In response to feedback from operational security communities, CAIDA's source address validation measurement project (https://spoofer.caida.org) is automatically generating monthly reports of ASes originating prefixes in BGP for systems from which we received packets with a spoofed source address. We are publishing these reports to network and security operations lists in order to ensure this information reaches operational contacts in these ASes. This report summarises tests conducted within usa, can. Inferred improvements during Oct 2022: ASN Name Fixed-By 33696 NEXTARRAY-ASN-01 2022-10-02 399486 2022-10-05 397086 LAYER-HOST-HOUSTON 2022-10-22 Further information for the inferred remediation is available at: https://spoofer.caida.org/remedy.php Source Address Validation issues inferred during Oct 2022: ASN Name First-Spoofed Last-Spoofed 19230 NANOG 2016-06-13 2022-10-03 209 CENTURYLINK-US-LEGACY-QWEST 2016-08-16 2022-10-29 6128 CABLE-NET-1 2016-09-03 2022-10-03 20412 CLARITY-TELECOM 2016-09-30 2022-10-31 271 BCNET 2016-10-24 2022-10-27 30036 MEDIACOM-ENTERPRISE-BUSINESS 2016-11-16 2022-10-12 22898 ATLINK 2016-12-16 2022-10-14 23089 HOTWIRE-COMMUNICATIONS 2017-09-30 2022-10-04 33452 RW 2018-09-19 2022-10-27 14031 SCXY 2018-10-18 2022-10-26 20278 NEXEON 2019-03-05 2022-10-07 21804 ACCESS-SK 2019-06-09 2022-10-26 398836 NP-NETWORKS 2021-03-12 2022-10-30 394414 E2WS 2022-05-08 2022-10-31 400517 2022-10-03 2022-10-03 400328 2022-10-14 2022-10-14 Further information for these tests where we received spoofed packets is available at: https://spoofer.caida.org/recent_tests.php?country_include=usa,can&no_block=1 Please send any feedback or suggestions to spoofer-info@caida.org
participants (1)
-
CAIDA Spoofer Project