</loc>
		<lastmod>2021-12-09T23:20:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/OARC36-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/13/how-to-employing-network-validation/</loc>
		<lastmod>2021-12-12T23:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Learn_test_deploy_banner-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Hostingers-Jenkins-pipeline.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/NetVal_command1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/NetVal_command2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/NetVal_command3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/14/event-wrap-pacnog-29/</loc>
		<lastmod>2021-12-13T22:48:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/PacNOG29.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/14/better-route-monitoring-with-bmp/</loc>
		<lastmod>2021-12-13T23:15:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/BMP-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/08/internets-technical-success-factors-revealed/</loc>
		<lastmod>2021-12-14T22:47:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/success-ft-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/15/toward-managing-network-traffic-by-domain-name/</loc>
		<lastmod>2021-12-14T23:00:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/meta4-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-1%E2%80%94-Matching-the-client-IP-server-IP-and-domain-name-information-in-the-DNS-response-packet-with-the-clients-subsequent-data-packet..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-2-%E2%80%94-Meta4-architecture..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-3-%E2%80%94-Example-domain-name-format-embedded-in-the-DNS-response-packet.-This-domain-name-config.messenger.msn_.com-has-four-labels..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-4-%E2%80%94-Multi-stage-hash-table-using-the-register-arrays-in-PISA-switches..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/16/satellite-constellations-are-coming-are-we-prepared/</loc>
		<lastmod>2021-12-15T23:01:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Satellite-dish-ground_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Satelitte-paths.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/16/event-wrap-khnog-3/</loc>
		<lastmod>2021-12-16T01:20:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/KHNOG-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/16/opinion-ipv4-address-markets/</loc>
		<lastmod>2021-12-16T04:40:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/ipv4-market-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Figure-1-%E2%80%93-IPv4-Sales-Data-%E2%80%93-source-Hilco-Streambank..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/20/seven-years-in-the-life-of-hypergiants-off-nets/</loc>
		<lastmod>2021-12-19T23:48:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Offnet_hitchhike_network_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/hypergiants-off-net-footprint.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/hypergiant_off-net-footprint-growth.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Facebook-off-nets-2017.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Facebook-off-nets-2021.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Facebook-off-nets-customer-cones-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/21/identifying-unexpected-internet-services/</loc>
		<lastmod>2021-12-21T05:29:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Scanner_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/SYN-ACK-packet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/ports_service_breakdown.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/cdf_service_protos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/22/how-widely-adopted-is-anycast-in-the-dns/</loc>
		<lastmod>2021-12-21T22:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Anycast_blue_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Evolution-of-anycast-authoritative-deployment.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/17/the-space-between-ipv6-allocations-part-2/</loc>
		<lastmod>2021-12-22T07:33:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6-space-part-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/23/preparing-for-the-next-large-scale-iot-botnet-attack/</loc>
		<lastmod>2021-12-22T23:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Danger_IoT_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Mirai-variants.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/02/17/auseries-it-takes-a-community-building-the-internet-in-australia/</loc>
		<lastmod>2021-12-23T01:15:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/02/Peter-Elford-and-Geoff-Huston_banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/02/Peter-Elford-and-Geoff-Huston.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/02/AARNet-Book-Images-038.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/02/PeterElford_business-card_AARNet.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/28/three-of-the-best-geoff-huston-4/</loc>
		<lastmod>2021-12-27T23:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/3OTB-GH.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/29/three-of-the-best-security-2/</loc>
		<lastmod>2021-12-28T23:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/3OTB-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/30/three-of-the-best-development-5/</loc>
		<lastmod>2021-12-29T23:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/3OTB-DEV.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/04/three-of-the-best-how-to-4/</loc>
		<lastmod>2022-01-03T23:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/3OTB-howto.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/05/three-of-the-best-george-michaelson/</loc>
		<lastmod>2022-01-04T23:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/3OTB-GGM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/06/three-of-the-best-rpki-2/</loc>
		<lastmod>2022-01-05T23:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/3OTB-RPKI.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/10/how-to-employing-network-validation-part-2/</loc>
		<lastmod>2022-01-10T00:30:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Batfish_SuzieQ_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/24/women-in-ict-what-are-the-challenges-in-submitting-conference-papers/</loc>
		<lastmod>2022-01-10T04:33:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Women-in-ICT-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Paper-submission-1-cropped.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Paper-submission-2-cropped.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/06/bgp-in-2021-the-bgp-table/</loc>
		<lastmod>2022-01-10T22:48:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/BGP-calendar-2021_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/bgpfig34.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/07/three-of-the-best-ipv6-5/</loc>
		<lastmod>2022-01-10T22:48:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/3OTB-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/11/we-need-to-rethink-the-resilience-of-the-global-internet-infrastructure/</loc>
		<lastmod>2022-01-11T04:02:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Coronal-Mass-Ejection_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/13/bgp-updates-2021/</loc>
		<lastmod>2022-01-12T23:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/BGP_Updates_2021_FT-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-1-%E2%80%94-IPv4-BGP-update-counts..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-2-%E2%80%94-Smoothed-IPv4-BGP-prefix-update-counts..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-3-%E2%80%94-IPv4-unstable-prefixes-per-day..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-4-IPv4-average-routing-convergence-time-per-day..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-5-%E2%80%94-Distribution-of-BGP-updates-by-prefix..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-6-%E2%80%94-Distribution-of-BGP-updates-by-origin-AS..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-7-%E2%80%94-IPv6-BGP-update-counts..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-8-%E2%80%94-Unstable-IPv6-prefix-count..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-9-%E2%80%93-IPv6-average-routing-convergence-time-per-day..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-10-%E2%80%94-Distribution-of-BGP-IPv6-updates-by-prefix..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-11-%E2%80%94-Distribution-of-BGP-IPv6-updates-by-origin-AS..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-12-%E2%80%94-Average-AS-path-length-of-BGP-IPv4-prefixes..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-13-%E2%80%94-Distribution-of-AS-adjacencies-in-the-IPv4-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-14-%E2%80%94-Average-AS-path-length-of-BGP-IPv6-prefixes..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-15-%E2%80%94-Distribution-of-AS-adjacencies-in-the-IPv6-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-16-%E2%80%94-Distribution-of-update-types-in-the-IPv4-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-17-%E2%80%94-Distribution-of-update-types-in-the-IPv6-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-18-%E2%80%94-Relative-distribution-of-update-types-in-the-IPv4-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-19-%E2%80%93-Relative-distribution-of-update-types-in-the-IPv6-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-20-%E2%80%93-Relative-distribution-of-prefix-types-in-the-IPv4-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-21-%E2%80%94-Relative-distribution-of-prefix-types-in-the-IPv6-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-22-%E2%80%94-Relative-distribution-of-prefix-update-types-in-the-IPv4-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-23-%E2%80%93-Relative-distribution-of-prefix-update-types-in-the-IPv6-network..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/14/web-cache-deception-escalates/</loc>
		<lastmod>2022-01-14T00:01:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/WebCache-FT-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/FIGURE1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/18/peeringdb-2021-product-report/</loc>
		<lastmod>2022-01-18T00:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/PeerinDB_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/example_advanced_search_fac_brisbane_power.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/20/dns-vulnerability-configuration-errors-can-cause-ddos/</loc>
		<lastmod>2022-01-20T22:47:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/DNS_DDoS_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/tsunami_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/tsuname_Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/tsuname_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/tsuname_Fig4-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/18/increasing-the-robustness-of-neighbor-discovery-for-ipv6/</loc>
		<lastmod>2022-01-24T03:42:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Neighbor-Discovery_banner1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/ND-Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/multi-homing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/ND-Fig3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/25/data-plane-security-applications-in-adversarial-settings/</loc>
		<lastmod>2022-01-24T22:45:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Adversarial-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Figure-1-%E2%80%94-A-example-of-SYN-proxy..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/27/mesh-networks-and-semantic-routing/</loc>
		<lastmod>2022-01-27T00:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Mesh-networks-and-Semantic-Routing-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/27/2-6-million-addresses-support-quic/</loc>
		<lastmod>2022-01-27T07:56:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/QUIC_banner2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/fig1-stack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/fig2-versions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/fig3-svcb-rr.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/fig4-transport.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/24/improving-network-performance-with-dynamic-congestion-control-tuning/</loc>
		<lastmod>2022-01-27T07:57:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/tuning-fork_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/xTCP_fig1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/xTCP_fig2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/xTCP_fig3.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/xTCP_fig4.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/xTCP_fig5.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/21/investigating-hidden-root-certificates-in-the-wild/</loc>
		<lastmod>2022-01-27T07:58:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Hidden-root_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/ecosystem.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/distribution.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/31/defeating-ipv6-prefix-rotation-privacy/</loc>
		<lastmod>2022-01-30T23:05:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Ipv6-Edge.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Homogeneity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Versatel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Allocation-size.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/01/address-semantics/</loc>
		<lastmod>2022-01-31T22:45:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/semantic-addressing-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/19/ip-addressing-in-2021/</loc>
		<lastmod>2022-02-02T00:37:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/addressing2021-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-1-%E2%80%94-IPv4-addresses-allocated-by-RIR-by-year..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-2-%E2%80%94-IPv4-allocations-by-RIR-by-year.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-3-%E2%80%94-Number-of-transfers-2012-%E2%80%93-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-4-%E2%80%94-Volume-of-transferred-addresses-2012-%E2%80%93-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-5-%E2%80%94-IPv4-unadvertised-address-pool-size.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-6-%E2%80%94-IPv4-unadvertised-address-pool-size-through-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-7-%E2%80%93-Ratio-of-unadvertised-pool-size-to-total-pool-size.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-8-%E2%80%94-IPv4-price-time-series-data-from-Hilco-Streambank..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-9-%E2%80%94-Age-distribution-of-transferred-addresses..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-10-%E2%80%94-Age-distribution-of-transfer-transactions..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-11-%E2%80%94-Changes-to-the-BGP-routing-table-across-2021-by-address-prefix-age..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-12-%E2%80%94-Number-of-IPv6-allocations-per-year..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-13-%E2%80%94-Volume-of-IPv6-allocations-per-year..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-14-%E2%80%94-allocated-unadvertised-and-advertised-IPv6-addresses..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-15-%E2%80%94-Advertised-IPv6-addresses-as-a-percentage-of-the-allocated-address-pool..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-16-%E2%80%94-IPv6-deployment-measurement-2010-%E2%80%93-2021.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-17-%E2%80%94-IPv6-deployment-measurement-December-2021..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/03/measuring-dns-over-https-performance-around-the-world/</loc>
		<lastmod>2022-02-02T22:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/DoH_world_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/DNS-resolution-times-and-PoPs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/CDF-potential-improvement.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/02/dns-malware-misuse-and-current-countermeasures/</loc>
		<lastmod>2022-02-03T05:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/DNS-Malware_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/CandC-over-DNS_small.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Data-exfiltration-over-DNS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Encryted-DNS-packet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/07/source-address-validation-use-cases-and-gap-analysis/</loc>
		<lastmod>2022-02-07T01:41:47+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Valid_checklist_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/intra-AS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/inter-AS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/08/consider-failure-probability-and-severity-to-improve-segment-routing/</loc>
		<lastmod>2022-02-07T22:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Fire-failure-sign_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Fig_1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Fig_2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Fig_3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Fig_4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/12/19/leaving-last-second/</loc>
		<lastmod>2022-02-09T00:18:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/07/clock-334117_960_720-copy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/28/openbsd-part-1-how-it-all-started/</loc>
		<lastmod>2022-02-09T22:41:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OpenBSD_pufferfish_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OpenBSD_pufferfish_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/08/23/what-can-you-learn-from-an-ip-address/</loc>
		<lastmod>2022-02-09T22:44:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/IP_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/IPlearn_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/IPlearn_img2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/IPlearn_img3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/IPlearn_img4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/05/09/bbr-new-kid-tcp-block/</loc>
		<lastmod>2022-02-09T22:46:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/TCP.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig9-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/04/03/the-future-of-undersea-internet-cables-are-big-tech-companies-forming-a-cartel/</loc>
		<lastmod>2022-02-09T22:47:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/fibre_fiber_optics_blender_4k_resolution_wallpaper-573469.jpgd_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/113kqFSriWoCDwK30CFHKSQ.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/contentproviderinvestments.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/bandwidthconsumers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/03/28/just-one-quic-bit/</loc>
		<lastmod>2022-02-09T22:47:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/quic-start.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/07/05/tcp-fast-open-not-so-fast/</loc>
		<lastmod>2022-02-09T22:49:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/TFO-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-1-%E2%80%94-A-regular-3WHS-request-reply-and-shutdown..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-2-%E2%80%94-SYN-requests-a-TFO-cookie-followed-by-response-and-teardown..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-3-%E2%80%94SYN-with-request-and-rejected-TFO-cookie-causes-resend-of-request..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/09/15/quiet-ipv4-internet/</loc>
		<lastmod>2022-02-09T22:50:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/IPv4-quiet-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/PhilippRichter_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/PhilippRichter_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/PhilippRichter_3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/PhilippRichter_4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/PhilippRichter_5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/PhilippRichter_6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/PhilippRichter_7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/05/30/public-dns-in-taiwan-the-latest-victim-of-bgp-hijack/</loc>
		<lastmod>2022-02-09T22:51:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/06/BGP_hijack_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/05/Screenshot-2019-05-13-14.20.02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/05/Screenshot-2019-05-13-15.13.56.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/11/openbsd-part-3-that-packet-filter/</loc>
		<lastmod>2022-02-09T22:51:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/OpenBSD3-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/06/06/five-years-ipv6-whither-next-five/</loc>
		<lastmod>2022-02-09T22:52:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/06/go_ipv6_blog_banner-01-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/BBIX_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/BBIX_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/BBIX_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/BBIX_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/BBIX_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/BBIX_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/BBIX_img1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/10/28/the-death-of-transit/</loc>
		<lastmod>2022-02-09T22:53:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/tunnel.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/xtransit-fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/xtransit-fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/xtransit-fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/xtransit-fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/xtransit-fig5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/16/really-need-new-bgp/</loc>
		<lastmod>2022-02-09T22:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/BGP_bulge_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/12/14/dont-get-caught-blockchain-hype/</loc>
		<lastmod>2022-02-09T22:57:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/12/Block-and-chain_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/04/how-chromium-reduces-root-dns-traffic/</loc>
		<lastmod>2022-02-09T23:06:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Chomium-banner-cars-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/root_traffic_20210128-cropped.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/10/stopping-dns-based-ddos-attacks-in-their-tracks/</loc>
		<lastmod>2022-02-10T01:33:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/stop_DDoS_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-1-%E2%80%94-An-example-of-a-DDoS-attack-using-the-DNS-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Figure-2-%E2%80%94-An-example-of-how-different-advertisement-records-would-apply-to-different-subnets..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/14/disaster-recovery-with-dnssec/</loc>
		<lastmod>2022-02-14T00:02:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/DNSSEC-RECOV.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-1%E2%80%94-Signing-setup-with-HSMs..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-2-%E2%80%94-Percentage-of-validating-resolvers-in-The-Netherlands..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-3-%E2%80%94-Times-related-to-the-signing-process..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/11/opinion-dns4eu/</loc>
		<lastmod>2022-02-14T02:01:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/DNS4EU.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Use-of-open-resolvers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Use-of-open-resolvers_Europe.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/15/three-policy-proposals-apnic-53/</loc>
		<lastmod>2022-02-15T04:25:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Policy-prop-ft-555x202-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/16/why-are-authentication-and-authorization-so-difficult/</loc>
		<lastmod>2022-02-15T23:10:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/authentication-authorization-difficult-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/11/26/adoption-of-dns-security-mechanisms-related-to-ease-of-use-cost/</loc>
		<lastmod>2022-02-15T23:11:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Difficult_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/cost_adoption.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/15/journeying-into-xdp-fully-fledged-dns-service-augmentation/</loc>
		<lastmod>2022-02-16T04:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/XDP_incoming-outgoing_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/XDP_FIg1_cookie-op1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/XDP_FIg2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/XDP_code8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/XDP_Fig3_imageLikeEmbed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/XDP_Fig4_imageLikeEmbed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/XDP_code10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/XDP_code11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/17/securing-an-rdap-service-with-openid-connect-and-keycloak/</loc>
		<lastmod>2022-02-17T08:24:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/securing-RDAP-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-1-%E2%80%94-Architecture-of-.it-RDAP-service..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/18/peeringdbs-2021-user-survey-results-and-2022-product-roadmap/</loc>
		<lastmod>2022-02-18T00:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Arrows_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/PeeringDB-2021-User-Survey-Overall-Satisfaction.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/18/omni-an-adaptation-layer-for-the-internet/</loc>
		<lastmod>2022-02-17T23:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Layer-cake_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/21/authentication-and-authorization-using-sso/</loc>
		<lastmod>2022-02-20T23:16:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Authentication-and-authorization-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/21/another-year-of-the-transition-to-ipv6/</loc>
		<lastmod>2022-02-21T04:40:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/IPv6-Transition_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-1-%E2%80%94-Annual-IPv4-address-allocations..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-2-%E2%80%94-IPv4-market-price-data-from-Hilco-Streambank..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-3-%E2%80%94-IPv4-transfer-volume-from-RIR-operated-transfer-logs..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-4-%E2%80%94-IPv6-allocations-per-year..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-5-%E2%80%94-IPv6-allocated-addresses-per-year..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-6-%E2%80%94-IPv6-BGP-routing-table-size-2004-2022.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-7-%E2%80%94-IPv6-BGP-routing-table-size-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-8-%E2%80%94-Daily-average-IPv6-route-convergence-time-2020-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-9-%E2%80%94-Use-of-IPv6-2012-%E2%80%93-2022..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-9-%E2%80%94-Distribution-of-IPv6-deployment-January-2022..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/22/resurrection-of-injection-attacks/</loc>
		<lastmod>2022-02-23T22:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/DNS_transparency_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-1-%E2%80%94-DNS-based-injection-attack-against-radsecproxy-in-eduroam..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-2-%E2%80%94-Missing-validation-in-DNS-components..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-3-%E2%80%94-DNS-based-XSS-injection-in-OpenWRT-below-19.07.7..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/24/can-we-make-wide-area-network-routers-less-busy/</loc>
		<lastmod>2022-02-23T23:15:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/Bypass_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/olt-router.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Shoofly_bypass-simple-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/shoofly-benefit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/23/the-end-of-isdn/</loc>
		<lastmod>2022-02-24T03:46:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/copper-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/28/welcome-to-apricot-2022/</loc>
		<lastmod>2022-02-28T07:04:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/APRICOT-2022-FT-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/06/17/trust-neutrality-keys-to-sustainable-internet-exchange-pakistan/</loc>
		<lastmod>2022-03-02T01:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/06/PKIX-Karachi_Naeem-Ahmed_banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/06/Traffic-volume-Islamabad-IX.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/06/PKIX-members-RTT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/06/IMG_2039.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/06/PKIX_training.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/03/podcast-taking-ipv6-by-the-horns/</loc>
		<lastmod>2022-03-03T01:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Jio_banner2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_blog_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_academy_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_stats_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_website_pointer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/03/apnic-54-update/</loc>
		<lastmod>2022-03-03T07:56:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/APNIC-54-prelim-blog-banner-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/03/apnic-2021-annual-report-now-available/</loc>
		<lastmod>2022-03-03T07:58:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Screen-Shot-2022-03-03-at-12.20.35-pm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/04/apricot-2022-is-a-wrap/</loc>
		<lastmod>2022-03-04T04:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/APRICOT-2022-wrap_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/07/publishing-ipv6-ntp-servers-with-dhcpv6/</loc>
		<lastmod>2022-03-06T23:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/publishing_printing_letters_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/08/one-in-six-ases-exhibit-consistent-tagging-behaviour/</loc>
		<lastmod>2022-03-07T22:50:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/AS_forward_tag_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Krenc_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Krenc_Fig2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/25/small-home-office-network-ipv6-wish-list/</loc>
		<lastmod>2022-03-10T06:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/IPv6-router_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/1isp_home_network.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/08/authenticated-bootstrapping-of-dnssec-delegations/</loc>
		<lastmod>2022-03-10T06:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Chain_of_Trust_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-1-%E2%80%94-Approaches-to-DNSSEC-bootstrapping.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-2-%E2%80%94-Authenticated-Bootstrapping-of-DNSSEC-Delegations.-For-simplicity-the-_dsauth-label-is-skipped.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/11/how-complex-is-the-dns/</loc>
