Contact us
  • AS Relation Model

    Our portal represents various analytical data regarding the relation types between autonomous systems (AS). For each AS we openly display its current links as well as the dynamics of their changes. This information is updated daily.

  • Radar Monitor

    Our monitoring system allows detection of a wide range of network anomalies which may have a significant impact on the end-point network resource availability. Currently we provide the information about detected static and dynamic routing cycles, Route Leaks, DDoS amplifiers and bots. The details on the detected incidents are available for technical representatives of the given AS.

  • Reverse LG

    Reverse LG is an exclusive network tool for determining the route which will be used by any other AS in order to reach your AS depending on the given routing policy. This tool is implemented using the modeling of inter-AS relations and priorities on all levels of BGP decision-making.

  • AS Rating

    In order to simplify the process of comparing different AS our portal provides a set of ratings which let the user perform comparisons by various parameters. For user convenience we have added the search function which makes evaluation of a certain AS in the list a lot easier.


November 17th, 2017


On November 7, 2017, a bunch of blogs wrote about a route leak created by Level3 that affected a significant amount of users. Route leaks happen all the time, and we persistently monitor them all around the world. Except for the mentioned one, which was not detected by our system. So, for Qrator.Radar team it was vital to get into details of this particular incident and understand why our detectors missed this one. We decided to look into it, but this incident analysis took us some time. However, here's the result.

November 2nd, 2017

Full Path Incidents & Bogons

Qrator Labs Radar team is proud to announce the significant change in detection of routing incidents. Previously we were able to give information only about ‘abnormal’ subpath, due to limits of our previous model representation. We put a lot of effort to design and deploy our new model that is capable of processing hundreds of full view BGP sessions in real time which includes compressing data, analyzing compressed representation and full AS_PATH reconstruction for detected incidents. This change substantially increased our opportunities to detect accepted route leaks. Also, with this new functionality, we decided to add in our security section information about bogon routes.

Contact us

Thank you for feedback!

We will contact you by provided email address.