BGP Diversion — Geographic + Temporal Map

The map below shows how Russian Internet operators routed European-allocated address space — before the invasion of Ukraine, during it, and now. Drag the timeline to move through time; press Play to watch routes appear and persist. Read the panel below the map for plain-language explanation of what the arcs mean and why each finding matters.

// Read this first — plain-language primer

The Internet is a network of networks. Each independent network — a corporation, an ISP, a country's state telecom — operates an autonomous system (AS) identified by a number like AS12389. To send a packet from Berlin to Moscow, that packet hops through several ASes in sequence. Which sequence it actually traverses is decided by a protocol called BGP (Border Gateway Protocol).

An IP "prefix" is a contiguous block of addresses written like 91.241.80.0/24. The /24 means 256 addresses. An ASN advertises (via BGP) "I own this prefix, route packets to it through me" — that's an origin announcement. Other ASes around the world hear that and use it.

A "BGP hijack" is when an AS announces a prefix it doesn't actually own. The legitimate owner's traffic can then be redirected through the announcer, or made unreachable, depending on intent. RPKI and IRR are two systems where prefix owners can pre-declare "only these specific ASes are allowed to announce my prefix." When a Russian AS announces a Ukrainian or Czech prefix and neither RPKI nor the IRR has authorized it, that's the hijack shape.

"Transit" is different from "origin." A packet's path goes: start → transit AS → transit AS → … → origin AS. If Russian state telecom appears in the transit list — even when the origin is unchanged — that means Russian infrastructure is in the path. Our analysis distinguishes the two: Track A finds unauthorized origins, Track B finds Russian ASes appearing in the transit hops.

// Narrator —
Loading the map…
Timeline →loading…
Origin hijack (real) Origin hijack (narrow) Crimea integration Jurisdiction laundering (Beget via RETN UK) Pre-war legacy / context flow Nimbus = just appeared
loading…

How to read the arcs

Each arc is a relationship between two ASes (network operators) regarding one specific block of IP addresses. The colors mean:

Line thickness for red arcs scales with the number of RouteViews peers observing the announcement (more peers = thicker = more globally visible). Dot size at each endpoint is uniform.

The seven substantiated findings

AS196638 → Ukrainian /24 cluster (×3 prefixes)

A Russian AS (AS196638) began originating three contiguous Ukrainian-allocated /24s in early March 2026 — 91.241.80.0/24, 91.241.81.0/24, 91.241.82.0/24. All three appeared within nine days of each other. Seventeen RouteViews peers around the world observe the announcement, meaning the route is broadly propagated. Neither RPKI ROA nor RIPE IRR route: object authorizes the announcement. The IPs have no reverse DNS — there's no hosted-service fingerprint to attack or intercept — which is consistent with either BGP-level disruption (making the legitimate holder's space harder to reach) or staging for future deployment.

AS64486 → Czech /24 (since December 2022)

The longest-tenured finding. A Russian AS originating 176.96.229.0/24, a RIPE-Czech-allocated /24, continuously since 29 December 2022. Eighteen RouteViews peers observe it. No reverse DNS. Significantly: the IPs in this block geolocate to Ryazan, Russia — the "Czech" allocation appears to actually serve Russian addresses operationally. Thirty-eight months without RPKI/IRR correction by the registered prefix holder is itself noteworthy: either the holder is unaware, has stopped maintaining the block, or has implicitly accepted the announcement.

AS201097 KVANTA-LLC → French /24 (narrow)

A fresh Russian AS (allocated February 2026) originating 209.131.69.0/24, allocated by RIPE to French hosting company Syslevel. RPKI ROA explicitly rejects this origin; no IRR authorization exists. However, only 2 RouteViews peers observe the announcement, which means the route is barely propagating — likely a local injection, not a globally-effective hijack. Worth noting; not worth a designation referral.

Rostelecom transit on Crimean /20 (×2 AS paths)

This is the Track B finding. A Ukrainian-RIPE-allocated /20 — 81.162.64.0/20, registered to AS198293 GIGABYTE-AS pre-annexation — hosts internet.crimeastar.net, an Internet operator physically located in Russian-occupied Crimea (sample IP geolocates to Bakhchisaray). Post-invasion, BGP paths to this /20 traverse both AS12389 Rostelecom (Russian state telecom) and AS201776 (a Rostelecom subsidiary). These transit relationships did not exist in any of our six pre-war snapshots (2021Q1 through April 2022) and are present in 10 of the 13 recent weekly snapshots. The interpretation is straightforward: Russia is operating occupied-Crimea Internet infrastructure via its own state backbone. Overt integration, not covert diversion.

