Back to Blog
Networking

BGP: The Protocol That Actually Runs the Internet

By Kunal Khatri·Feb 23, 2026
BGP: The Protocol That Actually Runs the Internet

The internet isn't one network — it's roughly 70,000 separate networks (Autonomous Systems) that exchange traffic with each other. The protocol that coordinates this exchange is BGP, the Border Gateway Protocol. It's been largely unchanged since 1994. It has no built-in authentication. And when it breaks, entire countries go offline.

What BGP Actually Does

BGP is a path vector protocol. Each Autonomous System (AS) — think ISP, CDN, major enterprise — announces the IP prefixes it's responsible for to its BGP neighbours. Those neighbours propagate the announcements to their neighbours. The result is a distributed, globally consistent routing table where every router knows the best path to reach any IP prefix on earth.

'Best path' in BGP means the path with the most favourable combination of policy attributes, not necessarily the fastest or most reliable. BGP is built for policy, not performance. A network can deliberately prefer a longer path through a partner network over a shorter path through a competitor. This is how the commercial relationships between ISPs translate into actual traffic flows.

BGP Route Leaks and Hijacks

A BGP route leak happens when a network accidentally announces IP prefixes it shouldn't be announcing — forwarding routes from one upstream provider to another, drawing traffic through paths that can't handle it. In 2010, China Telecom leaked routes for about 37,000 IP prefixes, briefly redirecting traffic from major US networks through Chinese routers. The traffic itself was probably fine. The possibility that it was inspected is less fine.

BGP hijacking is deliberate. An attacker announces someone else's IP space as their own, diverting traffic to their infrastructure. In 2018, traffic to Amazon's Route 53 DNS service was hijacked for about 2 hours using BGP, redirecting cryptocurrency wallet queries to a fake site. The attack stole roughly $150,000 in cryptocurrency.

Why BGP Is So Vulnerable

BGP was designed in an era when the internet was a trusted research network and the idea of adversarial participants wasn't central to the design. There's no cryptographic verification that a network actually owns the prefixes it announces. RPKI (Resource Public Key Infrastructure) was designed to fix this — it lets networks cryptographically sign their prefix ownership. Adoption is growing but not universal.

Look Up ASN and Routing Information

Check which AS is responsible for any IP address and see its BGP routing details.

IP Lookup Tool
Share this article: