#codebgp search results
3/3 Interestingly, the suspicious announcements were only picked up by only one RIS Peer. The blog post raises concerns about the low visibility of these announcements and suggests the possibility of a RIS peer malfunction. #CodeBGP #routingsecurity
I have been in multiple NOG meetings all over the world, but I have never seen this before. @ITNOG_IT provides dedicated space and a meeting arrangement tool to facilitate bilateral B2B meetings!🙌 Great idea indeed, which many NOGs can consider🤓 #CodeBGP #ITNOG7 @nogalliance
Always enjoy attending a @ripencc meeting, and #RIPE86 was no exception, I had a blast! 😊 See you all at Rome 🇮🇹 #CodeBGP
Beware of Greeks bearing gifts...or is it actually the Danes? 😋 Thank you @DKNOG for the lovely presents! 🙃 #DKNOG13 #CodeBGP
I really enjoyed presenting at #DKNOG13, warm, vibrant and inclusive community, highly recommended experience! Looking forward to the next @DKNOG! 😊 #CodeBGP
At Code BGP we are using a cutting edge software stack to achieve real-time routing state views and alerts. With this stack, we can inform our users on critical incidents like route leaks or BGP hijacks in seconds instead of hours. #CodeBGP #networkmonitoring #networksecurity
🧵1/3 Since last night the @CodeBGP Platform has detected that AS17639 is hijacking prefix 2001:500:a8::/48, which belongs to @NASA (Ames Research Center) and serves as the IPv6 prefix of the “E-Root” domain server. #hijack #routingsecurity #CodeBGP
🧵1/3 The @CodeBGP Platform has detected that AS137661 is announcing prefix 199.7.83.0/24, which belongs to @ICANN and is the “L-Root” IPv4 DNS prefix. Blog post with all the details: codebgp.com/blog/suspiciou… #CodeBGP #RoutingSecurity
I had a blast presenting the "Bogons Observatory" at #NANOG88! Link to the presentation slides: storage.googleapis.com/site-media-pro… #CodeBGP
My Lighting Talk "Bogons Observatory" in #RIPE86 is online! 🤓 Take a look if interested in Bogons, which are prefixes and ASes that persist in the global routing table, despite the fact they are reserved, unallocated or unassigned. #CodeBGP ripe86.ripe.net/archives/video…
Code BGP combines streaming BGP sources with Kafka, PostgreSQL and Hasura GraphQL, coordinated by Go mservices to adapt, process and expose alertable real-time BGP state. Sign up at cloud.codebgp.com/?tenant=public… and check codebgp.com/platform/ use cases. #CodeBGP #networksecurity
Extremely happy and honored to have attended #GRNOG14 and presented our approach on real-time access on BGP data using GraphQL! Many thanks to the organizers, it is always a great opportunity to connect! codebgp.com/blog/code-bgp-… #GRNOG #CodeBGP
Had a lot of fun attending and presenting the @CodeBGP Platform at @ITNOG_IT. 280+ attendees! Saw old friends, made new ones and had the chance for a bit of sightseeing, Bologna is a beautiful city. Looking forward to coming back next year! 🤓 #CodeBGP itnog.it/itnog7/
Visit of CISCO / ThousandEyes to the @ICS_FORTH following the acquisition of the #CodeBGP technology company. You can read more: ics.forth.gr/new/15748?lang… @FORTH_ITE
Visit of CISCO / ThousandEyes to the @ICS_FORTH following the acquisition of the #CodeBGP technology company. You can read more: ics.forth.gr/new/15748?lang… @FORTH_ITE
Quick detection & remediation are key to protect users & prevent downtime. #BGP visibility essential for organizations relying on the Internet. #Cisco's active acquisitions: #CodeBGP, #Oort, #SamKnows, #AccedianNetworks & more enhancing network capabilities & security. #TechNews
My #NANOG88 talk "Bogons Observatory" is online! 🤓 See how you can use our @CodeBGP platform and identify in real time who is announcing, accepting and/or propagating Bogon prefixes and ASNs. #CodeBGP youtube.com/watch?v=ShzJgl…
youtube.com
YouTube
4778 Bogons Observatory
Thank you @swinog for hosting my presentation today! Great venue at the high areas of Bern :), and fantastic organization and attendance! Very nice experience and community! #CodeBGP #routing #graphql #bgp
I had a blast presenting the "Bogons Observatory" at #NANOG88! Link to the presentation slides: storage.googleapis.com/site-media-pro… #CodeBGP
Always enjoy attending a @ripencc meeting, and #RIPE86 was no exception, I had a blast! 😊 See you all at Rome 🇮🇹 #CodeBGP
My Lighting Talk "Bogons Observatory" in #RIPE86 is online! 🤓 Take a look if interested in Bogons, which are prefixes and ASes that persist in the global routing table, despite the fact they are reserved, unallocated or unassigned. #CodeBGP ripe86.ripe.net/archives/video…
3/3 Interestingly, the suspicious announcements were only picked up by only one RIS Peer. The blog post raises concerns about the low visibility of these announcements and suggests the possibility of a RIS peer malfunction. #CodeBGP #routingsecurity
