Seven years of Roskomnadzor blocklist history (Nov 2012–April 2019) show the list grew to 132,798 unique domains and 324,695 unique IPs, with a dramatic spike in 2018 when Russia blocked Telegram by adding subnets covering approximately 16 million IP addresses—producing major collateral damage to co-hosted Google and Amazon services and illustrating that subnet-level blocking is the blunt instrument of last resort for CDN-hosted targets.
From 2020-ramesh-decentralized — Decentralized Control: A Case Study of Russia
· §VI-A, §II-B
· 2020
· Network and Distributed System Security
Implications
Shared CDN or cloud IP space provides no protection against subnet-level enforcement actions; circumvention services should maintain geographically and topologically diverse IP inventory outside major cloud ASes to survive collateral blocklisting.
Continuous monitoring of the Roskomnadzor blocklist (e.g., via the public Zapret repository) enables circumvention operators to detect and pre-rotate infrastructure before enforcement reaches their addresses.