		<lastmod>2022-03-10T22:41:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/07/DNS_puzzle_banner-e1646951956701.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Clases-of-automata.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/07/16/rpki-invalids-are-not-going-away/</loc>
		<lastmod>2022-03-15T05:58:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Inavlids-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Figure-1%E2%80%94-Growth-of-RPKI-valid-BGP-announcements-among-the-southern-Asian-countries-according-MANRS-Observatory.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Figure-2-%E2%80%94-Consistent-presence-of-RPKI-invalid-routes-in-the-global-routing-table-as-announced-by-the-southern-Asian-countries-according-MANRS-Observatory.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Figure-3-%E2%80%94-Number-of-routing-incidents-per-month-for-each-of-the-nine-southern-Asian-countries-according-MANRS-Observatory..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/07/Figure-4-%E2%80%94-Example-of-RPKI-based-route-origin-validation..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/09/threat-hunting-with-yara-the-three-body-problem/</loc>
		<lastmod>2022-03-15T22:51:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/YARA_pattern_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Yara1_Fig1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Yara1_Fig2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Yara1_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Yara1_Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Yara1_Fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Yara1_Fig6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/16/2022-isif-asia-grants-now-open-for-applications/</loc>
		<lastmod>2022-03-16T04:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/ISIF-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Ian-Peter-Main-infographic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/14/the-multiple-meanings-of-nameserver-and-dns-resolver/</loc>
		<lastmod>2022-03-16T05:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Nameserver_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/03/16/revocation-is-there-a-better-way-to-secure-certificates/</loc>
		<lastmod>2022-03-21T06:23:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/03/Revoke_Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/22/apnic-registry-api/</loc>
		<lastmod>2022-03-22T01:42:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Registry-API_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/16/threat-hunting-with-yara-measuring-distance-between-any-three-elements/</loc>
		<lastmod>2022-03-22T22:32:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Measure_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Yara2_fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Yara2_Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Yara2_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Yara2_Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Yara2_Fig5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/21/identifying-autonomous-systems-of-state-owned-internet-operators/</loc>
		<lastmod>2022-03-22T22:33:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Flags_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/01_combined_max_heatmap.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/24/dnssec-algorithms-for-tlds-and-everyone-else/</loc>
		<lastmod>2022-03-23T23:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Encrypt-Encryption-text_FT-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/24/apnic-announces-hybrid-apnic-54-conference-in-singapore/</loc>
		<lastmod>2022-03-24T01:06:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/singapore_skyline.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/04/07/building-an-open-source-anycast-cdn/</loc>
		<lastmod>2022-03-27T22:25:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/CDN-construction-image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Nate-figure-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/28/how-to-properly-interpret-a-traceroute-or-mtr/</loc>
		<lastmod>2022-03-27T23:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Traceroute_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/30/threat-hunting-with-yara-the-red-pill-approach/</loc>
		<lastmod>2022-03-29T23:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Yara_redpill_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/23/threat-hunting-with-yara-dealing-with-wildcard-hexadecimal-patterns/</loc>
		<lastmod>2022-03-29T23:31:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Yara_hexadecimal_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/31/how-to-detect-and-prevent-common-data-exfiltration-attacks/</loc>
		<lastmod>2022-03-30T23:15:40+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/No-Access_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-1-cURL-command-for-POST-file-to-attacker-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-2-Attacker-server-response-with-cURL-POST-command-executed-from-victim-host.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-3-PowerShell-code-for-HTTP-POST-from-victim-host-plain.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-4-HTTP-POST-received-from-victim-to-attacker-listing-server-plain.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-5-Victim-host-to-attacker-control-system-communication-with-encrypted-Payload-using-HTTP-POST-encrypt.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-6-HTTP-POST-along-with-encrypted-payload-received-from-victim-to-attacker-listing-server-encrypted.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-7-Encrypted-payloaddata-decryption-decrypted-data.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-8-Victim-host-send-stolen-data-to-attacker-control-email-box-using-SMTP-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-9-Exfiltrate-data-delivered-to-attacker-email-box.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-10-SMTP-streams-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-11-Run-the-attackers-name-system-with-DNSteal.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-12-victim-system-sends-targetdata.txt-over-DNS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-13-Attacker-name-server-receive-target-data-using-DNS-is-a-communication-protocol-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-14-Metasploit-module-load-and-run-for-ICMP-ping-replies-from-victim.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-15-Victim-use-nping-tool-send-stolen-data-using-ICMP.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-16-Exfiltrated-data-store-in-attacker-machine-using-ICMP-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-17-ICMP-Data-Exfiltration-packet-capture-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-18-receiver-script-run-attacker-machine.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-19-Victim-send-etc-shadow-content-to-attacker-host-using-ARPExfiltrator.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-20-Attacker-server-listen-exfiltrated-data-over-ARP.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-21-ARP-Request-Operation-Code.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-22-IPv6teal-sender-script-running-on-victim-host-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-23-IPv6teal-receiver-script-and-related-streams-.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/01/fragility-of-transient-identifiers/</loc>
		<lastmod>2022-04-01T01:03:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Fragile_Broken-Glass_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/29/a-first-look-at-dns-over-quic/</loc>
		<lastmod>2022-04-04T01:59:07+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/DoQ-Speed_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-1-Number-of-DoQ-veri%EF%AC%81ed-resolvers-per-week-number-of-2021-and-2022-grouped-by-negotiated-DoQ-and-QUIC-version.-Support-for-QUIC-version-1-was-added-in-Week-43-of-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-2-Geographical-locations-of-the-1217-DoQ-veri%EF%AC%81ed-resolvers-as-of-2022W03-with-counts-by-continent.-The-blue-marker-represents-our-vantage-point..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-3-Handshake-time-and-handshake-to-RTT-ratio-distribution.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/04/rpki-2021-retrospective/</loc>
		<lastmod>2022-04-04T03:06:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI-retro_Ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/rpki-images-1665x609-06-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-1-%E2%80%94-Percentage-of-Asia-Pacific-valid-ROAs-by-subregion-in-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-2-%E2%80%94-Percentage-of-Asia-Pacific-invalid-ROAs-by-subregion-in-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-3-%E2%80%94-Percentage-of-Asia-Pacific-Not-Found-ROAs-by-subregion-in-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-4-%E2%80%94-Top-subregions-for-valid-routes-globally-in-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-5-%E2%80%94-Percentage-of-delegated-as-valid-routes-by-economy-in-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-6-%E2%80%94-Asia-Pacific-ROA-valid-address-count-by-economy-in-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-7-%E2%80%94-Global-ROV-in-June-2020.-Red-indicates-limited-ROV-and-green-indicates-high-ROV..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-8-%E2%80%94-Global-ROV-in-December-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Figure-9-%E2%80%94-The-default-Max-Length-matching-the-prefix-has-now-been-removed..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/05/doa-using-rpki-to-drive-out-bad-traffic/</loc>
		<lastmod>2022-04-05T02:19:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Wolf-sheep_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/ROA_signed-3_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/07/irr-hygiene-in-the-rpki-era/</loc>
		<lastmod>2022-04-06T22:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/IRR_dartboard_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/IRR-vs-RPKI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Classification-of-IRR-records.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/RIR-IRR-databases-vs-RADB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/IRR-record-with-inconsistent-Max-Length.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/IRR-record-with-inconsistent-ASN.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/08/route-management-prevalidation/</loc>
		<lastmod>2022-04-08T03:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/05/No-Invalids_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/14/creating-an-extensible-internet/</loc>
		<lastmod>2022-04-13T22:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Layers_elevator_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Extenstible-Internet-diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/12/how-nat-traversal-works-figuring-out-firewalls/</loc>
		<lastmod>2022-04-12T22:49:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Nat-firewall.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-intro.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-deep-integration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-firewalls-1a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-firewalls-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-firewalls-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-firewalls-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-firewalls-5a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-firewalls-5b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-firewalls-5c.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/13/omni-integrity-efficiency-and-security/</loc>
		<lastmod>2022-04-12T23:50:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Layers-cake_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/13/an-update-on-the-historical-resources-transition/</loc>
		<lastmod>2022-04-13T04:30:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/apnic-logos-555x202.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/06/how-to-installing-an-rpki-validator-2/</loc>
		<lastmod>2022-04-13T04:58:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/RPKI-validation-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/academy-ft-1024x373.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/lab01-image16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/rtr.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/RPKI-at-APNIC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.8.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.9.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.12.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/RPKI_Blog_Fort1.5_section-2.13.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/RPKI-at-APNIC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image021.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image031.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image041.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image051.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image061.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image071.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image081.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image091.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image101-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/image13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/19/event-wrap-apac-dns-forum/</loc>
		<lastmod>2022-04-19T05:30:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/APAC-DNS-Forum.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/19/how-nat-traversal-works-the-nature-of-nats/</loc>
		<lastmod>2022-04-19T06:33:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/NatNature.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-overview-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-overview-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-overview-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-stun-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-stun-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-stun-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/30/event-wrap-vphnog3/</loc>
		<lastmod>2022-04-20T05:44:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/PhNOG-2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/19/event-wrap-mmix-agm-2022/</loc>
		<lastmod>2022-04-20T05:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/MMIX-AGM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/19/event-wrap-ietf-113/</loc>
		<lastmod>2022-04-20T05:45:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/IETF113_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/12/event-wrap-pacson-virtual-webinar/</loc>
		<lastmod>2022-04-20T05:46:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/PacSON.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/07/event-wrap-nanog-84/</loc>
		<lastmod>2022-04-20T05:47:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/NANOG_84.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/12/how-to-analyse-a-cyber-attack-chain-a-cyber-drill-scenario-from-bgd-e-gov-cirt/</loc>
		<lastmod>2022-04-20T05:48:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/cyber-chain-attack-exercise_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-1-%E2%80%93-FIN-Cyber-Drill-2021-By-BGD-e-GOV-CIRT-network-diagram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-2-Validating-the-vulnerability-of-our-Exchange-system.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-3-%E2%80%93-Validate-the-cyber-incident.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-4-%E2%80%93-Web-access-log-inspection-for-suspicious-backdoor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-5-%E2%80%93-Exchange-2016-server-inspection-for-unusual-activity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-6-%E2%80%93-detection-of-the-folder-creation-time.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-7-Detect-any-unusual-program-running-during-system-bootup-or-login.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-8-Suspicious-VB-script-that-drops-an-executable.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-9-%E2%80%93-PowerShell-activity-log-for-unusual-tools-download.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-10-%E2%80%93-PowerShell-activity-log-for-downloading-post-explotation-tool-named-%E2%80%98Mimikatz.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-11-%E2%80%93-Cyber-attacker-activity-inspection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-12-%E2%80%93-Mimikatz-run-into-the-victim-Exchange-2016-machine.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-13-%E2%80%93-RDP-authentication-was-successful-by-cyber-attacker-initial-footstep-by-attacker-to-DC-system.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-14-%E2%80%93-The-attacker-is-trying-to-figure-out-from-Exchange-2016-system-to-DC-system-whether-the-spooler-service-is-on-or-not.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-15-Search-engine-query.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-16-%E2%80%93-Suspicious-PowerShell-script-execution-by-attacker.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-17-%E2%80%93-Starting-of-the-exploit-code.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-18-%E2%80%93-PrintNightmare-exploitation-event-log.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-19-PrintNightmare-exploitation-event-log.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-20-PrintNightmare-exploitation-create-a-local-admin-user-in-vulnerable-DC-system.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-21-%E2%80%93-Checking-the-creation-of-firewall-rules.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-22-%E2%80%93-Firewall-rule-found-in-the-Exchange-2016-machine.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-23-%E2%80%93-Firewall-rule-created-by-the-cyber-attacker.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-24-%E2%80%93-Port-fording-rule-created-by-the-attacker.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/02/new-maldives-ixp-marks-start-of-joint-initiative-to-support-asia-pacific-ixp-development/</loc>
		<lastmod>2022-04-20T05:49:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Maldives_Male_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/11/notes-from-ausnog-2021/</loc>
		<lastmod>2022-04-20T05:50:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/AusNOG-2021_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/21/off-path-taking-over-internet-resources/</loc>
		<lastmod>2022-04-20T22:45:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Hitchhikers_Guide_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-1-%E2%80%94-Off-path-hijacking-accounts..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-2-%E2%80%94-Vulnerable-resources-of-tested-accounts.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/25/testing-awareness-key-to-realizing-ipv6-single-stack-at-ntt-docomo/</loc>
		<lastmod>2022-04-24T22:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/DOCOMO_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/ipv6-progress-and-challenges-in-ntt-10-638.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/NTTDocomo_IPv6test_Webpage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/22/hop-by-hop-extension-headers/</loc>
		<lastmod>2022-04-22T04:05:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Vapour_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-1-%E2%80%93-IPv4-forward-fragmentation..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-2-%E2%80%93-IPv6-reverse-fragmentation..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-3-%E2%80%93-Path-MTU-hop-by-hop-header..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/26/how-nat-traversal-works-nat-notes-for-nerds/</loc>
		<lastmod>2022-04-25T22:47:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/NatNotes.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-birthday-attack-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-birthday-attack-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-multiple-layers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/28/tracing-the-ddos-attack-ecosystem-from-the-internet-core/</loc>
		<lastmod>2022-04-27T22:10:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Core_apple_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/figure4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/29/shedding-light-on-power-plant-control-networks/</loc>
		<lastmod>2022-04-28T23:25:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Power-plant_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/simple_topo_no_vp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Application-Mix.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/05/public-cloud-and-technical-culture/</loc>
		<lastmod>2022-05-04T22:10:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Public_Cloud_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/09/future-of-ipsec/</loc>
		<lastmod>2022-05-09T06:27:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/IPSec_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-1-%E2%80%94-The-IPSec-sequence-procedures-are-complex-and-Ill-defined-in-the-RFC..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-2-%E2%80%94-Old-financial-networks..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-3-%E2%80%94-Todays-financial-networks..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-4-%E2%80%94-IKEv2-a-simplified-and-clearer-protocol..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-5-%E2%80%94-The-future-of-IPSec..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/02/testing-leo-and-geo-satellite-services-in-australia/</loc>
		<lastmod>2022-05-09T06:40:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Canberra_satellite_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeomap.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/leogeofig15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/10/using-cctld-data-to-study-the-impact-of-local-ixps/</loc>
		<lastmod>2022-05-10T05:12:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/CCTLD-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/28/dishing-up-krill/</loc>
		<lastmod>2022-05-11T04:12:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Dishing_up_Krill_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/16/free-legal-clinic-available-to-asia-pacific-network-operators/</loc>
		<lastmod>2022-05-11T10:19:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/law-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/06/11/leo-satellites-part-4-why-direct-to-site/</loc>
		<lastmod>2022-05-11T10:19:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/LEO-FT-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/06/02/everything-you-wanted-to-know-about-leo-satellites-part-3-bandwidth-system-capacity-and-inter-satellite-routing/</loc>
		<lastmod>2022-05-11T10:19:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/05/LEO-FT-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/05/27/everything-you-wanted-to-know-about-leo-satellites-part-2-constellations-gateways-and-antennas/</loc>
		<lastmod>2022-05-11T10:19:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/05/LEO-FT-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/05/20/everything-you-wanted-to-know-about-leo-satellites-part-1-the-basics/</loc>
		<lastmod>2022-05-11T10:19:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/05/LEO-FT-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/03/09/cert-tonga-mitigates-risk-with-awareness/</loc>
		<lastmod>2022-05-11T10:19:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Cert-Tonga-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/11/30/event-wrap-vigf-2020/</loc>
		<lastmod>2022-05-11T10:20:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/IGF2020.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/10/15/event-wrap-aprigf-2020/</loc>
		<lastmod>2022-05-11T10:20:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/APrIGF-banner-black.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/08/05/retrofitting-internet-exchange-points-with-software-defined-networking/</loc>
		<lastmod>2022-05-11T10:20:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/IXP-computer-banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/07/16/identifying-malicious-iot-botnet-activity-using-graph-theory/</loc>
		<lastmod>2022-05-11T10:20:40+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/IoT-Botnet-banner-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/IoT-Botnet-detection-chart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/Iot-Botnet-table-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/IoT-Botnet-Table-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/IoT-Botnet-node-image-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/Iot-Botnet-node-image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/01/08/funding-to-connect-the-remaining-unconnected-in-asia-pacific/</loc>
		<lastmod>2022-05-11T10:21:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/Third-session-of-the-Asia-Pacific-Information-Superhighway-AP-IS-Steering-Committee_banner.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/organizations-at-AP-IS-meeting.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/Digital-Infrastructure-Development.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/01/16/event-wrap-igf-2019/</loc>
		<lastmod>2022-05-11T10:21:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Pablo_Data-Use_IGF2019.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/11/event-wrap-igf-2017/</loc>
		<lastmod>2022-05-11T10:21:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/IGF2017_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/10/11/event-wrap-international-cyber-engagement-strategy-launch/</loc>
		<lastmod>2022-05-11T10:21:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/10/Klee_Dalsie_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/10/09/security-round-up-july-september-2020/</loc>
		<lastmod>2022-05-11T10:22:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/Security-first-group-banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/09/18/satellite-still-a-necessity-for-many-pacific-islands/</loc>
		<lastmod>2022-05-11T10:22:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/46_Sat_Panel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/03/20/geo-vs-meo-which-satellite-solution-works-best/</loc>
		<lastmod>2022-05-11T10:22:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/GEOvsMEO_banner-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Ulrich_Picture4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/03/19/striking-a-balance-between-bufferbloat-and-tcp-queue-oscillation/</loc>
		<lastmod>2022-05-11T10:22:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Bufferbloat_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Ulrich_Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Ulrich_Picture2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Ulrich_Picture3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/03/15/should-i-allow-udp-over-my-satellite-link/</loc>
		<lastmod>2022-05-11T10:22:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/UDP_Big.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/03/Ulrich_Picture5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/12/john-gilmore-on-arp-rarp-bootp-dhcp-and-sun/</loc>
		<lastmod>2022-05-11T23:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/BOOTP-ARP_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/06/ditto-prevents-traffic-analysis-attacks-in-wans/</loc>
		<lastmod>2022-05-12T05:23:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/WAN_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/ditto_imag1_colour.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/16/ula-is-broken-in-dual-stack-networks/</loc>
		<lastmod>2022-05-15T23:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/ULA_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-1-%E2%80%94-Random-ULA-48-breaking-summarization..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Figure-2-%E2%80%94-In-Windows-the-host-will-still-have-an-IPv4-address-even-in-IPv6-only-network-deployments..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/13/open-dns-resolvers-from-bad-to-worse/</loc>
		<lastmod>2022-05-16T22:37:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/DNS_Open-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Percentage-of-removed-open-resolvers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/17/event-wrap-arin-49/</loc>
		<lastmod>2022-05-17T04:30:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/ARIN-49.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/19/register-now-for-network-management-and-monitoring-workshop-bangkok/</loc>
		<lastmod>2022-05-19T04:16:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Training_Shane_Wita_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/19/bypassing-cdn-wafs-with-alternate-domain-routing/</loc>
		<lastmod>2022-05-19T06:43:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Bypassing-WAFs.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-1-%E2%80%94-How-the-attack-works..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/23/running-docker-alpine-linux-in-an-ipv6-only-environment/</loc>
		<lastmod>2022-05-23T02:28:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Docker-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/25/monitoring-customer-networks-using-a-raspberry-pi/</loc>
		<lastmod>2022-05-24T22:55:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/RaspeberryPi_WiFi_ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-1-%E2%80%94-Monitoring-system-flow-chart.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-2-%E2%80%94-Logical-topology..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-3-%E2%80%94-Grafanas-Network-Monitor-dashboard..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-4-%E2%80%94-In-the-network-traffic-section-you-can-monitor-errors-and-drop-packets..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-5-%E2%80%94-You-can-also-categorize-traffic-on-Netstat.-Here-you-can-see-the-amount-of-ICMP-traffic-TCP-and-UDP-traffic..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-6-%E2%80%94-Grafanas-probe-monitoring-dashboard..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-7-%E2%80%94-OpenVPN-Server..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-8-%E2%80%94-MySQL-table..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-9-%E2%80%94-Passing-all-the-management-and-monitoring-data-through-a-VPN-tunnel..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-10-%E2%80%94-Speedtest-and-probe-monitoring-via-Grafana-topology..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/04/the-transition-to-ipv6-are-we-there-yet/</loc>
		<lastmod>2022-05-26T01:58:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Bear-with-us_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/when-fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/when-fig2revised.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/when-fig3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/26/register-now-for-the-network-and-information-security-workshop-singapore/</loc>
		<lastmod>2022-05-26T06:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Singapore-training_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/27/making-a-krill-sandbox/</loc>
		<lastmod>2022-05-27T06:45:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Krill_Sandbox_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/31/cutting-down-on-ip-address-waste/</loc>
		<lastmod>2022-05-30T22:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Zero-waste_banner1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/unicast-diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/17/the-path-to-resolverless-dns/</loc>
