Re: broken DNS proxying at public wireless hotspots

2007-02-02 Thread Gadi Evron

On Sat, 3 Feb 2007, Suresh Ramasubramanian wrote:
> What do nanogers usually do when caught in a situation like this?

Important question: if memory serves, and you are in the "Paris Charles de
Gaulle International Airport", wireless costs money.

This is after paying, right?

I had this problem in a more annoying location. On a connexxion wireless
on a flight to NYC.

What I do if there are no alternatives is very simply... kick back and
listen to some music (unless you have some cellular 3G connectivity).

Gadi.



Re: broken DNS proxying at public wireless hotspots

2007-02-02 Thread Trent Lloyd

On Sat, Feb 03, 2007 at 01:00:29AM -0600, Stephen Sprunk wrote:
> Thus spake "Trent Lloyd" <[EMAIL PROTECTED]>
> >One thing I have noticed to be unfortunately more common that I would
> >like is routers that misunderstand IPv6  requests and return an
> >A record of 0.0.0.1
> >
> >So if you are using (for the most part) anything other than windows, 
> >or
> >Windows Vista, this may be related to what you are seeing.
> 
> The same is true if you've enabled IPv6 on XP.  Unfortunately, it's hard 
> to find a hotel network these days that _doesn't_ break when presented 
> with  queries.
> 
> I'm hoping that the flood of support calls from Vista users will 
> pressure them to get their systems fixed, but I'm not holding my breath. 
> They'll probably just make "disable IPv6" part of their standard 
> troubleshooting routine, just like telling you to reboot your PC.  After 
> all, nobody uses it, right?

Unfortunately this is something I'm afraid of, currently there is a long
running bug[1] in the Ubuntu bug tracker on why they should disable IPv6 by
default, which makes me sad, but I can understand why they would think
that because to them it provides no advantage (yet), yet when disabled,
it works for them.

I have considered if some kind of "workaround" to the resolver which
would ignore returns of 0.0.0.1 (possibly if there are other addresses,
or only if  is requested, etc)

Is anyone aware of other "weird" things some routers return? Personally
I have only seen 0.0.0.1 coming back.

Cheers,
Trent

[1] https://launchpad.net/ubuntu/+source/netcfg/+bug/24828

> 
> S
> 
> Stephen Sprunk "God does not play dice."  --Albert Einstein
> CCIE #3723 "God is an inveterate gambler, and He throws the
> K5SSSdice at every possible opportunity." --Stephen Hawking 
> 


Re: broken DNS proxying at public wireless hotspots

2007-02-02 Thread Stephen Sprunk


Thus spake "Trent Lloyd" <[EMAIL PROTECTED]>

One thing I have noticed to be unfortunately more common that I would
like is routers that misunderstand IPv6  requests and return an
A record of 0.0.0.1

So if you are using (for the most part) anything other than windows, 
or

Windows Vista, this may be related to what you are seeing.


The same is true if you've enabled IPv6 on XP.  Unfortunately, it's hard 
to find a hotel network these days that _doesn't_ break when presented 
with  queries.


I'm hoping that the flood of support calls from Vista users will 
pressure them to get their systems fixed, but I'm not holding my breath. 
They'll probably just make "disable IPv6" part of their standard 
troubleshooting routine, just like telling you to reboot your PC.  After 
all, nobody uses it, right?


S

Stephen Sprunk "God does not play dice."  --Albert Einstein
CCIE #3723 "God is an inveterate gambler, and He throws the
K5SSSdice at every possible opportunity." --Stephen Hawking 





Re: broken DNS proxying at public wireless hotspots

2007-02-02 Thread Chris L. Morrow



On Sat, 3 Feb 2007, Fergie wrote:

>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Use OpenDNS?
>
> - -- "Suresh Ramasubramanian" <[EMAIL PROTECTED]> wrote:
>
>
> Right now, I'm on a swisscom eurospot wifi connection at Paris
> airport, and this - yet again - has a DNS proxy setup so that the
>

> They're not the first provider I've seen doing this, and the obvious
> workarounds (setting another NS in resolv.conf, or running a local dns
> caching resolver) dont work either as all dns traffic is proxied.

see where it says: "all dns traffic is proxied"... :(


Re: broken DNS proxying at public wireless hotspots

2007-02-02 Thread Fergie

Yes, then he's screwed. :-)

As we all are in a similar situation.

