{"id":43267,"date":"2021-10-06T14:49:19","date_gmt":"2021-10-06T14:49:19","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32698\/Tools-To-Explore-BGP-Routes.html"},"modified":"2021-10-06T14:49:19","modified_gmt":"2021-10-06T14:49:19","slug":"tools-to-explore-bgp-routes","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/","title":{"rendered":"Tools To Explore BGP Routes"},"content":{"rendered":"<p>Yesterday there was a big Facebook outage caused by BGP. I\u2019ve been vaguely<br \/>\ninterested in learning more about BGP for a long time, so I was reading a<br \/>\ncouple of articles.<\/p>\n<p>I got frustrated because none of the articles showed me how I could actually<br \/>\nlook up information related to BGP on my computer, so I <a href=\"https:\/\/twitter.com\/b0rk\/status\/1445199475195236356\">wrote a tweet asking for tools<\/a>.<\/p>\n<p>I got a bunch of useful replies as always, so this blog post shows some tools<br \/>\nyou can use to look up BGP information. There might be an above average number<br \/>\nof things wrong in this post because I don\u2019t understand BGP that well.<\/p>\n<h3 id=\"i-can-t-publish-bgp-routes\">I can\u2019t publish BGP routes<\/h3>\n<p>One of the reasons I\u2019ve never learned much about BGP is \u2013 as far as I know, I don\u2019t have access to publish BGP routes on the internet.<\/p>\n<p>With most networking protocols, you can pretty trivially get access to<br \/>\nimplement the protocol yourself if you want. For example you can:<\/p>\n<ul>\n<li>issue your own TLS certificates<\/li>\n<li>write your own HTTP server<\/li>\n<li>write your own TCP implementation<\/li>\n<li>write your own authoritative DNS server for your domain (I\u2019m trying to do that right now for a small project)<\/li>\n<li>set up your own certificate authority<\/li>\n<\/ul>\n<p>But with BGP, I think that unless you own your own ASN, you can\u2019t publish routes yourself!<br \/>\n(you <em>could<\/em> implement BGP on your home network, but that feels a bit boring to<br \/>\nme, when I experiment with things I like them to actually be on the real internet).<\/p>\n<p>Anyway, even though I can\u2019t experiment with it, I still think it\u2019s super<br \/>\ninteresting because I love networking, so I\u2019m going to show you some tools I<br \/>\nfound to learn about BGP \ud83d\ude42<\/p>\n<p>First let\u2019s talk through some BGP terminology though. I\u2019m going to go pretty<br \/>\nfast because I\u2019m more interested in the tools and there are a lot of high level<br \/>\nexplanations of BGP out there (like this <a href=\"https:\/\/blog.cloudflare.com\/october-2021-facebook-outage\/\">cloudflare post<\/a>).<\/p>\n<h3 id=\"what-s-an-as-autonomous-system\">What\u2019s an AS (\u201cautonomous system\u201d)<\/h3>\n<p>The first thing we need to understand is an AS. Every AS:<\/p>\n<ol>\n<li>is owned by an organization (usually a large organization like your ISP, a government, a university, Facebook, etc)<\/li>\n<li>controls a specific set of IP addresses (for example my ISP\u2019s AS includes 247,808 IP addresses)<\/li>\n<li>has a number (like 1403)<\/li>\n<\/ol>\n<p>Here are some observations I made about ASes just by doing some experimentation:<\/p>\n<ul>\n<li>Some fairly big tech companies don\u2019t have their own AS. For example, I<br \/>\nlooked up Patreon on BGPView, and as far as I can tell they don\u2019t own as AS<br \/>\n\u2013 their main site (patreon.com,<br \/>\n<a href=\"https:\/\/bgpview.io\/ip\/104.16.6.49\">104.16.6.49<\/a>) is in Cloudflare\u2019s AS.<\/li>\n<li>An AS can include IPs in many countries. Facebook\u2019s AS (<a href=\"https:\/\/bgpview.io\/asn\/32934#prefixes-v4\">AS32934<\/a>) definitely has IP addresses in Singapore, Canada, Nigeria, Kenya, the US, and more countries.<\/li>\n<li>It seems like IP address can be in more than one AS. For example, if I look up <a href=\"https:\/\/bgpview.io\/ip\/209.216.230.240\">209.216.230.240<\/a>, it has 2 ASNs associated with it \u2013 AS6130 and AS21581. Apparently when this happens the more specific route takes priority \u2013 so packets to that IP would get routed to AS21581.