Had a lot of fun attending and presenting the @CodeBGP Platform at @ITNOG_IT. 280+ attendees! Saw old friends, made new ones and had the chance for a bit of sightseeing, Bologna is a beautiful city. Looking forward to coming back next year! 🤓 #CodeBGP itnog.it/itnog7/
I have been in multiple NOG meetings all over the world, but I have never seen this before. @ITNOG_IT provides dedicated space and a meeting arrangement tool to facilitate bilateral B2B meetings!🙌 Great idea indeed, which many NOGs can consider🤓 #CodeBGP #ITNOG7 @nogalliance
Extremely happy and honored to have attended #GRNOG14 and presented our approach on real-time access on BGP data using GraphQL! Many thanks to the organizers, it is always a great opportunity to connect! codebgp.com/blog/code-bgp-… #GRNOG #CodeBGP
🧵1/3 The @CodeBGP Platform has detected that AS137661 is announcing prefix 199.7.83.0/24, which belongs to @ICANN and is the “L-Root” IPv4 DNS prefix. Blog post with all the details: codebgp.com/blog/suspiciou… #CodeBGP #RoutingSecurity
Excited my talk about #BGP Security is accepted at #ITNOG7! 🤓 Looking forward to seeing friends in Bologna. #CodeBGP @ITNOG_IT itnog.it/itnog7/
Code BGP combines streaming BGP sources with Kafka, PostgreSQL and Hasura GraphQL, coordinated by Go mservices to adapt, process and expose alertable real-time BGP state. Sign up at cloud.codebgp.com/?tenant=public… and check codebgp.com/platform/ use cases. #CodeBGP #networksecurity
At Code BGP we are using a cutting edge software stack to achieve real-time routing state views and alerts. With this stack, we can inform our users on critical incidents like route leaks or BGP hijacks in seconds instead of hours. #CodeBGP #networkmonitoring #networksecurity
I was just blown away by a demo of a tool called #CodeBGP Platform. Find @CodeBGP Lefteris Manassakis at #IETF115 to see for yourself!
🧵1/3 Since last night the @CodeBGP Platform has detected that AS17639 is hijacking prefix 2001:500:a8::/48, which belongs to @NASA (Ames Research Center) and serves as the IPv6 prefix of the “E-Root” domain server. #hijack #routingsecurity #CodeBGP
3/3 Interestingly, the suspicious announcements were only picked up by only one RIS Peer. The blog post raises concerns about the low visibility of these announcements and suggests the possibility of a RIS peer malfunction. #CodeBGP #routingsecurity
I have been in multiple NOG meetings all over the world, but I have never seen this before. @ITNOG_IT provides dedicated space and a meeting arrangement tool to facilitate bilateral B2B meetings!🙌 Great idea indeed, which many NOGs can consider🤓 #CodeBGP #ITNOG7 @nogalliance
Beware of Greeks bearing gifts...or is it actually the Danes? 😋 Thank you @DKNOG for the lovely presents! 🙃 #DKNOG13 #CodeBGP
Always enjoy attending a @ripencc meeting, and #RIPE86 was no exception, I had a blast! 😊 See you all at Rome 🇮🇹 #CodeBGP
Check out our latest blog post, where we analyze the root causes of @Facebook's global outage! bit.ly/3lyIDr7 #facebookdown #CodeBGP
At Code BGP we are using a cutting edge software stack to achieve real-time routing state views and alerts. With this stack, we can inform our users on critical incidents like route leaks or BGP hijacks in seconds instead of hours. #CodeBGP #networkmonitoring #networksecurity
🧵1/3 The @CodeBGP Platform has detected that AS137661 is announcing prefix 199.7.83.0/24, which belongs to @ICANN and is the “L-Root” IPv4 DNS prefix. Blog post with all the details: codebgp.com/blog/suspiciou… #CodeBGP #RoutingSecurity
Pictures from the last #GRNOG, where @vkotronis and myself presented the Code BGP Platform, met with old friends and made new ones. We had a blast! 😊 grnog.indico.nogalliance.org/event/5/contri… #CodeBGP
I really enjoyed presenting at #DKNOG13, warm, vibrant and inclusive community, highly recommended experience! Looking forward to the next @DKNOG! 😊 #CodeBGP
I had a blast presenting the "Bogons Observatory" at #NANOG88! Link to the presentation slides: storage.googleapis.com/site-media-pro… #CodeBGP
Yesterday I presented "BGP Zombies - Ghost routes as seen by BGP monitoring platforms" at the stage of #NANOG87, and then I went to my first ever #NBA game. What a day! 🤓🤯 storage.googleapis.com/site-media-pro… #CodeBGP #blownaway
Something went wrong.
Something went wrong.
United States Trends
- 1. Grammy 234K posts
- 2. Clipse 14.1K posts
- 3. Kendrick 51.6K posts
- 4. Dizzy 8,582 posts
- 5. olivia dean 11.8K posts
- 6. addison rae 18.8K posts
- 7. AOTY 17K posts
- 8. Katseye 99.8K posts
- 9. Leon Thomas 14.8K posts
- 10. gaga 89.2K posts
- 11. #FanCashDropPromotion 3,427 posts
- 12. Kehlani 30K posts
- 13. ravyn lenae 2,557 posts
- 14. lorde 10.7K posts
- 15. Durand 4,380 posts
- 16. Alfredo 2 N/A
- 17. Album of the Year 54.1K posts
- 18. The Weeknd 9,967 posts
- 19. #FridayVibes 6,833 posts
- 20. Alex Warren 5,955 posts