BGP.Tools

217 posts

BGP.Tools banner
BGP.Tools

BGP.Tools

@bgptools

It's like a real-time global BGP looking glass that doesn't hate you! You can also pay us to tell you when stuff changes! Tweets by: @[email protected]

Default Free Zone Katılım Kasım 2018
1 Takip Edilen3.8K Takipçiler
BGP.Tools
BGP.Tools@bgptools·
The bgp.tools August 2024 changelog is out! bgp.tools/kb/aug-2024-ch… , This month changes include: * BGP Flapping / Churn detection * Prefix counts on AS-SET pages * NAT64 addresses are now automatically translated in the search bar to their IPv4 counterparts
BGP.Tools tweet mediaBGP.Tools tweet media
English
5
10
56
3.6K
BGP.Tools
BGP.Tools@bgptools·
@it_neber_ekered There are known cable breaks impacting a lot of Kenyan ISPs right now, but "weird" is subjective :)
English
1
0
1
119
CN
CN@it_neber_ekered·
@bgptools are you seeing anything weird with bgp.tools/as/15399? I'm not too familiar with troubleshooting BGP yet to find anything but something is up. Thanks!
English
1
0
0
78
BGP.Tools
BGP.Tools@bgptools·
@DougMadory Yeah ROV won't prevent this. But it gave a route for ROV invalids to go via Airtel/TI and hit their destinations, If you did this enough, and the other carriers accepted all 8 /3's, then ROV would basically be moot. That would be a exceptionally stupid situation though!
English
1
0
3
449
Doug Madory (also on Bluesky)
Surprised by the comments along the lines of, why didn't RPKI ROV stop this? First of all, there is no ROA for this address range so ROV can't do much here. rpki-validator.ripe.net/ui/96.0.0.0%2F… Also, this is a less-specific route, so, in theory, it shouldn't affect much Internet traffic.
BGP.Tools@bgptools

Looks like AS9498 (Bharti Airtel) typod a /32, /31 or /30. And turned it into a /3 (aka, 12.5% of the IPv4 internet) and other carriers (At least TI & GTT) accepted it!

English
3
5
26
3.1K
BGP.Tools
BGP.Tools@bgptools·
Airtel fixed the bogus announcement at 04:40 UTC today. Looking back at the bgp.tools data, Orange/GTT/NTT/Cogent also accepted the /3 via Sparkle (TI), from Airtel. GTT's acceptance was down to a (now fixed) JunOS config gotcha x.com/packetsource/s…
Adam Chappell@packetsource

@bgptools Thanks BGP Ben for the alert! It turns out that prefix-length checking does contain some hidden man-traps

English
0
5
27
5K
BGP.Tools
BGP.Tools@bgptools·
This halfed the number of RPKI ROV Validating ASNs according to bgp.tools (via RIPE Atlas) because those networks accepted the /3 and one of the probe IPs is inside 96.0.0.0/3
BGP.Tools tweet media
English
2
1
30
6.2K
BGP.Tools
BGP.Tools@bgptools·
Looks like AS9498 (Bharti Airtel) typod a /32, /31 or /30. And turned it into a /3 (aka, 12.5% of the IPv4 internet) and other carriers (At least TI & GTT) accepted it!
BGP.Tools tweet media
English
15
83
330
80.5K
BGP.Tools
BGP.Tools@bgptools·
@acontios_net More than just TI and GTT, TI accepted it, and NTT/Cogent/Orange/GTT accepted it from TI.
English
1
0
8
401
BGP.Tools
BGP.Tools@bgptools·
This seems to come off the back of Cogent trying to establish a market in APAC, and the main players in that region not wanting to have their market eaten away by Cogent (To be fair, Cogent is very good at getting prices down, and APAC is still quite expensive per mbps)
English
1
1
14
2.5K
BGP.Tools
BGP.Tools@bgptools·
Due to this Networks that are single homed behind AS6453 (in APAC) or AS174 will not be able to reach each other. This is similar but more serious to the previous regional NTT-Cogent depeerings (since the NTT ones "just" increased latency by routing via the US instead)
English
2
0
8
2.3K
BGP.Tools
BGP.Tools@bgptools·
(The previous TATA-Cogent Full depeering post was wrong) It appears that TATA-Cogent have partially depeered in APAC. Cogent can't see APAC (notably India) routes anymore. It seems based on statements Cogent has initiated this depeering (Some EU/US routes seem to still be find)
BGP.Tools tweet media
English
1
25
60
29K
BGP.Tools
BGP.Tools@bgptools·
3. Small fixes/changes Like every month, there are a number of smaller improvements and fixes that are not blockbuster features, here are this months smaller fixes and changes! Find the full changelog here: bgp.tools/kb/may-2024-ch… ! 🧵3/3
BGP.Tools tweet media
English
0
1
9
1.5K
BGP.Tools
BGP.Tools@bgptools·
2. Automatic Hijack Detection List generation Paying customers who have hijack detection enabled can now have their hijack lists automatically updated by the website itself, so new prefixes don't slip through the cracks! 🧵2/3
BGP.Tools tweet media
English
1
1
8
1.4K
BGP.Tools
BGP.Tools@bgptools·
The bgp.tools May 2024 changelog is out! bgp.tools/kb/may-2024-ch… Major changes include: 1. Route Servers on propagation graphs, and more New display options for propagation graphs, including IXP visibility 🧵1/3
BGP.Tools tweet media
English
2
31
90
10.1K
Saeid
Saeid@MrSaeid007·
@bgptools Hi @Benjojo12 If you can specific that in what IX the prefix 1.1.1.0/24 advertised to Route-Servers it will be great. because I don't think 1.1.1.0/24 Accessible via route servers IXP.
Saeid tweet media
English
2
0
0
153
BGP.Tools
BGP.Tools@bgptools·
You can now change display options for the propagation graphs! You can now: * Turn on the display of IX Route Servers, * Quickly hide your own sessions, * Switch between straight lines and bendy ones.
English
3
15
74
5.5K
BGP.Tools
BGP.Tools@bgptools·
3. Super Looking Glass Improvements You can now invert the ASN filter on the super looking glass, in addition the site now displays the number of paths that were not shown due to the sessions being flagged as not for public export 🧵3/4
BGP.Tools tweet media
English
1
0
6
889
BGP.Tools
BGP.Tools@bgptools·
The bgp.tools April 2024 changelog is out! Major changes include: 1. Forward DNS History See what IPs _used_ to point into a IP block, or find out when a Domain started being served from a IP block. 🧵1/4
BGP.Tools tweet media
English
1
12
49
3.9K