[SANOG] Spoofer Report for SANOG for May 2019

CAIDA Spoofer Project spoofer-info at caida.org
Sat Jun 8 17:00:24 UTC 2019

In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.

This report summarises tests conducted within afg, bgd, btn, ind, lka, mdv, npl, pak.

Inferred improvements during May 2019:
   ASN Name                                           Fixed-By
  9541 CYBERNET-AP                                    2019-05-17

Further information for the inferred remediation is available at:

Source Address Validation issues inferred during May 2019:
   ASN Name                           First-Spoofed Last-Spoofed
 24560 AIRTELBROADBAND                   2016-03-12   2019-05-23
 17747 ZIML-AP                           2016-07-22   2019-05-23
 55836 RELIANCEJIO-IN                    2017-03-03   2019-05-31
136514 ONESKY                            2018-03-29   2019-05-30
  9541 CYBERNET-AP                       2018-05-17   2019-05-28
132976 KINGSBROADBAND                    2018-09-17   2019-05-25
138418                                   2018-12-06   2019-05-22
  9829 BSNL-NIB                          2019-03-07   2019-05-30

Further information for these tests where we received spoofed
packets is available at:

Please send any feedback or suggestions to spoofer-info at caida.org

More information about the sanog mailing list