Jurisdiction laundering — the purple flows (1,163 candidates across 11+ ASes)

A separate category our origin-and-transit framework would have missed entirely — and the reason this map has a fourth color. We bulk-scanned all ~4 million RIPE inetnum objects looking for prefixes that are registered to a non-RU country but whose more-specific WHOIS records show Russian-operator signals (BEGET-MNT, AEZA-MNT, TIMEWEB-MNT, RU-* netnames, etc.), joined to the AS currently announcing them.

1,163 candidate prefixes surfaced, concentrated under 11+ ASes:

The dominant flows are KZ → NL (242 prefixes), RU → SE (64), RU → NL (49), GB → NL (43), GB → LV (36), RS → DE (32), KZ → DE (32), RU → FI (33). Click any purple arc on the map for the detail panel listing the named ASes for that jurisdiction.

This pattern predates the war for the Beget/RETN line (2007+), but the Timeweb-via-Kazakhstan structure was registered in April 2025 — a post-invasion, post-sanctions response. AEZA's 2024 OFAC designation didn't dislodge the EU-registered prefix layer either; the maintainer handles persist.

Track A and Track B both miss this class structurally: the BGP-visible country of origin is the operating AS's RIR allocation country (KZ, GB, RS, NL, etc.), not RU. RPKI ROAs issued by those ASes would validate the announcements cleanly. Only WHOIS analysis of the more-specific inetnum reveals the Russian operator. The dedicated RETN-specific audit lives at /intel/retn-as9002-prefix-audit.html; the broader intel page is /intel/bgp-jurisdiction-laundering.html (being prepared).

Glossary

Two detection layers, neither sees the whole picture

The laundering pattern works because two different surveillance layers observe it inconsistently — and the gap between them is the operational window.

The commercial AS-classifier layer (IPQS, IP2Proxy, Spur, MaxMind GeoIP2-Anonymous, etc.) is what Western compliance teams consume. It tells them: "this AS looks anonymous-network / VPN-shape" — small allocation, recent registration, datacenter address space, individual-owned. What it cannot tell them: who actually operates the AS, which Russian tenants are on its prefixes, and that the structure is sanctions-evasion shape rather than a generic privacy VPN. Compliance teams may block the AS; they don't know whose business they're disrupting.

The Russian-platform-side detection layer (mail.ru, Yandex, VK, Sber, госуслуги) appears to draw on flow-correlation data from upstream ISP-level pipelines. Major Russian platforms detect VPN / proxy connections with multi-second latency — too slow for synchronous commercial-classifier API lookups (sub-50ms typical), but consistent with asynchronous flow metadata propagating from upstream subscriber-attribution systems. Under Russia's SORM-2 / SORM-3 regulatory regime, which mandates ISP-level mirroring of metadata to FSB-controlled buffers, flow-correlated detection of this shape is the operationally plausible mechanism. What this layer sees: Russian-mainland users routing through anomalous foreign-AS endpoints. What it doesn't see: sessions that terminate entirely abroad — the laundering layer is invisible to Russian-side surveillance because the user is foreign.

The asymmetry is the design. A Russian operator builds infrastructure on a foreign-jurisdiction AS to serve content to Russian customers. The Russian platform-side observers can't see sessions where both ends are outside Russian ISPs; the Western compliance teams can see the AS but can't attribute its operator. Both layers know something is happening but neither sees the full picture. Operator attribution at the WHOIS inetnum level — the contribution of this analysis — is the missing piece for the Western side.

Full write-up at /intel/bgp-jurisdiction-laundering.html.

Methodology

Caveats

Full analytical report: docs/BGP_DIVERSION_INTELLIGENCE.md in the sanctions-intelligence repository. Generated 2026-05-20.

// Monthly findings digest

What's new in Russia procurement, sanctions list changes, designation gaps.

One email per month. No marketing pitch. Unsubscribe anytime.