Logo

State of IP Spoofing

Summary:

These charts show spoofing results with different kinds of aggregation. They use only the most recent test from each client IP address, and only tests run within the last year. Because the large majority of tests occur from behind a NAT, the results are separated into tests with no NAT involved, and all tests (with and without NAT). Tests that couldn't evaluate whether spoofing or blocking occur are excluded.

The remaining tests are first aggregated in IP blocks (/24 for IPv4, and /40 for IPv6). Blocks in which all tested client addresses result in the same status are labeled as "spoofable" or "unspoofable", and blocks with conflicting results from different IP addresses are labeled "inconsistent".

A similar analysis is done on the AS level, but the "inconsistent" ASes are further subdivided into those with less than half their IP blocks considered spoofable (which are labeled "partly spoofable") and those with at least half spoofable (which are labeled "mostly spoofable").

StatusCount
Spoofable264
Inconsistent1
Blocked1084
StatusCount
Spoofable147
Mostly spoofable28
Partly spoofable36
Blocked542
StatusCount
Spoofable1417
Inconsistent2
NAT Blocked10611
Blocked1072
StatusCount
Spoofable503
Mostly spoofable28
Partly spoofable71
NAT Blocked1281
Blocked504
StatusCount
Spoofable320
Inconsistent57
Blocked1611
StatusCount
Spoofable206
Mostly spoofable48
Partly spoofable31
Blocked535
Summary of observed spoofing over last 6 months

These graphs plot the spoofability of the IP blocks and ASes that we have observed over the last 6 months, at a granularity of 1 day. In order to prevent visual clutter, all tests since 1 week before the specified date are included in the spoofability calculation, and all the "inconsistent" prefixes or ASes are considered to be "spoofable". Tests that couldn't evaluate whether spoofing or blocking occur are excluded.

See the graph for the lifetime of spoofer
IPv4 spoofing over time excluding NAT
IPv4 spoofing over time including NAT
IPv6 spoofing over time excluding NAT
Top Ten Spoofer Test Results (for the last year)
by ASNClient
IP blocks
Spoofing
IP blocks
24560 (AIRTELBROADBAND-AS-AP)259254 (98.1%)
614616962 (89.9%)
741820750 (24.2%)
8452 (TE-AS)7527 (36.0%)
3329 (HOL-GR)5626 (46.4%)
73034522 (48.9%)
6810 (BEZEK)2314 (60.9%)
1267 (ASN-WINDTRE)12313 (10.6%)
24016 (RaajjeOnline-AS)1313 (100.0%)
528722111 (52.4%)
See more test results classified by AS
by CountryClient
IP blocks
Spoofing
IP blocks
bra (Brazil)2442404 (16.5%)
ind (India)602275 (45.7%)
usa (United States)2013162 (8.0%)
chl (Chile)34358 (16.9%)
arg (Argentina)15234 (22.4%)
zaf (South Africa)17829 (16.3%)
egy (Egypt)12328 (22.8%)
col (Colombia)9727 (27.8%)
ita (Italy)32127 (8.4%)
grc (Greece)9926 (26.3%)
See more test results classified by country
Geographic Distribution:
We assess the geographic distribution of clients seen in the last year both to measure the extent of our testing coverage as well as to determine if any region of the world is more susceptible to spoofing. The value shown is the percentage of tested IP blocks (including those behind a NAT) that show any evidence of spoofing.
Source address filtering:
Each test run spoofs addresses from adjacent netblocks, beginning with a direct neighbor (IP address + 1) all the way to an adjacent /8. The following figure displays the granularity of source address filtering (typically employed by service providers) along paths tested in our study. If the filtering is occurring on a /8 boundary for instance, a client within that network is able to spoof 16,777,215 other addresses. Using the tracefilter mechanism, we measure filtering depth; where along the tested path (from each client to the server), filtering is employed. Depth represents the number of IP routers through which the client can spoof before being filtered.
Filtering Filtering
About:
This report, provided by CAIDA, intends to provide a current aggregate view of ingress and egress filtering and IP Spoofing on the Internet. While the data in this report is the most comprehensive of its type we are aware of, it is still an ongoing, incomplete project. The data here is representative only of the netblocks, addresses and autonomous systems (ASes) of clients from which we have received reports. The more client reports we receive the better - they increase our accuracy and coverage.

Download and run our testing software to automatically contribute a report to our database.

Feedback, comments and bug fixes welcome; contact spoofer-info at caida.org.

Last Modified