This page lists the directly connected customers of AS 4134 from which we have received a spoofed packet in the past month. We have ordered the customer ASes by the number of IPv4 prefixes for a candidate Ingress ACL that we derived from prefix announcements in public BGP data by the customer AS. BCP-84 describes Ingress ACLs as "the most bulletproof solution when done properly" and the "best fit ... when the configuration is not too dynamic, ... if the number of used prefixes is low." Further detail about the size and dynamism of an inferred ACL is available by following the History link for each AS.
ASN | Country | Number of Prefixes in Customer Cone | Number of ASes in Customer Cone | Address History | Outbound Routable Status |
---|---|---|---|---|---|
4538 (ERX-CERNET-BKB) | chn (China) | 1269 | 26 | History | received |
36678 (CTUSA) | usa (United States) | 19 | 1 | History | blocked |
4847 (CNIX-AP) | chn (China) | 3011 | 98 | History | blocked |
4809 (CHINATELECOM-CORE-WAN-CN2) | chn (China) | 11897 | 421 | History | blocked |
4837 (CHINA169-Backbone) | chn (China) | 26257 | 985 | History | blocked |