Logo

Session Report

Summary:
Test run at: 2017-04-11 22:53:57 GMT
Client Prefix (v4): 89.46.222.x/24
Client AS (v4): 48874 (HOSTMAZE)
IPv4 Probes: 104
Client Prefix (v6): 2a02:13f0:81xx::/40
Client AS (v6): 48874 (HOSTMAZE)
IPv6 Probes: 80
Outbound spoofing summary (from the client to our server)
Source address type IPv4IPv6
Private - RFC1918 or ULA blockedreceived
Routable blockedreceived
Largest spoofable neighbor prefix length /23none
Spoof status key
receivedSpoofed packet was received.Pattern of tests from this IP block indicates a switch from allowing spoofing to blocking it.
rewrittenSpoofed packet was received, but the source address was changed en route.
blockedSpoofed packet was not received, but unspoofed packet was.
unknownNeither spoofed nor unspoofed packet was received.

IPv4 Adjacent Netblock Testing:

Your host (89.46.222.x/24) can spoof 511 neighboring addresses (within your /23 prefix)


Spoofed source address (anon)Prefix
Length
ASN of spoofed
source address
Received
89.46.222.x/24/3148874yes
89.46.222.x/24/3048874yes
89.46.222.x/24/2948874yes
89.46.222.x/24/2848874yes
89.46.222.x/24/2748874yes
89.46.222.x/24/2648874yes
89.46.222.x/24/2548874yes
89.46.222.x/24/2448874yes
89.46.223.x/24/2348874yes
89.46.220.x/24/2244682no
89.46.218.x/24/21198357no
89.46.214.x/24/2044826no
89.46.206.x/24/1957324no
89.46.254.x/24/1848095no
89.46.158.x/24/1744681no
89.46.94.x/24/16UNROUTEDno
89.47.222.x/24/156910no
89.44.222.x/24/1448095no
89.42.222.x/24/135588no
89.38.222.x/24/1229119no
89.62.222.x/24/115430no
89.14.222.x/24/106805no
89.110.222.x/24/913091no
89.174.222.x/24/85588no

Meaning of status in Received column:

noPackets spoofed from adjacent netblock were not received, probably due to blocking
yesPackets spoofed from adjacent netblock were received (but that netblock is within the source AS)

IPv4 Outbound Filtering Depth:

The tracefilter test found your host able to spoof routable, non-adjacent source addresses through the first 2 IP hop(s).
IPv6 probes:
Spoofed source addressDestinationReceived
2001:4978:1fb:6400::d22001:388:1:5001:21c:c0ff:fea2:4a3ayes
2001:49aa:111:aa00::112001:388:1:5001:21c:c0ff:fea2:4a3ayes
fd11:1111:1111::11112001:388:1:5001:21c:c0ff:fea2:4a3ayes
2001:4978:1fb:6400::d22001:410:102:1::78yes
2001:49aa:111:aa00::112001:410:102:1::78yes
fd11:1111:1111::11112001:410:102:1::78yes
2001:4978:1fb:6400::d22001:410:90ff::5yes
2001:49aa:111:aa00::112001:410:90ff::5yes
fd11:1111:1111::11112001:410:90ff::5yes
2001:4978:1fb:6400::d22001:48d0:101:501::242yes
2001:49aa:111:aa00::112001:48d0:101:501::242yes
fd11:1111:1111::11112001:48d0:101:501::242yes
2001:4978:1fb:6400::d22001:708:40:2001:21c:c0ff:fea2:4c5cyes
2001:49aa:111:aa00::112001:708:40:2001:21c:c0ff:fea2:4c5cyes
fd11:1111:1111::11112001:708:40:2001:21c:c0ff:fea2:4c5cno
2001:4978:1fb:6400::d22001:770:18:7:225:90ff:fe0c:acb4yes
2001:49aa:111:aa00::112001:770:18:7:225:90ff:fe0c:acb4yes
fd11:1111:1111::11112001:770:18:7:225:90ff:fe0c:acb4no
IPv6 Adjacent Netblock Testing:
Spoofed source address (anon)Prefix
Length
ASN of spoofed
source address
Received
2a02:13f0:81xx::/40/12048874no
2a02:13f0:81xx::/40/11248874no
2a02:13f0:81xx::/40/10448874no
2a02:13f0:81xx::/40/9648874no
2a02:13f0:81xx::/40/8848874no
2a02:13f0:81xx::/40/8048874no
2a02:13f0:81xx::/40/7248874no
2a02:13f0:81xx::/40/6448874no
2a02:13f0:81xx::/40/5648874no
2a02:13f0:81xx::/40/4848874no
2a02:13f0:81xx::/40/40UNROUTEDno
2a02:13f0:1xx::/40/32UNROUTEDno
2a02:1370:81xx::/40/2439324no
2a02:93f0:81xx::/40/16UNROUTEDno

Meaning of status in Received column:

noPackets spoofed from adjacent netblock were not received, probably due to blocking
Summary:
The results from all tests are aggregated to produce a summary "State of IP Spoofing" report.
Feedback:
We welcome questions and feedback to the Spoofer Information Mailing List and invite users to join the Spoofer Users Mailing List for discussion and announcements.
Last Modified