In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.

This report summarises tests conducted within gbr.

Inferred improvements during Jul 2019:
   ASN Name                                           Fixed-By
 56595 FLUENCY                                        2019-07-19

Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php

Source Address Validation issues inferred during Jul 2019:
   ASN Name                           First-Spoofed Last-Spoofed
 60339 H3GUK                             2016-09-01   2019-07-31
  5089 NTL                               2016-11-16   2019-07-25
 44684 MYTHIC                            2018-02-25   2019-07-28
 62904 EONIX-COMMUNICATIONS-ASBLOCK-6    2019-07-14   2019-07-17
203851 as_csd001                         2019-07-30   2019-07-30

Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=gbr&no_block=1

Please send any feedback or suggestions to [email protected]

Reply via email to