		<lastmod>2022-05-31T04:31:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/server-push-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-1-%E2%80%93-%E2%80%98Classic-DNS-system-architecture..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-2-%E2%80%93-%E2%80%98ISP-DNS-system-architecture..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-3-%E2%80%93-Market-share-of-Googles-DNS-service-across-all-users..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-4-%E2%80%93-Open-resolver-DNS-system-architecture..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/01/running-krill-under-apnic/</loc>
		<lastmod>2022-05-31T23:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Krill_APNIC_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-1-%E2%80%94-Notice-to-set-up-RPKI-in-MyAPNIC..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-2-%E2%80%94-Select-%E2%80%98host-my-own-certification-authority-in-MyAPNIC..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-3-%E2%80%94-Upload-the-child-request-XML-in-MyAPNIC..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-4-%E2%80%94-Download-the-child-request-XML..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-5-%E2%80%94-XML-file-options-for-the-CA-are-shown-in-MyAPNIC..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-6-%E2%80%94-Upload-the-parent-response-XML-in-Krill..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-7-%E2%80%94-Copy-the-publisher-request-XML-from-the-Repository-tab-in-the-Krill-UI..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-8-%E2%80%94-Submit-the-publisher-request-XML-in-MyAPNIC..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-9-%E2%80%94-Upload-the-repository-response-XML-in-the-Krill-UI..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-10-%E2%80%94-Resources-are-being-requested-in-the-background-but-not-yet-received..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-11-%E2%80%94-Parents-tab-showing-the-last-successful-exchange-and-resources-received..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-12-%E2%80%94-Repository-tab-showing-that-a-.mft-and-.crl-file-were-successfully-published..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-13-%E2%80%94-ROA-tab-showing-some-announcements-for-private-space-seen-by-RIS-Route-Collectors..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-14-%E2%80%94-Krill-ROA-analysis..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-15-%E2%80%94-ROAs-are-now-shown..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/01/event-wrap-auscert-2022/</loc>
		<lastmod>2022-06-01T04:30:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Auscert_2022_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/02/more-mysterious-dns-root-query-traffic-from-a-large-cloud-dns-operator/</loc>
		<lastmod>2022-06-01T22:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/MissingPiece_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/DNSrootmystery-Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/DNSrootmystery-Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/DNSrootmystery-Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/DNSrootmystery-Fig4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/27/how-effective-is-https-tls-usage-in-the-consumer-iot-ecosystem/</loc>
		<lastmod>2022-06-01T05:14:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/IoT_hub_update.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/MonIoTr-lab.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/IoT-devices-in-study.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/DigiCert_IoT_trusted.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/11/reducing-bias-of-networking-a-b-tests/</loc>
		<lastmod>2022-06-01T05:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/AB-testing-bias_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Treatment-and-control.jpg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Table-1-pair-links.jpg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Examples-of-alternate-experiments.jog_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/02/suspicious-traffic-alerts-released-to-dash/</loc>
		<lastmod>2022-06-02T02:30:40+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/DASH-Alerts_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-1-%E2%80%94-The-new-Alerts-tab-in-DASH..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-2-%E2%80%94-Creating-an-alert-and-defining-the-trigger-in-DASH..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-3-%E2%80%94-Defining-the-rule-in-DASH..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Figure-4-%E2%80%94-Defining-the-action-when-the-system-triggers-an-alert..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/03/how-does-iptv-work/</loc>
		<lastmod>2022-06-02T23:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/IPTV_banner2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/How-IPTV-Works-INNOG5-2022.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/How-IPTV-Works-INNOG5-2022-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/How-IPTV-Works-INNOG5-2022-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/How-IPTV-Works-INNOG5-2022-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/18/omni-and-the-6ms-of-modern-internetworking/</loc>
		<lastmod>2022-06-03T02:09:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Candy_mnms_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/06/ipv6-whats-changed-in-five-years/</loc>
		<lastmod>2022-06-06T22:19:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/IPv6-Transition_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_blog_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_academy_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_stats_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_website_pointer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/07/rfc-9099-operational-security-considerations-for-ipv6-networks/</loc>
		<lastmod>2022-06-06T22:49:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Apples_oranges_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_blog_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_academy_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_stats_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_website_pointer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/08/ipv6-connecting-the-next-40/</loc>
		<lastmod>2022-06-07T22:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/IPv6_loading_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/IPv6-Google_40percent-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/10/iot-devices-endanger-ipv6-privacy/</loc>
		<lastmod>2022-06-09T22:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/IoT-IPv6_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_blog_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_academy_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_stats_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_website_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/IoT-IPv6_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/IoT-IPv6_Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/IoT-IPv6_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/IoT-IPv6_Fig4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/13/podcast-do-government-networks-have-a-role-to-play-in-deploying-rpki/</loc>
		<lastmod>2022-06-08T04:26:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/RPKI_AUNZ_Banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/RPKI-at-APNIC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/26/podcast-why-a-resolverless-dns-makes-sense/</loc>
		<lastmod>2022-06-08T04:27:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Push_DNS_Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/02/the-politics-of-submarine-cables-in-the-pacific/</loc>
		<lastmod>2022-06-09T01:43:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Submarine_cables_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-1-%E2%80%93-BBC-News-headline-of-the-Canada-announcement-20-May-2022..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-2-%E2%80%93-Submarine-cable-systems-in-the-Asia-Pacific-region-from-telegeography.com_..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-3-%E2%80%93-New-high-capacity-trans-Pacific-cables..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/09/podcast-leave-your-preconceptions-at-the-door-challenges-and-opportunities-for-the-internet-routing-system/</loc>
		<lastmod>2022-06-09T04:25:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Podcast_shoesatdoor_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/10/100gbps-of-cern-data-over-ipv6-on-the-janet-network/</loc>
		<lastmod>2022-06-09T23:23:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/LHC_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/100-received.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/cropped-fts-log-1200x661-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/100G-brian-1200x426-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/10/event-wrap-ripe-84/</loc>
		<lastmod>2022-06-10T05:40:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/RIPE-84.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/10/event-wrap-interpol-cybercrime-conference-for-leas-and-judicial-authorities/</loc>
		<lastmod>2022-06-10T05:50:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Interpol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/13/google-and-subsea-fibre/</loc>
		<lastmod>2022-06-12T23:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/sub_cable_map_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/13/take-the-2022-apnic-survey/</loc>
		<lastmod>2022-06-13T02:30:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Survey-Banner-2022-blog-1110x404px-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/14/dns-abuse-trends/</loc>
		<lastmod>2022-06-13T22:45:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/DNS_Abuse_trends_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-1-%E2%80%94-Total-number-of-domain-names-in-gTLD-zones-over-time..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-2-%E2%80%94-Sum-of-absolute-counts-of-security-threat-domains-across-threat-gTLD-types-over-time..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-3-%E2%80%94-Sum-of-absolute-counts-of-security-threat-domains-spam-data-is-excluded-across-threat-gTLD-types-over-time..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-4-%E2%80%94-Normalized-percentage-of-security-threat-domains-across-gTLD-types-over-time..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-5-%E2%80%94-Distribution-of-security-threat-domains-across-threat-types-over-time..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/15/stalloris-rpki-downgrade-attack/</loc>
		<lastmod>2022-06-15T22:40:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Stalloris_disbable_power_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-1-%E2%80%94-Attack-overview..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/17/openli-an-open-source-alternative-for-meeting-lawful-interception-requirements/</loc>
		<lastmod>2022-06-17T10:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/OpenLI_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/OpenLI_LabTopology.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/20/a-message-to-the-afrinic-community-from-the-rirs/</loc>
		<lastmod>2022-06-20T06:43:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/01/NRO-logo_blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/21/know-thy-lag-in-network-gameplay-detection-and-latency-monitoring/</loc>
		<lastmod>2022-06-20T23:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Gaming_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/GameLag_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/GameLag_Fig2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/22/aero-omni-and-dtn-an-internetworking-architecture-for-mobility/</loc>
		<lastmod>2022-06-21T22:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Mobile_cake_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/DTN_Fig1-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/23/surviving-the-flood-how-data-centres-and-the-internet-must-face-climate-change/</loc>
		<lastmod>2022-06-22T23:01:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/climate-change-FT-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/27/routing-status-added-to-dash/</loc>
		<lastmod>2022-06-27T01:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/DASH-route_management_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/New-URL.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/fig4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/28/what-is-working-latency/</loc>
		<lastmod>2022-06-27T22:45:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Latency-under-load.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/24/ferret-automatically-finding-rfc-compliance-bugs-in-dns-nameservers/</loc>
		<lastmod>2022-06-28T01:50:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Ferret_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Ferret_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Ferret_Fig3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/28/event-wrap-communicasia-2022/</loc>
		<lastmod>2022-06-28T06:30:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/CommunicAsia2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/29/free-range-routing/</loc>
		<lastmod>2022-06-28T22:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Chicken_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/FRR_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/FRR_Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/FRR_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/FRR_Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/FRR_Fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/FRR_Fig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/FRR_Fig7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/30/investigating-dns-abuse-in-japan/</loc>
		<lastmod>2022-06-29T22:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/Phishing-email-banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/DNSabuse_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/DNSabuse_Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/DNSabuse_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/DNSabuse_Fig4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/30/event-wrap-indonesia-mcit-webinar-on-5g-iot-and-ipv6/</loc>
		<lastmod>2022-06-29T23:30:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Sanjaya-IPv6-webinar.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/02/working-latency-the-next-qoe-frontier/</loc>
		<lastmod>2022-06-30T23:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/HowsMyNetwork_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Average-latency-by-Australian-Retail-Service-Provider_large.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/Idle-latencies_US_large.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/CDF-of-Max-Upstream-Latency-Under-Load_large.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/06/14/future-internet-at-terabit-speeds-scion-in-p4/</loc>
		<lastmod>2022-07-01T04:48:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/terbit-speeds.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-1-%E2%80%94-The-control-plane-of-our-implementation-and-its-interactions-with-the-data-plane.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-2-%E2%80%94-The-old-and-new-layouts-of-the-forwarding-path-in-the-SCION-header.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/Figure-3-%E2%80%94-The-topology-with-which-we-tested-our-implementation-on-the-2STiC-testbed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/15/can-we-provide-slos-in-an-open-internet-in-a-scalable-manner/</loc>
		<lastmod>2022-07-01T04:49:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Colibri_hummingbird_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/11/25/epic-exploring-challenges-and-opportunities-in-next-generation-internet-architectures/</loc>
		<lastmod>2022-07-01T04:49:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/Fast-Lane-Pool_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/EPIC_Fig1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/27/event-wrap-africa-internet-summit-2022/</loc>
		<lastmod>2022-07-04T01:05:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Karla-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/23/podcast-why-the-saga-of-ipv6-may-never-end/</loc>
		<lastmod>2022-07-04T01:05:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/RoadEnds_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/23/event-wrap-pita-business-forum-exposition-2022/</loc>
		<lastmod>2022-07-04T01:05:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Pablo_PITA.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/08/nominations-now-open-for-nro-nc-election-2022/</loc>
		<lastmod>2022-07-04T01:08:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/NRO-elections-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/06/event-wrap-apec-tel-64/</loc>
		<lastmod>2022-07-04T01:08:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/APEC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/19/event-wrap-20th-itcn-asia-and-telecom-conference-and-expo/</loc>
		<lastmod>2022-07-04T01:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/ICTN.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/18/event-wrap-yigf-nepal-2022/</loc>
		<lastmod>2022-07-04T01:09:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/YIGFNepal2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/06/event-wrap-3rd-icann-apac-twnic-engagement-forum/</loc>
		<lastmod>2022-07-04T01:09:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/ICANN-APAC-TWNIC-Engagement-Forum_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/18/event-wrap-bhutan-cybersecurity-week-2021/</loc>
		<lastmod>2022-07-04T01:10:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/BhutanCyber-copy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/23/event-wrap-igf-2021/</loc>
		<lastmod>2022-07-04T01:11:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IGF-2021.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/13/event-wrap-women-in-networking-series/</loc>
		<lastmod>2022-07-04T01:11:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/women-in-networking-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/22/event-wrap-bpf-2022/</loc>
		<lastmod>2022-07-04T01:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/BPF-2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/15/event-wrap-nznog-2022/</loc>
		<lastmod>2022-07-04T01:13:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Dave_NZNOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/30/event-wrap-innog-5/</loc>
		<lastmod>2022-07-04T01:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/INNOG_FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/10/event-wrap-ausnog-2021/</loc>
		<lastmod>2022-07-04T01:14:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/GIH-AusNOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/20/rethinking-submarine-fibre-cable-projects-south-pacific/</loc>
		<lastmod>2022-07-04T01:17:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Pacific-Islands-FT-Marek-Okon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Fig1-mesh-utopia-in-the-Pacific.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/fig2-mesh-utopia-in-the-Pacific.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/28/dns-topics-at-ietf-113/</loc>
		<lastmod>2022-07-04T01:19:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/IETF113_DNS_TF.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/IETF113-fig1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/25/notes-from-the-iepg-meeting-at-ietf-113/</loc>
		<lastmod>2022-07-04T01:19:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/ietf133-notes-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/17/perfsonar-open-extensible-worldwide/</loc>
		<lastmod>2022-07-04T01:20:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/perfsonar-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/maddashdashboardexample-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/historicaldatagraph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/toolkit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/18/resourcing-in-2021/</loc>
		<lastmod>2022-07-04T01:20:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Services-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-1-%E2%80%94-2021-IPv4-delegation-by-month..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-2-%E2%80%94-IPv4-delegation-by-subregion..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-3-%E2%80%94-2021-ASN-delegations-by-subregion..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-4-%E2%80%94-Top-five-economies-for-ASN-delegations-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-5-%E2%80%94-IPv6-delegation-size-by-economy-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-6-%E2%80%94-IPv6-delegation-by-month-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-7-%E2%80%94-Top-IPv4-transfer-recipients-by-economy-2021-%E2%80%93-2021..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-8-%E2%80%94-Top-IPv4-transfer-source-by-economy-2021-%E2%80%93-2021.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-9-%E2%80%94-New-Members-by-industry-2020-2021.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/15/join-us-for-an-rpki-deployathon-in-april/</loc>
		<lastmod>2022-07-04T01:21:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/deployathon_ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/04/apply-now-for-an-apnic-fellowship-2022/</loc>
		<lastmod>2022-07-04T01:21:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Fellows-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/09/apnic-products-2021-in-review/</loc>
		<lastmod>2022-07-04T01:23:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/products-team.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/02/01/2021-isif-asia-grant-recipients-announced/</loc>
		<lastmod>2022-07-04T01:24:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/ISIF_banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/18/tonga-and-fragility-of-long-haul-networks/</loc>
		<lastmod>2022-07-04T01:25:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/Disconnected.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/31/three-of-the-best-podcasts/</loc>
		<lastmod>2022-07-04T01:26:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/3OTB-Pods-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/03/01/when-volcanoes-go-bang-submarine-cables-do-what/</loc>
		<lastmod>2022-07-04T01:27:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Tonga-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/New-pic1-tonga.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/02/Figure-2-%E2%80%94-Operations-near-Tongatapu.-All-drives-shown-are-HDs-and-any-cutting-was-done-by-ROV.-Chart-and-track-courtesy-of-BigOceanData..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/23/notes-from-icanns-dns-resolver-symposium/</loc>
		<lastmod>2022-07-04T01:28:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/resops-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/07/notes-from-dns-oarc-36/</loc>
		<lastmod>2022-07-04T01:28:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/OARC36-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/Figure-1-%E2%80%93-Slack.com-DNSSEC-signing-timeline.-Source..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/06/mariix-improves-local-internet-for-growing-pacific-hub/</loc>
		<lastmod>2022-07-05T23:20:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/MARIIX_team_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Guam_submarinemap_Social.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/MARIIX-NOC-Team.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/MARIIX-Servers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/07/podcast-taking-a-clean-slate-to-designing-the-internet-of-the-future/</loc>
		<lastmod>2022-07-06T21:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Restart_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/05/13-propositions-internet-for-a-burning-world-1-4/</loc>
		<lastmod>2022-07-06T05:32:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Fire_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/07/13-propositions-internet-for-a-burning-world-5-8/</loc>
		<lastmod>2022-07-07T00:20:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Fire_Dont-Panic_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/08/unpacking-zero-knowledge-middleboxes/</loc>
		<lastmod>2022-07-07T22:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Middlebox-simple_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/ZKMBs_Fig1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/12/aero-omni-dtn-routing-and-route-optimization/</loc>
		<lastmod>2022-07-11T22:55:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Rainbow-arch_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Catenet_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Reverse-path-B_Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Fwd-path-A_Fig3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/24/apnic-54-call-for-papers-open-now/</loc>
		<lastmod>2022-07-11T23:50:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/APNIC-54-Blog-image-02-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/11/a-look-at-quic-use/</loc>
		<lastmod>2022-07-12T06:06:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/QUIC_BANNER_6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-1-%E2%80%93-Comparison-of-TCP-and-QUIC-within-the-HTTP-architecture..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-2-%E2%80%93-Comparison-of-TCP-and-TLS-with-QUIC..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-3-%E2%80%93-QUIC-measurements-for-June-2022.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-4-%E2%80%93-QUIC-use-per-country..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-5-%E2%80%93-QUIC-maximum-packet-size-distribution..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-6-%E2%80%93-Comparison-of-retrieval-time-differences-QUIC-vs-non-QUIC..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-7-%E2%80%93-Cumulative-distribution-of-retrieval-time-differences-QUIC-vs-non-QUIC..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/13/journeying-into-xdp-xdperimenting-with-dns-telemetry/</loc>
		<lastmod>2022-07-12T23:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/XDP_telemetry_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/XDP-Telemetry_Fig1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/04/10/opinion-stuffing-the-camel-into-the-bikeshed/</loc>
		<lastmod>2022-07-13T02:43:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/04/bikeshed_blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/03/07/a-quic-way-to-decrease-latency/</loc>
		<lastmod>2022-07-13T02:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/02/IMG_6912-copy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/13/the-nir-structure-annual-fees-and-voting-entitlement%ef%bf%bc/</loc>
		<lastmod>2022-07-13T06:52:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/07/Monika-Singhvi-APNIC42-elections.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/14/for-want-of-a-nail-is-strong-in-your-login/</loc>
		<lastmod>2022-07-13T23:16:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Security_talk_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/04/27/metrics-methods-better-not-just-bigger-internet/</loc>
		<lastmod>2022-07-14T22:44:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/04/ice-climbers-1247614_960_720.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/04/cpFig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/04/cpFig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/04/cpFig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/04/cpFig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/04/cpFig5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/15/13-propositions-on-an-internet-for-a-burning-world-9-11/</loc>
		<lastmod>2022-07-14T23:20:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Matchstick-house_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/18/making-security-simpler-for-all-orgs/</loc>
		<lastmod>2022-07-18T06:15:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Simple_security-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/20/industry-popularity-effect-if-customers-leave-cloud-providers-following-a-ddos-attack-outage/</loc>
		<lastmod>2022-07-19T22:18:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Cloud_staygo_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Cloud-DDoS_fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Cloud-DDoS_fig2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/21/new-dashboard-tracks-indian-ixp-community-activity/</loc>
		<lastmod>2022-07-21T01:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/India_IXP_dashboard_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/abater-india-dashboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/19/13-propositions-on-an-internet-for-a-burning-world-12-13/</loc>
		<lastmod>2022-07-21T23:01:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Matchbox_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/25/router-security-in-2021/</loc>
		<lastmod>2022-07-24T22:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Router-Secirity_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-1-%E2%80%94-Number-of-router-vulnerabilities-according-to-cve.mitre_.org-2010%E2%80%932022.-Source-Kapersky..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-2-%E2%80%94-Number-of-router-vulnerabilities-according-to-nvd.nist_.gov-2010%E2%80%932022.-Soure..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-3-%E2%80%94-Distribution-of-router-vulnerabilities-by-priority-2021.-Source-Kapersky..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-4-%E2%80%94-Router-manufacturers-response-to-vulnerabilities-found-in-their-products-in-2021.-Source-Kapersky..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-5-%E2%80%94-Shodan.io-search-results-for-%E2%80%98default-password-in-June-2021.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Figure-6-%E2%80%94-Shodan.io-search-results-for-default-password.-in-April-2022.-Source..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/26/governance-in-the-public-cloud/</loc>
		<lastmod>2022-07-25T22:45:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Cloud-Governance_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/27/behind-the-network-that-images-the-whole-world-every-day/</loc>
		<lastmod>2022-07-26T22:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Planet_satellite-images_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Planet_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Planet_Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Planet_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Planet_Fig4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/28/four-million-views-and-counting/</loc>
		<lastmod>2022-07-27T23:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/4-million-views-at-APNIC-Blog-ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-1-%E2%80%94-APNIC-Blog-growth-since-2014.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/29/addressing-the-challenges-of-modern-dns/</loc>
		<lastmod>2022-07-28T22:45:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/DNS-Challenge_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-1-%E2%80%94-Challenges-in-the-DNS.-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/01/what-are-symmetric-and-asymmetric-ip-routing/</loc>
		<lastmod>2022-07-31T23:12:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Symmetric_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/21/podcast-making-the-internet-quicer/</loc>
		<lastmod>2022-08-02T05:56:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Stopwatch_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/04/podcast-quic-and-not-so-complex/</loc>
		<lastmod>2022-08-03T21:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Bowling_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/04/bigger-faster-better/</loc>
