Contact us
  • October 24, 2016

    Global Looking Glass aka Realtime Graph

    Our team is pleased to announce the launch of the completely new BGP graph. Compared to the previous version, it has a number of significant improvements and new features. First and most important, the new graph shows BGP announces at the current moment, and all changes are now updated in real time. We worked much on design and readability in order to present even complicated situations as simple as possible. You can now explicitly specify the list of autonomous systems for which you are interested in chosen BGP paths. So now you can use Radar graph as global looking glass. Please check all the new features by choosing "Graph" item in the left-side menu.

    You could also improve the quality of our data by establishing BGP multihop session with our reflector.

  • February 08, 2016

    Major Update of Security Detectors

    Our team is pleased to announce the launch of the new engine for detecting route loops. The results have proved to be very interesting. Every day we detect several thousands of BGP dynamic loops and millions of static loops. Many of them affect links between ASes and can be used for amplification in DDoS attacks.

    We also updated our MOAS conflict detector: now it shows not only conflicts for equal prefixes but also for more and less specific prefixes.

    Next, we added several new types of monitored DDoS amplifiers. Now we are detecting amplification vulnerabilities in 10 various protocols: ICMP, DNS, NTP, SNMP, SSDP, CHARGEN, QOTD, NETBIOS, RIPv1, and PORTMAP.

    Finally, we added support for IPv6 routes in our BGP reflector. If you have IPv6 routes, you can send them to us via the existing IPv4 session. It will help Radar to improve the detection of your IPv6 peerings and connectivity, and will be required for some IPv6 tools added in future releases.

  • November 17, 2015

    A Simple BGP

    A Simple BGP is initiative of Radar by Qrator team which aims to simplify the process of BGP configuration and avoid route leaks by adding built-in protection against route leaks in BGP.

    Route leak is a network anomaly, when route learned from provider or peer is announced to another provider or peer. The effect of such issues could vary from increased network delays for victim (originator of prefix) to DoS for both victim and leaker. According to our research main reason of these routing issues are mistakes in BGP configuration. You could find more details about proposed BGP extension on our website. We have already implemented this extension as a fork of BIRD routing daemon. You could download it from GitHub under GNU public license. This implementation has full backward compatibility with "classic" BGP, so you are welcome to use it now and be sure that you will have no route leaks inside your network.

    We have also finished big inner work with our AS relation model and architecture reconfiguration. The result of these changes should make data accurate and we now are quite near to start providing real time service. The weekly reports will be back at next Monday.

    We are waiting for your comments, feedbacks and suggestions! You could also catch us in person during this week at RIPE meeting.

  • June 10, 2015

    IPv6, MOAS conflicts and lots of other things

    Qrator Radar team is pleased to announce the launch of a number of new mechanisms.

    First of all we finally added support for IPv6. Now we've got three major blocks: IPv4 connectivity, IPv6 connectivity and Security Issues combining the data for both IPv4 and IPv6.

    The next thing to notice is that the detection of Multiple Origin AS (MOAS) was added. The same as in case of Route Leaks, we are not trying to determine the reason for such network anomaly -- it's just the detection of its presence.

    We also implemented DNS resolve for domain names, which means that now you only need to enter the domain name in the search field. Security Issues for domain names are coming soon.

    And the last feature in this release: reports. You now have an opportunity to subscribe for aggregated weekly or monthly reviews of your AS. These reports cover both connectivity and security issues. The default subscription comes on a weekly basis, you can manage subscription period using the link.

  • May 5, 2015

    New Design with new Functionality

    Our team is pleased to announce the launch of a fully new version of our portal. We’ve been working hard to improve UI interfaces and the quality of the data in our AS Relation model. In this release we also launch an open beta of our new tool – Global Reverse Looking Glass. With its help you can now determine the path(s) to your prefix which the target AS will choose according to the determined prepend policy. To access this tool you only need to establish a BGP multihop session with our reflector.

  • February 3, 2015

    Detecting hidden relationships

    The Radar by Qrator team is glad to announce the launch of the new model of inter-AS relations and priority determination which is expected to significantly improve the quality of our data. This new model gave us a number of additional opportunities. For example, we are now able to correctly distinguish paid and free peering relationships. On the base of the updated model we are going to add new functionality on our portal in the near future. The first one from this set of tools will be the global Reverse Looking Glass.

  • May 23, 2014

    Route Leak Monitor

    Qrator Radar team is pleased to announce launch of our Route Leak Monitor. Routing leaks could occur due to accidental mistakes or with help of comprised routers. But in all cases these routing incidents are undetectable from origin AS and often unnoticed by «leaker» AS. The typical result of route leaks is increase of delays or traffic loss due to bandwidth exhaustion. We provide detailed information about route leaks for both parties: for «leakers» and «victims» AS.

  • April 22, 2014

    Improvements in DDoS amplifiers monitoring module

    Qrator Radar team is pleased to announce several significant improvements in our DDoS amplifiers monitoring module.
    We have extended the number of supported protocols commonly used for amplification attacks, and we are planning to add the support of other important protocols in the near future. In addition to DNS and ICMP, we are now detecting vulnerable NTP and SNMP servers. Furthermore, we are now monitoring DDoS amplifiers on the entire IPv4 address space, so we are able to detect almost all amplifiers of the specified types in the particular Autonomous System.

  • November 28, 2013

    New Features with New Design

    Qrator Radar team is pleased to announce the launch of updated user interface. We’ve tried to improve the usability by adding infographics for AS Relations and Security Data. We also added several features such as full text search for all kinds of data, customer core rating, botnet activity in AS and aggregated security monitor for faster analysis. You can check out FAQ: AS RELATIONS and FAQ: RADAR MONITOR for detailed information.

  • September 2, 2013

    New time machine functionality: detailed history for AS Relations

    Qrator Radar team is pleased to announce launch of new detailed history feature. Today it covers changes in "customer to provider" and "peer to peer" relations for each Autonomous System. You can visit FAQ: AS RELATIONS page for more details.

Contact us

Thank you for feedback!

We will contact you by provided email address.