Shitty Dynamic DNS, optimised for Shitty Cisco boxes
Old Cisco hardware supports rudimentary "Dynamic DNS", which is helpful. They don't support modern TLS implementations however, which is less helpful as most providers offering dynamic DNS expect updates to be sent over HTTPS.
CuDDNS accepts updates over good old fashioned HTTP which solves the problem, but introduces new and exciting problems such as sending credentials over plaintext - you might be able to work around this by running a HTTP to HTTPS proxy locally.
We've previously operated an internal DDNS system using noip-rfc2136 and Bind, but maintaining servers is dull so we've gone "Serverless" thanks to Jeff Bezos.
If you're mad enough to use it, get in touch to get a username and password
Maybe. We're too busy to sanitise it for public consumption right now but if you're desperate we might get round to it.
This is a terrible idea and there's no guarantees of uptime.
Here's how you can configure a Cisco box to use the CuDDNS service
ip ddns update method ddns
HTTP
add http://user:password@dns.c29.uk/update?hostname=<h>&myip=<a>
interval maximum 0 1 0 0
interval minimum 0 0 10 0
interface FastEthernet0/0
ip ddns update hostname vgw-201.foocom.dns.c29.uk
ip ddns update ddns
You could also use Curl, or modify the request for another device
curl "https://user:password@dns.29.uk/update?hostname=vgw-201.foocom.dns.c29.uk&myip=198.51.100.23"