The IPv8 proposal brings together routing, identity, and network management into a single design, but does it leave too many operational questions unanswered?

Read article
17 Please read the article before liking.
0

Latest articles

peeringdb

PeeringDB Update October 2025 - April 2026

Author image
Leo Vegoda

4 min read

PeeringDB is a widely used resource for interconnection data, and in these regular updates, we help users keep track of how the platform evolves. This report summarises significant PeeringDB changes over the last six months.

Article tags:

2 Please read the article before liking.
0
Making Resource Holders Easier to Identify: Introducing reg-nr: in the RIPE Database

Making Resource Holders Easier to Identify: Introducing reg-nr: in the RIPE Database

Author image
Marco Schmidt

5 min read

Proposed at RIPE 91 in the Address Policy Working Group and then further discussed in the Database Working Group, the reg-nr: attribute (NWI-21) has already been implemented ahead of RIPE 92, showing how quickly community input can lead to practical results. It adds official company registration nu…

Article tags:

40 Please read the article before liking.
0
IHR BGP Monitor

From BGP Data to Insight: Simplifying Real-Time Routing Analysis

Author image
Romain Fontugne

5 min read

The IHR BGP monitoring tool is a simple web-based application that leverages the RIS Live and BGPlay APIs to monitor your prefixes and their RPKI status.

Article tags:

34 Please read the article before liking.
0
Submarine Cable Map

The Internet’s New Builders

Author image
Arman Obosyan

11 min read

Content and cloud platforms are no longer just the largest customers of global connectivity. They are increasingly financing and building the infrastructure itself, from submarine systems to edge and data center footprints.

Article tags:

28 Please read the article before liking.
0
ADoX Deployment in the Wild cover

ADoX Deployment in the Wild

Author image
Yevheniya Nosyk

11 min read

Encryption between DNS resolvers and users is growing - but what about the next hop? We measure the real-world deployment of encrypted resolver-to-authoritative DNS (ADoX), finding limited, highly concentrated adoption and little support among resolvers.

Article tags:

27 Please read the article before liking.
0
scrubbing cover

Understanding DDoS Scrubbing in BGP: Five Leading Scrubbers

Author image
Shyam Krishna Khadka

9 min read

DDoS mitigation often relies on BGP for "scrubbing", but how this appears in routing data is not well understood. We analyse five major providers to distinguish between always-on and on-demand protection, showing how mitigation manifests in practice and what it means for routing visibility and RPKI.

Article tags:

23 Please read the article before liking.
0
quic_cover

Using QUIC Backscatter to Infer Hypergiant Deployment Configurations

Author image
Jonas Mücke

10 min read

QUIC enhances privacy, but passive measurements still reveal deployment details. Using network telescope data, we analyse QUIC behaviour across major content providers and validate our findings with flow data and active measurements.

Article tags:

35 Please read the article before liking.
0
View all articles

Latest Podcasts

From the Archives

  • irr cover

    The IRR Landscape: Where Do ASes Keep Their Routes?

    Author image
    Stavros Konstantaras

    18 min read

    We map where networks actually publish routing data - across RIR-run and third-party IRRs - and how that data is used in practice. Connecting our findings with RPKI growth and exploring regional patterns, we examine legacy space and operational risks to suggest clear clean-up priorities.

    Article tags:

    133 Please read the article before liking.
    0
  • insidethebox

    Keeping Network Sites Online During Blackouts

    Author image
    Yuriy Vykhnevych

    8 min read

    When blackouts become a frequent reality, keeping network sites online requires more than ad-hoc fixes. This article outlines a power management system, tested in practice, with design notes and an operator playbook.

    Article tags:

    447 Please read the article before liking.
    0