		<lastmod>2022-08-04T06:40:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/bigger_faster_Better_FT-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/05/incident-response-lessons-from-firstcon22/</loc>
		<lastmod>2022-08-04T22:45:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/FIRSTCON-incident-response_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/08/strength-together-weakness-apart/</loc>
		<lastmod>2022-08-07T23:05:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/FIRSTCON-strength_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/04/unpacking-rfc-9199-considerations-for-large-authoritative-server-operators/</loc>
		<lastmod>2022-08-09T00:52:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Consider_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/13/women-in-ict-internet-governance/</loc>
		<lastmod>2022-08-09T00:53:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Sayda_FT-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/22/what-if-certificate-transparency-carried-the-same-burdens-as-ocsp-and-crls/</loc>
		<lastmod>2022-08-09T00:55:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/12/Certificate-Transparency-Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/02/making-csirts-even-better/</loc>
		<lastmod>2022-08-09T00:57:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/New_Improved_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-1-%E2%80%94-Typical-image-of-%E2%80%98cybersecurity.-Source..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/10/the-https-record-passes-a-key-milestone/</loc>
		<lastmod>2022-08-09T22:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/HTTPS_banner-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/All-Queries.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Queries-to-fonts.gstatic.com_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/15/shadowserver-now-scanning-ipv6/</loc>
		<lastmod>2022-08-14T22:45:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Shadowserver_IPv6_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-%E2%80%94-Accessible-SSL-HTTP-SSH-services-population-scan-by-unique-IPv6-on-11-July-2022..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-2-%E2%80%94-Accessible-SSL-HTTP-SSH-services-population-scan-by-unique-IPv6-on-11-July-2022..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-3-%E2%80%94-Accessible-vulnerable-or-abusable-or-exposed-services-by-unique-IPv6-on-11-July-2022..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-4%E2%80%94-Accessible-vulnerable-or-abusable-or-exposed-services-by-unique-IPv6-on-11-July-2022..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/11/realizing-transport-layer-slicing-using-segment-routing/</loc>
		<lastmod>2022-08-16T03:50:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Slice_mobile_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/5G-use-case.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/5G-network-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/5G_end-to-end.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/5G_closed-loop.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/22/why-the-nro-is-defending-afrinic/</loc>
		<lastmod>2022-08-17T03:47:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/01/NRO-logo_blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/18/one-in-eight-dns-a-queries-two-in-three-aaaa-fail-in-the-wild/</loc>
		<lastmod>2022-08-17T22:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/one-in-eight_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/DNS_China_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/DNS_China_Fig2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/18/podcast-dns-spoofing-is-a-non-issue-if-we-all-do-dnssec/</loc>
		<lastmod>2022-08-17T23:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/DNSdisguise_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/19/udp-based-amplification-the-dangerous-ddos-attack-vector/</loc>
		<lastmod>2022-08-18T23:26:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Closed_DDoS_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-vulnerable-version-of-NTP-service-run-on-victim.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-2-crafted-packet-send-from-attacker-machine.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-3-NTP-service-is-terminated-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-4-NTP-monlist-vulnerability-detection-using-Nmap-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-5-NTP-monlist-response-from-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-6-NTP-amplification-packet-analyze.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-7-NTP-READVARcommand-amplification.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-10-UDP-Fragmentation-Attack-packet-analyze-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-8-DNS-Amplification-Attacks-LAB-Scenario.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-9-Attacker-machine-generate-DNS-Amplification-Attacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-12-Victim-machine-receive-DNS-response-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-11-DNS-Amplification-Attack-packet-analyze.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/23/analyzing-mptcp-adoption-in-the-internet/</loc>
		<lastmod>2022-08-22T22:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Multiple-paths_railway_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/mptcp_Figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/22/dnssec-validation-performance-killer/</loc>
		<lastmod>2022-08-22T22:43:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Horse-racing_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image9-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image8-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image7-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/24/semantic-networking-discussions-at-the-ietf/</loc>
		<lastmod>2022-08-23T22:38:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/road-train_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/25/the-state-of-ipv6-ten-years-after-world-ipv6-launch/</loc>
		<lastmod>2022-08-24T23:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/06/IPv6-Adoption-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/25/stay-informed-about-resource-allocations-and-more-at-apnic-54/</loc>
		<lastmod>2022-08-25T04:28:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/NIR-SIG_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-%E2%80%94-Delegations-made-by-NIRs..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/26/tackling-dns-abuse-through-education-collaboration-and-innovation/</loc>
		<lastmod>2022-08-25T23:05:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Stay-Safe_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/29/ipv6-celebrates-its-5th-anniversary-as-an-internet-standard/</loc>
		<lastmod>2022-08-28T23:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/cake-five_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_blog_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_academy_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_stats_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_website_pointer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/17/tls-1-3-a-story-of-experimentation-and-centralization/</loc>
		<lastmod>2022-08-29T05:05:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Chess_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Monitoring-of-SSL3-and-TLS-versions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Monitoring-of-TLS-connections.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Early-experimentation-with-TLS-1.3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Early-adopters.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/10/24/opinion-consolidation-centralization-and-the-internet-architecture/</loc>
		<lastmod>2022-08-29T05:05:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/Fish_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/11/24/how-centralized-is-dns-traffic-becoming/</loc>
		<lastmod>2022-08-29T05:06:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/Fish_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/DNS-Centalized_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/DNS-Centalized_Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/DNS-Centalized_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/DNS-Centalized_Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/DNS-Centalized_Tab3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/DNS-Centalized_Fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/11/DNS-Centalized_Fig6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/30/its-time-to-reconsider-selective-fec-with-high-priority-resources-in-http-3/</loc>
		<lastmod>2022-08-30T01:14:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/rethink_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/09/apnic-helpdesks-five-most-asked-questions/</loc>
		<lastmod>2022-08-30T01:43:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Pubudu_FT-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/04/notes-from-dns-oarc-38/</loc>
		<lastmod>2022-08-30T01:43:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/OARC38_Geoff_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-%E2%80%94-DNS-Transports-as-seen-by-AdGuard-from-%E2%80%98DNS-over-QUIC-Andrey-Meshkov-AdGuard.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-2-%E2%80%93-Authoritative-DNS-over-QUIC-summary-from-%E2%80%98DoQ-on-authoritative-by-Libor-Peltan-CZ.NIC_.-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-3-%E2%80%93-Anti-Spoofing-Effectiveness-measures-from-Cache-Poisoning-Protection-for-Authoritative-Queries-Puneet-Sood-Google.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/03/event-wrap-sanog-38-npnog-6/</loc>
		<lastmod>2022-08-30T01:44:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/SANOG-38_Dave.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/03/measuring-the-practical-effect-of-dns-root-server-instances-a-china-wide-case-study/</loc>
		<lastmod>2022-08-30T01:44:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Domestic_International-Sign_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/ChinaDNS_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/ChinaDNS_Fig2_telecom.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/ChinaDNS_Fig2_unicom-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/ChinaDNS_Fig2_unicom.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/ChinaDNS_Fig2_CERNET.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/ChinaDNS_Fig3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/05/notes-from-ietf-114/</loc>
		<lastmod>2022-08-30T01:46:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/ietf114_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/26/event-wrap-dns-oarc-38/</loc>
		<lastmod>2022-08-30T01:46:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/DNS-OARC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/25/event-wrap-idnog-7/</loc>
		<lastmod>2022-08-30T01:49:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Wita_IDNOG-7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/16/pkix-launches-third-ixp/</loc>
		<lastmod>2022-08-30T01:50:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/IXPLahor_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/APNIC-Visit-01.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/11/event-wrap-phnog-2022/</loc>
		<lastmod>2022-08-30T01:51:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Anna_PhNOG2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/25/event-wrap-bdnog-14/</loc>
		<lastmod>2022-08-30T01:52:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/bdNOG14_Tuan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/22/event-wrap-vnnic-internet-conference-2022/</loc>
		<lastmod>2022-08-30T01:52:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/VNNIC-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/31/the-dns-and-internet-fragmentation/</loc>
		<lastmod>2022-08-30T23:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Egg_hammer_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/01/podcast-rethinking-how-we-measure-video-performance/</loc>
		<lastmod>2022-08-31T20:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Thinking_phone_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/30/boost-cooperation-between-technical-and-non-technical-disciplines-at-apnic-54/</loc>
		<lastmod>2022-08-31T06:05:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Coop_SIG_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/01/measuring-hyper-specific-prefixes-in-the-wild/</loc>
		<lastmod>2022-08-31T22:45:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Hyper_specific_prefixes_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-%E2%80%94-Heatmap-showing-HSP-visibility-and-consistency.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-2-%E2%80%94-HSPs-per-CIDR-size-over-time..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-3-%E2%80%94-ROV-status-for-HSPs..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/01/online-voting-for-the-nro-nc-election-2022-opens-today/</loc>
		<lastmod>2022-09-01T04:05:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/NRO-NC-banner-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/01/help-secure-global-routing-at-apnic-54/</loc>
		<lastmod>2022-09-01T06:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Di_Ma_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/05/14/analyzing-the-certificate-ecosystem-using-ct-logs/</loc>
		<lastmod>2022-09-01T22:48:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/12/Certificate-Transparency-Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/root-issuer-crop.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/sha1-1024-cn-crop.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/02/doh-dot-and-plain-old-dns/</loc>
		<lastmod>2022-09-01T23:05:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/doh-dot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%94-Use-of-DNS-open-resolvers-as-a-proportion-of-users-for-Google-Cloudflare-and-OpenDNS.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-2-%E2%80%94-Use-of-transport-protocols-for-the-1.1.1.1-resolver-May-August-2022.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-3-%E2%80%94-Use-of-encrypted-DNS-per-economy-based-on-Cloudflare-1.1.1.1-query-data.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-4-%E2%80%93-Profile-of-the-use-of-encrypted-DNS-based-on-Singapore-Cloudflare-1.1.1.1-query-data.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-5-%E2%80%94-Profile-of-the-use-of-encrypted-DNS-based-on-Hong-Kong-Cloudflare-1.1.1.1-query-data..-Source.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-6-%E2%80%93-Profile-of-the-use-of-encrypted-DNS-based-on-United-States-Cloudflare-1.1.1.1-query-data.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-7-Profile-of-the-use-of-encrypted-DNS-based-on-Laos-Cloudflare-1.1.1.1-query-data.-Source..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/02/four-policy-proposals-up-for-community-discussion-at-apnic-54/</loc>
		<lastmod>2022-09-02T04:45:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Policies_APNIC54_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/16/register-now-for-apnic-54-aprigf-2022-and-apsig-2022-singapore/</loc>
		<lastmod>2022-09-02T05:56:27+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/APNIC54_Register_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/02/event-wrap-pacnog-30/</loc>
		<lastmod>2022-09-02T06:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/PacNOG-30.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/05/internet-edge-ip-sla-deep-dive/</loc>
		<lastmod>2022-09-04T22:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/09/Quality_feedback_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Edge_HA.drawio.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Edge_HA-Scenario-1-ISP-services.drawio.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Edge_HA-Scenario-1-Google-resolver.drawio.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/PCAP.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/23/affect-real-change-at-the-apnic-54-opm/</loc>
		<lastmod>2022-09-05T01:44:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Policy_SIG_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/04/08/deploying-rpki-at-comcast/</loc>
		<lastmod>2022-09-05T22:39:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/RPKIComcast.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/RPKIROV_History_of_Unique_PrefixOrigin_Pairs_IPv4_20220406.18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Comcast-RPKI-ROV-infrastructure-design.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/07/networking-wirelesssg/</loc>
		<lastmod>2022-09-06T23:09:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Wireless@SG_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-%E2%80%94-Wireless%40SGs-federated-network-model..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/06/the-rise-and-rise-of-sgix/</loc>
		<lastmod>2022-09-06T23:23:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/SGIX-Rise_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-%E2%80%94-Historical-growth-of-ASNs-and-traffics-at-SGIX.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/26/bng-blaster-the-open-network-tester-for-the-ip-networking-community/</loc>
		<lastmod>2022-09-06T23:34:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/BNGBlaster_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/BNGBlaster_screenshot1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/BNGBlaster_screenshot2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/07/a-second-look-at-quic-use/</loc>
		<lastmod>2022-09-07T00:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/quic-look_ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%93-QUIC-use-for-first-and-second-fetches..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-2-%E2%80%93-Lifting-the-number-of-subsequent-fetches-from-1-to-7..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-3-%E2%80%93-Altering-the-servers-keepalive-time-value..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-4-%E2%80%93-Altering-the-servers-keepalive-time-value-to-20-seconds..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-5-%E2%80%93-QUIC-use-per-economy-August-2022..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/07/apricot-returns-face-to-face-in-manila/</loc>
		<lastmod>2022-09-07T23:24:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/APRICOT2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/08/nusnets-iot-and-5g-enabling-a-borderless-university/</loc>
		<lastmod>2022-09-07T23:38:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/NUSNET_FT2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/nusnet-topology.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/09/under-the-hood-of-dane-mismanagement-in-smtp/</loc>
		<lastmod>2022-09-08T22:48:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Under-car-hood_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image4-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image2-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/image1-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/09/how-apnic-is-implementing-your-feedback/</loc>
		<lastmod>2022-09-09T00:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/User-feedback-group_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/09/sender-pays/</loc>
		<lastmod>2022-09-09T07:06:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Sender-pays_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%93-Inter-provider-settlements..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-2-%E2%80%93-Inter-provider-path-settlements..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-3-%E2%80%93-Inter-provider-%E2%80%98valley-path..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-4-%E2%80%93-Generic-Access-ISP-design..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-5a-%E2%80%93-External-content-streaming..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-5b-%E2%80%93-Internal-content-streaming..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-5c-%E2%80%93-Edge-content-streaming..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/13/clustering-network-attacks-using-medium-interaction-honeypots/</loc>
		<lastmod>2022-09-12T22:45:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Honey_Bees_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-%E2%80%94-Observations-of-attacker-behaviour..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-2-%E2%80%94-Example-graph-visualization-from-IPs-sharing-credentials.1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/15/the-future-is-still-ipv6/</loc>
		<lastmod>2022-09-14T23:01:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Future_is_still_IPv6_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-%E2%80%94-IPv6-usage-in-Singapore-from-APNIC-Labs..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-2-%E2%80%94-Top-origin-ASes-in-Singapore-from-APNIC-Labs..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-3-%E2%80%94-IPv6-usage-in-Singapore-without-the-top-10-origin-ASes.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/13/2022-apnic-survey-report-released/</loc>
		<lastmod>2022-09-15T02:41:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Survey-Banner-2022-blog-1110x404px-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/16/apnic-54-thank-you-and-farewell/</loc>
		<lastmod>2022-09-16T03:45:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/54-wrap_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/APNIC54-sponsors.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/19/can-the-ietf-standardize-in-human-rights/</loc>
		<lastmod>2022-09-18T22:52:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/03/IETF_human-rights_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/20/let-go-of-traditional-strategies-when-it-comes-to-ipv6-address-planning/</loc>
		<lastmod>2022-09-19T22:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Elsa_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_blog_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_academy_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_stats_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_website_pointer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/14/where-did-my-packet-go-measuring-the-impact-of-rpki-rov/</loc>
		<lastmod>2022-09-20T00:39:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Mail_Packet_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/05/sgseries-singapore-at-a-glance/</loc>
		<lastmod>2022-09-20T01:58:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/SG_Merlion_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/21/event-wrap-apan-54/</loc>
		<lastmod>2022-09-21T00:30:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/APAN-54.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/21/event-wrap-itcn-expo-2022/</loc>
		<lastmod>2022-09-21T00:31:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Tuan_ITCN.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/22/underload-the-future-of-congestion-control/</loc>
		<lastmod>2022-09-21T22:45:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/congestion-control-ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Congestion_control-fig1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/23/interdomain-bgp-policies-where-traffic-should-exit-a-network/</loc>
		<lastmod>2022-09-25T22:42:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Interdomain-BGP-policies-Exit-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%94-Reference-network..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/26/interdomain-bgp-policies-where-traffic-should-enter-a-network/</loc>
		<lastmod>2022-09-26T06:23:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Interdomain-BGP-policies-Enter-FT-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%94-Reference-network..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/27/address-space-fragmentation/</loc>
		<lastmod>2022-09-27T04:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Fragmentation_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/27/event-wrap-global-digital-dialogue-2022/</loc>
		<lastmod>2022-09-27T06:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/gdd-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/27/event-wrap-ausnog-2022/</loc>
		<lastmod>2022-09-27T06:20:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/IAASysters.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/29/podcast-taking-a-systems-approach-to-developing-new-protocols/</loc>
		<lastmod>2022-09-28T20:45:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Complex-network_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/30/interdomain-bgp-policies-do-not-transit/</loc>
		<lastmod>2022-09-29T22:45:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Interdomain-BGP-policies-transit-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%94-Reference-network..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/21/ip-fragmentation-and-the-dns-the-state-of-ip-fragmentation/</loc>
		<lastmod>2022-09-29T23:21:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/DNS_Fragmented_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Fragmentation_IPv4_IPv61.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Fragmenting-Auth-ECDF1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/IPv4-size-OpenINTEL1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/IPv6-size-OpenINTEL1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/EDNS0-size-OpenINTEL1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/03/threat-integration-lessons-of-indicator-and-incident-exchange/</loc>
		<lastmod>2022-10-02T22:45:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/intergration_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/04/routing-security-in-singapore/</loc>
		<lastmod>2022-10-04T07:07:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Routing_Sec_SG_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/manr-obs-architecture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-2-%E2%80%94-Singapores-Autonomous-System-Number-ASN-delegation-since-1994..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-3-%E2%80%94-Routing-security-in-Singapore-during-August-2022-from-MANRS-Observatory..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-4-%E2%80%94-Routing-security-in-Singapore-August-2021-August-2022-from-MANRS-Observatory..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-5-%E2%80%94-Routing-completeness-for-Internet-Routing-Registry-IRR-and-RPKI-in-Singapore-August-2021-%E2%80%93-August-2022-from-MANRS-Observatory..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-5-%E2%80%94-Sample-of-Singaporean-government-website-ending-in-.gov_.sg-hosts..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-6-%E2%80%94-Singaporean-government-website-ending-in-.gov_.sg-hosts-not-found-and-valid..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-7-%E2%80%94-Akamai-and-Incapsula-lead-the-not-founds..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-8-%E2%80%94-ASN-report-for-AS135008.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-9-%E2%80%94-ASN-report-for-AS140592.-Source..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-10-%E2%80%94-Sample-of-Singaporean-education-website-ending-in-.edu_.sg-hosts..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-12-%E2%80%94-Singaporean-education-website-ending-in-.edu_.sg-hosts-not-found-and-valid..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-13-%E2%80%94-NUS-and-Incapsula-lead-the-not-founds..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/05/why-are-5g-and-wi-fi-underdelivering-on-performance-in-the-wild-a-china-perspective/</loc>
		<lastmod>2022-10-04T23:06:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Phone-reception_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/5GWifi_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/5GWifi_Fig3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/5GWifi_Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/5GWifi_Fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/5GWifi_Fig5b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/5GWifi_Fig6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/29/ip-fragmentation-and-the-dns-vulnerable-dns-servers/</loc>
		<lastmod>2022-10-05T04:50:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Broken-cup_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Authoritative-Testbed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/08/13/dns-privacy-software-not-only-a-browser-game/</loc>
		<lastmod>2022-10-05T04:51:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/DoH_eye_banner-e1630556188290.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/Projects-by-pgm-language.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/30/dns-evolution-innovation-or-fragmentation/</loc>
		<lastmod>2022-10-05T04:51:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/DNS-evolution-Name-_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/06/a-complex-network-analysis-of-global-internet-public-peering/</loc>
		<lastmod>2022-10-05T22:50:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Global-public-peering-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%94-PeeringDB-topology.-Weve-made-an-interactive-version-available.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-2-%E2%80%94-The-PeeringDB-capacity-graph-model.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-3-%E2%80%94-End-user-market-share-by-the-PeeringDB-%E2%80%98country-attribute..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-4-%E2%80%94-Reduced-Google-matrix-of-the-key-peering-actors.-Labels-are-given-in-Figure-5..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-5-%E2%80%94-Time-difference-of-the-reduced-Google-matrix-before-and-after-the-COVID-outbreak..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/06/opinion-walking-the-policy-tightrope/</loc>
		<lastmod>2022-10-06T00:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Online-Safety_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/05/kindns-initiative-to-improve-mutual-understanding-and-security-of-dns-among-operators/</loc>
		<lastmod>2022-10-06T00:02:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/KINDNS_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/09/12/a-short-history-of-singapores-role-in-the-cable-world/</loc>
		<lastmod>2022-10-06T05:57:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Singapore_Subsea_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-%E2%80%94-Map-showing-the-telegraph-lines-in-operation-under-contract-and-contemplated-to-complete-the-circuit-of-the-globe..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-2-%E2%80%94-Singapores-cable-network-in-August-2022.-Source-Telegeographys-Submarine-Cable-Map..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/07/dealing-with-the-undercurrent-of-unwanted-traffic/</loc>
		<lastmod>2022-10-06T22:45:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Traffic-red-light-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%94-Top-20-ASes-ranked-by-the-number-of-attacks..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-2-%E2%80%94-Ranking-the-top-20-ASes-by-average-number-of-attacks-per-attacking-IP-in-the-network..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/10/the-2022-national-internet-segment-reliability-research/</loc>
		<lastmod>2022-10-09T22:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Podium_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Top20-economies.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/10/event-wrap-mynog-9/</loc>
		<lastmod>2022-10-10T04:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/MyNOG-9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/10/apply-now-for-an-apricot-2023-fellowship/</loc>
		<lastmod>2022-10-10T04:30:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/APRICOT_2017_Fellows_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/12/taurus-a-data-plane-architecture-for-per-packet-machine-learning/</loc>
		<lastmod>2022-10-11T22:57:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Bull_taurus_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/06/16/content-vs-carriage-who-pays/</loc>
		<lastmod>2022-10-12T04:55:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/content-vs-carriage_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/13/ipv6-extension-headers-revisited/</loc>
		<lastmod>2022-10-13T01:10:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Measure_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-1-%E2%80%93-Experiment-configuration..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-2-%E2%80%93-IPv6-fragmentation-drop-profile-from-APNIC-Labs..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-3-%E2%80%93-IPv6-fragmentation-drop-profile-for-various-regions-and-economies..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-4-%E2%80%93-Atomic-fragment-drop-rate-for-the-IPv6-Internet..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-5a-%E2%80%93-Atomic-fragment-drop-rate-for-the-US..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-5b-%E2%80%93-Atomic-fragment-drop-rate-for-China..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-6-%E2%80%93-DST-option-extension-header-drop-rate..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-7a-%E2%80%93-DST-option-drop-rate-for-Greece..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-7b-%E2%80%93-DST-option-drop-rate-for-the-United-States..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-8-%E2%80%93-DST-option-drop-rate-October-2022..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-9-%E2%80%93-IPv6-packet-drop-with-HBH-headers..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-10-%E2%80%93-HBH-option-drop-rate-October-2022..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-11-%E2%80%93-HBH-option-drop-rate-for-Comcast-AS7922..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-12-%E2%80%93-HBH-option-drop-rate-for-T-Mobile-AS21928..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-13-%E2%80%93-HBH-option-drop-rate-for-ETISALAT-MIR-AS36992..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/14/upcoming-changes-to-myapnic/</loc>
		<lastmod>2022-10-14T05:30:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/MyAPNIC-Update_Dashboard_F.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/fig5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/17/multivendor-async-grpc-dial-out-collector/</loc>
		<lastmod>2022-10-16T22:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/phone-dial_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/mdt-dialout-collectors-high-level-architecture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/04/18/declaring-ipv6-internet-standard/</loc>
		<lastmod>2022-10-16T23:34:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/04/v6_header-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/11/apnic-54-election-analysis-completed/</loc>
		<lastmod>2022-10-17T02:51:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/apnic-logos-555x202-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/18/apricot-2023-call-for-papers-now-open/</loc>
		<lastmod>2022-10-18T01:00:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/APRICOT-2023-blog-1110x404px-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/19/formally-verifying-protocols-from-textual-specifications/</loc>
		<lastmod>2022-10-19T00:45:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Squeeze_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%94-Example-annotations-on-the-DCCP-RFC-written-with-our-grammar..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/18/a-new-ddos-attack-vector-tcp-middlebox-reflection/</loc>
		<lastmod>2022-10-19T04:03:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Refelection-server_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%94-Example-of-a-TCP-three-way-handshake-packet-sequence..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-2-TCP-3-way-handshake-%E2%80%93-SYN-Packet-length-is-zero-bytes-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-3a-%E2%80%94-TCP-three-way-handshake-SYNACK-packet..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-3b-%E2%80%94-TCP-three-way-handshake-ACK-packet..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-4-Legitimate-HTTP-GET-request-after-complete-TCP-3-way-handshake.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-5-Abusing-TCP-non-compliance-in-middleboxes-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-6-%E2%80%94-Example-response-from-a-vulnerable-middlebox..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-7-%E2%80%94-Example-response-from-a-vulnerable-middlebox..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/21/management-interfaces-attack-surface-hidden-in-plain-sight/</loc>
		<lastmod>2022-10-20T22:40:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Attack_Surface_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-1-%E2%80%94-F5-TMOS-applications-reachable-globally-compared-to-the-exposed-management-interfaces.-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-2-%E2%80%94-Sophos-firewall-user-admin-portals..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-3-%E2%80%94-Zyxel-firewall-zero-touch-provisioning-feature-was-turned-into-an-attack-vector-via-CVE-2022-30525.-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-4-%E2%80%94-Window-remote-management-interfaces-exposed-to-the-whole-Internet-between-Jan-2022-and-May-2022.-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/08/12/the-future-of-automated-incident-response/</loc>
		<lastmod>2022-10-21T01:28:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/FIRSTCON-automation_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-1-%E2%80%94-Depiction-of-automated-network-management..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/07/Figure-2-%E2%80%94-My-depiction-of-how-we-can-safely-use-AI-referencing-EUs-draft-AI-Act-Articles..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/21/event-wrap-insig-2022/</loc>
		<lastmod>2022-10-21T03:50:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/inSIG-2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/24/is-it-possible-for-encryption-to-harm-cybersecurity/</loc>
		<lastmod>2022-10-23T22:52:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Over-security_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Ripe_Picture1.width-1536.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Ripe_Picture2.width-1536.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Ripe_Picture3.width-1536.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Ripe_Picture4.width-1536.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/20/log4shell-through-the-scope-of-a-reactive-network-telescope/</loc>
		<lastmod>2022-10-23T23:32:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Log4Shell_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-1-%E2%80%94-The-intensity-and-maliciousness-of-scanners-targeting-the-Log4Shell-vulnerability-during-December-2021-and-January-2022.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-2-%E2%80%94-Schemes-in-JNDI-URLs-over-time..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/10/18/how-to-ipv6-neighbor-discovery/</loc>
		<lastmod>2022-10-23T23:33:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/router-banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/10/ipv6-ndp-img1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/10/ipv6-ndp-img2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/10/ipv6-ndp-img3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/10/ipv6-ndp-img4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/10/ipv6-ndp-img5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/10/ipv6-ndp-img6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/10/ipv6-ndp-img7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/10/ipv6-ndp-img8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/25/using-tls-for-active-server-fingerprinting/</loc>
		<lastmod>2022-10-24T22:49:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Fingerprinting_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-1-%E2%80%94-Example-TLS-1.3-handshake..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-2-%E2%80%94-Example-fingerprint-from-a-single-TLS-1.3-handshake..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-3-%E2%80%94-CDN-server-detection-results-for-each-week-based-on-past-observations..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-4-%E2%80%94-CnC-detection-using-pure-TLS-fingerprinting-ten-CHs..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Figure-5-%E2%80%94-CnC-Detection-with-TLS-fingerprinting-ten-CHs-combined-with-the-HTTP-server-header..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/Fingerpritning-fig6-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/25/introducing-orbit/</loc>
		<lastmod>2022-10-25T05:16:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Orbit_FT-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/26/acc-turbo-mitigates-pulse-wave-ddos-attacks-using-programmable-switches/</loc>
		<lastmod>2022-10-25T21:11:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Pulse_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/26/notes-from-dns-oarc-39/</loc>
		<lastmod>2022-10-26T01:47:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/OARC39-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-1-%E2%80%93-Resolverless-DNS..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-2-%E2%80%93-DANE-for-Client-Server-Authentication..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-3-%E2%80%93-Source-Port-randomization-seen-by-A-Root-over-time..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-4-%E2%80%93-Uptake-of-Qname-Minimization-as-seen-by-A-root-Server-over-time..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/27/getting-serious-about-the-internet-and-energy/</loc>
		<lastmod>2022-10-26T22:50:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Colibri_hummingbird_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/27/event-wrap-pacson-2022/</loc>
		<lastmod>2022-10-27T00:48:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/PacSON_2022_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/28/browser-powered-desync-attacks-a-new-frontier-in-http-request-smuggling/</loc>
		<lastmod>2022-10-28T05:50:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Browser_Open_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Code1-desync.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Code2-desync.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/fig1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/fig2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/31/software-assurance-approaching-allowlisting-for-code/</loc>
		<lastmod>2022-10-30T22:45:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/allowlist-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/31/event-wrap-vnix-nog-2022/</loc>
		<lastmod>2022-10-31T06:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/VNIX-NOG-2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/01/reducing-the-control-loop-in-congestion-control/</loc>
		<lastmod>2022-10-31T22:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Loops_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/03/comparing-tcp-and-quic/</loc>
		<lastmod>2022-11-02T23:03:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/TCP-VQUIC_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-1-%E2%80%93-TCP-3-way-handshake.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-2-%E2%80%93-TCP-TLS-and-QUIC-handshakes..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-3-%E2%80%93-QUIC-logical-organization..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/27/your-network-is-more-ready-than-you-think-for-the-quantum-internet/</loc>
		<lastmod>2022-11-03T01:26:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Quantum_key_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/09/27/how-to-choose-dns-ttl-values/</loc>
		<lastmod>2022-11-04T00:13:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/Lotto_numbers_gamble.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/DNSTTL_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/DNSTTL_img2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/DNSTTL_img3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/DNSTTL_img4a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/DNSTTL_img4b.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/08/system-administration-work-during-the-covid-19-lockdown-insights-and-practical-recommendations/</loc>
		<lastmod>2022-11-07T22:50:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/IThelpdesk_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/09/openbsd-packet-filter-tools-part-2/</loc>
		<lastmod>2022-11-08T22:45:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/BSD_PF_FT2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/02/openbsd-packet-filter-tools/</loc>
		<lastmod>2022-11-09T00:12:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/BSD_PF_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/10/why-protocol-specifications-dont-always-work/</loc>
		<lastmod>2022-11-09T23:13:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/RFC_Disambiguation_tools_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%94-How-specifications-are-generated..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-2-%E2%80%94-The-Sage-process..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/11/12/stop-using-ridiculously-low-dns-ttls/</loc>
		<lastmod>2022-11-09T23:16:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/Time_To_Live_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/ttls-overall.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/ttls-0-10000.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/ttls-0-3600.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/ttls-0-900.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/ttls-0-300.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/ttls-cumulative-0-3600.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/ttls-jointplot-reg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/ttls-jointplot-reg-3600.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/ttls-jointplot-simulated.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/ttls-jointplot-simulated-client.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/07/what-can-be-learned-from-bgp-hijacks-targeting-cryptocurrency-services/</loc>
		<lastmod>2022-11-09T23:17:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/BGP-crypto-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-1-%E2%80%94-Kentik-BFP-Monitors-view-of-the-Amazon-BGP-hijack.-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-2-%E2%80%94-Amazons-authoritative-DNS-service-was-hijacked-to-redirect-certain-DNS-queries-to-an-imposter-DNS-service-in-April-2018.-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-3-%E2%80%94-BGP-hijack-of-Kakaos-IP-space.-Image-credit-Henry-Birge-Lee.-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-4-%E2%80%94-Validation-results-for-44.235.216.0-24-AS16509-via-the-Routinator-web-UI.-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/11/continuous-in-network-round-trip-time-monitoring/</loc>
		<lastmod>2022-11-10T22:45:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/DART_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/image5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/image3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/image4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/image2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/10/podcast-whither-rpki/</loc>
		<lastmod>2022-11-10T04:24:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Whither_RPKI_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/10/journeying-through-tunnels-the-story-behind-award-winning-satellite-link-research/</loc>
		<lastmod>2022-11-10T07:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Speidel-blog-banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/11/event-wrap-btnog-9/</loc>
		<lastmod>2022-11-10T22:41:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/btNOG9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/14/extended-dns-error-support-for-unbound/</loc>
		<lastmod>2022-11-13T22:55:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Stop_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-1-%E2%80%94-DNSKEY-missing..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/16/when-it-comes-to-ipv6-we-need-to-be-promoting-location-location-location/</loc>
		<lastmod>2022-11-15T23:10:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/phone_location_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/BusinessGeo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Conversion-rate.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/IP-location.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/15/the-fibre-optic-path/</loc>
		<lastmod>2022-11-16T04:49:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/subcables-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-1-%E2%80%94-Isambard-Kingdom-Brunels-SS-Great-Eastern-the-ship-that-laid-the-first-lasting-transatlantic-cable-in-1866..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-2-%E2%80%94-Map-of-the-%E2%80%98All-Red-Line-c-1902..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-3-%E2%80%94-Daniel-Colladons-demonstration-of-total-internal-reflection-of-light-in-a-water-tube..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-4-%E2%80%93-Loss-profile-for-silica-fibre..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-5-%E2%80%93-Charles-Townes-left-with-the-MASER-he-developed-in-1954..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-6-%E2%80%93-Optical-impairments..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-7-%E2%80%93-Phase-amplitude-space-mapping-of-QPSK-keying..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-8-%E2%80%94-Adaptive-Modulation-Constellations-for-QPSK-8PSK-16QAM-AND-64QAM..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/16/event-wrap-hknog-11-0/</loc>
		<lastmod>2022-11-16T05:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/HKNOG10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/17/what-you-need-to-know-about-migrating-to-the-cloud/</loc>
		<lastmod>2022-11-16T22:40:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Cloud_Migration_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/18/event-wrap-dns-oarc-39/</loc>
		<lastmod>2022-11-18T01:45:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/DNS-OARC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/18/service-exhaustion-floods-http-https-flood-http-pipelining-and-ssl-renegotiation-ddos-attack/</loc>
		<lastmod>2022-11-21T05:25:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Flood_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-1-%E2%80%94-Example-of-a-HTTP-GET-flood-attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-2-%E2%80%94-Example-of-a-HTTP-POST-flood-attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-3-%E2%80%94-Example-of-a-HTTP-Pipelining-attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-4-%E2%80%94-Server-response-of-HTTP-Pipelining-request.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-5-%E2%80%94-TCP-three-way-handshake.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-6-%E2%80%94-client-Hello-message.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-7-%E2%80%94-server-Hello-message.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-8-%E2%80%94-The-handshake-is-complete-and-the-application-protocol-is-enabled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-9-%E2%80%94-Capture-packet-of-a-server-system-which-support-SSLTLS-renegotiation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-10-%E2%80%94-thc-ssl-flood-attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Figure-11-%E2%80%94-Example-of-a-HTTPS-flood-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/21/deploying-ipv6-mostly-access-networks/</loc>
		<lastmod>2022-11-21T23:08:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/apples_and_oranges_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Fig1-CLAT-active-on-a-IPv6-only-network-connection..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/23/congestion-control-algorithms-are-not-fair/</loc>
		<lastmod>2022-11-22T23:05:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/11/mindthegap.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-1-%E2%80%94-Test-network-results-with-a-bottleneck-link-rate-of-120-Mbits-using-Mahimahi.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/23/event-wrap-ripe-85/</loc>
		<lastmod>2022-11-23T00:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/RIPE-85.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/24/inaugural-isif-asia-ipv6-deployment-grant-recipients-announced/</loc>
		<lastmod>2022-11-24T06:30:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/ISIF-pardot-banner-01_BLOG.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/IPv6-recipients-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/25/ixp-scrubber-learning-from-blackholing-traffic-for-ml-driven-ddos-detection-at-scale/</loc>
		<lastmod>2022-11-24T22:45:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/IXP_Scrubber_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-1-%E2%80%94-IXP-Scrubber-applies-an-ML-DDoS-classifier-at-IXPs-at-the-Internets-core.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-2-%E2%80%94-Share-of-well-known-DDoS-ports-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-3-%E2%80%94-Overview-of-microscopic-and-macroscopic-ML-model-classification-process..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-4-%E2%80%94-Classification-performance-with-a-sliding-window-size-of-a-day-a-week-and-a-month..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/24/podcast-colibri-brokering-bandwidth-across-the-path-in-scion/</loc>
		<lastmod>2022-11-24T22:51:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/COLIBRI_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/25/event-wrap-netthing-2022/</loc>
		<lastmod>2022-11-25T01:59:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/NetThing_2022_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/25/event-wrap-indonesia-academic-csirt-conference/</loc>
		<lastmod>2022-11-25T04:55:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/CSIRT_ID.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/24/yes-de-aggregation-can-be-bad-no-its-not-game-over/</loc>
		<lastmod>2022-11-27T22:46:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/IPv6_Vast.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/12/10/the-space-between-ipv6-allocations-part-1/</loc>
		<lastmod>2022-11-27T22:47:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/IPv6-space-part-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-2-cropped.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-3-Binary-chop.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/11/Figure-4-half-of-the-IPv6-space.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/05/28/what-is-m-of-n-in-public-private-key-signing/</loc>
		<lastmod>2022-11-27T22:47:47+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/05/treasure-map-M-of-N-header.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/29/isacs-possible-role-in-software-supply-chain-assurance/</loc>
		<lastmod>2022-11-28T22:50:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Chain_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/25/event-wrap-mnnog-4/</loc>
		<lastmod>2022-11-29T00:18:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/mnNOG-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/01/event-wrap-ums-cybersecurity-awareness-seminar-2022/</loc>
		<lastmod>2022-12-01T06:31:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Security_talk_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/01/event-wrap-samoa-it-association-sita-tech-expo/</loc>
		<lastmod>2022-12-01T06:32:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/SITA_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/01/event-wrap-ietf-115/</loc>
		<lastmod>2022-12-01T06:33:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/IETF_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/01/random-notes-from-ietf-115/</loc>
		<lastmod>2022-12-01T05:15:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/IETF115_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/30/http-3-and-quic-prioritization-and-head-of-line-blocking/</loc>
		<lastmod>2022-12-01T22:35:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Queue_blocking_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/HOL_Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/HOL_Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/HOL_Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/HOL_Fig4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/02/event-wrap-peering-asia-4-0/</loc>
		<lastmod>2022-12-02T04:40:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/PeeringAsia4_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/02/ec-response-to-2022-apnic-survey-published/</loc>
		<lastmod>2022-12-02T01:49:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/05/Survey-Banner-2022-blog-1110x404px-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/05/on-the-49th-anniversary-of-documenting-tcp-ip/</loc>
		<lastmod>2022-12-04T23:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Birthday_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/06/how-does-starlink-compare-to-broadband/</loc>
		<lastmod>2022-12-05T23:37:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/ethernetvssatellite_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/LEOvsGEO.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/The-Bent-Pipe.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/07/dns-at-igf-2022/</loc>
		<lastmod>2022-12-06T23:09:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Policy_DNS_FT_IGF.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/07/event-wrap-bigf-2022/</loc>
		<lastmod>2022-12-07T00:51:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/BGIF2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/07/event-wrap-pacific-telecommunications-security-expert-forum-ptsef/</loc>
		<lastmod>2022-12-07T01:35:47+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Adli-Pacific.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/10/20/ipv6-and-the-dns/</loc>
		<lastmod>2022-12-07T05:22:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/03/Tape-measure-IPv6-banner-white.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/dns-1a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/dns-2a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/dns-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/dns-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/dns-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/dns-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/dns-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/10/dns-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/08/26/unearthing-ipv6-benefits-moving-cloud/</loc>
		<lastmod>2022-12-07T05:49:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/08/Yoda-picture-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/08/podcast-the-most-important-work-in-the-internet/</loc>
		<lastmod>2022-12-07T20:30:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Ping-OARC_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/11/15/scoring-dns-root-server-system/</loc>
		<lastmod>2022-12-07T07:41:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/11/5-stars_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/12/12/scoring-dns-root-server-system-pt-2-sixth-star/</loc>
		<lastmod>2022-12-07T08:15:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/12/6-stars_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/12/fig1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/08/event-wrap-icann-dns-symposium-2022/</loc>
		<lastmod>2022-12-08T06:33:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/ICANN-DNS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/01/27/bgp-in-2016/</loc>
		<lastmod>2022-12-08T05:53:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/BGP2016_banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/bgp-figure32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/02/02/addressing-in-2016/</loc>
		<lastmod>2022-12-08T08:23:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/Geoff-Huston.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/addr-figure13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/03/10/surprising-connection-hyperloglog-dnssec-nsec3/</loc>
		<lastmod>2022-12-09T00:37:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/HyperLoglog_banner.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/hyper_dnssec_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/hyper_dnssec_img2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/hyper_dnssec_img3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/04/05/look-up/</loc>
		<lastmod>2022-12-09T01:09:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/04/satellite.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/04/newton.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/04/Orbitalaltitudes.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/06/13/stops-ipv6-traffic-dual-stack-isp/</loc>
		<lastmod>2022-12-09T01:33:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/Stop-sign-traffic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/IPv6_EnricP_image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/IPv6_EnricP_image2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/ipv6_barriers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/ipv6_intent.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/08/22/dealing-ipv6-fragmentation-dns/</loc>
		<lastmod>2022-12-09T01:53:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/08/glue.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/09/new-alert-options-for-dash/</loc>
		<lastmod>2022-12-09T04:30:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/DASH_Alerts2_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-1-%E2%80%94-Routing-status-in-DASH..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-2-%E2%80%94-Configuring-alerts-in-DASH..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-3-%E2%80%94-Defining-filters-for-alerts-in-DASH..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Figure-4-%E2%80%94-New-notification-options-in-DASH..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/08/29/dealing-ipv6-fragmentation-dns-part-2/</loc>
		<lastmod>2022-12-09T03:45:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/08/fragmented-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/BBIX_img1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/09/29/network-operator-perspective-ipv6-performance/</loc>
		<lastmod>2022-12-09T04:06:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/anchor_cropped.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/11/03/trust-geolocation-databases-geolocate-routers/</loc>
		<lastmod>2022-12-09T04:37:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/Geolocation_banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/DBs_Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/DBs_Picture2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/DBs_Picture3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/DBs_Picture4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/DBs_Picture5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/DBs_Picture6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/12/06/dnssec-deployment-remains-low/</loc>
		<lastmod>2022-12-09T05:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/11/DNSSEC_key.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/ds-ratio-kpn-loopia-per-tlds-eps-converted-to.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/ds-ratio-paid-eps-converted-to.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/ds-ratio-cloudflare-multi-all-eps-converted-to.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/11/30/seeing-world-atlas/</loc>
