Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis
Customers of 23520 we have received spoofed packets from

This page lists the directly connected customers of AS 23520 from which we have received a spoofed packet from, ordered by the number of prefixes of an inferred Ingress ACL derived from prefix announcements for the customer recorded in public BGP data. BCP-84 describes Ingress ACLs as "the most bulletproof solution when done properly" and the "best fit ... when the configuration is not too dynamic, ... if the number of used prefixes is low." Further detail about the size and dynamism of an inferred ACL is available by following the History link for each AS.

ASNCountryNumber of Prefixes
in Customer Cone
Number of ASes
in Customer Cone
Address
History
Spoof
Routable
30689 (FLOW-NET)jam (Jamaica)815Historyreceived
11139 (CWDOM)grd (Grenada)1786Historyreceived
33182 (DIMENOC)usa (United States)70235Historyreceived
27774hti (Haiti)10Historyblocked
20015chl (Chile)30Historyblocked
52260hti (Haiti)41Historyblocked
52260hti (Haiti)41Historyblocked
19863guy (Guyana)112Historyblocked
46650 (ASN1)grd (Grenada)121Historyblocked
8048ven (Venezuela)15226Historyblocked
61440usa (United States)1831Historyblocked
27759hti (Haiti)23774Historyblocked
27665tto (Trinidad and Tobago)243916Historyblocked
  Last Modified: