Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
Customers of 16265 we have received spoofed packets from

This page lists the directly connected customers of AS 16265 from which we hav received a spoofed packet from, ordered by the number of prefixes of an inferred Ingress ACL derived from prefix announcements for the customer recorded in public BGP data. BCP-84 describes Ingress ACLs as "the most bulletproof solution when done properly" and the "best fit ... when the configuration is not too dynamic, ... if the number of used prefixes is low." Further detail about the size and dynamism of an inferred ACL is available by following the History link for each AS.

ASNCountryNumber of Prefixes
in Customer Cone
Number of ASes
in Customer Cone
Address
History
Spoof
Routable
394380 (LeaseWeb-DAL)usa (United States)20Historyblocked
30633 (LEASEWEB-USA-WDC-01)usa (United States)130Historyblocked
30880 (SPACEDUMP-AS)swe (Sweden)215Historyblocked
28753 (LEASEWEB-DE)deu (Germany)220Historyblocked
7203 (LEASEWEB-USA-SFO-12)usa (United States)610Historyblocked
13189 (LIDERO)swe (Sweden)727Historyblocked
6661 (EPT-LU)lux (Luxembourg)23653Historyblocked
15704 (AS15704)esp (Spain)29535Historyblocked
1257 (SWIPNET)swe (Sweden)1464295Historyblocked
12880 (DCI-AS)irn (Iran)1970364Historyblocked
9009 (M247)usa (United States)5430540Historyblocked
  Last Modified: