Spoofing Information for AS 13436 (INTERNET2-CONF)

Spoofing status per IP block (all dates)

Spoof status key
receivedSpoofed packet was received.Pattern of tests from this IP block indicates a switch from allowing spoofing to blocking it.
rewrittenSpoofed packet was received, but the source address was changed en route.
blockedSpoofed packet was not received, but unspoofed packet was.
unknownNeither spoofed nor unspoofed packet was received.
IP blockLatest testSpoof
163.253.48.x/242019-03-05 21:02:16 GMTblockedblocked
163.253.49.x/242023-09-20 14:21:19 GMTblockedblocked
163.253.50.x/242019-12-10 21:16:11 GMTblockedblocked
163.253.51.x/242019-12-10 17:31:03 GMTblockedblocked
163.253.52.x/242019-03-06 20:18:51 GMTblockedblocked
163.253.53.x/242019-12-11 17:50:12 GMTblockedblocked
2001:468:26xx::/402023-09-20 14:21:19 GMTblockedblocked

Address Space Announcement History

This is the address space announcement history of an AS and its customer cone, derived from prefix announcements for the AS recorded in public BGP data. For each month, we have aggregated more specific prefix announcements into contiguous address blocks, where possible. The goal of this page is to allow a network operator to judge the feasibility of deploying a static ingress access control list for their border router connecting to the AS. BCP-84 describes Ingress ACLs as "the most bulletproof solution when done properly" and the "best fit ... when the configuration is not too dynamic, ... if the number of used prefixes is low."

Address Space Announcements: 13436 (INTERNET2-CONF)

No prefix history data was found for ASN 13436
Last Modified