OMZ Global (AS34329) is an industrial process company (eg steel, manufacturing, ship building, etc). I'm going to assume someone who shouldn't have had access to BGP is trying to use it to block GoogleDNS or similar inside the corporation.<p>That or some pretty hilariously heavy-handed state-sponsored hijacking.
Heads up this happened a few days ago, not currently hijacked.<p>Handy tool though, bookmarked it - using the event graph to display route changes as detected over time is a great visualization - would be really cool if there was the same event graph covering the entire internet (though I suspect without some cleverness in both design and implementation, the quantity of data would be prohibitively large for building a useful visualization).
Am I reading this right that leak lasted 2 hours?<p>These are often the result of mistakes. Even if OMZ were a tier 1 provider in RU, the impact would still be limited - I can't see how this could be intentional.
BGPStream [1] and RIPEstat[2], indicate that they also briefly announced prefix 87.23.14.0/24, belonging to a major Italian telco.<p>[1] <a href="https://bgpstream.com/event/17606" rel="nofollow">https://bgpstream.com/event/17606</a><p>[2] <a href="https://stat.ripe.net/widget/announced-prefixes#w.resource=AS34329&w.starttime=2000-08-01T00%3A00" rel="nofollow">https://stat.ripe.net/widget/announced-prefixes#w.resource=A...</a>
The BGPlay visualization on that page appears to be open sourced: <a href="https://github.com/MaxCam/BGPlay" rel="nofollow">https://github.com/MaxCam/BGPlay</a>
* Edited: Disregard this comment *<p>Ok, so if OMZ is Russian, do know this:<p>Russia currently is 'blocking' several websites. I.e. blocking at a DNS level, so this might be half witted attempt on keeping the censorship..<p>And as @swiley noted: some people only use the easier to remember 8.8.8.8 (I do that for instance)