Contact us
  • AS Relation Model

    Our portal represents various analytical data regarding the relation types between autonomous systems (AS). For each AS we openly display its current links as well as the dynamics of their changes. This information is updated daily.

  • Radar Monitor

    Our monitoring system allows detection of a wide range of network anomalies which may have a significant impact on the end-point network resource availability. Currently we provide the information about detected static and dynamic routing cycles, Route Leaks, DDoS amplifiers and bots. The details on the detected incidents are available for technical representatives of the given AS.

  • AS Rating

    In order to simplify the process of comparing different AS our portal provides a set of ratings which let the user perform comparisons by various parameters. For user convenience we have added the search function which makes evaluation of a certain AS in the list a lot easier.


February 7th, 2020

Route leak by the big Russian carrier AS8359 (MTS)

February 7, 2020 - one of the biggest carriers and ISPs in Russia - MTS - AS8359, created two route leaks involving prefixes belonging to such companies as Imperva, GCore, IPTP, Akamai and many others. MTS took those prefixes from HKIX (AS4635) and sent them to Level3 (AS3356) for further distribution. READ MORE →
June 25th, 2019

How difficult is it to disrupt a service nowadays?

Today we often talk about SLA and redundancy. And the increasing role of clouds in the overall Internet infrastructure. Someone says that they will play a crucial role in traffic share in the nearest future. However, there are other huge ISPs - Tier-1, aka the biggest transit operators, which have transnational cables and indeed are part of the historical Internet backbone. They often play the role of last resort in the filtration process of bad routes. Because they have hundreds of customers. Also, almost all of these customers believe in what they got from the provider ISPs. That is the main reason why modern internet drafts rely on Tier-1s as flag carriers and hope that they’ll apply a new security mechanism among all the others.
Is this always a real scenario? READ MORE →
Contact us

Thank you for feedback!

We will contact you by provided email address.