Re: broken DNS proxying at public wireless hotspots
On Sat, 3 Feb 2007, Suresh Ramasubramanian wrote: > What do nanogers usually do when caught in a situation like this? Important question: if memory serves, and you are in the "Paris Charles de Gaulle International Airport", wireless costs money. This is after paying, right? I had this problem in a more annoying location. On a connexxion wireless on a flight to NYC. What I do if there are no alternatives is very simply... kick back and listen to some music (unless you have some cellular 3G connectivity). Gadi.
Re: broken DNS proxying at public wireless hotspots
On Sat, Feb 03, 2007 at 01:00:29AM -0600, Stephen Sprunk wrote: > Thus spake "Trent Lloyd" <[EMAIL PROTECTED]> > >One thing I have noticed to be unfortunately more common that I would > >like is routers that misunderstand IPv6 requests and return an > >A record of 0.0.0.1 > > > >So if you are using (for the most part) anything other than windows, > >or > >Windows Vista, this may be related to what you are seeing. > > The same is true if you've enabled IPv6 on XP. Unfortunately, it's hard > to find a hotel network these days that _doesn't_ break when presented > with queries. > > I'm hoping that the flood of support calls from Vista users will > pressure them to get their systems fixed, but I'm not holding my breath. > They'll probably just make "disable IPv6" part of their standard > troubleshooting routine, just like telling you to reboot your PC. After > all, nobody uses it, right? Unfortunately this is something I'm afraid of, currently there is a long running bug[1] in the Ubuntu bug tracker on why they should disable IPv6 by default, which makes me sad, but I can understand why they would think that because to them it provides no advantage (yet), yet when disabled, it works for them. I have considered if some kind of "workaround" to the resolver which would ignore returns of 0.0.0.1 (possibly if there are other addresses, or only if is requested, etc) Is anyone aware of other "weird" things some routers return? Personally I have only seen 0.0.0.1 coming back. Cheers, Trent [1] https://launchpad.net/ubuntu/+source/netcfg/+bug/24828 > > S > > Stephen Sprunk "God does not play dice." --Albert Einstein > CCIE #3723 "God is an inveterate gambler, and He throws the > K5SSSdice at every possible opportunity." --Stephen Hawking >
Re: broken DNS proxying at public wireless hotspots
Thus spake "Trent Lloyd" <[EMAIL PROTECTED]> One thing I have noticed to be unfortunately more common that I would like is routers that misunderstand IPv6 requests and return an A record of 0.0.0.1 So if you are using (for the most part) anything other than windows, or Windows Vista, this may be related to what you are seeing. The same is true if you've enabled IPv6 on XP. Unfortunately, it's hard to find a hotel network these days that _doesn't_ break when presented with queries. I'm hoping that the flood of support calls from Vista users will pressure them to get their systems fixed, but I'm not holding my breath. They'll probably just make "disable IPv6" part of their standard troubleshooting routine, just like telling you to reboot your PC. After all, nobody uses it, right? S Stephen Sprunk "God does not play dice." --Albert Einstein CCIE #3723 "God is an inveterate gambler, and He throws the K5SSSdice at every possible opportunity." --Stephen Hawking
Re: broken DNS proxying at public wireless hotspots
On Sat, 3 Feb 2007, Fergie wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Use OpenDNS? > > - -- "Suresh Ramasubramanian" <[EMAIL PROTECTED]> wrote: > > > Right now, I'm on a swisscom eurospot wifi connection at Paris > airport, and this - yet again - has a DNS proxy setup so that the > > They're not the first provider I've seen doing this, and the obvious > workarounds (setting another NS in resolv.conf, or running a local dns > caching resolver) dont work either as all dns traffic is proxied. see where it says: "all dns traffic is proxied"... :(
