APNIC is the Regional Internet Registry administering IP addresses for the Asia Pacific

Banner image for APRICOT 2025 Call for Presentations open now article.
APRICOT 2025 Call for Presentations open now

By Mark Tinka

If you have an interesting presentation to share on Internet operations, submit a paper for APRICOT 2025.

Banner image for Event Wrap: SGNOG 11 article.
Event Wrap: SGNOG 11

By Samantha Douglas

Zen Ng showcased DASH at SGNOG 11, held in Singapore on 27 September 2024.

Homepage highlight
Banner image for Relive APNIC 58 article.
Relive APNIC 58
Relive the APNIC 58 sessions or catch up on those sessions you missed by watching the recordings. See you at APRICOT 2025.
Banner image for The strange cases of consumer-grade routers on puny power supplies article.
The strange cases of consumer-grade routers on puny power supplies

By Ulrich Speidel

Guest Post: Investigating the least likely suspect in router configuration.

Banner image for [Podcast] The back of the class: Looking at 240/4 reachability article.
[Podcast] The back of the class: Looking at 240/4 reachability

By George Michaelson

Geoff Huston discusses measuring the routability of 240.0.0.0/4 class-E addresses.

Banner image for Empowering remote agricultural communities in Lao PDR through IoT technology article.
Empowering remote agricultural communities in Lao PDR through IoT technology

By Arthur Gilly

Guest Post: Developing affordable IoT technology to provide reliable, relevant agricultural data and forecasting information for remote farmers.

Banner image for Highlights of AINTEC 2024 article.
Highlights of AINTEC 2024

By George Michaelson

Measuring GenAI usage patterns, dynamic fixed-point values in eBPF, improving TCP/IP performance and more from AINTEC 2024.

Banner image for Event Wrap: APTLD 86 article.
Event Wrap: APTLD 86

By Samantha Douglas

Joyce Chen presented at APTLD 86, held in Da Nang, Viet Nam from 17 to 20 September 2024.

Banner image for How to inspect TLS encrypted traffic article.
How to inspect TLS encrypted traffic

By Erik Hjelmvik

Guest Post: Three methods to decrypt TLS traffic, how each works, and when to use them.