<\/li>\n<\/ul>\n<h3 id=\"what-s-a-bgp-route\">what\u2019s a BGP route?<\/h3>\n<p>There are a lot of routers on the internet. For example, my ISP has routers.<\/p>\n<p>When I send my ISP a packet (for example by running <code>ping 129.134.30.0<\/code>), my ISP\u2019s routers<br \/>\nneeds to figure out how to actually get my packet to the IP address<br \/>\n<code>129.134.30.0<\/code>.<\/p>\n<p>The way the router figures this out is that it has a <strong>route table<\/strong> \u2013 it has a list<br \/>\nof a bunch of IP ranges (like <code>129.134.30.0\/23<\/code>), and routes it knows about to<br \/>\nget to that subnet.<\/p>\n<p>Here\u2019s an example of a real route for <code>129.134.30.0\/23<\/code>: (one of Facebook\u2019s subnets). This one isn\u2019t from my ISP.<\/p>\n<pre><code> 11670 32934 206.108.35.2 from 206.108.35.254 (206.108.35.254) Origin IGP, metric 0, valid, external Community: 3856:55000 Last update: Mon Oct 4 21:17:33 2021\n<\/code><\/pre>\n<p>I think that this is saying that one path to <code>129.134.30.0<\/code> is through the<br \/>\nmachine <code>206.108.35.2<\/code>, which is on its local network. So the router might send<br \/>\nmy ping packet to <code>206.108.35.2<\/code> next, and then <code>206.108.35.2<\/code> will know how to<br \/>\nget it to Facebook. The two numbers at the beginning (<code>11670 32934<\/code>) are ASNs.<\/p>\n<h3 id=\"what-s-bgp\">what\u2019s BGP?<\/h3>\n<p>My understanding of BGP is very shaky, but it\u2019s a protocol that companies use to<br \/>\nadvertise BGP routes.<\/p>\n<p>What happened yesterday with Facebook is that they basically made BGP<br \/>\nannouncements withdrawing all their BGP routes, so every router in the world<br \/>\ndeleted all of its routes related to Facebook, so no traffic could get there.<\/p>\n<p>Okay, now that we\u2019ve covered some basic terminology, let\u2019s talk about tools you<br \/>\ncan use to look at autonomous systems and BGP!<\/p>\n<h3 id=\"tool-1-look-at-your-isp-s-as-with-bgpview\">tool 1: look at your ISP\u2019s AS with BGPView<\/h3>\n<p>To make this AS thing less abstract, let\u2019s use a tool called <a href=\"https:\/\/bgpview.io\">BGPView<\/a> to look at a real AS.<\/p>\n<p>My ISP (EBOX) owns <a href=\"https:\/\/bgpview.io\/asn\/1403\">AS 1403<\/a>. Here are the <a href=\"https:\/\/bgpview.io\/asn\/1403#prefixes-v4\">IP addresses my ISP owns<\/a>. If I look up my<br \/>\ncomputer\u2019s public IPv4 address, I can check that it\u2019s one of the IP addresses<br \/>\nmy ISP owns \u2013 it\u2019s in the <code>104.163.128.0\/17<\/code> block.<\/p>\n<p>BGPView also has this graph of how my ISP is connected to other ASes<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/jvns.ca\/images\/ebox-graph.png\"><\/p>\n<h3 id=\"tool-2-traceroute-a-and-mtr-z\">tool 2: <code>traceroute -A<\/code> and <code>mtr -z<\/code><\/h3>\n<p>Okay, so we\u2019re interested in autonomous systems. Let\u2019s see which ASes I go through from<\/p>\n<p><code>traceroute<\/code> and <code>mtr<\/code> both have options to tell you the ASN for every IP you go through. The flags are <code>traceroute -A<\/code> and <code>mtr -z<\/code>, respectively.<\/p>\n<p>Let\u2019s see which autonomous systems I go through on my way to facebook.com with <code>mtr<\/code>!<\/p>\n<pre><code>$ mtr -z facebook.com 1. AS??? LEDE.lan 2. AS1403 104-163-190-1.qc.cable.ebox.net 3. AS??? 10.170.192.58 4. AS1403 0.et-5-2-0.er1.mtl7.yul.ebox.ca 5. AS1403 0.ae17.er2.mtl3.yul.ebox.ca 6. AS1403 0.ae0.er1.151fw.yyz.ebox.ca 7. AS??? facebook-a.ip4.torontointernetxchange.net 8. AS32934 po103.psw01.yyz1.tfbnw.net 9. AS32934 157.240.38.75 10. AS32934 edge-star-mini-shv-01-yyz1.facebook.com <\/code><\/pre>\n<p>This is interesting \u2013 it looks like we go directly from my ISP\u2019s AS (1403) to<br \/>\nFacebook\u2019s AS (32934), with an \u201cinternet exchange\u201d in between.<\/p>\n<p><small><br \/>\nI\u2019m not sure what an <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_exchange_point\">internet<br \/>\nexchange<\/a> is but I know<br \/>\nthat it\u2019s an extremely important part of the internet. That\u2019s going to be for<br \/>\nanother day though. My best guess is that it\u2019s the part of the internet that<br \/>\nenables \u201cpeering\u201d \u2013 like an IX is a server room with a gigantic switch with<br \/>\ninfinite bandwith in it where a bunch of different companies put their<br \/>\ncomputers so they can send each other packets.<br \/>\n<\/small><\/p>\n<h3 id=\"mtr-looks-up-asns-with-dns\">mtr looks up ASNs with DNS<\/h3>\n<p>I got curious about how mtr looks up ASNs, so I used strace. I saw that it looked like it was using DNS, so I ran <a href=\"https:\/\/github.com\/jvns\/dnspeep\/\">dnspeep<\/a>, and voila!<\/p>\n<pre><code>$ sudo dnspeep\n...\nTXT 1.190.163.104.origin.asn.cymru.com 192.168.1.1 TXT: 1403 | 104.163.176.0\/20 | CA | arin | 2014-08-14, TXT: 1403 | 104.163.160.0\/19 | CA | arin | 2014-08-14, TXT: 1403 | 104.163.128.0\/17 | CA | arin | 2014-08-14\n...\n<\/code><\/pre>\n<p>So it looks like we can find the ASN for <code>104.163.190.1<\/code> by looking up the <code>txt<\/code> record on <code>1.190.163.104.origin.asn.cymru.com<\/code>, like this:<\/p>\n<pre><code>$ dig txt 1.190.163.104.origin.asn.cymru.com\n1.190.163.104.origin.asn.cymru.com. 13911 IN TXT \"1403 | 104.163.160.0\/19 | CA | arin | 2014-08-14\"\n1.190.163.104.origin.asn.cymru.com. 13911 IN TXT \"1403 | 104.163.128.0\/17 | CA | arin | 2014-08-14\"\n1.190.163.104.origin.asn.cymru.com. 13911 IN TXT \"1403 | 104.163.176.0\/20 | CA | arin | 2014-08-14\"\n<\/code><\/pre>\n<p>That\u2019s cool! Let\u2019s keep moving though.<\/p>\n<h3 id=\"tool-3-the-packet-clearing-house-looking-glass\">tool 3: the packet clearing house looking glass<\/h3>\n<p>PCH (\u201cpacket clearing house\u201d) is the organization that runs a lot of internet<br \/>\nexchange points. A \u201clooking glass\u201d seems to be a generic term for a web form<br \/>\nthat lets you run network commands from another person\u2019s computer. There are<br \/>\nlooking glasses that don\u2019t support BGP, but I\u2019m just interested in ones that<br \/>\nshow you information about BGP routes.<\/p>\n<p>Here\u2019s the PCH looking glass: <a href=\"https:\/\/www.pch.net\/tools\/looking_glass\/\">https:\/\/www.pch.net\/tools\/looking_glass\/<\/a>.<\/p>\n<p>In the web form on that site, I picked the Toronto IX (\u201cTORIX\u201d), since that\u2019s what <code>mtr<\/code> said I was using to go to facebook.com.<\/p>\n<p><strong>thing 1: \u201cshow ip bgp summary\u201d<\/strong><\/p>\n<p>Here\u2019s the output. I\u2019ve redacted some of it:<\/p>\n<pre><code>IPv4 Unicast Summary:\nBGP router identifier 74.80.118.4, local AS number 3856 vrf-id 0\nBGP table version 33061919\nRIB entries 513241, using 90 MiB of memory\nPeers 147, using 3003 KiB of memory\nPeer groups 8, using 512 bytes of memory Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up\/Down State\/PfxRcd\n...\n206.108.34.248 4 1403 484672 466938 0 0 0 05w3d03h 50\n...\n206.108.35.2 4 32934 482088 466714 0 0 0 01w6d07h 38\n206.108.35.3 4 32934 482019 466475 0 0 0 01w0d06h 38\n... Total number of neighbors 147\n<\/code><\/pre>\n<p>My understanding of what this is saying is that the Toronto Internet Exchange<br \/>\n(\u201cTORIX\u201d) is directly connected to both my ISP (EBOX, AS 1403) and Facebook (AS<br \/>\n32934).<\/p>\n<p><strong>thing 2: \u201cshow ip bgp 129.134.30.0\u201d<\/strong><\/p>\n<p>Here\u2019s the output of picking \u201cshow ip bgp\u201d for <code>129.134.30.0<\/code> (one of Facebook\u2019s IP addresses):<\/p>\n<pre><code>BGP routing table entry for 129.134.30.0\/23\nPaths: (4 available, best #4, table default) Advertised to non peer-group peers: 206.220.231.55 11670 32934 206.108.35.2 from 206.108.35.254 (206.108.35.254) Origin IGP, metric 0, valid, external Community: 3856:55000 Last update: Mon Oct 4 21:17:33 2021 11670 32934 206.108.35.2 from 206.108.35.253 (206.108.35.253) Origin IGP, metric 0, valid, external Community: 3856:55000 Last update: Mon Oct 4 21:17:31 2021 32934 206.108.35.3 from 206.108.35.3 (157.240.58.225) Origin IGP, metric 0, valid, external, multipath Community: 3856:55000 Last update: Mon Oct 4 21:17:27 2021 32934 206.108.35.2 from 206.108.35.2 (157.240.58.182) Origin IGP, metric 0, valid, external, multipath, best (Older Path) Community: 3856:55000 Last update: Mon Oct 4 21:17:27 2021\n<\/code><\/pre>\n<p>This seems to be saying that there are 4 routes to Facebook from that internet exchange.<\/p>\n<p><strong>the quebec internet exchange doesn\u2019t seem to know anything about Facebook<\/strong><\/p>\n<p>I also tried the same thing from the Quebec internet exchange QIX (which is<br \/>\npresumably closer to me, since I live in Montreal and not Toronto). But the QIX<br \/>\ndoesn\u2019t seem to know anything about Facebook \u2013 when I put in <code>129.134.30.0<\/code> it<br \/>\njust says \u201c% Network not in table\u201d.<\/p>\n<p>So I guess that\u2019s why I was sent through the Toronto IX and not the Quebec one.<\/p>\n<h3 id=\"more-bgp-looking-glasses\">more BGP looking glasses<\/h3>\n<p>Here are some more websites with looking glasses that will give you similar<br \/>\ninformation from other points of view. They all seem to support the same <code>show ip bgp<\/code> syntax, maybe because they\u2019re running the same software? I\u2019m not sure.<\/p>\n<p>There seem to be a LOT of these looking glass services out there, way more than just those 3 lists.<\/p>\n<p>Here\u2019s an example session with one of the servers on this list:<br \/>\nroute-views.routeviews.org. This time I connected via telnet and not through a<br \/>\nweb form, but the output looks like it\u2019s in the same format.<\/p>\n<pre><code>$ telnet route-views.routeviews.org route-views&gt;show ip bgp 31.13.80.36 BGP routing table entry for 31.13.80.0\/24, version 1053404087\nPaths: (23 available, best #2, table default) Not advertised to any peer Refresh Epoch 1 3267 1299 32934 194.85.40.15 from 194.85.40.15 (185.141.126.1) Origin IGP, metric 0, localpref 100, valid, external path 7FE0C3340190 RPKI State valid rx pathid: 0, tx pathid: 0 Refresh Epoch 1 6939 32934 64.71.137.241 from 64.71.137.241 (216.218.252.164) Origin IGP, localpref 100, valid, external, best path 7FE135DB6500 RPKI State valid rx pathid: 0, tx pathid: 0x0 Refresh Epoch 1 701 174 32934 137.39.3.55 from 137.39.3.55 (137.39.3.55) Origin IGP, localpref 100, valid, external path 7FE1604D3AF0 RPKI State valid rx pathid: 0, tx pathid: 0 Refresh Epoch 1 20912 3257 1299 32934 212.66.96.126 from 212.66.96.126 (212.66.96.126) Origin IGP, localpref 100, valid, external Community: 3257:8095 3257:30622 3257:50001 3257:53900 3257:53904 20912:65004 path 7FE1195AF140 RPKI State valid rx pathid: 0, tx pathid: 0 Refresh Epoch 1 7660 2516 1299 32934 203.181.248.168 from 203.181.248.168 (203.181.248.168) Origin IGP, localpref 100, valid, external Community: 2516:1030 7660:9001 path 7FE0D195E7D0 RPKI State valid rx pathid: 0, tx pathid: 0 <\/code><\/pre>\n<p>Here there are a few options for routes:<\/p>\n<ul>\n<li><code>3267 1299 32934<\/code><\/li>\n<li><code>6939 32934<\/code><\/li>\n<li><code>701 174 32934<\/code><\/li>\n<li><code>20912 3257 1299 32934<\/code><\/li>\n<li><code>7660 2516 1299 32934<\/code><\/li>\n<\/ul>\n<p>I think the reason there\u2019s more than one AS in all of these is that <code>31.13.80.36<\/code> is a Facebook IP address in<br \/>\nToronto, so this server (which is maybe on the US west coast, I\u2019m not sure) is<br \/>\nnot able to connect to it directly, it needs to go to another AS first. So all of the routes have one or more ASNs<\/p>\n<p>The shortest one is 6939 (\u201cHurricane Electric\u201d), which is a \u201cglobal internet backbone\u201d. They also have their own <a href=\"https:\/\/lg.he.net\/\">hurricane electric looking glass<\/a> page.<\/p>\n<h3 id=\"tool-4-bgplay\">tool 4: BGPlay<\/h3>\n<p>All the other tools so far have just shown us the current state of Facebook<br \/>\nrouting where everything is fine, but this 4th tool lets us see the history of<br \/>\nthis Facebook BGP internet disaster! It\u2019s a GUI tool so I\u2019m going to include a bunch of screenshots.<\/p>\n<p>The tool is at <a href=\"https:\/\/stat.ripe.net\/special\/bgplay\">https:\/\/stat.ripe.net\/special\/bgplay<\/a>. I typed in the IP address 129.134.30.12 (one of Facebook\u2019s IPs), if you want to play along.<\/p>\n<p>First, let\u2019s look at the state of things before everything went wrong. I clicked in the timeline at 13:11:28 on Oct. 4, and got this:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/jvns.ca\/images\/bgplay-before.png\"><\/p>\n<p>I originally found this very overwhelming. What\u2019s happening? But then someone<br \/>\non Twitter pointed out that the next place to look is to click on the timeline<br \/>\nright <em>after<\/em> the Facebook disaster happened (at 18:38 on Oct. 4).<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/jvns.ca\/images\/bgplay-after.png\"><\/p>\n<p>It\u2019s pretty clear that something is wrong in this picture \u2013 all the BGP routes are gone! oh no!<\/p>\n<p>The text at the top shows the last Facebook BGP route disappearing:<\/p>\n<pre><code>Type: W &gt; withdrawal Involving: 129.134.30.0\/24\nShort description: The route 50869, 25091, 32934 has been withdrawn.\nDate and time: 2021-10-04 16:02:33 Collected by: 20-91.206.53.12\n<\/code><\/pre>\n<p>If I then click the \u201cfast forward\u201d button, we see the BGP routes start to come back:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/jvns.ca\/images\/bgplay-return.png\"><\/p>\n<p>The first one announced is <code>137409 32934<\/code>. I don\u2019t think this is <em>actually<\/em> the<br \/>\nfirst one announced though \u2013 there are a lot of route announcements inside the<br \/>\nsame second (at 2021-10-04 21:00:40), and I think the ordering inside BGPlay is arbitrary.<\/p>\n<p>If I click the \u201cfast forward\u201d button again, more and more routes start to come back and routing starts to go back to normal<\/p>\n<p>I found looking at this outage in BGPlay really fun, even though the interface is pretty confusing at first.<\/p>\n<h3 id=\"maybe-it-is-important-to-understand-a-little-about-bgp\">maybe it is important to understand a little about BGP?<\/h3>\n<p>I started out this post by saying you can\u2019t change BGP routes<br \/>\nBGP, but then I remembered that in 2016 or 2017 there was a <a href=\"https:\/\/news.ycombinator.com\/item?id=14246888\">Telia routing issue<\/a> that caused us some minor<br \/>\nnetwork at work. And when that happens, it is actually useful to understand why<br \/>\nyour customers can\u2019t reach your site, even if it\u2019s totally out of your control.<br \/>\nI didn\u2019t know about any of these tools at that time but I would have liked to!<\/p>\n<p>I think for most companies all you can do to respond to outages caused by<br \/>\nsomeone else\u2019s bad BGP routes is \u201cdo nothing and wait for it to get fixed\u201d, but<br \/>\nit\u2019s nice to be able to <em>confidently<\/em> do nothing.<\/p>\n<h3 id=\"some-ways-to-publish-bgp-routes\">some ways to publish BGP routes<\/h3>\n<p>If you want to (as a hobbyist) actually publish BGP routes, here are some links from the comments:<\/p>\n<ul>\n<li><a href=\"https:\/\/labs.ripe.net\/author\/samir_jafferali\/build-your-own-anycast-network-in-nine-steps\/\">a guide to getting your own ASN<\/a><\/li>\n<li><a href=\"https:\/\/dn42.eu\/Home\">dn42<\/a> seems to have a playground for BGP (it\u2019s not on the public internet, but it does have other people on it which seems more fun than just doing BGP by yourself at home)<\/li>\n<\/ul>\n<h3 id=\"that-s-all-for-now\">that\u2019s all for now<\/h3>\n<p>I think there are a lot more BGP tools (like PCH has a bunch of <a href=\"https:\/\/www.pch.net\/resources\/Routing_Data\/IPv4_daily_snapshots\/\">daily snapshots of routing data<\/a> which look like fun), but<br \/>\nthis post is already pretty long and there are other things I need to do today.