Re: broken DNS proxying at public wireless hotspots
Yes, then he's screwed. :-) As we all are in a similar situation. Mea culpa. - ferg -- Joe Abley <[EMAIL PROTECTED]> wrote: On 3-Feb-2007, at 06:20, Fergie wrote: > Use OpenDNS? OpenDNS provides service on other than 53/tcp and 53/udp? If so, how do you configure your client operating system of choice to use the novel, un-proxied ports instead of using port 53? Joe
Re: broken DNS proxying at public wireless hotspots
On Sat, 3 Feb 2007, Fergie wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Use OpenDNS? - - ferg How can that make a difference when he already said that setting NS in "resolv.conf" does not help. BTW - personally if name resolution at hotspot is not working (and sometimes even if it is) I connect by ssh to my "home system" using its public ip address and then tunnel X11 and call broswer and other programs there. - -- "Suresh Ramasubramanian" <[EMAIL PROTECTED]> wrote: Right now, I'm on a swisscom eurospot wifi connection at Paris airport, and this - yet again - has a DNS proxy setup so that the first few queries for a host will return some nonsense value like 1.2.3.4, or will return the records for com instead. Some 4 or 5 minutes later, the dns server might actually return the right dns record. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25634 ;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 11 ;; QUESTION SECTION: ;www.kcircle.com. IN A ;; AUTHORITY SECTION: com.172573 IN NS j.gtld-servers.net. com.172573 IN NS k.gtld-servers.net. [etc] ;; Query time: 1032 msec ;; SERVER: 192.168.48.1#53(192.168.48.1) ;; WHEN: Sat Feb 3 11:33:07 2007 ;; MSG SIZE rcvd: 433 They're not the first provider I've seen doing this, and the obvious workarounds (setting another NS in resolv.conf, or running a local dns caching resolver) dont work either as all dns traffic is proxied. Sure I could route dns queries out through a ssh tunnel but the latency makes this kind of thing unusable at times. I'm then reduced to hardwiring some critical work server IPs into /etc/hosts What do nanogers usually do when caught in a situation like this? thanks srs - -- Suresh Ramasubramanian ([EMAIL PROTECTED]) -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.5.3 (Build 5003) wj8DBQFFxCmJq1pz9mNUZTMRAhCBAKCpmCoKnQ09hCF+uwAfnF/Ht5VQ8wCfXykH ATEHEAwCnErNlgbZHYAmF+M= =V8Zf -END PGP SIGNATURE-
Re: broken DNS proxying at public wireless hotspots
On 3-Feb-2007, at 06:20, Fergie wrote: Use OpenDNS? OpenDNS provides service on other than 53/tcp and 53/udp? If so, how do you configure your client operating system of choice to use the novel, un-proxied ports instead of using port 53? Joe
Re: broken DNS proxying at public wireless hotspots
One thing I have noticed to be unfortunately more common that I would like is routers that misunderstand IPv6 requests and return an A record of 0.0.0.1 So if you are using (for the most part) anything other than windows, or Windows Vista, this may be related to what you are seeing. Cheers, Trent On Sat, Feb 03, 2007 at 11:38:26AM +0530, Suresh Ramasubramanian wrote: > > Right now, I'm on a swisscom eurospot wifi connection at Paris > airport, and this - yet again - has a DNS proxy setup so that the > first few queries for a host will return some nonsense value like > 1.2.3.4, or will return the records for com instead. Some 4 or 5 > minutes later, the dns server might actually return the right dns > record. > > ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25634 > ;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 11 > ;; QUESTION SECTION: > ;www.kcircle.com. IN A > ;; AUTHORITY SECTION: > com.172573 IN NS j.gtld-servers.net. > com.172573 IN NS k.gtld-servers.net. > > [etc] > ;; Query time: 1032 msec > ;; SERVER: 192.168.48.1#53(192.168.48.1) > ;; WHEN: Sat Feb 3 11:33:07 2007 > ;; MSG SIZE rcvd: 433 > > They're not the first provider I've seen doing this, and the obvious > workarounds (setting another NS in resolv.conf, or running a local dns > caching resolver) dont work either as all dns traffic is proxied. > Sure I could route dns queries out through a ssh tunnel but the > latency makes this kind of thing unusable at times. I'm then reduced > to hardwiring some critical work server IPs into /etc/hosts > > What do nanogers usually do when caught in a situation like this? > > thanks > srs > > -- > Suresh Ramasubramanian ([EMAIL PROTECTED])
