Iran's January 2026 Internet Shutdown: Public Data, Censorship Methods, and Circumvention Techniques

This paper analyzes the Internet shutdown that occurred in Iran in January 2026 in the context of protests, focusing on its impact on the country's digital communication infrastructure and on information access and control dynamics. The scale, comple…

Authors: Giuseppe Aceto, Valerio Persico, Antonio Pescapè

Iran's January 2026 Internet Shutdown: Public Data, Censorship Methods, and Circumvention Techniques
Iran’s Januar y 2026 Internet Shutdown: Public Data, Censorship Methods, and Circumvention T echniques Giuseppe Aceto University of Napoli Federico II Department of Electrical Engineering and Information T echnology Napoli, Italy giuseppe.aceto@unina.it V alerio Persico University of Napoli Federico II Department of Electrical Engineering and Information T echnology Napoli, Italy valerio.persico@unina.it Antonio Pescapè University of Napoli Federico II Department of Electrical Engineering and Information T echnology Napoli, Italy pescape@unina.it Abstract This paper analyzes the Internet shutdown that occurred in Iran in January 2026 in the context of protests, focusing on its impact on the country’s digital communication infrastructure and on in- formation access and control dynamics. The scale, complexity , and nation-state nature of the event motivate a comprehensiv e investi- gation that goes beyond isolated reports, aiming to provide a unied and systematic understanding of what happened and how it was observed. The study is guided by a set of research questions addressing: the characterization of the shutdown via the timeline of the dis- ruption events and post-event “new normal”; the detectability of the event, encompassing monitoring initiatives, measurement tech- niques, and precursory signals; and the interplay between censor- ship and circumvention, assessing both the imp osed restrictions and the eectiveness of tools designed to bypass them. T o answer these questions, we adopt a multi-source, multi-- perspective methodology that integrates heterogeneous public data, primarily from grey literature produced by network measurement and monitoring initiatives, complemented by additional private measurements. This approach enables a holistic view of the event and allows us to reconcile and compar e partial observations from dierent sources. Ke ywords Network Monitoring, Censorship, Internet Shutdown, Iran 1 Introduction This paper investigates the Internet shutdown that occurred in Iran in January 2026. The e vent, which took place in the context of wide- spread protests, deeply modifyed the Iranian connectivity to the Internet, aecting the country’s digital communication infrastruc- ture, with signicant impact on information access and censorship dynamics. The scale and complexity of the communication systems in- volved in the event, and the nature of the actor (nation-state level) fuel the interest in the analysis of what happened, of the techniques used to enact it, how these have b een detected and monitored, and their interaction with censorship circumention practices. W e aim to characterize the shutdown, understand how it was implemented and detected, and assess its implications in terms of control and circumvention. This work is licensed under a Cr eative Commons Attribution 4.0 International License. T o guide the analysis, we formulate six research questions, drilling down in this complex topic: RQ1 What is known —considering ocial and reliable sources— about the events aecting Iran’s digital communication in- frastructure between December 2025 and Januar y 2026, in correspondence with widespread protests across the coun- try? More specically , which components of the digital infrastructure wer e disrupted, for how long, and with what eects? RQ2 Which “new normal” was established after the end of the shutdown? How control change d w .r .t. before the shut- down? RQ3 Which precursory symptoms manifested, if any? W as the shutdown foreseeable? RQ4 Which monitoring initiativ es contributed technical analyses of the event? What are the nature, the aim and capabili- ties of these initiatives and how they contributed to the understanding of the event? RQ5 How informative observations could be drawn? Which mea- surement platforms and techniques were used? Which data are available? Which limitations techniques and data present? RQ6 Which censorship-circumvention tools had the potential to bypass the imposed restriction and were they eective dur- ing the Internet shutdown? How eective these tools have been? These questions are answered in the course of this work, in the form ARQn (Answ er to Research Question n ). T o answer these questions, we adopt a multi-source approach integrating all pub- licly available network monitoring information. T o this aim we systematically collected and analyzed all available sources on the censorship event, also complementing it with additional private data from a transit provider . Due to its recency , these sources con- sist primarily of grey literature, including reports and technical analyses produced by monitoring initiatives. The article is organized as follows. Section 2 presents the back- ground including the iranian network infrastructure, the known interference practices implemented, the initiatives monitoring them, the available circumention tools to bypass such censorship eorts, and the history of recent distruptions. Se ction 3 integrates the con- tributions of the monitoring initiatives considered and pro vides a unied timeline of events, from the earliest signs of netw ork dis- ruptions to the outage and subsequent restoration, until the ne w disruption observed at the end of February with the military opera- tions impacting the country . Section 4 presents in detail the data sources and the monitoring initiatives that informed the analysis of Giuseppe Aceto, V alerio Persico, and Antonio Pescapè the 2026 shutdown, examining their institutional nature, method- ological approaches, and resulting outputs. Section 5 examines the mechanisms available to circumvent censorship in response to the shutdown. Finally , Section 6 concludes the paper by providing a summary of the main ndings and a concise answer to the resear ch questions. 2 Background T o contextualize the ev ents under study , this background section is structured in ve parts. First, w e describe the organization and structural characteristics of the Internet in Iran, outlining the gover- nance features that shape its conne ctivity . Second, we introduce the technical aspects of the interference mechanisms that the iranian network are currently known to be subjected to. Third, we sum- marize the main circumvention tools available to bypass govern censorship. Four , we provide an ov erview of the main monitoring initiatives that have contributed to obser ving and do cumenting network conditions in the countr y . Finally , we review the major network disruptions in Iran, in order to situate the 2026 shutdown within its broader historical and operational context. 2.1 Iran’s national network infrastructure For several decades, Iran’s connectivity to the global Internet has been mediate d through two principal international gate ways [ 13 ]: (i) the T elecommunication Infrastructure Company (TIC) (AS49666, formerly AS12880 and AS48159); and (ii) the Institute for Research in Fundamental Sciences (IPM) ( AS6736). IPM established the coun- try’s rst international Internet connection in the 1990s and since then primarily ser ves academic and research institutions. Subse- quently , TIC expanded its role to include Internet service provision and has since become the main carrier of Iran’s inbound and out- bound Internet trac. This notwithstanding, IPM has maintained a technically distinct connection to the global Internet. According to available reports, all major telecom operators in Iran are one way or another controlled by the government. 1 Iran’s online environment is known to b e one of the most restrictive worldwide, with the authorities systematically increasing the cost and technical barriers to accessing the global Internet in order to steer users toward a domestically controlled network, while em- ploying pervasive censorship, surveillance, content manipulation, and extralegal repression [ 9 ]. At the core of this strategy lies the National Information Network (NIN) , a centralized, state-operated digital infrastructur e ocially framed as a vehicle for cyb ersecurity and digital sovereignty [ 4 ]. Amid mounting internal and external pressures, the NIN has e volved into a central instrument not only for managing unrest but also for preemptively suppressing it [4]. 2.2 Network interference practices Studying the censorship practices enforced on the Iranian network is hindered by the limited availability of in-country measurement vantage p oints. Moreover , reported regional and ISP-level dier- ences make it dicult to draw broad conclusions. Indeed, ane cdotal accounts and scientic studies (the most recent and technically detailed being T ai et al . [18] and Lange et al . [12] , here used as main 1 https://ainita.net/ownership- in- irans- tele com- sector/ (accessed: March 2nd, 2026) references) show that Iran relies on an extensive censorship system (the so-called Great Firewall of Iran , GFI). The adopted censorship mechanisms have evolved substantially since the rst systematic investigation in 2013 [ 2 ], continually incor- porating new and more advanced blocking techniques as emerging protocols and applications appear , but still relying also on the anal- ysis of unencrypte d protocols. According to recent studies, the GFI is built on layered ltering methods, including DNS, H T TP, H T TPS, and protocol-level blocking. More spe cically , the GFI intercepts DNS queries , and for censored domain names responds with pri- vate addresses (that are routed inside the NIN) corresponding to block pages; inspe cts H T TP elds for keywords and domains in the rst data packet of an established TCP connection (stateful inspe c- tion), returning a 403 forbidden H T TP code if censored; inspects SNI eld of H T TPS handshake for domains in the rst data packet of an established TCP connection (stateful inspe ction), inje cting RST packets; nally , UDP trac (of spe cic signicance be cause of increasing QUIC adoption, and also related to VPN usage) is monitored and selectively ltered. The GFI exhibits bidirectional behavior (similar to censoring sys- tems in China and T urkmenistan) i.e. it takes interfer ence actions on b oth incoming and outgoing trac, regardless of the trac’s origin. This allowed active probing of the censoring me chanism from outside the NIN. Moreover , experimental analyses suggest a nuanced and possibly hierarchical structure of censorship de- ployment: while the GFI operates as a centralized system, certain ASes may be grante d exemptions or are subject to less stringent censorship measures. Some ASes apply nearly complete censorship across DNS, H T TP, and UDP protocols, whereas others, show neg- ligible or no censorship. These accounts oer several snapshots in time of a highly dynamic infrastructure of communications control, therefore they do not necessarily apply to the shutdown of Janu- ary 8th 2026. Moreover , several analyses are built on measurement techniques and postprocessing steps that are not readily available to the public. 2.3 Circumvention of Internet Censorship A recent study [ 19 ] showed Virtual Private Networks (VPNs) among the most widely used solutions for circumventing network censor- ship. This categor y includes several to ols (either repurposed or specically designed to circumvent censorship), united by the com- mon overall mechanism that creates an encrypted tunnel b etween a user’s device and a remote ser ver located outside the censored network, prev enting the access network operators from observing the nal destination of trac or tampering with DNS queries. A notable architecture, initially designed for privacy enhance- ment, is represented by T or (The Onion Router), which provides anonymity and censorship resistance through a network of volunteer- operated relays. T or routes trac through multiple encrypted hops, making it dicult for both intermediaries and observers to deter- mine either the source or the destination of communications, while presenting the user a TCP pr oxy (on Andr oid devices, a VPN-like connection). T o counter incr easingly sophisticated DPI systems, T or has also introduced pluggable transports designed to obfuscate T or trac so that it resembles or dinary protocols, thereby reducing the likelihood of dete ction by national ltering systems. More recently , Iran’s January 2026 Internet Shutdown: Public Data, Censorship Methods, and Circumvention T echniques to counteract the ser ver enumeration attacks that mostly aects VPNs, introduced the Snowakes architecture[ 3 ]: a large numb er of ultra-light, temporary proxies (“snowakes”), which accept trac from censored clients using peer-to-peer W ebRTC protocols and forward it to a centralized bridge. The temporary proxies can b e implemented in JavaScript, in a web page or browser extension (much cheaper to run than a traditional proxy or VPN server). Psiphon represents another widely deployed censorship circum- vention platform designed specically for users in heavily ltered networks, and its eectiveness in Iran has been analyzed during the Iranian elections in 2013 and 2016[ 6 ]. Unlike T or’s decentralized volunteer infrastructure, Psiphon uses a managed network of proxy servers combined with multiple tunneling protocols, including VPN, SSH, and H T TP proxy technologies. The system dynamically se- lects connection methods and employs trac obfuscation to evade both DNS manipulation and DPI-based blocking. Its centralized design emphasizes accessibility and rapid adaptation to evolving censorship techniques. 2.4 Observing Internet Conne ctivity in Iran Besides eld reports, consisting in obser vations, ndings, or ac- tivities recorded by people directly experiencing the eects of the control me chanisms impacting the network, the analyses performed at larger scales rely on dierent data sources, such as routing con- nectivity , active probing, and passive data-trac observation. Over the years, numerous monitoring initiatives have contributed to the analysis of the state of the Internet in Iran, including aca- demic projects (IODA ), private-sector platforms (Cloudare Radar , Kentik, Whisper ), independent observatories (NetBlo cks’ Internet Observator y , OONI), and initiatives focused on human-rights (Fil- terW atch). More details on available data sources and monitoring initiatives are reported in Section 4.1 and Section 4.2, respectively . 2.5 History of Previous Network Disruptions in Iran Iran has repeatedly resorted to Internet shutdowns in response to episodes of domestic unrest, deploying measures that variably ae ct the NIN and the country’s connectivity to the global Internet. Since 2019, three major nationwide disruptions have been documented, as discussed below . Bloody November Shutdown (November 2019, ≈ 6 days). This was the rst shutdown observed by IODA and was primarily implemented through the withdrawal of BGP routing announcements. Although Iranians experienced a near-total blackout, variations across IODA data sources and OONI measurements indicate that disconnection mechanisms diered by ISP and that limited access (particularly to the NIN) persisted during the disruption [ 14 ]. It involved both cellular and xed-line networks. W omen, Life, Freedom Movement Shutdown (Septemb er 2022, ≈ 2 weeks). Authorities imposed recurring nightly shutdo wns targeting mobile networks (the strategy visible in IOD A routing and active probing data) while keeping xe d-line connections online to reduce the broader economic and political costs of a full blackout [ 14 , 17 ]. These curfews, totaling roughly 100 hours, were accompanied by additional measures such as application and protocol blocking to further restrict information o ws and access to circumv ention tools [17]. Stealth blackout during the T welve-Day W ar with Israel ( June 2025, ≈ 2 weeks). Unlike previous disruptions, the June 2025 shutdown did not rely on withdrawing BGP routes, thereby preser ving the outward appearance of normal connectivity for conventional mon- itoring systems. Instead, authorities implemented a centralized ltering regime at the national gateway , combining DNS p oisoning, protocol allowlist , and Deep Packet Inspection (DPI) to block for- eign services and neutralize circumvention to ols while maintaining selected domestic access. The government justied the restrictions as a means of deterring cyberattacks from Israel. The shutdown involved both cellular and xed-line networks. This strategy re- duced Iran’s international Internet trac by approximately 90% without fully disconnecting the country [ 13 , 15 ]. Y et coordinated and diversied responses from the Internet freedom community enabled millions of Iranians to retain partial global connectivity . 3 2026 Iran’s Disruption: Lines of Evidence and Analyses Figure 1 presents a timeline that summarizes the observations of events recorded in relation to the disruption of Internet connec- tivity in Iran. This timeline is substantiate d by monitoring data we collected from dierent public sources and complemented with the information provided by a transit provider under NDA. Fig- ure 2 constitutes an integrate d overview derived from the set of available monitoring sources. It combines passive measurements (Cloudare Radar data, trac observed by a transit pro vider , and the IOD A telescope), active measurements (IOD A and OONI), and BGP routing information. The observation period covers the whole month of January 2026, encompassing the shutdown and surround- ing days. The dierent data sources present a broadly consistent picture of the event. Passiv e and active measur ements largely agree on the timing and progression of the disruption. The small visi- ble temporal discrepancies observed in the passive trac analysis from the transit provider can be attributed to the coarser time gran- ularity of the data, which is aggregated using daily averages. In contrast, BGP-lev el observations do not show corresponding anom- alies, indicating that the disruption was not implemented through BGP routing changes but rather through mechanisms operating at other layers of the network. In the following, the related details are provided. Early signs of disruption (Dec 29th, 2025–Jan 7th, 2026). Starting on December 29, eld reports gathered by Filterwatch [ 16 ] and IOD A [ 14 ] indicated the onset of a geographically targeted Internet disruptions in T ehran and several provincial cities, with complete outages, severe throttling, and VPN interfer ence concentrated in commercial, administrative , and protest-pr one areas, while other nearby locations remained partially functional [ 7 ]. Disruptions ranged from severe slowdowns to the loss of international con- nectivity , often restricting users to domestic services. Mobile and xed-line networks did not exhibit uniform behavior . In several instances, xed-line services were disrupted while mobile data Giuseppe Aceto, V alerio Persico, and Antonio Pescapè 22 Dec 2025 29 Dec 05 Jan 12 Jan 19 Jan 26 Jan 02 Feb 09 Feb 16 Feb 23 Feb 02 Mar 2026 QUIC-protocol anomalies. Type : Active measurements. Source: OONI. TIC withdraws IPv6 routes. Type : Routing connectivity . TIC disconnected from several transit providers. Type : Routing connectivity . Traffic plummeting to near-zero. Type : Passive measurements. Source: Kentik. Tiny amount of inbound and outbound traffic. Type : Passive measurements. Source: Kentik. Minimal responsiveness to active probing. Type : Active measurements. Source: IODA. Variability across the country . Type : Field Reports. Source: Filterwatch. Many iranians networks becoming visible internationally, with web still heavily filtered. Type : Active measurements. Source: Netblocks. Early signs of disruption Nation-wide total shutdown Early signs of restoration Sharp increase in active probing. Type : Active measurements. Source: IODA. Short-lived restoration (small amount of traffic, falling again near to zero). Type : Passive measurements. Source: Cloudflare, Kentik. Recovery of access to allowlisted services via the NIN. Type : Active Measurement. Source: IODA. De-facto disconnection from international network connectivity. Type : Active/Passive measurements. Source: IODA, Netblocks, Cloudflare. Allowlist "new normal" Disruption in the context of U.S.A. and Israeli military operations Geographically targeted internet disruptions (complete outages, severe throttling, VPN interference, loss of international connectivity). Type : Field Reports. Source: Filterwatch, IODA. Figure 1: Timeline of main registered disruption events. remained active, and in others, access to (internal) NIN was pre- served while international trac was severed or throttled, with inconsistencies also obser ved among xed-line providers regarding outages and performance degradation [ 7 ]. The users experienced the Internet appearing connected, but with services and apps not actually loading. Also VPNs resulted unstable. Accor ding to these eld reports [ 16 ], these phased and localize d measures were imple- mented at granular network levels (e.g., ISP PoPs or cell towers) and enabled authorities to disrupt coordination without necessar- ily triggering the nationwide trac drops that would be visible in macro-level monitoring data. On Januar y 2, the OONI Obser vatory reported protocol-level anomalies aecting QUIC trac on specic networks (the staggered appearance of these disruptions across operators suggests a phased implementation). 2 Such initial evidences strongly suggested that while the network appeared as te chnically “connected” at the IP layer , disruption was shifted to higher layers. Nation-wide T otal Shutdown ( Jan 8th–Jan 18th 2026). The rst ma- jor development occurred on Januar y 8 at 11:42 U TC when TIC (AS49666) started withdrawing its IPv6 BGP routes from its sessions, causing nearly all Iranian IPv6 routes to vanish from the global r out- ing table within hours [ 13 ]. Howev er , since IPv6 typically accounts for less than 1% of total inb ound trac to Iran (source: Kentik’s aggregated NetFlow data) the average user was unlikely to notice any impact [1, 13]. After a brief disruption, also IPv4 trac began to sharply decline at 16:30 U TC (19:00 local time), falling until it had nearly ceased by 18:45 U TC. This was reected in IODA T elescope data as a sudden drop, in Cloudare metrics as a sharp nationwide trac collapse [ 5 , 7 , 14 ], and trac volume seen at an upstream provider of AS 49666 (see Fig. 2, top). A corresponding drop of active measurements can 2 https://x.com/OpenObservator y/status/2007508011812892743?s=20 (accessed: March 2nd, 2026) be found in OONI probing testing (see Fig. 2, middle) and IODA active probing ( see Fig. 2, bottom). In total, it took more than two hours to bring inbound and out- bound connectivity to a near standstill [ 13 , 14 ]. At 19:00 U TC, TIC was obser ved disconne cting from several transit providers—including Russian state-owned Rostelecom ( AS12389) and Gulf Bridge Interna- tional (AS200612)—as w ell as from all of its settlement-free peering partners [ 1 , 13 ], with the reduced amount of visible /24s ( ≈ − 12% ) also highlighted by IOD A [ 14 ]. On the same day , Netblocks’ data reported the total loss of conne ctivity on Iran Internet backb one (TCI pr ovider) aecting restive cities such as Kermanshah. By 22:15 Iran time, Kentik data conrms the Internet reached a state of total blackout, with trac plummeting to near-zero [ 7 ]. Notably , the separation from the state-owned TIC has not shielded IPM from state-imposed censorship or monitoring measures [13]. Despite losing many BGP adjacencies for AS49666 (TIC), most Iranian IPv4 prexes r emained globally routed [ 13 ] (see IOD A BGP data in Fig. 2, bottom). The sharp decline in IPv4 trac was there- fore not due to reachability loss, but to ltering at the network edge. IOD A active-probing and BGP data illustrate this clearly (see Fig. 2, bottom): active probing fell to zero as trac was blocked, while routed IPv4 space in BGP remained largely intact ( ≈ 98.14% after Jan 8th) [ 14 ]. Hence, routing announcements were not the main mechanism used to generate the shutdown, highlighting the regime ’s more sophisticated approach to implementing shutdowns and controlling the information environment. In the initial phase of the shutdo wn, authorities cut both interna- tional connectivity and domestic infrastructure, including the NIN, privileged SIM cards, and landline services. By disabling e xternal and internal communication channels alike, the state imposed an unprecedented level of isolation, even e xceeding the wartime dis- ruptions of 2025, and creating a near-total information vacuum [ 8 ]. After January 8, the Internet shutdown in Iran was not complete: a tiny amount of trac was still owing in and out [ 13 ]. IOD A Iran’s January 2026 Internet Shutdown: Public Data, Censorship Methods, and Circumvention T echniques measurements recorded minimal responsiveness to active probing ( ≈ 3%), likely reecting either measurement artifacts or residual connectivity reser ved for allowed users, such as government en- tities or services operating within Iran’s state-controlled network perimeter [ 14 ]. Outside of very limite d connectivity , digital human rights groups report severely limited access to the Internet both internationally and domestically . This includes limited, intermittent ability to make phone calls via landlines [14]. Early Signs of Restoration ( Jan 18th–Jan 26th 2026). On January 18, IOD A, Cloudare Radar , and Kentik reported early signs of Internet connectivity b eing restored in Iran [ 14 ]. However , the apparent restoration of Internet connectivity observed proved to be short-lived, as the small volume of trac quickly droppe d back to near-zero (see Fig. 2, top). In accordance to this, IODA data showed synchronous reachability spikes for both T elescope and active probing on January 24th (see Fig. 2, top and bottom). A stronger recover was registered in the volumes of trac at the upstream provider (see Fig. 2, top). After Januar y 18 access was non-uniform across the country and varies by provider [11]. Allowlist “New Normal” ( Jan 26th–Feb 28th 2026). As of 10:00 PM (U TC) on Januar y 26, IODA obser ved a sharp increase in Active Probing witnessing the reachability of Iran’s networks from the Internet (see Fig. 2, bottom). 3 Such a change of connectivity status was also notied by Netblocks, which on Januar y 27th r eported that many iranians networks were becoming visible internationally . 4 Howev er , according to Netblocks, no return to normal was regis- tered: web was still heavily ltered on an allowlist basis. Despite this statement is not explicitly supported by shared evidences, OONI data do provide experimental proof of this, esp ecially regarding Whatsapp instant messaging. Fig. 2 (middle) shows that before the shutdown, Whatsapp was generally accessible (low counts of anom- alies), while a complete block is evident in the “new normal” phase. Similarly , OONI W eb tests re veal a signicant increase of anomalies with respect to before the shutdown. Trac data from Kentik and IODA conrms this is a “low- volume ” restoration. T rac remains at only 25% of pre-shutdo wn levels, further proving that the vast majority of the global Internet remains inaccessible to the general public [ 11 ]. Cloudare data indi- cate that overall trac volume, which had been steadily increasing since the end of January , experienced a marked decline around February 11 [ 5 ] (not evident fr om IOD A dashboard). Follo wing this abrupt drop, trac lev els stabilized at approximately 50% of those observed in the immediately preceding p eriod. Focusing on the accessible services, according to FilterW atch a specic set of international platforms and services have been allowlisted to provide a baseline of digital functionality , including search engines, communication tools, app stores, AI tools, gaming, and navigation. 5 Other social media and messaging platforms 6 remained accessible only via circumvention tools and continue to 3 https://bsky .app/prole/did:plc:3xessr3vu336mxean6zvfyjq/post/3mdfuqw xjpc2g (ac- cessed: March 2nd, 2026) 4 https://www.instagram.com/p/DUBHDR4DP8l/ 5 Service list: Google, Bing, Google Meet, Gmail, Outlook, Play Store, App Store , Apple, Samsung website, ChatGPT , GitHub, PlayStation, and Google Maps [11]. 6 Instagram, T elegram, Y ouT ube, and X. experience instability [ 11 ]. Others that were previously reachable 7 deteriorated to comparable restrictive conditions [ 11 ]. Also, user reports on January 27 indicate that a higher number of VPNs became functional compared to the initial days of the Internet shutdown, when most circumvention tools were r endered useless [11]. This situation reects Iran’s “allowlist” policy: a model akin to the Chinese Great Firewall that permits access only to approved users or services while blocking all others [ 14 ]. Field reports wit- ness that since January 15, international connectivity in Iran has functioned as a tightly monitored privilege rather than a universal service. A pilot “tiered Internet” program at the T ehran Chamber of Commerce requires applicants to undergo in-person identity verication, register xed IP addresses, and sign a written pledge not to “misuse” access [11]. Disruption in the context of U.S.A. and Israeli military operations (from Feb 28th). In the context of U.S.A. and Israeli military opera- tions, on February 28th IOD A reporte d that Iran was cut o from the global Internet beginning at approximately 07:00 UTC, reecting a de-facto disconnection from international network connectivity , in line with the disconnection implemented during the Jun 2025 conict. 8 Similarly , Netblock’s Internet-obser vatory data revealed that Iran was (and still is at the time of writing) experiencing an almost complete Internet shutdown, with national connectivity reduced to approximately 4% of typical lev els. 9 A coherent assess- ment is provided by Whisper . After 24 hours, the overall country connectivity was estimated at approximately 1% of typical levels. 10 Also Accor ding to the data from Cloudar e Radar , the trac trends reveal near-total disconnection ( < 0 . 1% maximum level registered in the previous period). 11 The analyses above allow us to answer some of the research questions, as follows. What is known about Iran’s 2026 Internet shutdown (ANS- RQ1) . The events that occurred in the nal days of 2025 and in January 2026 provide a new example of the Iranian State’s inter- ference in, and control over , the countr y’s digital infrastructure. During this period, access to Internet-base d services was rendered unavailable. The shutdown laste d approximately ten days (8–18 January), consistently with the other nationwide disruptions docu- mented since 2019. Although evidence of disconnections at the BGP level can be obser ved, these are limited both in scop e (primarily aecting IPv6 routes) and in duration. Even during the shutdown period, BGP connectivity app ears to be largely restored, revealing that the blocking mechanisms were implemented at higher layers of the protocol stack. Which “new normal” was established (ANS-RQ2) . After the shutdown, available measurements data reveal a drop in trac volumes with respect to before, as well as increasing selective im- pairment of web and applications access. Field reports explain that service r estoration followed a selective approach, based on allowlist 7 WhatsApp and LinkedIn. 8 https://bsky .app/prole/did:plc:3xessr3vu336mxean6zvfyjq/post/3mfwfp ezy6c2e (ac- cessed: March 2nd, 2026) 9 https://mastodon.social/@netblocks/116147264437940657 (accessed: March 2nd, 2026) 10 https://mastodon.social/@netblocks/116149846834309209 (accessed: March 2nd, 2026) 11 https://radar .cloudare.com/ir?dateRange=28d (accessed: March 2nd, 2026) Giuseppe Aceto, V alerio Persico, and Antonio Pescapè Figure 2: Synoptic monitoring data: passive measurements of trac and telescope data (top); OONI active probing (middle); IOD A active probing and BGP data ( b ottom). mechanisms and authorization procedures, potentially including in-person identication requirements. This approach eectively embeds surveillance into access itself in a way that is hard to detect via network measurements fr om outside the national network. The described scenario lasted until February 28th, when a total shuth- down was enacted again in correspondence of U.S.A. and Israeli military operations. Which precursory symptoms manifeste d (ANS-RQ3) . Be- fore the shutdown, several eld r eports of connectivity disruption or impairing have been mentioned by human rights associations, on-alert be cause of the unrest and protests happening in several Iranian cities. The localized and time-limite d nature of this kind of interference makes it hard to detect with nation-wide aggregated monitoring techniques. Some considerations can b e proposed, regarding network pat- terns detectable starting on January 1st (noting that Jan 2nd has been a national holiday for Iran). First, the web trac originated from Iran towards the Cloudare CDN and marked likely human- generated 12 (Fig. 3, top) sees a signicant reduction (b ottoming on January 4th to ab out 35% from the reference maximum). By in- specting the bot-vs-human ratio (Fig. 3, middle) emerges that b ots increase their share from January 2nd on; a similar phenomenon at the same time can be seen considering the share of TLS QUIC (Fig. 3, bottom), which signicantly shrinks with respe ct to other TLS versions, also losing the daily pattern typical of human activities. Thanks to eld reports, this human-selective trac reduction can be related to unreliable connections (including p ossibly throttling), which frustrate human users (thus amplifying the connectivity impairment) while not (ov erly-) aecting automated trac. 4 Data Sources and Monitoring Initiatives In the following, we present the data sources with the related moni- toring approaches at the basis of the analysis of the connectivity in Iran (Section 4.1) and detailed the monitoring initiatives that have provided eort in such analysis (Section 4.2). 12 Cloudare tells human operators from automated web scraping by means of several proprietary heuristics, including to a large extent a super vised ML algorithm, see: https: //developers.cloudare.com/bots/concepts/bot- score/ (accessed: March 2nd, 2026). Iran’s January 2026 Internet Shutdown: Public Data, Censorship Methods, and Circumvention T echniques Figure 3: Pre-shutdown clues in bot- vs. human- generated trac and TLS protocol shares (Data Source: Cloudare Radar). 4.1 Data sources The Iranian regime does not tend to disclose data regarding the management mechanisms of its national digital communication in- frastructure. Consequently , information for outage analysis must be obtained through monitoring and telemetr y approaches that mostly do not rely on the cooperation of the networks under observation. Visibility on global routing connectivity represents a major source of information to analyze how the iranian networks are connected to the Internet. Route Views and RIPE RIS are the two main publicly accessible sources of information about BGP data. They both take advantage of r oute collectors strategically deployed at IXPs and partner networks worldwide, where they peer with ISPs, academic networks, backbone providers, and hyperscalers to capture diverse , multi-perspective views of the global routing table. While BGP data oers a high-level view of the Internet’s funda- mental connectivity structure, it is insucient to uncover or explain more comple x netw ork management strategies. T o address this lim- itation, active probing (i.e., the injection of measurement trac into the network to solicit some sort of responses and/or to observe how the trac is handled) is used to complement and enrich the analysis. Notably , obtaining reliable in-country vantage points for active measurements is challenging due to sanctions, strict regula- tions, and risks to local volunteers. As a result, r esearchers often rely on external probing toward in-country services, although send- ing large volumes of probes to publicly accessible ser vers also raises concerns [18]. These insights can be further enriched through passive data trac obser vations from privileged vantage points. Such van- tage points may include upstream providers of Iranian networks (specically , of the gateway providers TIC and IPM) wher e trac volumes and related variations can be easily captured; or CDN in- frastructures that have no des within the country (the latter also enabling inference on trac characteristics e.g., the analysis of request–response patterns or human vs. automated activity). As a particular case of passive analysis, it is worth to mention dark- space trac analysis that monitors trac dir ected to routable but unassigned IP addr esses ( an evidence or byproduct of scanning and attacks). A network telescope enables the detection of structural changes in a country’s conne ctivity and network behavior , ser ving as a useful tool to identify nationwide blackouts, analyze disconnec- tion events, observe systemic eects of censorship or government interventions. Giuseppe Aceto, V alerio Persico, and Antonio Pescapè 4.2 Monitoring Initiatives IOD A 13 monitors the connectivity of global Internet infrastructure providing data at country , subnational, and ISP/AS levels and al- lows to assess the severity of disruptions. The project is run by the Internet Intelligence Lab , an academic research lab at the School of Computer Science, College of Computing of Georgia T ech; it was initially developed at the Center for Applied Internet Data Anal- ysis (CAIDA), in the UC San Diego, and has b een funded by the U.S.A. NSF and OTF organizations. It relies on three main measure- ment typ es: Border Gateway Protocol (BGP) data (from RIPE NCC’s Routing Information Service (RIS) and the University of Oregon’s Route Views project), active probing (4.2 million /24 address blocks are probed at least once every ten minutes), and network telescop e observations (analysis of unsolicited background trac). IOD A ’s long-term perspective on global Internet connectivity oers insight into the increasing sophistication of the Iranian authorities’ ap- proaches to information control and Internet shutdowns within the country via both te chnical reports [ 14 ] and an online dashboard 14 . Cloudare Radar 15 is a platform that presents insights into global Internet trac, cybersecurity threats, and technology adop- tion trends. It is primarily powered by data from Cloudare ’s global Content Distribution Network and aggr egated, anonymized data from their 1.1.1.1 public DNS r esolver . The platform also incorpo- rates external datasets in specic areas, including interconnection metadata from PeeringDB, Autonomous System p opulation esti- mates from APNIC, geographic refer ence data fr om Ge oNames, and Internet routing information from RIPE NCC RIS and Route Views. The platforms allows to fo cus the analysis on selected nations, including Iran [5]. Kentik 16 is a U.S.A. technology company that develops a cloud- based network intelligence and observability platform, which in- gests and correlates a wide range of telemetry sources to give visibility into networks. These include: core network telemetry (ow data exported from routers, switches, hosts, and cloud environ- ments; routing and path data such as BGP routing information; device and interface metrics colle cted via SNMP and streaming telemetry; synthetic test results generate d by agents for active per- formance monitoring) as well as enrichment and contextual teleme- try (GeoIP and threat intelligence feeds; cloud provider ow logs; business/operational metadata like DNS data, orchestration con- text, user identity information from NA C/RADIUS/IP AM). After the blackout, the data from Kentik wer e used to explain how the event dev eloped and compare it with past internet shutdo wns in Iran [13]. The Internet Observatory project 17 uses measurement, classi- cation, and attribution methods to identify internet disruptions, censorship, and cyberattacks aecting critical infrastructure. It supports the reporting activities of NetBlocks 18 , an independent, non-partisan organization that monitors global Internet conne c- tivity , with a fo cus on digital rights, cyb ersecurity , and Internet 13 https://ioda.inetintel.cc.gatech.edu/ (accessed: March 2nd, 2026) 14 https://ioda.inetintel.cc.gatech.edu/country/IR?from=1764609812&until= 1770830612&view=view1 (accessed: March 2nd, 2026) 15 https://radar .cloudare.com/ (accessed: March 2nd, 2026) 16 https://www.kentik.com/ ( accessed: March 2nd, 2026) 17 https://netblocks.org/projects/observator y (accessed: March 2nd, 2026) 18 https://netblocks.org/ (accessed: March 2nd, 2026) governance. Its monitoring approach emphasizes impartiality , accu- racy , and methodologies designed to operate at global Internet scale . The program combines rst-party and third-party data sources to provide an integrate d view of connectivity and platform availability during events such as crises, elections, civic actions, and natural disasters that may aect human rights and democratic processes. Sources are classied by telemetry type, such as conne ctivity mea- surements ( e.g., ICMP), trac data ( e.g., w eb, DNS, or ow aggre- gates), probe-based measurements ( e.g., active or user-driv en tests), and routing metrics. Since the start of the shutdown, NetBlocks has provided via social media at least daily updates on the status of the connectivity in Iran. FilterW atch 19 is an Iran-focused digital rights initiative that op- erates as a project of the Miaan Group 20 , a non-prot organization based in the U.S.A., focused on human rights in Iran and the wider Middle East. Filterwatch provides legal, te chnical, research, and advocacy support, and analyzes and documents the human rights impacts of Internet censorship, sur veillance, and infrastructure policies, particularly in relation to Iran’s NIN. The project provides data, analysis, and tools to support accountability , advocacy , and the protection of online privacy and freedom of expression [ 11 ]. Preminent data sources are of the eld report kind, with gathering of local information. This kind of contribution complements (and is used jointly in the analyses) the network measurements from outside the national network. Inde ed “tactical” local disruptions are not visible in the aggregated trac, and due to Carrier-Grade NA T architecture of the Iranian national network, measurement tools like ones by IODA or Cloudar e cannot easily detect sub-national scale throttling or jamming. Following the internet blackout in Iran, FilterW atch released a series of technical reports [ 7 , 8 , 11 , 16 ], mainly supported by the netw ork measurement from IOD A, K entik, and Cloudare. OONI 21 (the Op en Obser vatory of Network Interference) is a project aimed at decentralize d eorts in documenting internet cen- sorship around the world since 2012. Born as a sub-pr oject of the U.S.A. non-pr ot organization T or Project 22 , since 2024 it is backed by a dedicated Italian non-prot association. The project provides Free/Open-Source software ( OONI Probe mobile and desktop app) to measure the blocking of websites, instant messaging apps, and censorship circumvention tools; real-time analysis and open pub- lication of censorship measurements from ar ound the world, pub- lished as open data on a dashboard 23 ; research reports documenting censorship events around the world, in collaboration with more than 50 research and human-rights advocacy partners. By providing the active probing applications for smartphones and desktop OSes, the OONI project allows the continuous worldwide crowdsourc- ing of reachability measur ements for selected services, oering a view from inside the potentially censored networks, thus oering (real-time and publicly) a viewpoint dierent from most censor- ship detection and reporting initiatives. This data is at the basis of analysis reports which are fr equently published on the project website and some scientic peer-reviewed papers. Regarding Iran, 19 https://lter .watch/english/ab out- us/ (accessed: March 2nd, 2026) 20 https://miaan.org/ (accessed: March 2nd, 2026) 21 https://ooni.org (accessed: March 2nd, 2026) 22 https://www.torpr oject.org (accessed: March 2nd, 2026) 23 https://explorer .ooni.org/ (accessed: March 2nd, 2026) Iran’s January 2026 Internet Shutdown: Public Data, Censorship Methods, and Circumvention T echniques OONI published (in collab oration with ARTICLE19, ASL19, and Small Media) a report 24 about blocking evidence between 2014 and 2017 ; a multi-stakeholder report 25 about the censorship following the death of Jhina (Mahsa) Amini, between 16th September 2022 to 16th October 2022 ; an analysis 26 in collaboration with Miaan Group on blocking of selected w omen’s rights websites ( with data analysis covering Feb. 1st, 2024 to Oct 1st, 2025 ). At the time of writing, no analysis has yet been published about Jan. 8th 2026 shutdown. Whisper 27 is a cybersecurity company founded in January 2025 that focuses on internet infrastructure intelligence. Following the Internet blackout in Iran on 8 January , Whisp er made an online dashboard available [ 1 ] to provide ongoing visibility into the coun- try’s connectivity status. The platform aggregates data from mul- tiple measurement and routing intelligence sources (IOD A, RIPE, and Cloudare) and presents near-real-time indicators describing the evolution of the disruption, together with analytical commen- tary on the te chnical mechanisms believed to have b een employed. Among the exposed metrics are BGP path counts, hourly BGP ac- tivity , BGP UPDA TE volume, OONI netw ork measurement results, and prex visibility by protocol (IPv4 and IPv6 prex counts de- rived from RIPE RIS r outing data). The dashboard also highlights structural aspects of Iran’s connectivity , including foreign transit providers connected to Iranian networks, internal ASN interconnec- tion patterns and topology , and changes observed across aected networks. Particular attention is given to the b ehavior of IPM’s 26 downstream netw orks after the blackout, with Iranian address space grouped by ASN to illustrate dierential r outing responses. Beyond descriptive monitoring, the analysis advances hypotheses framed in terms of a “digital kill chain” interpreting the event as a staged sequence of control actions targeting routing visibility , external reachability , and internal network segmentation. Additional data sources. W e complemented the aforemen- tioned data sources with a view of the aggregated and normalized trac volume involving the Iranian network (AS49666) as se en at one international upstrem provider . Due to NDA, we are not allowed to share further details on such trac, but we report these data due to their strong coherence with the rest of the available observations and since it constitutes a valid example of data sour ces that can shine more light on the analyzed event. T able 1 summarizes the main monitoring initiatives that con- tributed to the analysis of the 2026 network shutdown in Iran, highlighting their country of registration, data and measurement methodologies, and produced outputs. Which monitorig initiatives contributed to the understand- ing of the events (ANS-RQ4) . What is currently known ab out these events aecting the network deriv es from a limited number of monitoring initiatives, whose outputs are publicly accessible in the form of online dashboards or technical reports. Most of these initiatives are U .S.A.-centric: they are typically legally based in the 24 https://ooni.org/post/iran- internet- censorship/ (accessed: March 2nd, 2026) 25 https://ooni.org/post/2022- iran- technical- multistakeholder- report/ (accessed: March 2nd, 2026) — facilitated by the European Commission and U.S.A., coordinated by OONI and ISOC, and including besides OONI also IODA, Measurement Lab (M-Lab), Cloudare, K entik, Censored Planet, ISOC, Article19. 26 https://ooni.org/post/2025- iran- censorship- womens- rights/ (accessed: March 2nd, 2026) 27 https://www.whisper .security/ (accessed: March 2nd, 2026) United States and, in the majority of cases, receive funding either from U .S.A. go vernment sources or from private U .S.A. entities. De- spite the very high and well-established levels of e xpertise within academia and the private sector , as well as the signicant eorts of non-governmental organizations—many of which are directly engaged in eld operations—this structural conguration results in a concentration of both op erational capacity and nancial support within virtually a couple countries alone. An evident missing actor is the European Union, whose most-related monitoring project is Mapping Media Freedom 28 which is not technically-focuse d, and is limited only to European countries. Consequently , the continuity , scope, and methodological orientation of Internet monitoring ac- tivities remain signicantly dependent on the p olitical priorities, regulatory frameworks, and funding decisions of almost a single government. While this does not diminish the professionalism or integrity of the actors involved, it does highlight an underlying systemic dependency that may aect long-term sustainability , plu- ralism of perspectives, and the global representativeness of the resulting datasets. How informative observations could be drawn (ANS-RQ5) . Most of the considered r eports leveraged multiple viewpoints ( com- bining multiple data sources, potentially originated at multiple vantage points), although not all the monitoring initiatives relied on their own managed monitoring infrastructures. Some primarily aggregate, curate, or reinterpret data produced by other entities. First-hand data are in fact provided by a relatively small set of primary sources, and raw datasets are not always publicly available . These data sources can be broadly groupe d into four categories: BGP data, passive trac analysis, active probing measurements, and network telescopes (i.e., darknet monitoring infrastructures). Impor- tantly , large-scale monitoring platforms—by design—exhibit struc- tural blind spots when confronted with layered, phased, or highly granular disruption events. In such cases, purely measurement- based approaches may fail to capture the full scop e or timing of restrictions. The integration of eld r eports has therefor e proven es- sential, particularly for the early dete ction of impending shutdown events. 