<\/p>\n<p>I was surprised by how much information I could get about BGP just as a regular<br \/>\nperson, I always think of it as a \u201csecret network wizard\u201d thing but apparently there<br \/>\nare all kind of public machines anybody can just telnet to and use to look at the<br \/>\nroute tables! Who knew!<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32698\/Tools-To-Explore-BGP-Routes.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43268,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9680],"class_list":["post-43267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinedenial-of-servicefacebooksocialscience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tools To Explore BGP Routes 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tools To Explore BGP Routes 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-06T14:49:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/tools-to-explore-bgp-routes.png\" \/>\n\t<meta property=\"og:image:width\" content=\"609\" \/>\n\t<meta property=\"og:image:height\" content=\"775\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Tools To Explore BGP Routes\",\"datePublished\":\"2021-10-06T14:49:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/\"},\"wordCount\":2087,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/tools-to-explore-bgp-routes.png\",\"keywords\":[\"headline,denial of service,facebook,social,science\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/\",\"name\":\"Tools To Explore BGP Routes 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/tools-to-explore-bgp-routes.png\",\"datePublished\":\"2021-10-06T14:49:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/tools-to-explore-bgp-routes.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/tools-to-explore-bgp-routes.png\",\"width\":609,\"height\":775},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tools-to-explore-bgp-routes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,denial of service,facebook,social,science\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinedenial-of-servicefacebooksocialscience\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tools To Explore BGP Routes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tools To Explore BGP Routes 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/","og_locale":"en_US","og_type":"article","og_title":"Tools To Explore BGP Routes 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-06T14:49:19+00:00","og_image":[{"width":609,"height":775,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/tools-to-explore-bgp-routes.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Tools To Explore BGP Routes","datePublished":"2021-10-06T14:49:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/"},"wordCount":2087,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/tools-to-explore-bgp-routes.png","keywords":["headline,denial of service,facebook,social,science"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/","url":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/","name":"Tools To Explore BGP Routes 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/tools-to-explore-bgp-routes.png","datePublished":"2021-10-06T14:49:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/tools-to-explore-bgp-routes.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/tools-to-explore-bgp-routes.png","width":609,"height":775},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tools-to-explore-bgp-routes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,denial of service,facebook,social,science","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinedenial-of-servicefacebooksocialscience\/"},{"@type":"ListItem","position":3,"name":"Tools To Explore BGP Routes"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43267"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43267\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43268"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}