Re: broken DNS proxying at public wireless hotspots
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Use OpenDNS? - - ferg - -- "Suresh Ramasubramanian" <[EMAIL PROTECTED]> wrote: Right now, I'm on a swisscom eurospot wifi connection at Paris airport, and this - yet again - has a DNS proxy setup so that the first few queries for a host will return some nonsense value like 1.2.3.4, or will return the records for com instead. Some 4 or 5 minutes later, the dns server might actually return the right dns record. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25634 ;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 11 ;; QUESTION SECTION: ;www.kcircle.com. IN A ;; AUTHORITY SECTION: com.172573 IN NS j.gtld-servers.net. com.172573 IN NS k.gtld-servers.net. [etc] ;; Query time: 1032 msec ;; SERVER: 192.168.48.1#53(192.168.48.1) ;; WHEN: Sat Feb 3 11:33:07 2007 ;; MSG SIZE rcvd: 433 They're not the first provider I've seen doing this, and the obvious workarounds (setting another NS in resolv.conf, or running a local dns caching resolver) dont work either as all dns traffic is proxied. Sure I could route dns queries out through a ssh tunnel but the latency makes this kind of thing unusable at times. I'm then reduced to hardwiring some critical work server IPs into /etc/hosts What do nanogers usually do when caught in a situation like this? thanks srs - -- Suresh Ramasubramanian ([EMAIL PROTECTED]) -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.5.3 (Build 5003) wj8DBQFFxCmJq1pz9mNUZTMRAhCBAKCpmCoKnQ09hCF+uwAfnF/Ht5VQ8wCfXykH ATEHEAwCnErNlgbZHYAmF+M= =V8Zf -END PGP SIGNATURE-
broken DNS proxying at public wireless hotspots
Right now, I'm on a swisscom eurospot wifi connection at Paris airport, and this - yet again - has a DNS proxy setup so that the first few queries for a host will return some nonsense value like 1.2.3.4, or will return the records for com instead. Some 4 or 5 minutes later, the dns server might actually return the right dns record. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25634 ;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 11 ;; QUESTION SECTION: ;www.kcircle.com. IN A ;; AUTHORITY SECTION: com.172573 IN NS j.gtld-servers.net. com.172573 IN NS k.gtld-servers.net. [etc] ;; Query time: 1032 msec ;; SERVER: 192.168.48.1#53(192.168.48.1) ;; WHEN: Sat Feb 3 11:33:07 2007 ;; MSG SIZE rcvd: 433 They're not the first provider I've seen doing this, and the obvious workarounds (setting another NS in resolv.conf, or running a local dns caching resolver) dont work either as all dns traffic is proxied. Sure I could route dns queries out through a ssh tunnel but the latency makes this kind of thing unusable at times. I'm then reduced to hardwiring some critical work server IPs into /etc/hosts What do nanogers usually do when caught in a situation like this? thanks srs -- Suresh Ramasubramanian ([EMAIL PROTECTED])
Re: Best way to supply colo customer with specific provider
On Jan 31, 2007, at 5:10 AM, matthew zeier wrote: Steve Gibbard wrote: If you actually want to do this, you've got four choices: - Policy route, as mentioned below. - Get the customer their own connection to Cogent. - Have a border router that only talks to Cogent and doesn't receive full routes from your core, and connect the customer directly to that. - Do something involving route servers and switches outside your border routers, a-la-Equinix Direct. What about an MPLS VPN? There are a variety of layer 2 solutions for this problem. One simple solution: Get Cogent to provide you two "sessions" via link layer identifiers - FR encaps with separate DLCI on POS or two separate VLANs on Ethernet. Then use the L2 solution of your choice - GRE tunnel, Martini, whatever. I also sort of like "get the customer their own connection to Cogent". - Dan
Weekly Routing Table Report
This is an automated weekly mailing describing the state of the Internet Routing Table as seen from APNIC's router in Japan. Daily listings are sent to [EMAIL PROTECTED] For historical data, please see http://thyme.apnic.net. If you have any comments please contact Philip Smith <[EMAIL PROTECTED]>. Routing Table Report 04:00 +10GMT Sat 03 Feb, 2007 Analysis Summary BGP routing table entries examined: 209925 Prefixes after maximum aggregation: 113063 Deaggregation factor: 1.86 Unique aggregates announced to Internet: 102253 Total ASes present in the Internet Routing Table: 24248 Origin-only ASes present in the Internet Routing Table: 21107 Origin ASes announcing only one prefix: 10211 Transit ASes present in the Internet Routing Table:3141 Transit-only ASes present in the Internet Routing Table: 78 Average AS path length visible in the Internet Routing Table: 3.6 Max AS path length visible: 32 Max AS path prepend of ASN (20858) 18 Prefixes from unregistered ASNs in the Routing Table: 4 Unregistered ASNs in the Routing Table: 7 Special use prefixes present in the Routing Table:0 Prefixes being announced from unallocated address space: 12 Number of addresses announced to Internet: 1671682188 Equivalent to 99 /8s, 163 /16s and 216 /24s Percentage of available address space announced: 45.1 Percentage of allocated address space announced: 62.0 Percentage of available address space allocated: 72.8 Total number of prefixes smaller than registry allocations: 107663 APNIC Region Analysis Summary - Prefixes being announced by APNIC Region ASes:46876 Total APNIC prefixes after maximum aggregation: 18806 APNIC Deaggregation factor:2.49 Prefixes being announced from the APNIC address blocks: 44283 Unique aggregates announced from the APNIC address blocks:19393 APNIC Region origin ASes present in the Internet Routing Table:2833 APNIC Region origin ASes announcing only one prefix:788 APNIC Region transit ASes present in the Internet Routing Table:418 Average APNIC Region AS path length visible:3.6 Max APNIC Region AS path length visible: 16 Number of APNIC addresses announced to Internet: 283001824 Equivalent to 16 /8s, 222 /16s and 67 /24s Percentage of available APNIC address space announced: 70.1 APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431 (pre-ERX allocations) 23552-24575, 37888-38911 APNIC Address Blocks 58/7, 60/7, 116/6, 120/6, 124/7, 126/8, 202/7 210/7, 218/7, 220/7 and 222/8 ARIN Region Analysis Summary Prefixes being announced by ARIN Region ASes:103010 Total ARIN prefixes after maximum aggregation:60874 ARIN Deaggregation factor: 1.69 Prefixes being announced from the ARIN address blocks:75935 Unique aggregates announced from the ARIN address blocks: 29246 ARIN Region origin ASes present in the Internet Routing Table:11297 ARIN Region origin ASes announcing only one prefix:4325 ARIN Region transit ASes present in the Internet Routing Table:1052 Average ARIN Region AS path length visible: 3.4 Max ARIN Region AS path length visible: 21 Number of ARIN addresses announced to Internet: 315788928 Equivalent to 18 /8s, 210 /16s and 142 /24s Percentage of available ARIN address space announced: 69.7 ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 2048-2106 (pre-ERX allocations) 2138-2584, 2615-2772, 2823-2829, 2880-3153 3354-4607, 4865-5119, 5632-6655, 6912-7466 7723-8191, 10240-12287, 13312-15359, 16384-17407 18432-20479, 21504-23551, 25600-26591, 26624-27647, 29696-30719, 31744-33791 35840-36863, 39936-40959 ARIN Address Blocks24/8, 63/8, 64/5, 72/6, 76/8, 96/6, 199/8, 204/6, 208/7 and 216/8 RIPE Region Analysis Summary Prefixes being announced by RIPE Region ASes: 43595 Total RIPE prefixes after maximum aggregation:28378 RIPE Deaggregation factor: 1.54 Prefixes being announced from the
