In response to feedback from operational security communities, CAIDA's source address validation measurement project (https://spoofer.caida.org) is automatically generating monthly reports of ASes originating prefixes in BGP for systems from which we received packets with a spoofed source address. We are publishing these reports to network and security operations lists in order to ensure this information reaches operational contacts in these ASes. This report summarises tests conducted within usa, can. Inferred improvements during May 2022: ASN Name Fixed-By 5078 ONENET-AS-1 2022-05-10 Further information for the inferred remediation is available at: https://spoofer.caida.org/remedy.php Source Address Validation issues inferred during May 2022: ASN Name First-Spoofed Last-Spoofed 54825 PACKET 2016-04-15 2022-05-22 7029 WINDSTREAM 2016-06-21 2022-05-24 209 CENTURYLINK-US-LEGACY-QWEST 2016-08-16 2022-05-27 6128 CABLE-NET-1 2016-09-03 2022-05-31 27364 ACS-INTERNET 2016-09-27 2022-05-24 20412 CLARITY-TELECOM 2016-09-30 2022-05-31 271 BCNET 2016-10-24 2022-05-25 22898 ATLINK 2016-12-16 2022-05-31 1246 TLL-WEST 2017-04-20 2022-05-21 63296 AWBROADBAND 2017-09-01 2022-05-30 20845 DIGICABLE 2018-09-11 2022-05-15 33452 RW 2018-09-19 2022-05-20 21804 ACCESS-SK 2019-06-09 2022-05-28 6391 URBAN-15 2020-05-29 2022-05-17 398836 NP-NETWORKS 2021-03-12 2022-05-28 212934 AS_POTVIN 2021-10-03 2022-05-31 22773 ASN-CXA-ALL-CCI-22773-RDC 2021-10-24 2022-05-29 394437 PSLIGHTWAVE 2021-12-02 2022-05-03 399065 DEFASTLINK 2022-03-12 2022-05-29 33696 NEXTARRAY-ASN-01 2022-03-30 2022-05-27 396097 SAIL-INET 2022-04-22 2022-05-24 394414 E2WS 2022-05-08 2022-05-22 208563 LINUXGEMINI 2022-05-11 2022-05-25 Further information for these tests where we received spoofed packets is available at: https://spoofer.caida.org/recent_tests.php?country_include=usa,can&no_block=1 Please send any feedback or suggestions to spoofer-info@caida.org