Contact us
  • AS Relation Model

    Our portal represents various analytical data regarding the relation types between autonomous systems (AS). For each AS we openly display its current links as well as the dynamics of their changes. This information is updated daily.

  • Radar Monitor

    Our monitoring system allows detection of a wide range of network anomalies which may have a significant impact on the end-point network resource availability. Currently we provide the information about detected static and dynamic routing cycles, Route Leaks, DDoS amplifiers and bots. The details on the detected incidents are available for technical representatives of the given AS.

  • Reverse LG

    Reverse LG is an exclusive network tool for determining the route which will be used by any other AS in order to reach your AS depending on the given routing policy. This tool is implemented using the modeling of inter-AS relations and priorities on all levels of BGP decision-making.

  • AS Rating

    In order to simplify the process of comparing different AS our portal provides a set of ratings which let the user perform comparisons by various parameters. For user convenience we have added the search function which makes evaluation of a certain AS in the list a lot easier.

Blog

March 20th, 2019

Russian Internet Segment Architecture

As many of our readers know, Qrator.Radar is constantly researching global BGP connectivity, as well as regional. Since the Internet stands for “Interconnected Networks,” to ensure the best possible quality and speed the interconnectivity of individual networks should be rich and diverse, with their growth motivated on a sound competitive basis.

READ MORE →
March 4th, 2019

Eliminating opportunities for traffic hijacking

This week it has been 11 years since the memorable YouTube BGP incident, provoked by the global propagation of a more specific prefix announce, originated by the Pakistan Telecom, leading to an almost 2 hour in duration traffic disruption in the form of redirecting traffic from legitimate path to the bogus one. We could guess if that event was intentional, and even a correct answer wouldn’t help us completely prevent such incidents from happening today. While you read this, a route leak or a hijack is spreading over the networks. Why? Because BGP is not easy, and configuring a correct and secure setup is even harder (yet).

READ MORE →
LOGIN
×
Contact us
×
Type:
Email:
Subject:
Message:

Thank you for feedback!

We will contact you by provided email address.