Mea culpa.

- ferg


-- Joe Abley <[EMAIL PROTECTED]> wrote:


On 3-Feb-2007, at 06:20, Fergie wrote:

> Use OpenDNS?

OpenDNS provides service on other than 53/tcp and 53/udp?

If so, how do you configure your client operating system of choice to  
use the novel, un-proxied ports instead of using port 53?


Joe




Re: broken DNS proxying at public wireless hotspots

2007-02-02 Thread william(at)elan.net



On Sat, 3 Feb 2007, Fergie wrote:


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Use OpenDNS?

- - ferg


How can that make a difference when he already said that setting NS in 
"resolv.conf" does not help.


BTW - personally if name resolution at hotspot is not working (and 
sometimes even if it is) I connect by ssh to my "home system" using
its public ip address and  then tunnel X11 and call broswer and other 
programs there.



- -- "Suresh Ramasubramanian" <[EMAIL PROTECTED]> wrote:

Right now, I'm on a swisscom eurospot wifi connection at Paris
airport, and this - yet again - has a DNS proxy setup so that the
first few queries for a host will return some nonsense value like
1.2.3.4, or will return the records for com instead.  Some 4 or 5
minutes later, the dns server might actually return the right dns
record.

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25634
;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 11
;; QUESTION SECTION:
;www.kcircle.com.   IN  A
;; AUTHORITY SECTION:
com.172573  IN  NS  j.gtld-servers.net.
com.172573  IN  NS  k.gtld-servers.net.

[etc]
;; Query time: 1032 msec
;; SERVER: 192.168.48.1#53(192.168.48.1)
;; WHEN: Sat Feb  3 11:33:07 2007
;; MSG SIZE  rcvd: 433

They're not the first provider I've seen doing this, and the obvious
workarounds (setting another NS in resolv.conf, or running a local dns
caching resolver) dont work either as all dns traffic is proxied.
Sure I could route dns queries out through a ssh tunnel but the
latency makes this kind of thing unusable at times.   I'm then reduced
to hardwiring some critical work server IPs into /etc/hosts

What do nanogers usually do when caught in a situation like this?

thanks
srs

- --
Suresh Ramasubramanian ([EMAIL PROTECTED])

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.5.3 (Build 5003)

wj8DBQFFxCmJq1pz9mNUZTMRAhCBAKCpmCoKnQ09hCF+uwAfnF/Ht5VQ8wCfXykH
ATEHEAwCnErNlgbZHYAmF+M=
=V8Zf
-END PGP SIGNATURE-


Re: broken DNS proxying at public wireless hotspots

2007-02-02 Thread Joe Abley



On 3-Feb-2007, at 06:20, Fergie wrote:


Use OpenDNS?


OpenDNS provides service on other than 53/tcp and 53/udp?

If so, how do you configure your client operating system of choice to  
use the novel, un-proxied ports instead of using port 53?



Joe



Re: broken DNS proxying at public wireless hotspots

2007-02-02 Thread Trent Lloyd

One thing I have noticed to be unfortunately more common that I would
like is routers that misunderstand IPv6  requests and return an
A record of 0.0.0.1

So if you are using (for the most part) anything other than windows, or
Windows Vista, this may be related to what you are seeing.

