[SANOG] Spoofer Report for SANOG for Oct 2020
CAIDA Spoofer Project
spoofer-info at caida.org
Sun Nov 8 18:00:18 UTC 2020
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within afg, bgd, btn, lka, mdv, npl, pak.
Inferred improvements during Oct 2020:
ASN Name Fixed-By
63991 ARROWNETPVTLTD-NP 2020-10-13
135327 CWC 2020-10-21
Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php
Source Address Validation issues inferred during Oct 2020:
ASN Name First-Spoofed Last-Spoofed
9541 CYBERNET-AP 2018-12-10 2020-10-27
45671 AS45671-NET-AU 2020-08-18 2020-10-08
45650 VIANET-NP 2020-09-23 2020-10-28
63991 ARROWNETPVTLTD-NP 2020-10-13 2020-10-21
38712 TELNET-AS-BD-AP 2020-10-21 2020-10-28
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=afg,bgd,btn,lka,mdv,npl,pak&no_block=1
Please send any feedback or suggestions to spoofer-info at caida.org
More information about the sanog
mailing list