Spoofer Report for NANOG for Jan 2025

In response to feedback from operational security communities, CAIDA's source address validation measurement project (https://spoofer.caida.org) is automatically generating monthly reports of ASes originating prefixes in BGP for systems from which we received packets with a spoofed source address. We are publishing these reports to network and security operations lists in order to ensure this information reaches operational contacts in these ASes. This report summarises tests conducted within usa, can. Inferred improvements during Jan 2025: ASN Name Fixed-By 4922 SHENTEL 2025-01-03 Further information for the inferred remediation is available at: https://spoofer.caida.org/remedy.php Source Address Validation issues inferred during Jan 2025: ASN Name First-Spoofed Last-Spoofed 40676 AS40676 2016-08-29 2025-01-27 27364 ACS-INTERNET 2016-09-27 2025-01-31 63296 AWBROADBAND 2017-09-01 2025-01-30 6360 UNIVHAWAII 2019-02-25 2025-01-18 22883 CONDENAST 2019-05-29 2025-01-30 21804 ACCESS-SK 2019-06-09 2025-01-28 11525 HRTC 2020-06-27 2025-01-18 12183 TALKIE-COMMUNICATIONS 2022-12-10 2025-01-30 3701 NERONET 2023-04-18 2025-01-26 400282 2023-04-27 2025-01-30 393577 SCCNET 2023-05-03 2025-01-31 202400 2023-05-08 2025-01-28 61461 Airtek Solutions C.A. 2023-05-13 2025-01-31 20119 ARROW 2023-10-19 2025-01-30 394684 WISPERNET 2024-01-17 2025-01-26 398182 BLN 2024-06-17 2025-01-22 57308 Rossvyazinform 2024-08-10 2025-01-17 3801 MISNET 2024-09-09 2025-01-30 40959 HOSTMASTER 2024-09-16 2025-01-27 30083 AS-30083-GO-DADDY-COM-LLC 2024-12-09 2025-01-27 19530 NDIN-STATE 2024-12-20 2025-01-03 271814 2025-01-16 2025-01-16 273143 2025-01-22 2025-01-30 Further information for these tests where we received spoofed packets is available at: https://spoofer.caida.org/recent_tests.php?country_include=usa,can&no_block=1 Please send any feedback or suggestions to spoofer-info@caida.org
participants (1)
-
CAIDA Spoofer Project