Cheers,
Trent

On Sat, Feb 03, 2007 at 11:38:26AM +0530, Suresh Ramasubramanian wrote:
> 
> Right now, I'm on a swisscom eurospot wifi connection at Paris
> airport, and this - yet again - has a DNS proxy setup so that the
> first few queries for a host will return some nonsense value like
> 1.2.3.4, or will return the records for com instead.  Some 4 or 5
> minutes later, the dns server might actually return the right dns
> record.
> 
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25634
> ;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 11
> ;; QUESTION SECTION:
> ;www.kcircle.com.   IN  A
> ;; AUTHORITY SECTION:
> com.172573  IN  NS  j.gtld-servers.net.
> com.172573  IN  NS  k.gtld-servers.net.
> 
> [etc]
> ;; Query time: 1032 msec
> ;; SERVER: 192.168.48.1#53(192.168.48.1)
> ;; WHEN: Sat Feb  3 11:33:07 2007
> ;; MSG SIZE  rcvd: 433
> 
> They're not the first provider I've seen doing this, and the obvious
> workarounds (setting another NS in resolv.conf, or running a local dns
> caching resolver) dont work either as all dns traffic is proxied.
> Sure I could route dns queries out through a ssh tunnel but the
> latency makes this kind of thing unusable at times.   I'm then reduced
> to hardwiring some critical work server IPs into /etc/hosts
> 
> What do nanogers usually do when caught in a situation like this?
> 
> thanks
> srs
> 
> -- 
> Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: broken DNS proxying at public wireless hotspots

2007-02-02 Thread Fergie

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Use OpenDNS?

- - ferg


- -- "Suresh Ramasubramanian" <[EMAIL PROTECTED]> wrote:


Right now, I'm on a swisscom eurospot wifi connection at Paris
airport, and this - yet again - has a DNS proxy setup so that the
first few queries for a host will return some nonsense value like
1.2.3.4, or will return the records for com instead.  Some 4 or 5
minutes later, the dns server might actually return the right dns
record.

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25634
;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 11
;; QUESTION SECTION:
;www.kcircle.com.   IN  A
;; AUTHORITY SECTION:
com.172573  IN  NS  j.gtld-servers.net.
com.172573  IN  NS  k.gtld-servers.net.

[etc]
;; Query time: 1032 msec
;; SERVER: 192.168.48.1#53(192.168.48.1)
;; WHEN: Sat Feb  3 11:33:07 2007
;; MSG SIZE  rcvd: 433

They're not the first provider I've seen doing this, and the obvious
workarounds (setting another NS in resolv.conf, or running a local dns
caching resolver) dont work either as all dns traffic is proxied.
Sure I could route dns queries out through a ssh tunnel but the
latency makes this kind of thing unusable at times.   I'm then reduced
to hardwiring some critical work server IPs into /etc/hosts

What do nanogers usually do when caught in a situation like this?

thanks
srs

- -- 
Suresh Ramasubramanian ([EMAIL PROTECTED])

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.5.3 (Build 5003)

wj8DBQFFxCmJq1pz9mNUZTMRAhCBAKCpmCoKnQ09hCF+uwAfnF/Ht5VQ8wCfXykH
ATEHEAwCnErNlgbZHYAmF+M=
=V8Zf
-END PGP SIGNATURE-




broken DNS proxying at public wireless hotspots

2007-02-02 Thread Suresh Ramasubramanian


Right now, I'm on a swisscom eurospot wifi connection at Paris
airport, and this - yet again - has a DNS proxy setup so that the
first few queries for a host will return some nonsense value like
1.2.3.4, or will return the records for com instead.  Some 4 or 5
minutes later, the dns server might actually return the right dns
record.

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25634
;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 11
;; QUESTION SECTION:
;www.kcircle.com.   IN  A
;; AUTHORITY SECTION:
com.172573  IN  NS  j.gtld-servers.net.
com.172573  IN  NS  k.gtld-servers.net.

[etc]
;; Query time: 1032 msec
;; SERVER: 192.168.48.1#53(192.168.48.1)
;; WHEN: Sat Feb  3 11:33:07 2007
;; MSG SIZE  rcvd: 433

They're not the first provider I've seen doing this, and the obvious
workarounds (setting another NS in resolv.conf, or running a local dns
caching resolver) dont work either as all dns traffic is proxied.
Sure I could route dns queries out through a ssh tunnel but the
latency makes this kind of thing unusable at times.   I'm then reduced
to hardwiring some critical work server IPs into /etc/hosts

What do nanogers usually do when caught in a situation like this?

thanks
srs

--
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: Best way to supply colo customer with specific provider

2007-02-02 Thread Daniel Golding



On Jan 31, 2007, at 5:10 AM, matthew zeier wrote:



Steve Gibbard wrote:

If you actually want to do this, you've got four choices:
- Policy route, as mentioned below.
- Get the customer their own connection to Cogent.
- Have a border router that only talks to Cogent and doesn't  
receive full

  routes from your core, and connect the customer directly to that.
- Do something involving route servers and switches outside your  
border

  routers, a-la-Equinix Direct.


What about an MPLS VPN?


There are a variety of layer 2 solutions for this problem. One simple  
solution: Get Cogent to provide you two "sessions" via link layer  
identifiers - FR encaps  with separate DLCI on POS or two separate  
VLANs on Ethernet. Then use the L2 solution of your choice - GRE  
tunnel, Martini, whatever.


I also sort of like "get the customer their own connection to Cogent".

- Dan

Weekly Routing Table Report

2007-02-02 Thread Routing Analysis Role Account

This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]

For historical data, please see http://thyme.apnic.net.

If you have any comments please contact Philip Smith <[EMAIL PROTECTED]>.

Routing Table Report   04:00 +10GMT Sat 03 Feb, 2007

Analysis Summary


BGP routing table entries examined:  209925
Prefixes after maximum aggregation:  113063
Deaggregation factor:  1.86
Unique aggregates announced to Internet: 102253
Total ASes present in the Internet Routing Table: 24248
Origin-only ASes present in the Internet Routing Table:   21107
Origin ASes announcing only one prefix:   10211
Transit ASes present in the Internet Routing Table:3141
Transit-only ASes present in the Internet Routing Table: 78
Average AS path length visible in the Internet Routing Table:   3.6
Max AS path length visible:  32
Max AS path prepend of ASN (20858)   18
Prefixes from unregistered ASNs in the Routing Table: 4
Unregistered ASNs in the Routing Table:   7
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space: 12
Number of addresses announced to Internet:   1671682188
Equivalent to 99 /8s, 163 /16s and 216 /24s
Percentage of available address space announced:   45.1
Percentage of allocated address space announced:   62.0
Percentage of available address space allocated:   72.8
Total number of prefixes smaller than registry allocations:  107663

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:46876
Total APNIC prefixes after maximum aggregation:   18806
APNIC Deaggregation factor:2.49
Prefixes being announced from the APNIC address blocks:   44283
Unique aggregates announced from the APNIC address blocks:19393
APNIC Region origin ASes present in the Internet Routing Table:2833
APNIC Region origin ASes announcing only one prefix:788
APNIC Region transit ASes present in the Internet Routing Table:418
Average APNIC Region AS path length visible:3.6
Max APNIC Region AS path length visible: 16
Number of APNIC addresses announced to Internet:  283001824
Equivalent to 16 /8s, 222 /16s and 67 /24s
Percentage of available APNIC address space announced: 70.1

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911
APNIC Address Blocks   58/7, 60/7, 116/6, 120/6, 124/7, 126/8, 202/7
   210/7, 218/7, 220/7 and 222/8