		<lastmod>2022-12-09T05:14:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/RIPE-Atlas-coverage_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/Verizon_catchment.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/RIPE-Atlas-probe.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/RIPE-Atlas-coverage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/catchment_graph-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/catchment_graph-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/catchment_graph-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/equation-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/equation-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/before_and_after.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/09/securing-ntp-against-mitm-attacks/</loc>
		<lastmod>2022-12-09T06:01:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/NTP_security_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/10/bgp-in-2017/</loc>
		<lastmod>2022-12-09T06:58:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/BGP2017_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig19.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig23.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig30.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig31.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig34.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig37.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig38.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig39.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig40.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/30/addressing-2017/</loc>
		<lastmod>2022-12-12T00:01:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/11/14876594_1207090816027687_1710494011378339736_o.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/addrfig12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/12/mentorships-fellowships-and-the-road-to-professional-success/</loc>
		<lastmod>2022-12-12T04:30:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Ayesha_APNIC54_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/08/enabling-passive-measurement-of-zoom-performance-in-production-networks/</loc>
		<lastmod>2022-12-12T00:22:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Zoom_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-1-%E2%80%94-Simplified-header-format-of-zoom-media-packets..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-2-%E2%80%94-Validation-of-latency-measurements-using-Zoom-provided-QoS-data..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/wireshark.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/02/09/understanding-spoofing-problem/</loc>
		<lastmod>2022-12-12T00:28:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/mask_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/FL_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/FL_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/FL_3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/FL_4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/FL_5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/03/05/can-find-shared-ip-addresses/</loc>
		<lastmod>2022-12-12T00:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/Memory-IP_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/Fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/Fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/02/Fig5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/04/16/how-well-does-atr-actually-work/</loc>
		<lastmod>2022-12-12T00:42:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/04/ATR_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/04/atr1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/04/11/measuring-the-root-zone-ksk-trust/</loc>
		<lastmod>2022-12-12T01:19:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/Measure-banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/04/24/bang-for-buck-the-adoption-of-dnssec-and-return-on-investment/</loc>
		<lastmod>2022-12-12T01:27:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/04/DNS_money_Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/04/26/adoption-performance-and-human-perception-of-http-2-server-push/</loc>
		<lastmod>2022-12-12T01:37:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/04/Stopwatch_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/04/HTTP2_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/04/HTTP2_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/04/HTTP2_3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/05/21/what-drives-ipv6-deployment/</loc>
		<lastmod>2022-12-12T01:50:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/IPv6_rich_piggy-bank_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/fig1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/fig6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/12/apnic-fee-schedule-increase-for-all-account-holders-from-1-january-2023/</loc>
		<lastmod>2022-12-12T02:26:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/12/apnic-logos-555x202-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/IPv4_2023.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/IPv6_2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/06/01/mobile-content-hosting-infrastructure-in-china-a-view-from-a-cellular-isp/</loc>
		<lastmod>2022-12-12T02:31:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/Sim-card-country_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/06/11/do-dns-operators-want-to-deploy-dns-privacy/</loc>
		<lastmod>2022-12-12T02:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/Private_banner.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/05/ISC_pie-chart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/06/19/measuring-the-adoption-of-rpki-route-origin-validation/</loc>
		<lastmod>2022-12-12T02:49:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/06/ROV_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/06/Measuring-RPKI_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/06/Measuring-RPKI_2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/07/11/source-address-dependent-routing-for-simple-multihoming/</loc>
		<lastmod>2022-12-12T02:53:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/07/IPv6-home_banner1-copy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/07/ipv6_multihoming-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/11/12/policy-series-a-smarter-minimum-allocation/</loc>
		<lastmod>2022-12-12T04:48:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/Policy_Rajesh_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/Rajesh-Chharia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/08/30/ripe-ncc-moves-to-close-off-a-routing-registry-loophole/</loc>
		<lastmod>2022-12-12T05:01:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/Loophole-rope-banner.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/Count-of-route-route6-object.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/09/20/ipv6-renumbering-a-pain-in-the/</loc>
		<lastmod>2022-12-12T05:14:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/re-numbering_banner.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/IPv6-Renumbering-Mail-Cisco-ESA-HAT-RELAYLIST.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/IPv6-Renumbering-Mail-Cisco-ESA-SMTP-Routes-with-FQDNs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/IPv6-Renumbering-Mail-Cisco-ESA-SMTP-Routes.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/IPv6-Renumbering-Palo-Alto-Email-Server-Profile.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/IPv6-Renumbering-Palo-Alto-RDNSS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/2017-06-30-16_48_51-weberdns.de_.-RIPE-Atlas-%E2%80%94-RIPE-Network-Coordination-Centre.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/09/19/persistent-dns-connections-for-reliability-and-performance/</loc>
		<lastmod>2022-12-12T05:19:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/DNS_performance_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/DNS_bj_1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/DNS_bj_2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/DNS_bj_3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/DNS_bj_4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/10/16/cleaning-up-roas-inconsistent-with-the-bgp-state/</loc>
		<lastmod>2022-12-12T05:36:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/INVALID_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/Invalid_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/Invalid_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/Invalid_3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/Invalid_4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/Invalid_5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/Invalid_6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/Invalid_7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/09/28/measuring-the-ksk-roll/</loc>
		<lastmod>2022-12-12T05:42:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/KeyRoll_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/09/fig4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/10/15/apricot-2019-call-for-papers-open/</loc>
		<lastmod>2022-12-12T05:44:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/APRICOT2019-blog-banner-555x202-02-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/10/25/revisiting-reverse-dns-use/</loc>
		<lastmod>2022-12-12T05:49:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/Reverse-DNS_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/Reverse-DNS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/Reverse-DNS_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/Reverse-DNS_3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/Reverse-DNS_4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/Reverse-DNS_5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/10/Reverse-DNS_6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/11/26/when-the-internet-goes-down-improving-the-detection-of-disruptions/</loc>
		<lastmod>2022-12-12T05:53:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/11/Internet-distruption_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/11/alwaysondevices.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/11/baselineexample.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/11/methodsketch.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/11/Fig-4_Richter.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/</loc>
		<lastmod>2022-12-12T06:31:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/12/MustStaple_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/12/OCSP-Must-Staple_Fig2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/02/06/the-problems-with-security-posture/</loc>
		<lastmod>2022-12-12T06:39:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/Posture_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/01/16/bgp-in-2018-the-bgp-table/</loc>
		<lastmod>2022-12-12T06:59:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/BGP2018_banner2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv4fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv4fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/bgpfig12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv4fig25.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv4fig26.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv4fig27.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig29.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/bgpv6fig30.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/01/23/a-new-submarine-cable-for-the-cook-islands-but-to-where/</loc>
		<lastmod>2022-12-12T07:35:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/cook_submarine_v2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/image5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/image3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/01/30/addressing-2018/</loc>
		<lastmod>2022-12-12T08:22:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/Addressing2018_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/addrfig14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/02/22/no/</loc>
		<lastmod>2022-12-12T08:37:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/geoff_nxdomain_banner_1110_404.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/nxd-fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/nxd-fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/nxd-fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/nxd-fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/nxd-fig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/nxd-fig7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/nxd-fig8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/nxd-fig9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/nxd-fig10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/02/nxd-fig11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/03/19/prevent-route-leaks-by-explicitly-defining-policy/</loc>
		<lastmod>2022-12-12T23:06:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/BGP-churn_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/rfc8212.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/04/19/visibility-of-ipv4-and-ipv6-prefix-lengths-in-2019/</loc>
		<lastmod>2022-12-12T23:22:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/Tape-measure_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/Vis2019_img2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/Vis2019_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/Vis2019_img3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/Vis2019_img5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/Vis2019_img4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/Vis2019_img6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/Vis2019_img7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/04/Vis2019_img8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/06/06/100-by-2025-china-getting-serious-about-ipv6/</loc>
		<lastmod>2022-12-12T23:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/05/100percent_IPv6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/cn-f2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/05/ChinaIPv6_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/05/ChinaIPv6_2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/06/05/ipv6-in-2019-where-to-from-here/</loc>
		<lastmod>2022-12-12T23:46:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Flammarion_banner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/2017-pie-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/2019-pie-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Screen-Shot-2019-06-04-at-11.03.47-am.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/USA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/India-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/VIet-Nam-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Thailand-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Russia-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/China.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Mexico-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Great-Britain.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Taiwan-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/New-Zealand.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Australia.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/05/IPv6@APNIC_ad-banner-for-blogposts.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/07/12/its-time-to-consider-avoiding-ip-fragmentation-in-the-dns/</loc>
		<lastmod>2022-12-12T23:50:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/07/DNS_puzzle_banner-e1646951956701.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/fujiwara-5.pdf.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/fujiwara_Fig2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/07/15/excessive-bgp-as-path-prepending-is-a-self-inflicted-vulnerability/</loc>
		<lastmod>2022-12-13T00:04:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/This-way_BANNER2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/Prep_1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/Prep_2.2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/Prep_2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/Prep_3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/Prep_4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/07/31/tcp-mss-values-whats-changed/</loc>
		<lastmod>2022-12-13T00:12:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/Maximum_MSS_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/mss-fig1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/mss-fig2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/mss-fig3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/12/maldives-ixp-a-deployment-story/</loc>
		<lastmod>2022-12-13T00:19:13+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/MVIX_Training_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-1-%E2%80%94-MVIX-design.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/image-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/08/12/dns-query-privacy/</loc>
		<lastmod>2022-12-13T00:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/QNAME_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/qmin-fig1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/qmin-fig2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/qmin-fig3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/08/14/extract-malware-configurations-with-malconfscan/</loc>
		<lastmod>2022-12-13T00:29:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/MalConfScan.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/MalConfScan_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/MalConfScan_img2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/MalConfScan_img3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/MalConfScan_img4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/MalConfScan_img5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/08/19/measuring-the-impact-of-dns-flag-day/</loc>
		<lastmod>2022-12-13T00:35:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/DNS-Flag-day_measure_Banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/FlagDay_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/FlagDay_img2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/FlagDay_img3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/FlagDay_img4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/FlagDay_img5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/FlagDay_img6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/FlagDay_img7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/FlagDay_img8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/FlagDay_img9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/FlagDay_img10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/09/24/securing-bgp-on-the-host-with-origin-validation/</loc>
		<lastmod>2022-12-13T01:44:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/bgp_on_host_colour.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/bgp-on-the-host.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/rpki-validator1x.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/rpki-datacenter.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/09/25/does-tcp-keep-up-the-pace-against-quic/</loc>
		<lastmod>2022-12-13T01:52:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/tartan-track-tcp-quic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/image2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/image3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/09/23/dns-resolver-centrality/</loc>
		<lastmod>2022-12-13T01:56:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/06/DNSResolver_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/Picture-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/Picture-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/Picture-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/Picture-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/10/03/apricot-2020-call-for-papers-open/</loc>
		<lastmod>2022-12-13T01:59:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/09/APRICOT2020-blog-banner-highres.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/05/12/apnic-50-call-for-papers-open/</loc>
		<lastmod>2022-12-13T02:15:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/04/APNIC50_Dhaka_banner_555x203px_01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/04/15/open-sourcing-the-network-model/</loc>
		<lastmod>2022-12-13T02:17:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/03/Flight-simulator_banner.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/03/1600_20200212_Fiola_Network_Understanding_For_v1-20200212_Fiola_Network_Understanding_For_v1.pdf.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/01/14/bgp-in-2019-the-bgp-table/</loc>
		<lastmod>2022-12-13T02:29:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/BGP_Calendar_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig3-v4-bgp-active-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig5-v4-bgp-spec-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig7-v4-bgp-average-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig9-v4-bgp-aspath-length-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig11-v4-bgp-mixedas-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig4-v4-bgp-total-space-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/BGP2019_fig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig8-v4-bgp-prefix-vector.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig10-v4-bgp-as-count-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig12-v4-bgp-as-conns.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig13-plotend.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig14-bgpv6fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/BGP2019_fig15.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig16-v6-bgp-active-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig18-v6-bgp-spec-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig20-v6-bgp-average-prf.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig22-v6-bgp-aspath-length-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig24-v6-bgp-mixedas-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig17-v6-bgp-total-space-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig19-v6-bgp-spec-ratio-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig21-v6-bgp-prefix-vector.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig23-v6-bgp-as-count-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig25-v6-bgp-as-conns.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig26-v4-bgp-active-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig27-v4-bgp-average-day-diff.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig28-v4-bgp-active-proj.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig29-v6-bgp-active-day.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig30-v6-bgp-average-day-diff.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig31-v6-bgp-active-proj.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/bgpfig32-v6-deployment.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/01/21/addressing-2019/</loc>
		<lastmod>2022-12-13T06:02:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/addressing-2019-feat.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-2b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/01/Picture-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/07/17/ipv6-and-the-dns-2/</loc>
		<lastmod>2022-12-13T06:07:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/07/DNS_Measure_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/APNIC-Labs-DNS-measurement-framework_.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/Breakdown-of-protocols-used-by-experiment.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/Breakdown-of-protocols-used-by-experiment-for-the-past-22-months.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/First-query-protocol-for-the-past-22-months..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/Dual-stack-vs-IPv6-only-in-the-DNS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/dns6-fig5a.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/Distribution-of-DNS-responses-sizes-in-the-DNS-Root-Zone.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/07/Glueless-Delegation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/13/ip-fragmentation-and-the-dns-mitigation/</loc>
		<lastmod>2022-12-13T07:05:47+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Fragmentation_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/02/improving-sshs-security-with-sshfp-dns-records/</loc>
		<lastmod>2022-12-13T22:27:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/SSH_Fingerprint_Scan_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-1-%E2%80%94-SSH-asks-the-user-to-verify-the-authenticity-of-a-server-by-comparing-the-host-key-fingerprint-on-the-first-connection..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/14/event-wrap-lknog-6/</loc>
		<lastmod>2022-12-13T23:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/LKNOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/16/opinion-is-secured-routing-a-market-failure/</loc>
		<lastmod>2022-12-15T21:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/secured_lock-pick_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/19/event-wrap-khnog-4/</loc>
		<lastmod>2022-12-19T00:30:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/KHNOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/20/event-wrap-idnic-amm-2022/</loc>
		<lastmod>2022-12-19T22:45:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/IDNIC-2022.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/FHI_8009-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/19/be-careful-with-that-ping-freebsd/</loc>
		<lastmod>2022-12-19T22:45:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/pING_cve_ft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/20/discussions-in-the-ietf-on-reconsidering-multicast/</loc>
		<lastmod>2022-12-20T00:29:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Multicast_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-Vision-for-refactoring-communication-systems..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-2-%E2%80%93-Illustrating-the-consolidated-multicast-semantic..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/20/event-wrap-igf-2022/</loc>
		<lastmod>2022-12-20T06:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/IGF-2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/21/event-wrap-btcirt-cybersecurity-bootcamp/</loc>
		<lastmod>2022-12-20T23:35:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/adli-btcirt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/22/podcast-journeying-into-xdp-cardinality-and-keys/</loc>
		<lastmod>2022-12-21T16:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/XDP-bloom.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/21/rpki-in-apnics-network-a-case-study/</loc>
		<lastmod>2022-12-20T23:46:07+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Keep_it_simple_FT-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-APNIC-network-map..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-2-%E2%80%94-APNIC-announcements-as-cisco-show-ip-bgp-summary-format-for-IPv4-and-IPv6.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-DASH-view-of-the-AS4608-validity-state.-The-invalid-is-a-research-prefix-being-deliberately-misannounced-APNIC-Labs..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/21/event-wrap-38th-twnic-opm/</loc>
		<lastmod>2022-12-21T06:30:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/TWNIC38.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/21/maintaining-apnic-ec-election-integrity/</loc>
		<lastmod>2022-12-21T01:20:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/apnic-logos-555x202.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/05/03/how-nat-traversal-works-concerning-cgnats/</loc>
		<lastmod>2022-12-21T02:12:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Nats-CGNATs.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-cgnat-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-cgnat-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/nat-ipv6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_blog_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_academy_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_stats_pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/12/IPv6_website_pointer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/21/event-wrap-viet-nam-internet-day-2022/</loc>
		<lastmod>2022-12-21T07:01:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/VID2022.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/IMG_886142790EA3-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/22/omni-interface-mtu-assurance-and-ip-parcels/</loc>
		<lastmod>2022-12-21T22:41:04+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/OMNI_IP_Parcels_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-IP-Parcel-structure-of-TCP-and-UDP..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/26/three-of-the-best-guest-posts-5/</loc>
		<lastmod>2022-12-25T20:30:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/3OB-GP-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/27/three-of-the-best-measurement/</loc>
		<lastmod>2022-12-26T20:30:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/3OB-MEAS-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/28/three-of-the-best-ipv6-6/</loc>
		<lastmod>2022-12-27T20:30:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/3OTB-G6-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/29/three-of-the-best-geoff-huston-5/</loc>
		<lastmod>2022-12-28T20:30:08+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/3OTB-GH-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/30/three-of-the-best-development-6/</loc>
		<lastmod>2022-12-29T20:30:07+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/3OTBDEV-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/02/three-of-the-best-rpki-3/</loc>
		<lastmod>2023-01-01T20:30:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/3OTB-RPKI-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/03/three-of-the-best-podcasts-2/</loc>
		<lastmod>2023-01-02T22:40:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/3otb-ping-22.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/04/three-of-the-best-george-michaelson-2/</loc>
		<lastmod>2023-01-03T22:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/3otb-ggm-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/05/three-of-the-best-how-to-5/</loc>
		<lastmod>2023-01-04T22:40:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/3otb-howto-ft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/06/three-of-the-best-security-3/</loc>
		<lastmod>2023-01-05T20:30:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/3OTB-SEC-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/15/why-kids-need-to-be-involved-in-internet-governance-discussions/</loc>
		<lastmod>2023-01-06T00:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/20221111_111536-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/IMG-20221121-WA0001-edited.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/06/bgp-in-2022-the-routing-table/</loc>
