Apologies for the servfails; should be fixed. You have a healthy RIPE Atlas population!
For folks interested: we ran an "IPv6 hitlist" study a few years ago because researchers like reachable targets in many networks, but IPv6 isn't brute-force scannable like the old world. These RIPE Atlas measurements have been running for a couple of years; each probe resolves the name above to get a recent address from the list, and runs a traceroute to the address it got. Each query/traceroute is paced about two minutes apart. Last time somebody spotted a breakage was December 2020. 'tis the season! https://www.ripe.net/ripe/mail/archives/ripe-atlas/2020-December/004548.html The original paper is available at https://ipv6hitlist.github.io/; the RIPE Atlas campaign is a continuation that hasn't had much focus. The data's all public; measurement results are available above or in the public bigquery datasets. S. On Tue, 14 Dec 2021 at 09:54, Paul Mansfield <[email protected]> wrote: > it was suggested that he might be willing to give a talk at a UKNOF > conference. > >