5 Circumvention response to the shutdown Circumvention tools play a key role in reacting to Internet censor- ship activities. Indeed, VPNs and VPN-like tools as T or and Psiphon have been widely use d to circumvent Internet censorship [ 19 ], and have b een selectively subjected to censorship in their own turn. Dur- ing the analyzed shutdown, none of the circumvention techniques based on common Internet connectivity could work, therefore other communication means hav e be en explored, namely (illegal) satellite connections and peer-to-p eer decentralized WLAN / P AN commu- nications: these are described in the following sections. 5.1 Satellite connection The ltering of landline conne ction b etween Iran and the rest of the Internet has b een circumvented through satellite access (specically , 28 https://www.mappingmediafreedom.org/ (accessed: March 2nd, 2026) Giuseppe Aceto, V alerio Persico, and Antonio Pescapè T able 1: Monitoring initiatives that focuse d on 2026 Iran Internet shutdown. Initiative Reg. Org. Data origin Data types / measurement methods Output 1st 3rd BGP Trac Probing T elescope T ech. rep. Social Dashboard Cloudare Radar USA ✓ ✓ 3rd 1st · · ✓ · ✓ FilterW atch USA · ✓ 3rd · 3rd 3rd ✓ · · IODA USA ✓ ✓ 3rd · 1st 1st ✓ ✓ ✓ Kentik USA ✓ ✓ 3rd? ? ? · ✓ · · NetBlocks UK ✓ ✓ 3rd? 1st 1st · · ✓ · OONI I T A † ✓ · · · 1st · · · ✓ Whisper USA · ✓ 3rd · 3rd 3rd · · ✓ Legend. Initiative = Monitoring initatives in alphabetical order; Reg. = Registered oce country; Org. = Organization type: Academic, Non-Prot, Business; Data origin : 1st / 3rd -party data collection; BGP = routing and prex visibility; T rac = aggregated trac measurements; Probing = active measurements; T elescope = unsolicited background trac; T ech. rep. = technical report/analysis; Social = social media updates; Dashb oard = public dashb oard. † Initially founded in USA and funded mainly by USA private and public entities. with the Starlink constellation). On January 13th the USA nan- cial news outlet Bloomberg published 29 news that Starlink access was provided for free to Iran citizens. Indee d, despite possession of satellite communication technology is illegal in Iran, civil rights or- ganizations hav e helped smuggling in the order of 50 , 000 terminals in the country since 2022 protests 30 . This in turn prompted the Ira- nian government to interfere with satellite link through jammming (reported heavily happening from January 11th) 31 with up to 80% packet loss 32 in some areas, for some of the time, while elsewhere the Starlink connections were less sever ely aected or not at all. The cost of a satellite terminal, the lack of legal options to pur- chase them, and the risk associated with its possession (increased by the visibility of satellite “dish” antennas) all limit this option. The recently deployed Direct-to-Cell [ 10 ] 33 Starlink te chnology would help in this regar ds, as common mobile phones could be use d as terminals for satellite communications. There are no reports of actual availability and usage of this technology during the analyzed event. On the other hand, dependence on the goodwill of a private subject, currently running these services in a monopolistic condi- tion, has already shown the r eliability and (political) control risks in the case of Ukraine just a few months before 34 . 5.2 Peer-to-peer messaging apps If quasi-real time (“instant”) interactive communication is not a requirement, then long-distance digital communication is viable also in absence of Internet availability , by exploiting Personal- Area- Network technologies such as Bluetooth and delay-tolerant com- munication protocols. This is the case of a set of apps reported 29 https://www.bloomberg.com/news/articles/2026- 01- 13/musk- oers- free- starlink- in- iran- as- internet- blackout- persists (accessed: March 2nd, 2026) 30 https://www.nytimes.com/2026/01/15/technology/iran- online- starlink.html (accessed: March 2nd, 2026) 31 https://lter .watch/english/2026/01/13/network- monitoring- januar y- 2025- internet- repression- in- times- of- protest/ (accessed: March 2nd, 2026) 32 https://lter .watch/english/2026/01/13/network- monitoring- januar y- 2025- internet- repression- in- times- of- protest/ (accessed: March 2nd, 2026) 33 https://www.space x.com/updates/#dtc- gen2- spectrum (accessed: March 2nd, 2026) 34 https://www.r euters.com/investigations/musk- ordered- shutdown- starlink- satellite- ser vice- ukraine- retook- territory- russia- 2025- 07- 25/ (accessed: March 2nd, 2026) to b e use d in Iran during the shutdown 35 namely 𝐵𝑖 𝑡 𝑐 ℎ𝑎𝑡 36 and its closed-source Iranian-localized fork Noghteha , which has been downloaded more than 72 , 000 times between Jan 8th and Jan 10 2026 from the mobile app market AppBrain 37 . This peak of downloads of Noghteha testies the sore need for secure and o-internet digital communication tools, but this need is hardly properly addr essed by Noghteha and Bitchat . Indeed, Bitchat has been initially advertised as a secure communication app, but multiple reports in July 38 , 39 , 40 revealed sev eral critical security vul- nerabilities, including two zero-days, which make the app “danger- ously insecure” . Further concerns regard the closed-source forked version Noghteha (the most used in Iran) whose security characteris- tics and development are completely opaque. Both apps disclose that they didn’t undergo an independent security audit and therefore should not be used in highly sensitive use cases. Notably , Bitchat has been also widely downloaded 41 in Uganda before the elections due Jan 15th 2026, as the government cut o the Internet 42 . In this case, an Uganda IT taskforce allegedly 43 succeded in blocking the Bluetooth communications and thus blo ck the Bitchat app commu- nications, but no te chnical details nor independent validation of the claim has been provided. How eective censorship-circumvention tools have been (ANS-RQ6) . In the case of Iran, both T or and Psiphon were blocked already before the shutdown, and no censorship detection has b een 35 https://bitcoinmagazine.com/news/iranian- protestors- turn- to- censorship- resistant- freedom- tech- during- internet- blackout (accessed: March 2nd, 2026) 36 https://github.com/permissionlesstech/bitchat/blob/main/WHITEPAPER.md (ac- cessed: March 2nd, 2026) 37 https://www.appbrain.com/app/noghteha- mesh- messenger/com.ltershekanha. noghteha (accessed: January 28th, 2026) 38 https://www.supernetworks.org/pages/blog/agentic- insecurity- vibes- on- bitchat ( ac- cessed: March 2nd, 2026) 39 Published on Jul 25, 2025 — https://saadkhalidhere.medium.com/why- bitchat- is- a- bad- idea- my- audit- found- critical- zero- days- 1b126a45a2c5 (accessed: March 2nd, 2026) 40 Opened on bitchat github Issues list on Aug 1st, 2025 — https://github.com/ permissionlesstech/bitchat/issues/376 (accessed: March 2nd, 2026) 41 https://invezz.com/news/2026/01/14/bitchat- tops- uganda- app- stores- as- election- internet- blackout- drives- use/ (accessed: March 2nd, 2026) 42 https://reclaimthenet.org/uganda- imp oses- nationwide- internet- shutdown- ahead- of- 2026- election (accessed: March 2nd, 2026) 43 https://nilepost.co.ug/news/315117/the- it- taskforce- behind- the- bitchat- block- ugandas- homegrown- cyber- defense- triumphs (accessed: March 2nd, 2026) Iran’s January 2026 Internet Shutdown: Public Data, Censorship Methods, and Circumvention T echniques possible during the shutdown itself (as ver y tight allo wlist has been applied). Notably , T or resulted unltered from OONI tests after the shutdown, while Psiphon remained blocked afterwards. The allowlist approach is eective against virtually all circumv ention techniques that use the conventional lo cal Internet conne ctivity: this prompted for alternative means of communication, namely satellite connection and peer-to-pe er WLAN and P AN messaging apps. Both these approaches are virtually invisible to the moni- toring tools used in this and other published analyses 44 , so other approaches must be explored. 