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:103010
Total ARIN prefixes after maximum aggregation:60874
ARIN Deaggregation factor: 1.69
Prefixes being announced from the ARIN address blocks:75935
Unique aggregates announced from the ARIN address blocks: 29246
ARIN Region origin ASes present in the Internet Routing Table:11297
ARIN Region origin ASes announcing only one prefix:4325
ARIN Region transit ASes present in the Internet Routing Table:1052
Average ARIN Region AS path length visible: 3.4
Max ARIN Region AS path length visible:  21
Number of ARIN addresses announced to Internet:   315788928
Equivalent to 18 /8s, 210 /16s and 142 /24s
Percentage of available ARIN address space announced:  69.7

ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 2048-2106
(pre-ERX allocations)  2138-2584, 2615-2772, 2823-2829, 2880-3153
   3354-4607, 4865-5119, 5632-6655, 6912-7466
   7723-8191, 10240-12287, 13312-15359, 16384-17407
   18432-20479, 21504-23551, 25600-26591,
   26624-27647, 29696-30719, 31744-33791
   35840-36863, 39936-40959
ARIN Address Blocks24/8, 63/8, 64/5, 72/6, 76/8, 96/6, 199/8, 204/6,
   208/7 and 216/8

RIPE Region Analysis Summary


Prefixes being announced by RIPE Region ASes: 43595
Total RIPE prefixes after maximum aggregation:28378
RIPE Deaggregation factor: 1.54
Prefixes being announced from the 

No DNS operations BOF at NANOG39

2007-02-02 Thread Keith Mitchell

Unfortunately due to not enough potential speakers, and pressure on BOF
slots in the program, we have decided to not have this BOF this time
around. My apologies for this - a number of potential speakers indicated
they were preparing relevant work which would be more ready to present
next time around, so hopefully at NANOG40..

If anyone would still like to have a DNS operations discussion in
Toronto, I'm happy to facilitate this on an ad-hoc/informal basis. just
drop me a note.

Keith Mitchell

OARC Programme Manager


The Cidr Report

2007-02-02 Thread cidr-report

This report has been generated at Fri Feb  2 21:46:43 2007 AEST.
The report analyses the BGP Routing Table of an AS4637 (Reach) router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org/as4637 for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
26-01-07205748  133867
27-01-07205816  133770
28-01-07206041  133747
29-01-07206061  133458
30-01-07206083  133593
31-01-07206294  133909
01-02-07206413  134100
02-02-07206731  134140


AS Summary
 24178  Number of ASes in routing system
 10225  Number of ASes announcing only one prefix
  1522  Largest number of prefixes announced by an AS
AS7018 : ATT-INTERNET4 - AT&T WorldNet Services
  90744064  Largest address span announced by an AS (/32s)
AS721  : DISA-ASNBLK - DoD Network Information Center


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 02Feb07 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 206886   1342697261735.1%   All ASes

