All the new things — RouteViews in 2025
Guest Post: New collectors and tools, improved data access, and ongoing behind-the-scenes work to make the platform more stable, sustainable, and useful.
Guest Post: New collectors and tools, improved data access, and ongoing behind-the-scenes work to make the platform more stable, sustainable, and useful.
Guest Post: In modern network architecture, we often assume that perimeter defences are robust enough to keep internal traffic secure. However, vulnerabilities inherent in the trust mechanisms of fundamental network protocols reveal that unencrypted tunnels can become fatal backdoors in enterprise intranets.
Guest Post: How does the scope of failure awareness affect routing performance and resilience in Low Earth Orbit satellite constellations?
Guest Post: APNIC 2025 Fellow Rabby prepares future Fellows to make the most of their Fellowship experience by sharing what he learned during his time as an APNIC Fellow.
Guest Post: After twelve days, and 63,247 attacks later, we are confident recommending some steps you can take to protect your own network.
Measurement is always a popular topic on the APNIC Blog. This year, authors measured everything from Distributed Denial of Service (DDoS) prevention to Internet Service Provider (ISP) market share. Here are three of the best.
Special thanks to all the experts in our community who generously shared their knowledge on the APNIC Blog in 2025.
Guest Post: Domain renewal rates directly correlate with usage. Domain Connect creates a standardized way for service providers and DNS providers to communicate. Users complete setup in seconds with just a few clicks.
Guest Post: Has IPv4 allocation improved in the 21st century, or are prefixes becoming smaller and more fragmented? What are the potential impacts on Internet security?
Guest Post: An investigation into LightNode’s curious use of precomputed SSH host keys — a small operational quirk with security implications.