		<lastmod>2023-01-08T22:47:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/BGP-2022_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%93-IPv4-routing-table-since-1994-as-seen-by-Route-Views-peers..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-2-%E2%80%93-IPv4-routing-table-2019-2022-as-seen-by-Route-Views-and-RIS-peers..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-3-%E2%80%93-IPv4-routing-table-across-2022-as-seen-by-Route-Views-and-RIS-peers..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-4-%E2%80%94-IPv4-BGP-routing-table-size-RIB..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-5-%E2%80%94-IPv4-announced-address-span..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-6-%E2%80%94-IPv4-more-specific-announcements..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-7-%E2%80%94-IPv4-relative-proportion-of-more-specific-announcements..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-8-%E2%80%94-IPv4-average-announcement-size.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-9-%E2%80%94-IPv4-prefix-size-counts..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-10-%E2%80%94-IPv4-average-AS-path-length..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-11-%E2%80%94-IPv4-AS-count..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-12-%E2%80%94-transit-vs-total-AS-count..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-13-%E2%80%94-AS-connectivity-degree..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-14-%E2%80%94-IPv6-routing-table-since-2004-as-seen-by-Route-Views-peers..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-15-%E2%80%94-IPv6-routing-table-2019-2022-as-seen-by-Route-Views-and-RIS-peers..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-16-%E2%80%94-IPv6-routing-table-across-2021-as-seen-by-Route-Views-and-RIS-peers..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-17-%E2%80%94-IPv6-BGP-routing-table-size-RIB..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-18-%E2%80%94-Announced-address-span-32s..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-19-%E2%80%94-IPv6-more-specific-prefix-advertisements..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-20-%E2%80%94-IPv6-relative-proportion-of-more-specific-announcements..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-21-%E2%80%94-IPv6-average-prefix-size-prefix-size..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-22-%E2%80%94-IPv6-prefix-size-counts..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-23-%E2%80%94-IPv6-average-AS-path-length..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-24-%E2%80%94-IPv6-AS-count..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-25-%E2%80%94-IPv6-transit-AS-count..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-26-%E2%80%94-IPv6-AS-connectivity-degree..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-27-%E2%80%94-IPv4-BGP-Table-2016-%E2%80%93-2022..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-28-%E2%80%94-First-order-differential-of-smoothed-IPv4-BGP-table-size-2016-2022..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-29-%E2%80%94-IPv4-BGP-table-predictions..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-30-%E2%80%94-IPv6-BGP-table-size-from-January-2016..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-31-%E2%80%94-First-order-differential-of-IPv6-BGP-table-size..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-32-%E2%80%94-Projections-of-IPv6-BGP-table-size..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-33-%E2%80%94-IPv6-deployment-2012-%E2%80%93-2022..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/10/longest-prefix-matching-in-networking-chips/</loc>
		<lastmod>2023-01-09T22:41:17+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Longest_prefix_Matching_FT2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-An-uncompressed-tree-for-a-4-bit-IP-address.-Nodes-with-routes-are-highlighted-in-green..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-2-%E2%80%94-A-binary-tree-where-unused-nodes-are-pruned-and-the-remaining-nodes-are-compressed..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-3-%E2%80%94-The-tree-can-be-further-compressed-by-merging-parent-nodes-with-only-one-child..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-4-%E2%80%94-A-potential-hybrid-approach-with-a-TCAM-root-node-in-a-trie-structure..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-5-%E2%80%94-FIB-entries-arranged-as-two-has-tables-with-two-buckets-in-each-entry..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-6-%E2%80%94-Each-entry-of-the-FIB-table-is-hashed-three-times-and-various-bits-in-the-bloom-filter-are-set..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-7-%E2%80%94-Probe-bloom-filter-for-192.168.1.128-using-prefix-lengths-32-24-and-128..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/09/enhancing-subdomain-enumeration-ents-and-noerror/</loc>
		<lastmod>2023-01-09T22:42:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Enhancing-subdomain-enumeration-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-Graph-of-exampledomain.test-DNS-zone..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-2-%E2%80%94-DNS-hierarchy-of-exampledomain.test-from-black-box-perspective..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/10/event-wrap-bdnog-15/</loc>
		<lastmod>2023-01-09T23:10:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/bdNOG-15.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/10/event-wrap-cncert-international-partnership-conference-2022/</loc>
		<lastmod>2023-01-10T01:55:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/cncert.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/10/event-wrap-aintec-2022/</loc>
		<lastmod>2023-01-10T05:09:40+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/AINTEC_2022_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/12/15/monitoring-awareness-and-community-at-the-centre-of-ntts-rpki-deployment/</loc>
		<lastmod>2023-01-10T22:38:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Community_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-1-%E2%80%94-NTTs-Tier-1-IP-transit-network.-Source-Massimos-RIPE-85-presentation..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-3-%E2%80%94-The-blue-dot-on-the-x-axis-shows-the-point-at-which-NTT-introduced-new-software-and-procedures-for-our-RPKI-operations-resulting-in-an-86.84-reduction-of-RPKI-invalid-announcements..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-3-%E2%80%94-Validation-of-total-IPv4-and-IPv6-advertised-routes-for-NTTs-AS2914-is-currently-above-80.-Source..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/RPKI-at-APNIC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/11/bgp-in-2022-bgp-updates/</loc>
		<lastmod>2023-01-10T23:09:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/BGP-2022_churn-FT-copy-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%93-IPv4-BGP-update-counts..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-2-%E2%80%93-Smoothed-IPv4-BGP-prefix-update-counts.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-3-%E2%80%93-IPv4-unstable-prefixes-per-day..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-4-%E2%80%93-IPv4-average-routing-convergence-time-per-day..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-5-%E2%80%93-Distribution-of-BGP-updates-by-prefix..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-6-%E2%80%93-Distribution-of-BGP-updates-by-origin-AS..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-7-%E2%80%93-IPv6-BGP-update-counts..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-8-%E2%80%93-Unstable-IPv6-prefix-count..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-9-%E2%80%93-IPv6-average-routing-convergence-time-per-day..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-10-%E2%80%93-Distribution-of-BGP-IPv6-updates-by-prefix..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-11-%E2%80%93-Distribution-of-BGP-IPv6-updates-by-origin-AS..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-12-%E2%80%93-Average-AS-path-length-of-BGP-IPv4-prefixes..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-13-%E2%80%93-Distribution-of-AS-adjacencies-in-the-IPv4-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-14-%E2%80%93-Average-AS-path-length-of-BGP-IPv6-prefixes.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-15-%E2%80%93-Distribution-of-AS-adjacencies-in-the-IPv6-network.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-16-%E2%80%93-Distribution-of-update-types-in-the-IPv4-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-17-%E2%80%93-Distribution-of-update-types-in-the-IPv6-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-18-%E2%80%93-Relative-distribution-of-update-types-in-the-IPv4-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-19-%E2%80%93-Relative-distribution-of-update-types-in-the-IPv6-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-20-%E2%80%93-Relative-distribution-of-prefix-types-in-the-IPv4-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-21-%E2%80%93-Relative-distribution-of-prefix-types-in-the-IPv6-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-22-%E2%80%93-Relative-distribution-of-prefix-update-types-in-the-IPv4-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-23-%E2%80%93-Relative-distribution-of-prefix-update-types-in-the-IPv6-network..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/11/peeringdb-2022-product-report/</loc>
		<lastmod>2023-01-11T00:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/PeeringDB_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-PeeringDBs-search-functionality-is-now-easier-and-more-useful..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-2-%E2%80%94-Domain-revalidation-con.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-3-%E2%80%94-Add-email-control-panel..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-4-%E2%80%94-The-HOWTO-series-has-been-further-expanded-and-organized..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/24/notes-from-nanog-81/</loc>
		<lastmod>2023-01-11T04:22:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/NANOG81-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-1-%E2%80%94-Early-router-architecture-from-Tony-Li%E2%80%99s-A-History-of-Router-Architecture..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-2-%E2%80%94-Multi-bus-router-architecture-from-Tony-Li%E2%80%99s-A-History-of-Router-Architecture..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-3-%E2%80%94-Folded-Clos-router-architecture-from-Tony-Li%E2%80%99s-A-History-of-Router-Architecture..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-4-%E2%80%94-Super-nodes-from-Tony-Li%E2%80%99s-A-History-of-Router-Architecture..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-5-%E2%80%94-Core-POP-design-from-Mannan-Venkatesan-Comcast-Next-Gen-Core-Networks..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-6-%E2%80%94-NIST-National-Vulnerability-Database-records-of-TLS-vulnerabilities-23-February-2021..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-7-%E2%80%94-Targeted-routing-attacks-by-Jennifer-Rexford-Princeton-University..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Figure-8-%E2%80%94-Application-level-defence-Jennifer-Rexford-Princeton-University..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/12/bypassing-internet-congestion-with-flyovers/</loc>
		<lastmod>2023-01-11T22:50:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Flyovers_Congestion_FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-1%E2%80%94%C2%AC-Example-of-path-based-and-flyover-reservations..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/13/who-controls-the-internet/</loc>
		<lastmod>2023-01-12T22:35:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Measure_Internet_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-xkcd-2347-%E2%80%98Dependency.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-2-%E2%80%94-NS-records-for-the-root-zone..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-3-%E2%80%94-Domains-containing-those-NS-records.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-4-%E2%80%94-Nameserver-diversity-by-domain..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-5-%E2%80%94-Number-of-NS-records-by-gTLD..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-6-%E2%80%94-Number-of-NS-records-by-gTLD-NS..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-7-%E2%80%94-NS-diversity-in-gTLDs-by-domain..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-8-%E2%80%94-NS-diversity-in-gTLDs-by-AS..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-9-%E2%80%94-Top-1M-domains-according-to-the-Tranco-list..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-10-%E2%80%94-NS-diversity-in-1M-domains-by-AS..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/16/on-the-interplay-between-tls-certificates-and-quic-performance/</loc>
		<lastmod>2023-01-15T22:50:41+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/TLS_QUIC_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-In-QUIC-handshakes-server-replies-are-limited-to-3%C3%97-the-size-of-the-client-Initial-until-the-client-is-verified.-This-can-lead-to-multi-RTT-handshakes..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/FIGURE2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-3-%E2%80%94-Certificate-chain-sizes-depths-and-their-dependency.-Average-sized-certificate-chains-are-likely-to-exceed-QUIC-amplification-limits..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-4-%E2%80%94-QUIC-handshake-behaviour-as-observed-for-Cloudflare.-For-deployments-with-external-certificate-management-there-is-a-trade-off.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/FI03361.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-6-%E2%80%94-understanding-quic.net-measures-the-behaviour-of-QUIC-deployments-regarding-the-handshake-and-certificate-compression..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/17/subdomain-enumeration-with-dnssec/</loc>
		<lastmod>2023-01-16T22:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Records_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-DNS-Zone-using-DNSSEC-with-NSEC3.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-2-%E2%80%94-NSEC3-and-NSEC3PARAM-of-lab.test_.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-3-%E2%80%94-Illustration-of-a-NSEC-linked-list..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-4-%E2%80%94-Cleared-DO-bit-in-DNS-packet..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/18/rpkis-2022-year-in-review-growth-and-innovation/</loc>
		<lastmod>2023-01-17T23:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/RPKI_Review_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/18/the-apnic-foundation-snapshot-2022/</loc>
		<lastmod>2023-01-18T04:30:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Larger-foundation-banner-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Full-image-square.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Thailand-top-talent-cybersecurity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/ISIF-Award-Duncan-Ulrich-Charles.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/19/podcast-measuring-centrality-in-the-dns/</loc>
		<lastmod>2023-01-18T20:33:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Central_Market_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/19/the-current-development-of-dns-encryption/</loc>
		<lastmod>2023-01-18T22:40:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/03/Encrypt-Encryption-text_FT-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%94-Potential-privacy-threats-faced-by-a-client-in-its-unencrypted-DNS-lookup-activities..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-2-%E2%80%94-The-layer-structure-of-standard-plaintext-and-encrypted-DNS..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-3-%E2%80%94-Adoption-status-of-DNS-encryption-for-public-resolvers-user-operating-systems-and-user-browsers..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-4-%E2%80%94-Some-examples-of-barriers-to-the-public-adoption-of-DNS-encryption..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/11/28/fact-checking-starlinks-performance-figures/</loc>
		<lastmod>2023-01-19T02:22:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Starlink_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/image5-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Starlink_Fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/image3-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/20/your-multihop-bgp-session-probably-isnt-multihop/</loc>
		<lastmod>2023-01-19T22:43:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Multihop_ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%94-Example-topology..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-2-%E2%80%94-PCAP-of-the-resulting-session..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-3-%E2%80%94-Both-BGP-sessions-are-now-in-an-idle-state..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-4-%E2%80%94-PCAP-showing-that-a-TCP-handshake-is-successful-in-the-first-three-packets..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-5-%E2%80%94-PCAP-showing-a-TTL-of-255..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-7-%E2%80%94-Example-topology-with-R3..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/23/ip-addressing-through-2022/</loc>
		<lastmod>2023-01-23T00:10:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/addressing_2022_ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%94-IPv4-address-allocations-by-RIR-by-year..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-2-%E2%80%94-IPv4-allocations-by-RIR-by-year..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-3-%E2%80%94-Number-of-transfers-2012-%E2%80%93-2022..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-4-%E2%80%94-Volume-of-transferred-Addresses-2012-%E2%80%93-2021..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-5-%E2%80%94-IPv4-unadvertised-address-pool-size..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-6a-%E2%80%94-IPv4-address-pool-2000-%E2%80%93-2022..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-6b-%E2%80%94-IPv4-address-pool-changes-through-2022..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-7-%E2%80%94-Ratio-of-unadvertised-pool-size-to-total-pool-size..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-8-%E2%80%94-IPv4-price-time-series-data-from-Hilco-Streambank..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-9-%E2%80%94-Age-distribution-of-transferred-addresses..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-10-%E2%80%94-Age-distribution-of-transfer-transactions..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-11-%E2%80%94-Changes-to-the-BGP-routing-table-across-2022-by-address-prefix-age..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-12-%E2%80%94-Number-of-IPv6-allocations-per-year..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-13-%E2%80%94-Volume-of-IPv6-allocations-per-year..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-14-%E2%80%94-Allocated-unadvertised-and-advertised-IPv6-addresses..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-15-%E2%80%94-Advertised-IPv6-addresses-as-a-percentage-of-the-allocated-address-pool..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-16-%E2%80%94-IPv6-deployment-measurement-2010-%E2%80%93-2021..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-17-%E2%80%94-IPv6-deployment-measurement-December-2022..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/24/the-gendered-experiences-of-non-cisadmen/</loc>
		<lastmod>2023-01-23T23:15:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/gender_FT-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%94-A-self-reinforcing-circle-where-the-undervaluation-of-care-work-on-an-institutional-level.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-2-%E2%80%94-From-feminist-workplaces-to-computer-security.-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/26/when-clouds-become-reflectors/</loc>
		<lastmod>2023-01-25T20:30:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Cloud-reflector_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/12/Figure-1-%E2%80%94-Usage-network-type-distribution-of-open-resolvers.-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/27/a-reflection-on-the-organic-growth-of-the-internet-protocol-stack/</loc>
		<lastmod>2023-01-26T22:50:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Groeth_Layers_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%94-Classical-Internet-stack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/25/an-investigation-into-apples-new-relay-network/</loc>
		<lastmod>2023-01-29T22:37:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/iphone_icloud_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%93-Architecture-of-iCloud-Private-Relay.-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-2-%E2%80%94-The-difference-in-path-visibility-between-a-connection-with-and-without-using-Private-Relay..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/01/accessing-ipv6-only-resources-via-legacy-ip-nat46-on-a-fortigate/</loc>
		<lastmod>2023-01-31T23:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Tunnel_NAT46_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%94-The-NAT46-concept..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-2-%E2%80%94-Input-Virtual-IP-on-FortiOS-v7.0.9..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-3-%E2%80%94-Inputting-IPv6-pool.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-4-%E2%80%94-Inputting-the-firewall-policy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-5-%E2%80%94-Firewall-Policy-overview..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-6-%E2%80%94-T-Forward-traffic-log.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-7-%E2%80%94-SYN-for-the-HTTP-session.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-8-%E2%80%94-TLS-client-key-exchange-in-Wireshark..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-9-%E2%80%94ICMPv4-vs-ICMPv6-in-Wireshark..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-10-%E2%80%94-A-646-translation-on-an-IPv4-only-NAT46-domain..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/02/podcast-is-my-internet-down/</loc>
		<lastmod>2023-02-01T20:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/snowstorm_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/02/slammer-20-years-after/</loc>
		<lastmod>2023-02-01T22:45:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/worm-break-internet_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/02/four-policy-proposals-up-for-community-discussion-at-apnic-55/</loc>
		<lastmod>2023-02-02T06:10:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Voting_54_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/03/nsa-releases-ipv6-transition-guidance/</loc>
		<lastmod>2023-02-02T23:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/NSA_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/06/security-by-diversity-the-business-of-security-through-diversity/</loc>
		<lastmod>2023-02-05T23:05:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Security_by_diversity_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%94-Illustration-of-scaling-per-security-method-per-work-input.-Note-that-the-values-are-discrete-and-the-trendlines-are-interpreted..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/07/28/security-by-diversity-designing-secure-reliable-and-robust-systems/</loc>
		<lastmod>2023-02-05T23:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Security_Diversity_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/06/Fig1-equation1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/07/peeringdbs-product-roadmap-for-2023/</loc>
		<lastmod>2023-02-06T22:50:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/PeeringDB-FT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/08/event-wrap-mmnog-5/</loc>
		<lastmod>2023-02-07T22:51:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/mmNOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/08/event-wrap-ptc23/</loc>
		<lastmod>2023-02-08T01:40:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/PTC_23.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/08/the-root-of-the-dns-revisited/</loc>
		<lastmod>2023-02-08T05:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Root-zone_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-1-%E2%80%93-Total-root-server-queries-per-day-RSSAC002-data..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-2-%E2%80%93-Proportion-of-root-zone-NXDOMAIN-responses-per-day-RSSAC002-data.5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-3-%E2%80%94-Daily-count-of-root-zone-TLDs..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/09/ipv6-adoption-and-the-challenges-of-ipv6-only-iterative-resolvers/</loc>
		<lastmod>2023-02-08T22:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Translation_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-1-%E2%80%93-NAT64-overview..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-2-%E2%80%93-IPv6-only-iterative-resolver-failing-to-resolve-ieee.org_..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-3-%E2%80%93-The-network-topology-we-want-to-achieve-where-the-resolver-is-inside-the-IPv6-only-network..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-4-%E2%80%93-Proposed-solution-The-resolver-performing-customer-side-translation..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/10/towards-a-systematic-user-based-approach-for-studying-internet-outages/</loc>
		<lastmod>2023-02-09T20:30:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/SIFT_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Fig1-outage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/13/automation-tools-paramiko-netmiko-napalm-ansible-nornir-or/</loc>
		<lastmod>2023-02-12T23:01:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Network_Automation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/13/kyoto-confirmed-as-apnic-56-location/</loc>
		<lastmod>2023-02-13T00:19:39+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/kyoto_blog2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/14/studying-the-conformance-of-manrs-members/</loc>
		<lastmod>2023-02-13T23:15:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/MANRS_Loading-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-1-%E2%80%94-MANRS-participation-grew-between-2015-and-2022-but-the-picture-looks-quite-different-if-measured-by-the-number-of-ASes-left-vs-of-routed-address-space-right.-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/FIGURE2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-3-%E2%80%94-MANRS-ASes-that-did-not-conform-to-MANRS-Action-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-5-%E2%80%94-In-November-2022-IPv4-address-space-originated-by-MANRS-ASes-was-more-likely-to-be-registered-in-RPKI-in-all-RIR-regions-except-APNIC..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-6-%E2%80%94-In-November-2022-MANRS-ASes-were-more-likely-to-originate-RPKI-Valid-prefixes-than-non-MANRS-ASes..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/15/rovista-measuring-the-current-deployment-rate-status-of-rov/</loc>
		<lastmod>2023-02-15T00:26:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/validate_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/16/podcast-whats-happening-with-growth-in-bgp/</loc>
		<lastmod>2023-02-16T01:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Magnetic-core_memory_-_Detail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/16/apnic-ec-election-2023-value-your-vote/</loc>
		<lastmod>2023-02-16T04:21:43+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/VyV-Blog-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/17/sibyl-a-framework-for-evaluating-the-implementation-of-routing-protocols-in-fat-trees/</loc>
		<lastmod>2023-02-16T23:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Fat-Trees_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-1-%E2%80%94-A-simple-fat-tree-with-some-definitions-taken-from-the-RIFT-draft..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-2-%E2%80%94-The-topology-after-Leaf101-failure.-Each-link-is-labelled-with-the-number-of-packets-BGP-Updates-captured-after-the-event..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-3-%E2%80%94-The-computation-of-the-locality-metric-after-the-failure-of-Leaf101..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-4-%E2%80%94-The-node-state-timeline-of-the-FRR-BGP-implementation-in-case-of-the-failure-of-Leaf101.-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-5-%E2%80%94-The-node-state-graph-of-the-FRR-BGP-implementation-in-case-of-the-failure-of-Leaf101-only-101-on-the-fat-tree..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/17/event-wrap-cyberdefcon-bangladesh/</loc>
		<lastmod>2023-02-17T04:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Cyberdefcon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/21/the-benefits-of-rpki-signed-checklists/</loc>
		<lastmod>2023-02-20T23:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/RPKI-lock_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/09/apnic-academy-year-in-review/</loc>
		<lastmod>2023-02-21T00:16:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/LKNOG6-trainiing_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/22/nogs-fostering-operational-excellence-in-the-region/</loc>
		<lastmod>2023-02-21T22:53:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/NOG-BoF-at-APRICOT-2020_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/23/notes-from-dns-oarc-40/</loc>
		<lastmod>2023-02-23T22:48:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/OARC40_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/24/upcoming-foundation-activities-at-apricot-2023/</loc>
		<lastmod>2023-02-23T22:55:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Session-banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/27/welcome-to-apricot-2023/</loc>
		<lastmod>2023-02-27T01:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/APRICOT-2023-blog-1110x404px-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/28/transiting-uavs-in-aerial-mesh-networks/</loc>
		<lastmod>2023-02-28T00:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/UAV_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-1-%E2%80%94-Reference-UAV-diagram-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/01/troubleshooting-the-other-half/</loc>
		<lastmod>2023-03-01T00:35:06+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Uno-reverse_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-1-%E2%80%93-Most-paths-are-asymmetric-in-todays-Internet..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/02/podcast-measuring-user-experience-on-the-web-at-apnic/</loc>
		<lastmod>2023-03-01T20:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Steel_ruler_closeup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/01/apops-1-at-apricot-2023-apnic-55/</loc>
		<lastmod>2023-03-01T02:50:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Gautam-Akiwate-APRICOT-2023-ft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/01/panel-discusses-satellite-broadband-in-the-asia-pacific-region-at-apricot-2023/</loc>
		<lastmod>2023-03-01T09:37:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Geoff-APRCIOT-2023-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/02/not-that-simple-email-delivery-in-the-21st-century/</loc>
		<lastmod>2023-03-02T03:04:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Email_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-1-%E2%80%94-Explosion-of-email-related-standards-the-%E2%80%98SMTP-Camel-compared-to-DNS-related-standards-over-time..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/11/Figure-3-%E2%80%94-Verify-your-email-delivery-with-our-test-bed..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/02/vale-toru-takahashi-1941-2022/</loc>
		<lastmod>2023-03-02T06:05:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Toru_blog_header.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Feb270367-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Toru_Takahashi_blog.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Toru2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/03/apricot-2023-is-a-wrap/</loc>
		<lastmod>2023-03-03T00:50:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/APRICOT2023.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/06/event-wrap-cyber-safety-pasifika-workshop/</loc>
		<lastmod>2023-03-06T01:40:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/JamieCyberPasifika.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/06/sizing-router-buffers-small-is-the-new-big/</loc>