AS4134  1247  308  93975.3%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS18566  989   86  90391.3%   COVAD - Covad Communications
   Co.
AS4755  1055  188  86782.2%   VSNL-AS Videsh Sanchar Nigam
   Ltd. Autonomous System
AS4323  1048  302  74671.2%   TWTC - Time Warner Telecom,
   Inc.
AS9498   943  266  67771.8%   BBIL-AP BHARTI BT INTERNET
   LTD.
AS22773  720   47  67393.5%   CCINET-2 - Cox Communications
   Inc.
AS11492  917  332  58563.8%   CABLEONE - CABLE ONE
AS19262  763  181  58276.3%   VZGNI-TRANSIT - Verizon
   Internet Services Inc.
AS17488  592   51  54191.4%   HATHWAY-NET-AP Hathway IP Over
   Cable Internet
AS7018  1522  986  53635.2%   ATT-INTERNET4 - AT&T WorldNet
   Services
AS6197  1025  511  51450.1%   BATI-ATL - BellSouth Network
   Solutions, Inc
AS19916  568   71  49787.5%   ASTRUM-0001 - OLM LLC
AS8151   965  476  48950.7%   Uninet S.A. de C.V.
AS18101  516   33  48393.6%   RIL-IDC Reliance Infocom Ltd
   Internet Data Centre,
AS9583  1044  603  44142.2%   SIFY-AS-IN Sify Limited
AS17676  504   66  43886.9%   JPNIC-JP-ASN-BLOCK Japan
   Network Information Center
AS15270  502   85  41783.1%   AS-PAETEC-NET - PaeTec.net -a
   division of
   PaeTecCommunications, Inc.
AS4766   727  318  40956.3%   KIXS-AS-KR Korea Telecom
AS721685  297  38856.6%   DISA-ASNBLK - DoD Network
   Information Center
AS2386  1107  735  37233.6%   INS-AS - AT&T Data
   Communications Services
AS4812   432   70  36283.8%   CHINANET-SH-AP China Telecom
   (Group)
AS6467   413   55  35886.7%   ESPIRECOMM - Xspedius
   Communications Co.
AS3602   528  190  33864.0%   AS3602-RTI - Rogers Telecom
   Inc.
AS16852  395   69  32682.5%   BROADWING-FOCAL - Broadwing
   Communications Services, Inc.
AS33588  425  123  30271.1%   BRESNAN-AS - Bresnan
   Communications, LLC.
AS7011   761  467  29438.6%   FRONTIER-AND-CITIZENS -
   Frontier Communications, Inc.
AS6517   408  116  29271.6%   YIPESCOM - Yipes
   Communications, Inc.
AS6198   555  265  29052.3%   BATI-MIA - BellSouth Network
   Solutions, Inc
AS855561  286  27549.0%  

BGP Update Report

2007-02-02 Thread cidr-report

BGP Update Report
Interval: 19-Jan-07 -to- 01-Feb-07 (14 days)
Observation Point: BGP Peering with AS4637

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS701 31773  1.4%  33.3 -- UUNET - MCI Communications 
Services, Inc. d/b/a Verizon Business
 2 - AS702 27647  1.2%  38.3 -- AS702 MCI EMEA - Commercial IP 
service provider in Europe
 3 - AS209 27501  1.2%   5.9 -- ASN-QWEST - Qwest
 4 - AS28751   25382  1.1% 182.6 -- CAUCASUS-NET-AS Caucasus 
Network Tbilisi, Georgia
 5 - AS947124021  1.0% 186.2 -- MANA-PF-AP MANA S.A.
 6 - AS478823518  1.0%  12.6 -- TMNET-AS-AP TM Net, Internet 
Service Provider
 7 - AS815120283  0.9%  20.7 -- Uninet S.A. de C.V.
 8 - AS479516798  0.7%  66.4 -- INDOSAT2-ID INDOSATM2  ASN
 9 - AS356116434  0.7%  33.6 -- SAVVIS - Savvis
10 - AS705 13281  0.6%  38.3 -- UUNET - MCI Communications 
Services, Inc. d/b/a Verizon Business
11 - AS17974   13227  0.6%  25.2 -- TELKOMNET-AS2-AP PT 
TELEKOMUNIKASI INDONESIA
12 - AS619712114  0.5%  11.8 -- BATI-ATL - BellSouth Network 
Solutions, Inc
13 - AS958311789  0.5%  11.1 -- SIFY-AS-IN Sify Limited
14 - AS11830   11763  0.5%  24.4 -- Instituto Costarricense de 
Electricidad y Telecom.
15 - AS462110697  0.5%  79.2 -- UNSPECIFIED UNINET-TH
16 - AS247319990  0.4% 227.0 -- ASN-NESMA National Engineering 
Services and Marketing Company Ltd. (NESMA)
17 - AS114869524  0.4%  33.9 -- WAN - Worldcom Advance Networks
18 - AS9498 9444  0.4%   9.9 -- BBIL-AP BHARTI BT INTERNET LTD.
19 - AS4775 9406  0.4%  40.0 -- GLOBE-TELECOM-AS Telecom 
Carrier  /  ISP Plus +
20 - AS7545 9273  0.4%  16.7 -- TPG-INTERNET-AP TPG Internet 
Pty Ltd


