[SANOG] Spoofer Report for SANOG for Dec 2018
CAIDA Spoofer Project
spoofer-info at caida.org
Tue Jan 8 18:00:04 UTC 2019
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within afg, bgd, btn, ind, lka, mdv, npl, pak.
Inferred improvements during Dec 2018:
ASN Name Fixed-By
58587 FIBERATHOME-BD 2018-12-04
55824 NKN-CORE-NW 2018-12-05
Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php
Source Address Validation issues inferred during Dec 2018:
ASN Name First-Spoofed Last-Spoofed
55836 RELIANCEJIO-IN 2017-03-03 2018-12-31
136514 ONESKY 2018-03-29 2018-12-31
9541 CYBERNET-AP 2018-05-17 2018-12-28
45415 VASAICABLEPVTLTD 2018-06-07 2018-12-25
132976 KINGSBROADBAND 2018-09-17 2018-12-24
17665 IN2CABLE-AP 2018-11-21 2018-12-27
24186 RAILTEL 2018-12-08 2018-12-15
38264 WATEEN-IMS-PK 2018-12-25 2018-12-25
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=afg,bgd,btn,ind,lka,mdv,npl,pak&no_block=1
Please send any feedback or suggestions to spoofer-info at caida.org
More information about the sanog
mailing list