Contact us
  • AS Relation Model

    Our portal represents various analytical data regarding the relation types between autonomous systems (AS). For each AS we openly display its current links as well as the dynamics of their changes. This information is updated daily.

  • Radar Monitor

    Our monitoring system allows detection of a wide range of network anomalies which may have a significant impact on the end-point network resource availability. Currently we provide the information about detected static and dynamic routing cycles, Route Leaks, DDoS amplifiers and bots. The details on the detected incidents are available for technical representatives of the given AS.

  • Reverse LG

    Reverse LG is an exclusive network tool for determining the route which will be used by any other AS in order to reach your AS depending on the given routing policy. This tool is implemented using the modeling of inter-AS relations and priorities on all levels of BGP decision-making.

  • AS Rating

    In order to simplify the process of comparing different AS our portal provides a set of ratings which let the user perform comparisons by various parameters. For user convenience we have added the search function which makes evaluation of a certain AS in the list a lot easier.

Blog

July 11, 2017

Reliability of National Internet Segments

The connectivity of Internet at the network layer is a result of interaction between autonomous systems (AS), and it is more stable the more alternatives routes between ASNs there exist, which is basic fault tolerance principle. This research shows how outage of single, though significant AS affects the global connectivity of the region.

READ MORE →
May 10, 2017

BGP Open Ports

Qrator Radar team is pleased to announce a new feature of our network scanner: we begin to detect hosts with vulnerable ports in your network. At this moment we are detecting open TCP ports of BGP network protocol. This protocol is often used by network devices (especially border routers), and generally access to these devices should be restricted using ACL. If such port is open for everyone, it is a serious vulnerability which can be used by attacker to cause denial of service of the network device, which can in turn cause outage of whole networks.

LOGIN
×
Contact us
×
Type:
Email:
Subject:
Message:

Thank you for feedback!

We will contact you by provided email address.