6 Discussion and Conclusion The events of January 2026 constitute a further illustration of the Iranian authorities’ capacity to exert centralized contr ol over the national digital infrastructure. The ten-day blackout (8–18 Janu- ary) followed patterns observed in previous nationwide disrup- tions since 2019 and appears to have been implemented primarily through mechanisms operating above the BGP lay er , rather than through sustained routing withdrawals. The restoration of connec- tivity occurred through a selective and tightly controlled process based on allowlisting and authorization procedures. This mo del individualizes and conditions access to the network, embedding traceability and sur veillance into connectivity itself and thereby signicantly weakening guarantees of digital privacy . Evidence suggests that network interference may have begun even b efore the ocial shutdown, through localized disruptions and degrada- tions aecting human-generated trac. These patterns (consistent with throttling or unstable connectivity) highlight the diculty of detecting granular interference e vents using only nation-scale aggregated measurements. The reconstruction of these events relies on a limited e cosystem of monitoring initiatives, many of which are institutionally and nancially concentrated in a small numb er of countries, particu- larly the U.S.A. While these initiatives demonstrate high technical expertise and operational commitment, this concentration intro- duces structural dependencies that may inuence agenda setting, long-term sustainability , and geographic coverage of monitoring activities. Most available analyses combine heterogeneous data sources and obser vation vantage points, yet the underlying primary datasets originate from a relatively small set of infrastructures. BGP feeds, passive trac measurements, active probing, and darknet monitoring collectively provide valuable insights, but measurement- based approaches alone exhibit blind spots when disruptions are layered, phased, or geographically localized, making eld reports an essential complementary source. Finally , the shutdown demonstrated the eectiveness of allowlist approaches against conventional circumvention tools op erating over local Internet connectivity . As a consequence, alternative com- munication methods (such as satellite connectivity and peer-to-p eer messaging applications based on local wireless networks) became particularly relevant, although these approaches remain eectively 44 The decentralized nature of bitchat, using the nostr protocol, potentially allows for privacy-preserving activity monitoring with blockchain-based tracking dashboards such as https://bitchatexplorer .com/ (accessed: March 2nd, 2026) invisible to current large-scale monitoring frameworks and ther e- fore require new methodological approaches for systematic obser- vation. Acknowledgments W e thank all the organizations and initiatives that collected, orga- nized and made publicly available the monitoring data necessary for this analysis. References [1] Whisper 2026. The Blackout . Whisper . https://state- of- iranblackout.whisper. security Interactive real-time report and analysis on Iran internet connectivity blackout in January 2026 (accessed: 2026-03-26). [2] Simurgh Aryan, Homa Ar yan, and J Alex Halderman. 2013. Internet censorship in Iran: A rst look. In 3rd USENIX W orkshop on Free and Open Communications on the Internet (FOCI 13) . [3] Cecylia Bocovich, Arlo Breault, David Field, Xiaokang Wang, et al . 2024. Snowake, a censorship circumvention system using temporary W ebRTC proxies. In 33rd USENIX Security Symposium ( USENIX Security 24) . 2635–2652. [4] Calla O’Neil. 2025. Iran’s Digital Fortress: The Rise of the National In- formation Network . T echnical Rep ort 16. American Foreign Policy Coun- cil. https://www.afpc.org/uploads/documents/Iran_Strategy_Brief_No._16_- _August_2025.pdf. [5] Cloudare, Inc. 2026. Cloudare Radar — Overview for Iran . Cloudare. https: //radar .cloudare.com/ir [6] Ronald Deib ert, Joshua Oliver , and Adam Senft. 2019. Censors get smart: Evidence from Psiphon in Iran. Review of Policy Research 36, 3 (2019), 341–356. [7] FilterW atch. 2026. From Regional Disruptions to T otal Black- out: Examining Iran’s Internet During Escalating Protests . https://lter .watch/english/2026/01/09/network-monitoring-januar y-2026- internet-repression-in-times-of-protest/ ( Archived on 2026-02-21). [8] FilterW atch, IOD A, Kentik, Miaan Group, and ASL19. 2026. IRAN: 2026 Shutdown T echnical Analysis . T echnical Report. FilterW atch. https://lter .watch/wp- content/uploads/sites/2/2026/01/Iran-Internet-Shutdown- Technical- Analysis- January-2026.pdf (Archived on 2026-02-28). [9] Freedom House. 2024. Iran: Freedom on the Net 2024 Country Report . https://freedomhouse.org/country/iran/freedom-net/2024 (Archived on 2026- 01-24). [10] Jorge Garcia-Cabeza, Javier Albert-Smet, Zoraida Frias, Luis Mendo, Santiago An- drés Azcoitia, and Eduardo Y raola. 2025. Direct-to-Cell: A First Look into Star- link’s Direct Satellite-to-Device Radio Access Netw ork through Crowdsour ced Measurements. IEEE Communications Magazine (2025). [11] Narges Keshavarznia. 2026. A Month of Iran’s Internet: From Regional Disruptions and Blackouts to a New Whitelisted Reality . T echnical Report. Filterwatch. https://lter .watch/english/2026/01/28/network-monitoring-januar y-2026- from-regional-disuptions-to-total-blackout-and-whitelisted-access/ ( Archived on: 2026-01-28). [12] Felix Lange, Niklas Niere, Jonathan v on Niessen, Dennis Suermann, Nico Heit- mann, and Juraj Somorovsky . 2025. I (ra) nconsistencies: Novel Insights into Iran’s Censorship. Free and Open Communications on the Internet (2025), 7–12. Issue 1. [13] Doug Madory. 2026. From Stealth Blackout to Whitelisting: Inside the Iranian Shutdown . https://w ww .kentik.com/blog/from-stealth-blackout-to-whitelisting- inside-the-iranian-shutdown/ (Ar chived on 2026-01-22). [14] Amanda Meng, Zachar y Bischof, and Alberto Dainotti. 2026. A Com- parative Look at Internet Shutdowns in Iran: 2019, 2022, 2025, and 2026 . https://ioda.inetintel.cc.gatech.edu/reports/a-comparative-look-at-internet- shutdowns-in-iran-2019-2022-2026-and-2026/ (Ar chived on 2026-01-23). [15] Miaan Group, ASL19, IOD A. 2025. Iran’s Stealth Blackout: A Multi-Stakeholder A nalysis of the June 2025 Internet Shutdown . T echnical Report. https: //lter .watch/wp- content/uploads/sites/2/2026/01/Irans- Stealth- Blackout_- A - Multi- stakeholder- Analysis- of- the- June- 2025- Internet- Shutdown.pdf (Archiv ed on 2026-02-22). [16] Narges Keshavarznia. 2026. Connected but Unsafe: The Model of Regional In- ternet Repression During the December 2025 – January 2026 Protests . T e chnical Report. Filterwatch. https://lter.watch/english/2026/01/05/network-monitorig- december-2025-internet-repression-in-times-of-protest/ ( Archived on 2026-03- 05). [17] OONI, IODA, M-Lab , Cloudare, Kentik, Censored Planet, ISOC, Ar- ticle 19. 2022. T echnical Multi-Stakeholder Report on Internet Shut- downs: The Case of Iran A mid Autumn 2022 Protests . T echnical Report. https://ioda.inetintel.cc.gatech.edu/reports/technical- multi- stakeholder- report- on- internet- shutdowns- the- case- of- iran- amid- autumn- 2022- protests/ (Archiv ed on 2026-01-16 ). Giuseppe Aceto, V alerio Persico, and Antonio Pescapè [18] Jonas T ai, Karthik Nishanth Sengottuvelavan, Peter Whiting, and Nguyen Phong Hoang. 2025. IRBlo ck: A Large-Scale Measurement Study of the Great Firewall of Iran. In 34th USENIX Security Symposium (USENIX Security 25) . 705–722. [19] Elham Pourabbas V afa, Mohit Singhal, Po ojitha Thota, and Sayak Saha Roy . 2025. Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention T echnologies. In 2025 IEEE Symposium on Security and Privacy (SP) . IEEE, 1325–1343.

Original Paper

Loading high-quality paper...

Comments & Academic Discussion

Loading comments...

Leave a Comment