		<lastmod>2023-03-06T01:45:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/sizing-routing-buffers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-1-%E2%80%94-Three-kinds-of-packet-buffers-in-a-typical-routing-switch-ASIC..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-2-%E2%80%94-Combined-input-output-architecture.-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-3-%E2%80%94-Virtual-Output-Queue-architecture..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-4-%E2%80%94-Round-Trip-Time..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-5-%E2%80%94-Hybrid-buffering..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-6-%E2%80%94-Small-transient-congestion-events-could-be-absorbed-by-the-on-chip-buffer-alone..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/07/economic-perspective-on-internet-centrality/</loc>
		<lastmod>2023-03-07T03:50:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/central-station-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/10/11/predicting-ipv4-services-across-all-ports/</loc>
		<lastmod>2023-03-08T00:36:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/Ports_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/09/image5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/09/routing-security-sig-at-apricot-2023-apnic-55/</loc>
		<lastmod>2023-03-09T23:21:11+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/aftab-apricot2023-ft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/10/apply-now-for-an-apnic-fellowship-2023/</loc>
		<lastmod>2023-03-09T23:35:36+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/FellowsAPNIC54.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/10/apply-now-for-the-inaugural-pulse-research-fellowship/</loc>
		<lastmod>2023-03-10T00:25:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Indonesia_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/13/event-wrap-oarc-40/</loc>
		<lastmod>2023-03-13T05:40:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/08/DNS-OARC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/15/2023-state-of-network-automation-survey/</loc>
		<lastmod>2023-03-14T22:56:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Network_Automation_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/15/nog-reports-at-apricot-2023-apnic-55/</loc>
		<lastmod>2023-03-14T23:30:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/KHNOG-APRICOT2023-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/15/vale-raimundo-beca-lacnic-co-founder-network-community-leader/</loc>
		<lastmod>2023-03-15T02:31:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Raimundo-Beca-and-Vint-Cerf-at-an-ICANN-event-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Raimundo_Beca_-_Portrait-2013.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/13/kirin-a-bgp-flooding-attack-feasibility/</loc>
		<lastmod>2023-03-15T04:15:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/attack-millions-ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Figure-1-%E2%80%94-Transit-Scenario-trade-off-landscape..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/16/podcast-dnssec-the-case-for-and-against/</loc>
		<lastmod>2023-03-15T20:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/scales-balance-ft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/17/event-wrap-itcn-expo-2023/</loc>
		<lastmod>2023-03-16T22:50:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/ITCN_2023.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/20/routing-protocol-implementation-evaluation-in-fat-trees/</loc>
		<lastmod>2023-03-19T23:21:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Fat_trees_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-1-%E2%80%94-Our-sample-topology-A-three-level-fat-tree-with-a-radix-of-two..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-2-%E2%80%94-When-an-NLRI-is-withdrawn-as-part-of-the-leaf-failure-we-will-see-two-withdraws-between-each-eBGP-adjacency-resulting-in-an-aggregate-packet-count-of-six..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-3-%E2%80%94-the-node-state-timeline-for-our-sample-topology..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-4-%E2%80%94-Node-state-graph..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-5-%E2%80%94-Messaging-load-due-to-a-single-leaf-device-failure..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-6-%E2%80%94Blast-radius-comparison..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-7-%E2%80%94Amount-of-state-change-comparison..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-8-%E2%80%94-State-rounds-comparison..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/23/hiding-behind-masques/</loc>
		<lastmod>2023-03-23T02:22:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/MASQUE_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Figure-1-%E2%80%94-Oblivious-DNS-framework..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Figure-2-%E2%80%94-Oblivious-HTTPS-framework..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Figure-3-%E2%80%93-A-proxy-intermediary..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Figure-4-%E2%80%93-MASQUE-proxy-intermediary-model..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Figure-5-%E2%80%93-Apples-Private-Relay-architecture-from-Apples-Private-Relay-Overview-Documentation..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/24/rpki-roa-for-ip-resources-in-the-ix-segment/</loc>
		<lastmod>2023-03-23T22:54:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Lock-love_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Figure1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/27/event-wrap-apan-55/</loc>
		<lastmod>2023-03-27T00:16:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/APAN-55.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/22/zdns-a-fast-dns-toolkit-for-internet-measurement/</loc>
		<lastmod>2023-03-27T00:16:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/ZDNS_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/27/2023-apnic-ec-election-summary/</loc>
		<lastmod>2023-03-27T02:27:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/VyV-Blog-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/30/podcast-traceroute-but-in-the-other-direction/</loc>
		<lastmod>2023-03-29T20:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/day-and-night.jpgLarge.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/28/mitigating-ddos-using-an-anycast-playbook/</loc>
		<lastmod>2023-03-28T05:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/redistribute-traffic_FT-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/fig2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/29/the-apnic-hackathon-is-back/</loc>
		<lastmod>2023-03-30T04:23:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/hackathon-APRICOT2023-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/30/assessing-the-risk-of-new-nl-registrations-using-regcheck/</loc>
		<lastmod>2023-03-30T22:42:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/malicious-domain_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Figure-1-%E2%80%94-RegChecks-design-contains-a-registry-agnostic-core-database-and-CLI-programs.-A-registry-connector-links-RegCheck-with-a-registrys-registration-database..webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/FIGURE2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/31/everything-everywhere-all-the-time/</loc>
		<lastmod>2023-03-31T04:55:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/04/Canberra_satellite_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/03/yaml-could-do-better-please-try-again-toml/</loc>
		<lastmod>2023-04-03T00:37:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/YAML_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/07/global-ddos-for-hire-takedown/</loc>
		<lastmod>2023-04-06T22:25:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/hire_ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/10/how-organizations-can-prepare-for-post-quantum-cryptography/</loc>
		<lastmod>2023-04-09T22:23:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/post-quantum-security-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/11/event-wrap-innog-6/</loc>
		<lastmod>2023-04-11T05:49:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/INNOG-6-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/11/measuring-qmin-adoption/</loc>
		<lastmod>2023-04-11T06:15:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Measuring-qmin-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/qmin-dns-normal.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/qmin-dns-qmin.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/active.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/passive.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/12/event-wrap-nznog-2023/</loc>
		<lastmod>2023-04-11T23:10:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/NZNOG_DAVE_P_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/13/podcast-the-rise-and-potential-fall-of-leo/</loc>
		<lastmod>2023-04-12T20:30:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/echostarlink.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/08/21/chromiums-impact-on-root-dns-traffic/</loc>
		<lastmod>2023-04-12T22:35:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Chromium_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Fig1_Chromium_source-code-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Fig2_Chromium_sankey-graph.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/08/Fig3_Chromium_long-term-analysis-graph.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/13/event-wrap-taiwanicdf-and-usaid-workshop-on-national-cybersecurity-strategies/</loc>
		<lastmod>2023-04-13T06:30:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/TaiwanICDF_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/14/reflections-on-certificates-part-1/</loc>
		<lastmod>2023-04-13T22:45:27+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Certificate-reflections_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Figure-1-%E2%80%94-Extract-from-RFC-5280..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/17/observations-on-ripe-atlas-api-anti-patterns/</loc>
		<lastmod>2023-04-16T22:50:45+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Anti-patterns_graph_atlas_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Fig3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/18/15-years-to-the-end-of-the-world-as-unix-knows-it/</loc>
		<lastmod>2023-04-17T22:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/02/Time-2038-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/19/is-the-public-cloud-ready-for-ipv6/</loc>
		<lastmod>2023-04-18T23:20:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/cloud-ipv6-ft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/20/apnic-56-call-for-papers-open-now/</loc>
		<lastmod>2023-04-21T06:07:14+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/APNIC56-blog-banner-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/apnic-talk-bar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/21/the-internet-twenty-five-years-later/</loc>
		<lastmod>2023-04-23T22:13:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/layers-internet-ft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/24/around-the-world-with-perfsonar-lookup-service/</loc>
		<lastmod>2023-04-24T04:40:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Perfsonar-FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Figure-1-%E2%80%94-Overview-of-the-perfSONAR-Lookup-Service..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Figure-2-%E2%80%94-The-new-public-perfSONAR-dashboard..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Figure-3-%E2%80%94-perfSONAR-dashboards-map-showing-nodes-per-economy..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Foigure-4-%E2%80%94-Detailed-node-information..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/27/reflections-on-certificates-part-2/</loc>
		<lastmod>2023-04-26T23:23:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Certificate-reflections_FT-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Figure-1-%E2%80%94-The-certificate-lifecycle..webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/27/event-wrap-pita-working-group-meeting-on-cybersecurity-and-protection-initiatives/</loc>
		<lastmod>2023-04-27T00:15:56+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/PITA.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/27/event-wrap-arin-51/</loc>
		<lastmod>2023-04-27T00:16:51+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/ARIN-51.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/04/28/dns-response-manipulation-in-the-wild/</loc>
		<lastmod>2023-04-28T05:53:05+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/detour_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Figure-1-%E2%80%94-A-series-of-DNS-queries-issued-on-all-the-RIPE-Atlas-probes..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Figure-2-%E2%80%94-The-weekly-ratios-of-manipulation..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Figure-3-%E2%80%94-The-duration-of-manipulation-for-RIPE-Atlas-probes..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/01/podcast-network-dependency-measurement-at-iij/</loc>
		<lastmod>2023-04-30T21:36:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/global-banner.b1a143d0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/02/spatial-division-multiplexing-a-new-subsea-cable-paradigm/</loc>
		<lastmod>2023-05-02T06:24:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/subsea_ft.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Fig1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig3-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/fig6-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/05/understanding-the-global-digital-compact/</loc>
		<lastmod>2023-05-05T05:44:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/GDC_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/08/event-wrap-krnog-1/</loc>
		<lastmod>2023-05-07T23:55:23+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/krnog1.0-room.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/08/the-internet-as-a-public-utility/</loc>
		<lastmod>2023-05-08T01:50:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Old-phone-FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/11/podcast-how-much-buffer-is-enough/</loc>
		<lastmod>2023-05-10T20:30:15+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Slitting_saw_blades_OD_20_mm-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/09/dns-privacy-vs/</loc>
		<lastmod>2023-05-09T00:34:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/versus_ft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/09/event-wrap-pcta-convention-2023/</loc>
		<lastmod>2023-05-09T06:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/PCTA-IPv6-WS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/10/bgp-route-leak-prevention-and-detection-with-the-help-of-rfc-9234/</loc>
		<lastmod>2023-05-10T05:53:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/04/bgp-leak-ft.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Figure-1-%E2%80%94-An-incident-from-August-2022..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Figure-2-%E2%80%94-Example-of-route-leak-consequence..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Figure-3-%E2%80%94-Route-leak-prevention-with-communities..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Figure-4-%E2%80%94-The-OTC-attribute..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Figure-5-%E2%80%94-How-OTC-works..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Figure-7-%E2%80%94-OTC-is-double-set-double-checked..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Figure-8-%E2%80%94-Configuring-configuring-BGP-Roles..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Figure-9-%E2%80%94-Roles-are-automatically-tagged-with-the-OTC-attribute..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/01/31/australian-internet-and-astronomy-a-deep-relationship/</loc>
		<lastmod>2023-05-10T23:24:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/SKA_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/04/27/registration-is-now-open-for-apnic-40/</loc>
		<lastmod>2023-05-10T23:26:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/12/APNIC40_Blog_555px_202px_01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/05/06/apnic-40-workshops/</loc>
		<lastmod>2023-05-10T23:27:31+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/05/Training_BLOG2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/06/03/apnic-40-routing-workshop-in-bahasa/</loc>
		<lastmod>2023-05-10T23:30:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/06/DNSSEC-ID_blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/06/10/nominations-now-open-for-number-resource-organization-number-council/</loc>
		<lastmod>2023-05-10T23:32:16+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/01/NRO-logo_blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/01/12/call-for-nominations-to-the-apnic-executive-council-now-open/</loc>
		<lastmod>2023-05-10T23:34:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/08/apnic-logos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/07/08/apnic-42-relocated-dhaka/</loc>
		<lastmod>2023-05-10T23:37:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/07/apnic-42-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/07/12/apnic-42-held-colombo-sri-lanka/</loc>
		<lastmod>2023-05-10T23:38:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/07/Colombo_4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/06/20/it-asbestos/</loc>
		<lastmod>2023-05-10T23:40:42+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Danger_IoT_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/05/28/network-security-and-packet-analysis-workshop-btnog-6/</loc>
		<lastmod>2023-05-11T00:39:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/04/Tashi-banner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/09/igf-2017-highlights-need-greater-dialogue/</loc>
		<lastmod>2023-05-11T00:46:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/01/igf_2017.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/10/23/event-wrap-btnog-7/</loc>
		<lastmod>2023-05-11T01:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/10/btNOG-7.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/06/28/event-wrap-bhutannog-4/</loc>
		<lastmod>2023-05-11T01:04:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/06/Tashi_btNOG4_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/11/24/event-wrap-apnic-member-gathering-in-myanmar-2014/</loc>
		<lastmod>2023-05-11T01:06:03+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/11/Anna_Telnor_Redlink_yammer_BLOG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/03/06/mentoring-inclusive-work-environments-nurture-next-tech-leaders/</loc>
		<lastmod>2023-05-11T01:09:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/03/TechGirls_banner-2.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/03/26906171175_8cf04a5937_b.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/03/26872827246_500d111f52_b.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/03/26300964874_9e7f1ca115_b.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/03/26872816566_fbda90fb3a_b.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/03/33486822493_6780b873de_o-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/01/27/apnic-training-2019-in-review/</loc>
		<lastmod>2023-05-11T01:26:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/08/Training-selfie.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/03/27/my-experience-as-an-apnic-community-trainer/</loc>
		<lastmod>2023-05-11T01:27:19+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/Community-Trainer_Moinur.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/Community-Trainer_Moinur-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/Community-Trainer_pack_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/03/Community-Trainer_Moinur-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/02/21/preaching-the-benefits-of-human-networks/</loc>
		<lastmod>2023-05-11T01:27:57+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/07/moin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2022/01/12/apnic-academy-2021-in-review/</loc>
		<lastmod>2023-05-11T01:28:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/01/training-21-ft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/07/14/register-mpls-workshop-malaysia/</loc>
		<lastmod>2023-05-11T01:31:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/05/26441099442_7b26a46ac5_k.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/11/09/register-network-security-workshop-samoa/</loc>
		<lastmod>2023-05-11T01:32:40+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/11/Samoa-Training.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/05/register-apnic-workshops-lao-pdr/</loc>
		<lastmod>2023-05-11T01:33:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/13956675659_5ed5a60ad6_k.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/19/ipv4-ipv6-bgp-routing-workshop-indonesia-register-now/</loc>
		<lastmod>2023-05-11T01:34:22+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/09/20840217604_ed0440157a_b.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/05/register-apnic-ixp-workshop-vanuatu/</loc>
		<lastmod>2023-05-11T01:36:20+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/05/DSC027491.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/23/register-sdn-workshop-hong-kong/</loc>
		<lastmod>2023-05-11T01:36:58+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/02/Hong-Kong-workshop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/01/19/sdn-workshop-held-malaysia-april/</loc>
		<lastmod>2023-05-11T01:37:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/07/14840045037_e919cf73b1_z.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/01/15/new-cybersecurity-elearning-for-2019/</loc>
		<lastmod>2023-05-11T01:49:21+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/01/eLEarning_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/01/17/apnic-training-2016-review/</loc>
		<lastmod>2023-05-11T01:50:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/APNICtraining2016_heading.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/01/Training-2016-infographic_01-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/01/11/training-a-whole-nations-it-workforce/</loc>
		<lastmod>2023-05-11T01:53:24+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/01/23290792126_a661ab235a_k.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/07/24/event-wrap-pacnog-24/</loc>
		<lastmod>2023-05-11T01:54:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/PacNOG24.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/01/20/apnic-training-2015-in-review/</loc>
		<lastmod>2023-05-11T01:56:09+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/01/APNICtraining2015_heading01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/01/Training-2015-infographic_04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/08/10/how-to-calculating-ipv6-subnets-outside-the-nibble-boundary/</loc>
		<lastmod>2023-05-11T01:56:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/IPv6-subnetting_banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/03/29/podcast-whats-happening-security/</loc>
		<lastmod>2023-05-11T01:59:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/03/ASEAN-cybersecurity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2017/06/05/yet-surveying-ipv6-deployment-australia-china/</loc>
		<lastmod>2023-05-11T02:17:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/scale_IPV6_banner-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2017/05/bbr-fig2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/11/20/event-wrap-igf-2015/</loc>
		<lastmod>2023-05-11T02:18:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/11/logo-igf2015_BLOG.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/11/IGF2015_PW-300x163.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/11/IGF2015_ArIGFMeeting_BLOG-300x105.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2014/10/10/funding-available-for-internet-projects-in-the-asia-pacific/</loc>
		<lastmod>2023-05-11T02:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/slide_apply.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/09/09/isif-asia-internet-operations-research-grants/</loc>
		<lastmod>2023-05-11T02:21:34+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/07/14840045037_e919cf73b1_z.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/03/06/isif-asia-grant-recipients-for-2015-announced/</loc>
		<lastmod>2023-05-11T02:22:28+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/03/R2_ENRD_NP_05.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/03/31/surveying-state-ipv6-deployment-australia-china/</loc>
		<lastmod>2023-05-11T02:23:12+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/03/Tape-measure-IPv6-banner-white.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/09/geoff-huston.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/06/01/applications-extended-apnic-internet-operations-research-grant/</loc>
		<lastmod>2023-05-11T02:24:01+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/02/isif_asia_grants.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/08/05/event-wrap-ais19-afrinic-30/</loc>
		<lastmod>2023-05-11T02:34:52+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/07/policy-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/11/assessing-performance-and-qos-of-a-distributed-peering-platform/</loc>
		<lastmod>2023-05-11T03:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/QoS_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/fig1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Fig2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Fig3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/fig4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/05/Fig5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/04/12/event-wrap-apan-45/</loc>
		<lastmod>2023-05-11T06:02:35+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/04/APAN45-TRANSITS-Group-Photo_blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/08/21/event-wrap-apan-46/</loc>
		<lastmod>2023-05-11T06:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/07/apan18-logotype.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/MVIMG_20180806_110117cropped.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/08/apan46_dnssec2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/01/22/whac-a-mole-six-years-of-dns-spoofing/</loc>
		<lastmod>2023-05-11T06:14:26+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Whacamole-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Figure-1-spoofing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/01/Figure-2-spoofing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2018/11/29/new-mrt-bgp-reader-six-times-faster-than-its-predecessors/</loc>
		<lastmod>2023-05-11T06:28:02+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/11/BGP-Scan_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/11/BGP-Scanner_img1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/11/BGP-Scanner_img2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2018/11/BGP-Scanner_img3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/03/24/ietf92-bgpdump2-presented-at-iepg-by-yasuhiro-ohara/</loc>
		<lastmod>2023-05-11T06:28:25+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/03/ietf_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/01/27/event-wrap-sanog-25/</loc>
		<lastmod>2023-05-11T06:32:49+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/01/PFS3920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2015/02/12/how-to-become-a-clued-in-engineer/</loc>
		<lastmod>2023-05-11T06:35:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2014/10/10428182_343454759135239_3350404536634247801_o.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2015/02/Region-Map-with-NOGs-03-01-300x170.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/08/06/more-notes-from-ietf-111/</loc>
		<lastmod>2023-05-11T06:44:38+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/08/IETF111-2-ftjpg.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/02/06/apnic-products-2022-in-review/</loc>
		<lastmod>2023-05-11T06:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Products_Services_APNIC54_FT.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/voting.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/01/Figure-2-%E2%80%94-Additional-features-to-report-invalid-APNIC-Whois-data-have-been-added-to-the-submission-form..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2022/10/Fig3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2019/06/12/register-now-for-network-monitoring-and-packet-analysis-workshop-in-brisbane/</loc>
		<lastmod>2023-05-11T06:51:37+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2019/06/Australia_training.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2020/12/23/event-wrap-bsides-brisbane/</loc>
		<lastmod>2023-05-11T06:52:32+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2020/12/Tashi_BSides.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/02/09/how-to-run-krill-behind-an-nginx-reverse-proxy/</loc>
		<lastmod>2023-05-11T06:54:33+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Krill-NGINX-banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/krill-ui-enter-password-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/02/Screenshot-2020-12-28-at-17.13.09.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/05/15/good-day-sunshine/</loc>
		<lastmod>2023-05-14T23:34:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/04/Sunrise_Bangkok_FT.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/04/06/introducing-dns-shotgun/</loc>
		<lastmod>2023-05-15T03:08:59+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/DNS-shotgun-FT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-1-%E2%80%94-TCP-connections..png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/Figure-2-%E2%80%94-TCP-handshakes..png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/10/22/intel-owl-v3-0-0-speeds-up-threat-intelligence-retrieval/</loc>
		<lastmod>2023-05-15T03:23:50+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_banner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_3.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_6-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_8.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_9.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/10/IntelOwl_10.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/09/29/affordable-internet-for-the-community-by-the-community/</loc>
		<lastmod>2023-05-15T03:26:18+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Janata-ft-copy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Figure-1-%E2%80%94-Bangladesh-has-the-most-expensive-spectrum-in-the-world-according-to-GSMA-Intelligence..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Figure-1-%E2%80%94-The-Janata-Wi-Fi-operating-model..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/IMG_1930.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Figure-2-%E2%80%94-The-Janata-Wi-Fi-network..jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/09/Figure-3-%E2%80%94-Bangladeshs-mobile-and-fixed-broadband-Internet-speeds-in-August-2021.-Source..jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/12/14/event-wrap-afrinic-25-mauritius/</loc>
		<lastmod>2023-05-15T03:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/12/AFRINIC-25-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2016/07/18/event-wrap-icann-56/</loc>
		<lastmod>2023-05-15T03:40:44+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2016/07/ICANN_56_GH.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2021/03/03/event-wrap-nanog-81/</loc>
		<lastmod>2023-05-15T03:48:48+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2021/03/NANOG-81-GGM.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://blog.apnic.net/2023/03/17/making-a-difference-for-women-in-the-australian-internet-industry/</loc>
		<lastmod>2023-05-15T03:58:30+00:00</lastmod>
		<image:image>
			<image:loc>https://blog.apnic.net/wp-content/uploads/2023/03/Narelle_Clarke_FT.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->