Logo

Spoofing Information for AS 13335 (CLOUDFLARENET)

Spoofing status per IP block

Spoof status key
receivedSpoofed packet was received.Pattern of tests from this IP block indicates a switch from allowing spoofing to blocking it.
rewrittenSpoofed packet was received, but the source address was changed en route.
blockedSpoofed packet was not received, but unspoofed packet was.
unknownNeither spoofed nor unspoofed packet was received.
IP blockLatest testSpoof
Private
Spoof
Routable
8.17.206.x/242022-07-10 17:56:02 GMTblockedblocked
8.18.195.x/242021-02-10 02:12:45 GMTunknownunknown
8.20.101.x/242022-03-26 02:15:09 GMTunknownunknown
8.20.103.x/242021-11-07 15:58:01 GMTunknownunknown
8.21.11.x/242021-10-16 03:14:18 GMTunknownunknown
8.21.238.x/242022-04-02 03:09:59 GMTblockedblocked
8.21.239.x/242022-04-18 05:31:22 GMTunknownunknown
8.25.96.x/242022-01-27 19:17:00 GMTunknownunknown
8.26.182.x/242021-09-04 03:33:25 GMTunknownunknown
8.29.105.x/242022-01-30 00:02:16 GMTunknownunknown
8.30.234.x/242022-01-09 08:52:30 GMTunknownunknown
8.31.163.x/242022-02-10 04:52:16 GMTunknownunknown
8.36.216.x/242022-06-24 08:04:57 GMTunknownunknown
8.36.217.x/242022-03-03 12:41:43 GMTunknownunknown
8.37.43.x/242020-08-11 18:36:03 GMTblockedblocked
8.38.147.x/242021-12-23 11:11:45 GMTblockedblocked
8.38.148.x/242022-01-19 02:48:18 GMTblockedblocked
8.38.149.x/242020-02-25 03:59:11 GMTblockedblocked
8.39.201.x/242022-07-12 08:28:27 GMTunknownunknown
8.39.202.x/242022-03-27 04:57:35 GMTunknownunknown
8.39.205.x/242021-05-07 05:53:42 GMTunknownunknown
8.39.214.x/242021-08-01 10:52:48 GMTunknownunknown
8.39.215.x/242021-08-28 19:38:32 GMTunknownunknown
8.40.30.x/242022-04-29 03:19:50 GMTunknownunknown
8.40.107.x/242022-06-30 19:26:10 GMTblockedblocked
8.41.6.x/242021-10-31 11:55:54 GMTunknownunknown
8.42.54.x/242022-02-25 17:42:04 GMTunknownunknown
8.42.172.x/242021-01-28 10:01:03 GMTunknownunknown
8.42.245.x/242020-12-17 14:09:37 GMTunknownunknown
8.43.224.x/242021-06-15 19:15:24 GMTblockedblocked
8.45.42.x/242022-05-07 14:27:34 GMTunknownunknown
8.45.45.x/242022-01-18 10:45:35 GMTblockedblocked
8.45.47.x/242022-01-07 08:05:31 GMTunknownunknown
8.46.118.x/242021-11-20 15:56:57 GMTunknownunknown
8.47.13.x/242021-04-18 12:08:30 GMTunknownunknown
8.47.15.x/242021-06-10 20:29:50 GMTunknownunknown
104.28.198.x/242022-09-22 08:44:15 GMTblockedblocked
104.28.210.x/242022-08-11 04:50:39 GMTunknownblocked
104.28.222.x/242022-08-01 09:48:05 GMTunknownunknown
104.28.228.x/242022-09-24 21:48:19 GMTblockedblocked
104.28.254.x/242022-07-17 13:15:55 GMTunknownunknown
2a09:bac0:xx::/402022-06-24 08:04:57 GMTblockedblocked
2a09:bac0:1xx::/402021-05-07 05:53:42 GMTunknownunknown
2a09:bac0:2xx::/402021-02-10 02:12:45 GMTunknownunknown
2a09:bac0:4xx::/402022-01-30 00:02:16 GMTunknownunknown
2a09:bac0:5xx::/402022-09-24 21:48:19 GMTunknownunknown

Customers of AS 13335 we have spoofer tests from

This is the list of directly connected customers of AS 13335 from which we have received a spoofer test, ordered by the customer's ability to send spoofed packets and the number of prefixes of an inferred ingress ACL derived from prefix announcements for the customer recorded in public BGP data. BCP-84 describes ingress ACLs as "the most bulletproof solution when done properly" and the "best fit ... when the configuration is not too dynamic, ... if the number of used prefixes is low." Further detail about the size and dynamism of an inferred ACL is available by following the History link for each AS.

ASNCountryNumber of Prefixes
in Customer Cone
Number of ASes
in Customer Cone
Recent
tests
Spoof
Routable
4739 (INTERNODE-AS)aus (Australia)32416AS 4739 testsblocked

Address Space Announcement History

The customer cone for 13335 is too large for a prefix list to be useful.

Last Modified