In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.

This report summarises tests conducted within usa, can.

Inferred improvements during Dec 2018:
   ASN Name                                           Fixed-By
393422 NEWVISIONS-CNY                                 2018-12-10
 20009 WADSNET                                        2018-12-11
  7922 COMCAST-7922                                   2018-12-14

Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php

Source Address Validation issues inferred during Dec 2018:
   ASN Name                           First-Spoofed Last-Spoofed
 40065 CNServersLLC                      2016-05-01   2018-12-22
  7029 WINDSTREAM                        2016-06-21   2018-12-14
   209 CENTURYLINK-US-LEGACY-QWEST       2016-08-16   2018-12-27
  6128 CABLE-NET-1                       2016-09-03   2018-12-22
 20412 CLARITY-TELECOM                   2016-09-30   2018-12-26
  6181 FUSE-NET                          2016-10-10   2018-12-27
 15305 SYRINGANETWORKS                   2016-10-21   2018-12-15
 25787 ROWE-NETWORKS                     2016-10-21   2018-12-28
   174 COGENT-174                        2016-10-21   2018-12-20
 31857 PRIORITY-TERABIT                  2016-10-25   2018-12-28
 30341 SCTA-ASN                          2016-10-31   2018-12-31
 32440 LONI                              2016-11-03   2018-12-20
 33182 DimeNOC                           2016-11-08   2018-12-28
 12083 WOW-INTERNET                      2016-11-09   2018-12-31
 13427 SOFTCOM-INTERNET-COMMUNICATION    2016-11-14   2018-12-25
  3549 LVLT-3549                         2016-11-16   2018-12-13
 21832 KELLINCOM-1                       2017-02-03   2018-12-27
  7122 MTS-ASN                           2017-05-16   2018-12-24
   701 UUNET                             2017-06-14   2018-12-09
  6461 ZAYO-6461                         2017-06-21   2018-12-14
 63296 AMARILLO-WIRELESS                 2017-09-01   2018-12-26
  7233 YAHOO-US                          2017-09-07   2018-12-21
 33523 ROWANUNIVERSITY                   2017-10-29   2018-12-17
   546 PARSONS-PGS-1                     2017-11-20   2018-12-19
 12222 AKAMAI                            2018-02-14   2018-12-30
 29384 Qatar-Foundation                  2018-03-08   2018-12-26
 23148 TERRENAP                          2018-03-15   2018-12-26
  8100 ASN-QUADRANET-GLOBAL              2018-04-06   2018-12-26
  4201 ORST                              2018-04-19   2018-12-27
 11827 WSU                               2018-04-19   2018-12-28
 35911 BNQ-1                             2018-06-06   2018-12-18
   225 VIRGINIA                          2018-06-18   2018-12-19
  2381 WISCNET1                          2018-09-04   2018-12-26
 54804 CSMIII-BUNKIELA                   2018-09-15   2018-12-30
 33452 RW                                2018-09-19   2018-12-27
 20448 VPNTRANET-LLC                     2018-09-20   2018-12-26
 11215 LOGIXCOMM                         2018-09-20   2018-12-13
 11996 LOBOIS                            2018-09-24   2018-12-27
 19919 VSW                               2018-10-23   2018-12-13
 13825 TROYCABLE-NET                     2018-11-21   2018-12-22
  6453 AS6453                            2018-12-11   2018-12-20
 62957 HOSPITALITY-NETWORK               2018-12-30   2018-12-30

Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=usa,can&no_block=1

Please send any feedback or suggestions to spoofer-i...@caida.org

Reply via email to