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS315944168  0.2%4168.0 -- FORTESS-AS Fortess LLC Network
 2 - AS354893484  0.1%3484.0 -- TOTO-TECH-AS Toto Ltd.
 3 - AS157742130  0.1%2130.0 -- MEDIANAT LLC "MEDIANAT", ISP 
primarily for educational institution
 4 - AS274072026  0.1%2026.0 -- FRISCHS-INC - Frisch's 
Restaurants, Inc.
 5 - AS278141226  0.1%1226.0 -- Aeprovi
 6 - AS381511219  0.1%1219.0 -- ENUM-AS-ID APJII-RD
 7 - AS316245960  0.3%1192.0 -- VFMNL-AS Verza Facility 
Management BV
 8 - AS321311107  0.1%1107.0 -- AS-PCML - Penso Capital 
Markets, LLC
 9 - AS34378 926  0.0% 926.0 -- RUG-AS Razguliay-UKRROS Group
10 - AS33447 845  0.0% 845.0 -- RPTCO-ASN-1 - RPT Consulting, 
Inc.
11 - AS176457120  0.3% 712.0 -- NTT-SG-AP ASN - NTT SINGAPORE 
PTE LTD
12 - AS392501338  0.1% 669.0 -- COLOPROVIDER-AS Colo Provider
13 - AS3043 3082  0.1% 616.4 -- AMPHIB-AS - Amphibian Media 
Corporation
14 - AS331881187  0.1% 593.5 -- SCS-NETWORK-1 - Sono Corporate 
Suites
15 - AS14548 540  0.0% 540.0 -- LISTEN-SF-1 - Listen.com
16 - AS3727  521  0.0% 521.0 -- SHRUBB - Shrubbery Networks
17 - AS213911455  0.1% 485.0 -- TDA-AS
18 - AS28912 893  0.0% 446.5 -- OLMA-AS OLMA Investment Company
19 - AS30355 446  0.0% 446.0 -- PATRIOT-COMMUNICATIONS - 
PATRIOT COMMUNICATIONS
20 - AS29630 883  0.0% 441.5 -- AZRENA-AS Azerbaijan Research 
and Educational Networking


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 194.242.124.0/22   4168  0.1%   AS31594 -- FORTESS-AS Fortess LLC Network
 2 - 62.213.176.0/233484  0.1%   AS35489 -- TOTO-TECH-AS Toto Ltd.
 3 - 209.140.24.0/243075  0.1%   AS3043  -- AMPHIB-AS - Amphibian Media 
Corporation
 4 - 89.4.129.0/24  3070  0.1%   AS24731 -- ASN-NESMA National Engineering 
Services and Marketing Company Ltd. (NESMA)
 5 - 89.4.128.0/24  2980  0.1%   AS24731 -- ASN-NESMA National Engineering 
Services and Marketing Company Ltd. (NESMA)
 6 - 222.127.32.0/192879  0.1%   AS4775  -- GLOBE-TELECOM-AS Telecom 
Carrier  /  ISP Plus +
 7 - 61.0.0.0/8 2848  0.1%   AS4678  -- FINE CANON NETWORK 
COMMUNICATIONS INC.
 8 - 216.32.206.0/242818  0.1%   AS20473 -- AS-CHOOPA - Choopa, LLC
 9 - 89.4.131.0/24  2632  0.1%   AS24731 -- ASN-NESMA National Engineering 
Services and Marketing Company Ltd. (NESMA)
10 - 62.68.143.0/24 2130  0.1%   AS15774 -- MEDIANAT LLC "MEDIANAT", ISP 
primarily for educational institution
11 - 66.117.207.0/242026  0.1%   AS27407 -- FRISCHS-INC - Frisch's 
Restaurants, Inc.
12 - 194.42.208.0/201991  0.1%   AS705   -- UUNET - MCI Communications 
Services, Inc. d/b/a Verizon Business
13 - 202.136.