Activity Summary
- 1547 days inactive
- 1547 days old
- innog@innog.net
- 1 participants
- 0 comments
j
: Next unread message k
: Previous unread message j a
: Jump to all threads
j l
: Jump to MailingList overview
Dear Colleagues,
Few networks from India are listed in this Spoofer report so forwarding to the Indian NOG mailing list.
For further details, please contact spoofer-info@caida.org.
Regards Sunny APNIC
-------- Forwarded Message -------- Subject: [SANOG] Spoofer Report for SANOG for Jun 2019 Date: Mon, 8 Jul 2019 10:00:26 -0700 From: CAIDA Spoofer Project spoofer-info@caida.org To: sanog@sanog.org
In response to feedback from operational security communities, CAIDA's source address validation measurement project (https://spoofer.caida.org) is automatically generating monthly reports of ASes originating prefixes in BGP for systems from which we received packets with a spoofed source address. We are publishing these reports to network and security operations lists in order to ensure this information reaches operational contacts in these ASes.
This report summarises tests conducted within afg, bgd, btn, ind, lka, mdv, npl, pak.
Inferred improvements during Jun 2019: none inferred
Source Address Validation issues inferred during Jun 2019: ASN Name First-Spoofed Last-Spoofed 24560 AIRTELBROADBAND 2016-03-12 2019-06-25 17747 ZIML-AP 2016-07-22 2019-06-06 55836 RELIANCEJIO-IN 2017-03-03 2019-06-30 9541 CYBERNET-AP 2018-05-17 2019-06-25 132976 KINGSBROADBAND 2018-09-17 2019-06-26 138418 2018-12-06 2019-06-21 18024 2019-01-09 2019-06-04 9829 BSNL-NIB 2019-03-07 2019-06-11
Further information for these tests where we received spoofed packets is available at: https://spoofer.caida.org/recent_tests.php?country_include=afg,bgd,btn,ind,l...
Please send any feedback or suggestions to spoofer-info@caida.org