frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
503•klaussilveira•8h ago•139 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
842•xnx•14h ago•506 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
57•matheusalmeida•1d ago•11 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
166•dmpetrov•9h ago•76 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
166•isitcontent•8h ago•18 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
281•vecti•11h ago•127 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
60•quibono•4d ago•10 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
340•aktau•15h ago•164 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
226•eljojo•11h ago•141 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
332•ostacke•14h ago•89 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
422•todsacerdoti•16h ago•221 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
34•kmm•4d ago•2 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
364•lstoll•15h ago•251 comments

Show HN: ARM64 Android Dev Kit

https://github.com/denuoweb/ARM64-ADK
12•denuoweb•1d ago•0 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
79•SerCe•4h ago•60 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
59•phreda4•8h ago•9 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
16•gmays•3h ago•2 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
211•i5heu•11h ago•158 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
9•romes•4d ago•1 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
123•vmatsiiako•13h ago•51 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
33•gfortaine•6h ago•9 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
160•limoce•3d ago•80 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
258•surprisetalk•3d ago•34 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1020•cdrnsf•18h ago•425 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
52•rescrv•16h ago•17 comments

Evaluating and mitigating the growing risk of LLM-discovered 0-days

https://red.anthropic.com/2026/zero-days/
44•lebovic•1d ago•13 comments

I'm going to cure my girlfriend's brain tumor

https://andrewjrod.substack.com/p/im-going-to-cure-my-girlfriends-brain
96•ray__•5h ago•46 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
81•antves•1d ago•59 comments

How virtual textures work

https://www.shlom.dev/articles/how-virtual-textures-really-work/
36•betamark•15h ago•29 comments

WebView performance significantly slower than PWA

https://issues.chromium.org/issues/40817676
10•denysonique•5h ago•1 comments
Open in hackernews

BGP.Tools: Browse the Internet Ecosystem

https://bgp.tools/
302•RGBCube•6mo ago

Comments

dapperdrake•6mo ago
This tool looks really good. It seems like soon ASN level bot-curbing will become common.
RGBCube•6mo ago
It is really good for blocking whole Chinese & LLM scraper ASNs!
LohnChen•6mo ago
why u have to mention Chinese?
RGBCube•6mo ago
Anyone who has operated a public webserver knows that the vast majority of the rabid, robots.txt ignoring hyperscrapers are from Chinese autonomous systems
ranger_danger•6mo ago
cidr-report.org has been around for over 20 years, curious why you think this site now will make a difference with blocking bots?
supriyo-biswas•6mo ago
Most people don't know about it; in fact most of the IP geolocation providers pull their data from cidr-report.org or thyme.apnic.net.
zinekeller•6mo ago
I'm not shocked. ASN blocking is well-known among people who I can easily called experts (veterans which can set up a reasonable-ish firewall from base principles) and ASN control is exposed in major cloud firewalls, but younger people (except those who were trained with deep networking skills) don't really understand ASNs for some reason.
TheBoozyGenius•6mo ago
Pretty zany.
ddtaylor•6mo ago
A while ago there was a large data center outage that effected a lot of popular services and I speculated it might have been BGP, but it wasn't.

During that time I was trying to learn BGP on-the-fly enough to know if this was a thing and I didn't have a lot of luck.

What are some good methods or tools to know if BGP is causing a large scale outage before other experts have reported it?

dgl•6mo ago
https://radar.cloudflare.com/routing might be of interest for aggregated data that doesn't require a complete understanding of the internet. The global looking glass that bgp.tools has is pretty powerful too, but it gives you a lot of data, so if you don't know what you're looking for or what it should look like it's hard to say something is wrong.
Hikikomori•6mo ago
Its usually not BGP, its some operator misconfiguring BGP, and there's loads of ways of doing that and its hard to know what that would look like from a remote view like your own network. Most efficient way is to just compare current bad state to previous good state and look at the diff, ie what changed for some prefix in your table compared to previous version of your table.
rumblefrog•6mo ago
I find the map the most interesting map: https://map.bgp.tools/

And did not know Mercedes holds such a large block (53.0.0.0/8), and it appears to be mostly dark or unused.

mike_d•6mo ago
The map also does a good job showing why we need to do away with multicast/class E and reuse the address space.
kortilla•6mo ago
You can’t use multicast because multicast addresses work today on private networks
doughecka•6mo ago
Lol, then what do we do with all the multicast traffic?
ranger_danger•6mo ago
Surely something from https://en.wikipedia.org/wiki/Reserved_IP_addresses could be repurposed?
teaearlgraycold•6mo ago
Holy cow. Didn’t realize there is an entire /4 reserved for future use.
yardstick•6mo ago
240/4 can be hijacked/used as private IP space currently by a lot of devices. I think Windows might be the hold out. But for internal routing and IoT it’s very useful. Can never be used as publicly routable space.

I’d like to see it added to the official list of private space alongside RFC1918.

globular-toast•6mo ago
Not sure why you'd need more than 10/8, but I suppose it looks even cooler too those who know and find such things cool.

Does Windoze prevent you from using certain IPv4 addresses?

Hikikomori•6mo ago
Aws sized companies, we also use them in aws. And no doesn't work on windows.
throw0101b•6mo ago
> Not sure why you'd need more than 10/8

Large organizations have moved to IPv6 because they, and everyone else, are using 10/8, and so when mergers and acquisitions happen trying to connect the networks together becomes a nightmare.

See this talk from Wells Fargo as an example:

* https://www.youtube.com/watch?v=EzTWjNUb4H4

yardstick•6mo ago
The pain of merging acquired company networks cannot be overstated!