No DNS operations BOF at NANOG39
Unfortunately due to not enough potential speakers, and pressure on BOF slots in the program, we have decided to not have this BOF this time around. My apologies for this - a number of potential speakers indicated they were preparing relevant work which would be more ready to present next time around, so hopefully at NANOG40.. If anyone would still like to have a DNS operations discussion in Toronto, I'm happy to facilitate this on an ad-hoc/informal basis. just drop me a note. Keith Mitchell OARC Programme Manager
The Cidr Report
This report has been generated at Fri Feb 2 21:46:43 2007 AEST. The report analyses the BGP Routing Table of an AS4637 (Reach) router and generates a report on aggregation potential within the table. Check http://www.cidr-report.org/as4637 for a current version of this report. Recent Table History Date PrefixesCIDR Agg 26-01-07205748 133867 27-01-07205816 133770 28-01-07206041 133747 29-01-07206061 133458 30-01-07206083 133593 31-01-07206294 133909 01-02-07206413 134100 02-02-07206731 134140 AS Summary 24178 Number of ASes in routing system 10225 Number of ASes announcing only one prefix 1522 Largest number of prefixes announced by an AS AS7018 : ATT-INTERNET4 - AT&T WorldNet Services 90744064 Largest address span announced by an AS (/32s) AS721 : DISA-ASNBLK - DoD Network Information Center Aggregation Summary The algorithm used in this report proposes aggregation only when there is a precise match using the AS path, so as to preserve traffic transit policies. Aggregation is also proposed across non-advertised address space ('holes'). --- 02Feb07 --- ASnumNetsNow NetsAggr NetGain % Gain Description Table 206886 1342697261735.1% All ASes AS4134 1247 308 93975.3% CHINANET-BACKBONE No.31,Jin-rong Street AS18566 989 86 90391.3% COVAD - Covad Communications Co. AS4755 1055 188 86782.2% VSNL-AS Videsh Sanchar Nigam Ltd. Autonomous System AS4323 1048 302 74671.2% TWTC - Time Warner Telecom, Inc. AS9498 943 266 67771.8% BBIL-AP BHARTI BT INTERNET LTD. AS22773 720 47 67393.5% CCINET-2 - Cox Communications Inc. AS11492 917 332 58563.8% CABLEONE - CABLE ONE AS19262 763 181 58276.3% VZGNI-TRANSIT - Verizon Internet Services Inc. AS17488 592 51 54191.4% HATHWAY-NET-AP Hathway IP Over Cable Internet AS7018 1522 986 53635.2% ATT-INTERNET4 - AT&T WorldNet Services AS6197 1025 511 51450.1% BATI-ATL - BellSouth Network Solutions, Inc AS19916 568 71 49787.5% ASTRUM-0001 - OLM LLC AS8151 965 476 48950.7% Uninet S.A. de C.V. AS18101 516 33 48393.6% RIL-IDC Reliance Infocom Ltd Internet Data Centre, AS9583 1044 603 44142.2% SIFY-AS-IN Sify Limited AS17676 504 66 43886.9% JPNIC-JP-ASN-BLOCK Japan Network Information Center AS15270 502 85 41783.1% AS-PAETEC-NET - PaeTec.net -a division of PaeTecCommunications, Inc. AS4766 727 318 40956.3% KIXS-AS-KR Korea Telecom AS721685 297 38856.6% DISA-ASNBLK - DoD Network Information Center AS2386 1107 735 37233.6% INS-AS - AT&T Data Communications Services AS4812 432 70 36283.8% CHINANET-SH-AP China Telecom (Group) AS6467 413 55 35886.7% ESPIRECOMM - Xspedius Communications Co. AS3602 528 190 33864.0% AS3602-RTI - Rogers Telecom Inc. AS16852 395 69 32682.5% BROADWING-FOCAL - Broadwing Communications Services, Inc. AS33588 425 123 30271.1% BRESNAN-AS - Bresnan Communications, LLC. AS7011 761 467 29438.6% FRONTIER-AND-CITIZENS - Frontier Communications, Inc. AS6517 408 116 29271.6% YIPESCOM - Yipes Communications, Inc. AS6198 555 265 29052.3% BATI-MIA - BellSouth Network Solutions, Inc AS855561 286 27549.0%
BGP Update Report
BGP Update Report Interval: 19-Jan-07 -to- 01-Feb-07 (14 days) Observation Point: BGP Peering with AS4637 TOP 20 Unstable Origin AS Rank ASNUpds % Upds/PfxAS-Name 1 - AS701 31773 1.4% 33.3 -- UUNET - MCI Communications Services, Inc. d/b/a Verizon Business 2 - AS702 27647 1.2% 38.3 -- AS702 MCI EMEA - Commercial IP service provider in Europe 3 - AS209 27501 1.2% 5.9 -- ASN-QWEST - Qwest 4 - AS28751 25382 1.1% 182.6 -- CAUCASUS-NET-AS Caucasus Network Tbilisi, Georgia 5 - AS947124021 1.0% 186.2 -- MANA-PF-AP MANA S.A. 6 - AS478823518 1.0% 12.6 -- TMNET-AS-AP TM Net, Internet Service Provider 7 - AS815120283 0.9% 20.7 -- Uninet S.A. de C.V. 8 - AS479516798 0.7% 66.4 -- INDOSAT2-ID INDOSATM2 ASN 9 - AS356116434 0.7% 33.6 -- SAVVIS - Savvis 10 - AS705 13281 0.6% 38.3 -- UUNET - MCI Communications Services, Inc. d/b/a Verizon Business 11 - AS17974 13227 0.6% 25.2 -- TELKOMNET-AS2-AP PT TELEKOMUNIKASI INDONESIA 12 - AS619712114 0.5% 11.8 -- BATI-ATL - BellSouth Network Solutions, Inc 13 - AS958311789 0.5% 11.1 -- SIFY-AS-IN Sify Limited 14 - AS11830 11763 0.5% 24.4 -- Instituto Costarricense de Electricidad y Telecom. 15 - AS462110697 0.5% 79.2 -- UNSPECIFIED UNINET-TH 16 - AS247319990 0.4% 227.0 -- ASN-NESMA National Engineering Services and Marketing Company Ltd. (NESMA) 17 - AS114869524 0.4% 33.9 -- WAN - Worldcom Advance Networks 18 - AS9498 9444 0.4% 9.9 -- BBIL-AP BHARTI BT INTERNET LTD. 19 - AS4775 9406 0.4% 40.0 -- GLOBE-TELECOM-AS Telecom Carrier / ISP Plus + 20 - AS7545 9273 0.4% 16.7 -- TPG-INTERNET-AP TPG Internet Pty Ltd TOP 20 Unstable Origin AS (Updates per announced prefix) Rank ASNUpds % Upds/PfxAS-Name 1 - AS315944168 0.2%4168.0 -- FORTESS-AS Fortess LLC Network 2 - AS354893484 0.1%3484.0 -- TOTO-TECH-AS Toto Ltd. 3 - AS157742130 0.1%2130.0 -- MEDIANAT LLC "MEDIANAT", ISP primarily for educational institution 4 - AS274072026 0.1%2026.0 -- FRISCHS-INC - Frisch's Restaurants, Inc. 5 - AS278141226 0.1%1226.0 -- Aeprovi 6 - AS381511219 0.1%1219.0 -- ENUM-AS-ID APJII-RD 7 - AS316245960 0.3%1192.0 -- VFMNL-AS Verza Facility Management BV 8 - AS321311107 0.1%1107.0 -- AS-PCML - Penso Capital Markets, LLC 9 - AS34378 926 0.0% 926.0 -- RUG-AS Razguliay-UKRROS Group 10 - AS33447 845 0.0% 845.0 -- RPTCO-ASN-1 - RPT Consulting, Inc. 11 - AS176457120 0.3% 712.0 -- NTT-SG-AP ASN - NTT SINGAPORE PTE LTD 12 - AS392501338 0.1% 669.0 -- COLOPROVIDER-AS Colo Provider 13 - AS3043 3082 0.1% 616.4 -- AMPHIB-AS - Amphibian Media Corporation 14 - AS331881187 0.1% 593.5 -- SCS-NETWORK-1 - Sono Corporate Suites 15 - AS14548 540 0.0% 540.0 -- LISTEN-SF-1 - Listen.com 16 - AS3727 521 0.0% 521.0 -- SHRUBB - Shrubbery Networks 17 - AS213911455 0.1% 485.0 -- TDA-AS 18 - AS28912 893 0.0% 446.5 -- OLMA-AS OLMA Investment Company 19 - AS30355 446 0.0% 446.0 -- PATRIOT-COMMUNICATIONS - PATRIOT COMMUNICATIONS 20 - AS29630 883 0.0% 441.5 -- AZRENA-AS Azerbaijan Research and Educational Networking TOP 20 Unstable Prefixes Rank Prefix Upds % Origin AS -- AS Name 1 - 194.242.124.0/22 4168 0.1% AS31594 -- FORTESS-AS Fortess LLC Network 2 - 62.213.176.0/233484 0.1% AS35489 -- TOTO-TECH-AS Toto Ltd. 3 - 209.140.24.0/243075 0.1% AS3043 -- AMPHIB-AS - Amphibian Media Corporation 4 - 89.4.129.0/24 3070 0.1% AS24731 -- ASN-NESMA National Engineering Services and Marketing Company Ltd. (NESMA) 5 - 89.4.128.0/24 2980 0.1% AS24731 -- ASN-NESMA National Engineering Services and Marketing Company Ltd. (NESMA) 6 - 222.127.32.0/192879 0.1% AS4775 -- GLOBE-TELECOM-AS Telecom Carrier / ISP Plus + 7 - 61.0.0.0/8 2848 0.1% AS4678 -- FINE CANON NETWORK COMMUNICATIONS INC. 8 - 216.32.206.0/242818 0.1% AS20473 -- AS-CHOOPA - Choopa, LLC 9 - 89.4.131.0/24 2632 0.1% AS24731 -- ASN-NESMA National Engineering Services and Marketing Company Ltd. (NESMA) 10 - 62.68.143.0/24 2130 0.1% AS15774 -- MEDIANAT LLC "MEDIANAT", ISP primarily for educational institution 11 - 66.117.207.0/242026 0.1% AS27407 -- FRISCHS-INC - Frisch's Restaurants, Inc. 12 - 194.42.208.0/201991 0.1% AS705 -- UUNET - MCI Communications Services, Inc. d/b/a Verizon Business 13 - 202.136.