IPv6 can help, but in my experience there's just soo much old IPv4 tech that no one is prepared to migrate to IPv6.

mrbluecoat•6mo ago
https://www.ietf.org/archive/id/draft-schoen-intarea-unicast... is a nice historical overview of 240/4
teddyh•6mo ago
Why? It would be to the benefit of relatively few and be an enormous technical problem for decades for everyone. If we did this, the IPv4 addresses would run out again after a few months at most, leaving us all in the same position we are in today, but also with a huge technical problem of fixing all the old devices which had these now-repurposed networks hardcoded.

If you are fine with doing the work of obsoleting old equipment, then just start using IPv6.

sgjohnson•6mo ago
No. It will take 10 years for everyone to update their router configuration/software to treat the new “formely-reserved” addresses as global unicast. There’s no point in doing that whatsoever. That effort would be spent much better by adopting IPv6.
Faaak•6mo ago
and what, earn 5 more years till we have the same problem?
RedShift1•6mo ago
That's a problem for the people in 5 years
icedchai•6mo ago
At this point, time would be better spent moving to IPv6, don't you think?
mike_d•6mo ago
We have been trying to deploy IPv6 for 20 years now. This would be comparatively easier and buy us another 20 years to finish v6 deployment.
zamadatix•6mo ago
And 50% of the internet traffic is IPv6. The proposal here is to introduce a separate (arguably harder) change which would start at 0% support again. Beyond that, it'd just be a temporary fix.

Just 240/4 allowed specifically for private network use (like the 10/8 range)... that I could get behind though. This would still exclude 255.255.255.255/32 of course.

icedchai•6mo ago
A ton of old equipment would need to be upgraded to use 240/4 for IPv4 unicast. We'd run into weird issues where it works for some people and not others. I'm not convinced. If this was done 25 years ago, maybe.
UltraSane•6mo ago
The problem is that you can't really move completely to IPv6. You actually will have to run both IPv4 and IPv6 networks indefinitely. Which isn't a lot of fun.
icedchai•6mo ago
Now, yes. But eventually, we'll reach a tipping point where that isn't necessary. When? Your guess is as good as mine.
UltraSane•6mo ago
"You actually will have to run both IPv4 and IPv6 networks *indefinitely*."
Dagger2•6mo ago
Sure you can. You can do it today even, let alone in some unspecified number of years.
9dev•6mo ago
Does anyone know what the red striped sections are? Hovering them only yields < <range> is excluded from scanning, but that doesn’t say much
gnfargbl•6mo ago
They're part of AS749, which is US Department of Defense IP space that appears to be unused and which, based on public statements made by the Pentagon, might just be safely parked or might be part of a network scanning observatory [1]. Either way, scanning that space is probably a waste of bandwidth.

[1] https://blog.benjojo.co.uk/post/ip-address-squatting

wereHamster•6mo ago
> Either way, scanning that space is probably a waste of bandwidth

That's what the DoD wants you to think ;)

blahlabs•6mo ago
Maybe a bit off topic, but years ago I had a home linux server, used for usenet/torrenting. I was just poking about on it one day and ran some variation of netstat and could see a connection with a 6.x.x.x range IP address, which stood out. I didn't know a whole lot about networking at the time (still don't), couldn't say if I had misinterpreted what I saw in the netstat output. But it stood out so I looked it up and hoo-boy, it was a shock to see who owned that IP range, Army Information Systems Centre. I chalked it up to them maybe running a torrent tracker or something, or was the DoD in my PC?
bugsMarathon88•6mo ago
Service providers (especially mobile ones) often squat on large, unused IP blocks (of which the DoD has plenty of), especially at peak capacity. I suspect this is what occurred here.
Cthulhu_•6mo ago
I'd guess they bought a whole block early on because they could and it wasn't too expensive yet. I wonder if they could be compelled to auction it off. But they might be using it a lot internally.

(a lot of guesswork in this comment, I don't know anything lol)

bananapub•6mo ago
no, no one bought anything, they just emailed some dude and said "hey we're connecting to The Internet, we need some IPs" and the reply was "here is the 2^24 IP addresses dedicated to you".
everfrustrated•6mo ago
In the early days no money changed hands at all. You just asked for a block and got one.
jaza•6mo ago
See "List of assigned /8 blocks to commercial organizations" at: https://en.wikipedia.org/wiki/List_of_assigned_/8_IPv4_addre...

Mercedes-Benz isn't the only corporation with its own /8 block - although it is the only non-US one; and it's a pretty small exclusive list, only six in total. I guess someone at Mercedes-Benz just happened to hear about this Internet thing relatively early (53.0.0.0/8 was registered Oct 1993 according to Wikipedia - the relevant European authority, RIPE NCC, was only founded in Apr 1992), and/or happened to have a buddy at IANA / RIPE NCC, and the rest is history.

justusthane•6mo ago
The XKCD Map of the Internet is good too (2006): https://www.xkcd.com/195/
nocoiner•6mo ago
Just a fascinating map. Like looking into Neuromancer’s cyberspace.

Is there a legend of what the different colors mean?

tomhow•6mo ago
Previously:

BGP.Tools: Browse the Internet Ecosystem - https://news.ycombinator.com/item?id=36531988 - June 2023 (17 comments)

thisisgvrt•6mo ago
https://www.youtube.com/watch?v=83NJllv0q9U was a nice behind the cover peek into how the data is collected and parsed.
j4nek•6mo ago
bgp.tools is one of my most used sites - thanks to ben for doing this so great!